4/15 (Tue.) 15:30 - 16:00 4F 4A

The Ultimate Guide to Protecting Enterprise Sensitive Documents

Protecting sensitive documents from leaks is a major challenge for businesses.

This talk extracts practical approaches for intelligent protection of sensitive documents from hundreds of real cases:

1.Comprehensive Strategy – Introducing a framework of ""Security Defense, Good management, and Successful litigation"" to help businesses establish a solid document protection strategy.

2.Intelligent Document Classification – The key requirement of the Trade Secrets Act is that businesses must classify and categorize their documents. This session includes practical cases on how AI technology helps identify sensitive documents and conduct classification, categorization, and auditing.

3.Encryption & Secure File Sharing – File encryption must consider various devices and file formats, as well as secure internal and external sharing, searchability, and direct integration with cloud or other business systems.

4.Implementing Zero Trust: Based on CISA’s Zero Trust Maturity Model 2.0, the ""Data"" and ""Optimal"" guidelines, this session covers best practices for data security, including anomaly access analysis and dynamic access control. Insights from nearly 100 enterprise cases will provide a practical roadmap for implementation.

5.Leak Investigation & Litigation Assessment – Evidence collection and legal assessment can be time-consuming. Automating evidence reports and enhancing user behavior anomaly detection are essential steps after a data leak.

Winston Lo
SPEAKER
SECUCOCX INC.
Founder

TOPIC / TRACK
Data Security Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4A

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Data Security
Data Leak Prevention
Insider Threat