4/17 (Thu.) 15:05 - 15:35 7F 701A

IS Cybersecurity guy just all mouth? A brief discussion on the division of labor and cooperation between the first (IT) and second lines (IS) of cybersecurity defense

When the CISO segregated the duties with the CIO, how should the scope of "information security(IS)" be defined? The disaster recovery is addressed "Availability", issues, which is one of the CIA triad, and application-level vulnerability scan is for cybersecurity, so should them all be under IS management?

After 40 or 50 IS systems are implemented, should'nt we consider the effectiveness and measurability in addition to availability and efficiency? In addition, is the total cybersecurity budget only the budget of the IS unit? 

Stone Fang
SPEAKER
Shin Kong Financial Holding Company
Vice President, Information Security Department

TOPIC / TRACK
FINSEC Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701A

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
CISO
Human Factor
Governance