5 / 15 (Wed.) 15:00 - 17:00 4F 4C

When threats are everywhere, how to implement zero trust security?

Today, enterprises are facing increasingly complex and serious security challenges. People will connect to corporate networks, cloud databases or various applications from various locations and using various devices. This also makes it easier for hackers to impersonate corporate employees. or certified third parties to carry out targeted attacks such as data theft or encryption and ransomware. Simply relying on traditional firewalls, VPNs and other network security protections is no longer able to cope with evolving threats and attacks. Enterprises can no longer assume that pre-verified or trusted devices and user identities are safe.

In the face of a complex and frequently changing workplace, "zero trust" is an important strategy to strengthen the security of critical data and critical systems. Compared with traditional information security architecture, this is a more advanced, flexible and effective information security method. More and more organizations are turning to Zero Trust Secure Access (ZTSA) architecture. This architecture assumes that both internal and external networks are not trustworthy and takes appropriate security measures to ensure the safety of data and assets.

This agenda will share and implement how to use Zero Trust Secure Access to help enterprises implement a zero-trust architecture and protect their data and assets based on information security priority judgment and zero-trust automated access control.

Session Objectives
  1. Let students understand hacker thinking and techniques through actual cases.
  2. The actual operation platform uses a zero-trust secure access architecture to control personnel and devices.
  3. Experience VPN-free access control. Whether from the outside or the company's intranet, you can connect to corporate resources safely.
  4. Manage and control based on user identity, device status and real-time security status to ensure the implementation of the micro-segmentation principle of least privileges.
Session Summary
  1. From recent actual cases of hacker attacks, understand why companies need ZTSA?
  2. Practically experience how ZTSA provides a secure access channel and multiple security verifications of identity and device.
  3. Guide students to think about zero trust security strategies and implementation guidelines through the complete picture of hacking incidents.
Skills Requirement You Should Have

It is recommended to be an organizational information security manager/personnel, or have practical experience in IT maintenance and operation

Limit on the Number of Attendee
20 people
邱柏翰 (Peter Chiu)
SPEAKER
Senior Technical Consultant
Trend Micro

TOPIC / TRACK
CyberLAB

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4C

LANGUAGE
Chinese