Slide Download
Quark Script - Dig Vulnerabilities in the BlackBox
5/14 13:00 - 13:30
Quark Script - Dig Vulnerabilities in the BlackBox
KunYu Chen
KunYu Chen
Telecom Technology Center
YuShiang Dang
YuShiang Dang
Telecom Technology Center
Opening Critical Infrastructure:Cellular Network Attack Vectors
5/14 13:30 - 14:00
Opening Critical Infrastructure:Cellular Network Attack Vectors
Salim S I
Salim S I
CTOne
Analyzing the Importance of Database Activity Monitoring (DAM) and Data Security through Personal Data Protection Act.
5/14 14:00 - 14:30
Analyzing the Importance of Database Activity Monitoring (DAM) and Data Security through Personal Data Protection Act.
Santa Ye
Santa Ye
Dataisec Technology Inc.
Cybersecurity in the Era of AI : Challenges and Innovations
5/14 14:00 - 14:30
Cybersecurity in the Era of AI : Challenges and Innovations
Vic Wu
Vic Wu
Microsoft Taiwan
Defence Together: Zero Trust Framework Maturity Assessment Methodology and Practical Implementation Strategies for Public & Private Sectors
5/14 14:00 - 14:30
Defence Together: Zero Trust Framework Maturity Assessment Methodology and Practical Implementation Strategies for Public & Private Sectors
Sunrise Chen
Sunrise Chen
uniXecure
Empowering the Future of SOC: Multi layered AI-Powered Cybersecurity: How to address the mounting talent shortage in cybersecurity.
5/14 14:00 - 14:30
Empowering the Future of SOC: Multi layered AI-Powered Cybersecurity: How to address the mounting talent shortage in cybersecurity.
Wayne Phillips
Wayne Phillips
SentinelOne
HCL Software Key Messaging, Portfolio Roadmap and Strategy
5/14 14:00 - 14:30
HCL Software Key Messaging, Portfolio Roadmap and Strategy
Lily Wang
Lily Wang
HCL Software
How AI-powered user behavioral analysis helps on insider threats?
5/14 14:00 - 14:30
How AI-powered user behavioral analysis helps on insider threats?
YuFu Hsu
YuFu Hsu
FineArt Technology
IEC 62443 and IoT Integration: Key Role of Machine Identity Management
5/14 14:00 - 14:30
IEC 62443 and IoT Integration: Key Role of Machine Identity Management
Frank Chiu
Frank Chiu
CHANGING Information Technology Inc.
With AI/ML as the core for Data Security– data discovery, management and  loss prevention
5/14 14:00 - 14:30
With AI/ML as the core for Data Security– data discovery, management and loss prevention
Leon Hung
Leon Hung
Forcepoint
當我在雲端簽下名字後,沒想到開啟了無紙化世界的大門!
5/14 14:00 - 14:30
當我在雲端簽下名字後,沒想到開啟了無紙化世界的大門!
江彬榮博士
江彬榮博士
中華電信資訊技術分公司
Static strategy stale? ECU cybersecurity design approach in the SDV era
5/14 14:30 - 15:00
Static strategy stale? ECU cybersecurity design approach in the SDV era
Ian Chu
Ian Chu
VicOne
AI Security : Microsoft Copilot for Security In-Depth Analysis
5/14 14:45 - 15:15
AI Security : Microsoft Copilot for Security In-Depth Analysis
Jaron Lin
Jaron Lin
Microsoft Taiwan
Build a Secure Supply Chain: Best Practices of Product Security in Delta
5/14 14:45 - 15:15
Build a Secure Supply Chain: Best Practices of Product Security in Delta
Wei-Cheng Tian
Wei-Cheng Tian
Delta Electronics Inc.
Cybersecurity Governance Blueprint in Practice: Building a Robust Cybersecurity Framework and Response Strategy
5/14 14:45 - 15:15
Cybersecurity Governance Blueprint in Practice: Building a Robust Cybersecurity Framework and Response Strategy
Albert Tsao
Albert Tsao
Westcon
Czech Cyber Edge
5/14 14:45 - 15:15
Czech Cyber Edge
Hana Kubátová
Hana Kubátová
CTU in Prague
Roman Cermak
Roman Cermak
CyberSecurityHub CZ
Dominika Regéciová
Dominika Regéciová
Brno University of Technology, Faculty of Information Technology (FIT BUT)
DevSecOps Tools to Secure Software at The Speed Your Business Demands
5/14 14:45 - 15:15
DevSecOps Tools to Secure Software at The Speed Your Business Demands
Lambert Lin
Lambert Lin
Docutek Solutions
HCL Verse Email: Cloud or On-Premises, the Choice is Yours.
5/14 14:45 - 15:15
HCL Verse Email: Cloud or On-Premises, the Choice is Yours.
Ping.chen
Ping.chen
HCL Software
The Past, Present and Future of Automation
5/14 14:45 - 15:15
The Past, Present and Future of Automation
KhaiChen Wong
KhaiChen Wong
Swimlane Inc.
