Today, enterprises are facing increasingly complex and serious security challenges. People will connect to corporate networks, cloud databases or various applications from various locations and using various devices. This also makes it easier for hackers to impersonate corporate employees. or certified third parties to carry out targeted attacks such as data theft or encryption and ransomware. Simply relying on traditional firewalls, VPNs and other network security protections is no longer able to cope with evolving threats and attacks. Enterprises can no longer assume that pre-verified or trusted devices and user identities are safe.
In the face of a complex and frequently changing workplace, "zero trust" is an important strategy to strengthen the security of critical data and critical systems. Compared with traditional information security architecture, this is a more advanced, flexible and effective information security method. More and more organizations are turning to Zero Trust Secure Access (ZTSA) architecture. This architecture assumes that both internal and external networks are not trustworthy and takes appropriate security measures to ensure the safety of data and assets.
This agenda will share and implement how to use Zero Trust Secure Access to help enterprises implement a zero-trust architecture and protect their data and assets based on information security priority judgment and zero-trust automated access control.
It is recommended to be an organizational information security manager/personnel, or have practical experience in IT maintenance and operation
TOPIC / TRACK
CyberLAB
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4C
LANGUAGE
Chinese
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。