Protecting sensitive documents from leaks is a major challenge for businesses.
This talk extracts practical approaches for intelligent protection of sensitive documents from hundreds of real cases:
1.Comprehensive Strategy – Introducing a framework of ""Security Defense, Good management, and Successful litigation"" to help businesses establish a solid document protection strategy.
2.Intelligent Document Classification – The key requirement of the Trade Secrets Act is that businesses must classify and categorize their documents. This session includes practical cases on how AI technology helps identify sensitive documents and conduct classification, categorization, and auditing.
3.Encryption & Secure File Sharing – File encryption must consider various devices and file formats, as well as secure internal and external sharing, searchability, and direct integration with cloud or other business systems.
4.Implementing Zero Trust: Based on CISA’s Zero Trust Maturity Model 2.0, the ""Data"" and ""Optimal"" guidelines, this session covers best practices for data security, including anomaly access analysis and dynamic access control. Insights from nearly 100 enterprise cases will provide a practical roadmap for implementation.
5.Leak Investigation & Litigation Assessment – Evidence collection and legal assessment can be time-consuming. Automating evidence reports and enhancing user behavior anomaly detection are essential steps after a data leak.
TOPIC / TRACK
Data Security Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4A
LEVEL
Intermediate Intermediate sessions focus on
cybersecurity
architecture, tools, and practical applications, ideal for
professionals with a basic understanding of
cybersecurity.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Data Security
Data Leak Prevention
Insider Threat
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。