TWCERT服務介紹
5/14 14:45 - 15:15
TWCERT服務介紹
林易澍
林易澍
National Institute of Cyber Security
Zero Trust Maturity with Caso SASE Cloud SSE 360
5/14 14:45 - 15:15
Zero Trust Maturity with Caso SASE Cloud SSE 360
Colin Xia
Colin Xia
Cato Networks
與駭客對決:零信任網路下的 AI 智能與科技之戰
5/14 14:45 - 15:15
與駭客對決:零信任網路下的 AI 智能與科技之戰
孫漢傑 博士
孫漢傑 博士
中華電信研究院
Industrial Internet of Things (IIoT) Cybersecurity Strategies: Comprehensive Protection from Cloud Systems to Endpoint Devices
5/14 15:20 - 15:50
Industrial Internet of Things (IIoT) Cybersecurity Strategies: Comprehensive Protection from Cloud Systems to Endpoint Devices
SZ Lin
SZ Lin
International Society of Automation, Taiwan Section
Comprehensive Exploration of the Applicability and Performance of Taiwanese Language Models in Cybersecurity
5/14 15:45 - 16:15
Comprehensive Exploration of the Applicability and Performance of Taiwanese Language Models in Cybersecurity
Chen, Shu-Yuan
Chen, Shu-Yuan
CyCraft Technology
Create Perfect Secure DevOps with No Blind Spots in Application Security Testing
5/14 15:45 - 16:15
Create Perfect Secure DevOps with No Blind Spots in Application Security Testing
Kevin Chia
Kevin Chia
HCL Software
Cybersecurity Risk and Sustainable Management: SecurityScorecard Leads the New Era of Supply Chain and ESG Security Governance
5/14 15:45 - 16:15
Cybersecurity Risk and Sustainable Management: SecurityScorecard Leads the New Era of Supply Chain and ESG Security Governance
Fio Lee
Fio Lee
SecurityScorecard
Defending against Highly Sophisticated Cyberattacks with AI-powered Holistic Zero Trust Platform
5/14 15:45 - 16:15
Defending against Highly Sophisticated Cyberattacks with AI-powered Holistic Zero Trust Platform
Koay Choon Ping
Koay Choon Ping
Zscaler
NDR 技術在零信任安全策略中的關鍵作用
5/14 15:45 - 16:15
NDR 技術在零信任安全策略中的關鍵作用
Sam Lin
Sam Lin
ExtraHop
Reviewing the past and learning the new in configuration security management ~ How NIST SP 800-128 adapts to the emerging technology environment and international standards
5/14 15:45 - 16:15
Reviewing the past and learning the new in configuration security management ~ How NIST SP 800-128 adapts to the emerging technology environment and international standards
Yung-Wei.W.Tang
Yung-Wei.W.Tang
PwC Taiwan
Security for AI: Data Governance in the Era of AI
5/14 15:45 - 16:15
Security for AI: Data Governance in the Era of AI
Lisa Chen
Lisa Chen
Microsoft Taiwan
Am*ng us, but in The Factory:  Uncover various kinds of Man-in-the-Middle (MitM) attacks Against OT Environment.
5/14 16:20 - 16:50
Am*ng us, but in The Factory: Uncover various kinds of Man-in-the-Middle (MitM) attacks Against OT Environment.
Linwei Tsao
Linwei Tsao
TXOne Networks
Asia Digital Fraud Research Report 2023
5/14 16:30 - 17:00
Asia Digital Fraud Research Report 2023
Paul Liu
Paul Liu
Digital Trust Association in Taiwan
Azure Ascend & Assault from Above
5/14 16:30 - 17:30
Azure Ascend & Assault from Above
Jimmy Su
Jimmy Su
CyCraft Technology
Echo Lee
Echo Lee
CyCraft Technology
LLM Adversarial Attacks – a threat that cybersecurity experts should not ignore
5/14 16:30 - 17:00
LLM Adversarial Attacks – a threat that cybersecurity experts should not ignore
Stanley Chou
Stanley Chou
OneDegree
Q-Day 快要到來了?那是什麼?國安局、總統府應該緊張嗎?
5/14 16:30 - 17:00
Q-Day 快要到來了?那是什麼?國安局、總統府應該緊張嗎?
Kuan-Tsae Huang
Kuan-Tsae Huang
Chelpis Quantum Tech
Revolutionizing Endpoint Management and Security with HCL BigFix 11 fueled by AI
5/14 16:30 - 17:00
Revolutionizing Endpoint Management and Security with HCL BigFix 11 fueled by AI
C. K. Lin
C. K. Lin
HCL Software
Smartly managing enterprise internet access, surveilling hackers' every move from external to internal domains.
5/14 16:30 - 17:00
Smartly managing enterprise internet access, surveilling hackers' every move from external to internal domains.
Peter Peng
Peter Peng
NEITHNET
系統核心防護組合拳:從晶片原理綜觀 Windows 11 核心既有防禦手段是否有效?
5/14 16:30 - 17:30
系統核心防護組合拳:從晶片原理綜觀 Windows 11 核心既有防禦手段是否有效?
Sheng-Hao Ma
Sheng-Hao Ma
TXOne Networks
科技風險管理的演進 (一):從理論到跨國金融機構科技風險治理實務
5/14 16:30 - 17:00
科技風險管理的演進 (一):從理論到跨國金融機構科技風險治理實務
小P
小P
ISACA
科技風險管理的演進 (二):從理論到跨國金融機構科技風險治理趨勢 - 網絡風險定量分析 (CRQ-Cyber Risk Quantification Analysis)
5/14 17:00 - 17:30
科技風險管理的演進 (二):從理論到跨國金融機構科技風險治理趨勢 - 網絡風險定量分析 (CRQ-Cyber Risk Quantification Analysis)
小P
小P
ISACA