4/17 (Thu.) 14:30 - 14:50 7F 701A

Insider Threats – A Silent Killer in Financial Security

Insider threats remain one of the most persistent and dangerous challenges in the financial sector, contributing to significant data breaches and financial losses. Unlike external cyberattacks, insider threats exploit legitimate access, making them difficult to detect using traditional security methods. These threats can arise from malicious insiders, negligent employees, or compromised accounts, posing severe risks to financial institutions.

This session will explore how Trellix Wise AI and Trellix NDR (Network Detection and Response) provide a proactive, AI-driven approach to insider threat detection. By leveraging behavioral analytics and machine learning, Wise AI continuously monitors user activities to detect anomalies, while NDR analyzes network traffic to uncover hidden patterns of suspicious behavior, such as unauthorized data movement or lateral access attempts. Together, these solutions deliver real-time threat visibility, risk-based alerting, and automated response capabilities to stop insider threats before they escalate.

Additionally, we will highlight Trellix’s latest innovation—Attack Path Discovery, which helps security teams map out potential insider attack pathways before they are exploited. By identifying high-risk access routes and security gaps, Attack Path Discovery enables financial institutions to strengthen defenses proactively, reducing the risk of insider-driven breaches.

Attendees will gain insights into best practices for strengthening security operations, enhancing SOC efficiency, and implementing AI-powered defenses against insider risks. Learn how Trellix’s cutting-edge technologies can help financial organisations protect their most valuable assets from internal threats, ensuring operational resilience and regulatory compliance.

Jeff Yeo
SPEAKER
Trellix
Senior Manager Solution Engineering, ASIA

TOPIC / TRACK
FINSEC Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701A

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
AI
Network Detection & Response

More Session
Maritime Cyber Safety: Have we ever started, or have we even started?
Ken Soh / Athena Dynamics (BH Global) CEO
Data Protection by Design Practices for ICT Systems
I-Chen Lin / Division Chief Division of Privacy and Technology, Preparatory Office of Personal Data Protection Commission
Deep Dive into SBOM – Practical Challenges and Solutions for SBOM Implementation
Jason Huang / TXOne Networks Inc. Staff Software Engineer, PSIRT and Threat Research Team
Yenting Lee / TXOne Networks Inc. Senior Threat Researcher, PSIRT and Threat Research
The Gap Between Trade Secret and Information Security – Differences in Classification Approaches
Tsou, Tsung-Hsuan / Institute for Information Industry Deputy Director General, Innovation & Intellectual Property Center in Science & Technology Law Institute
Shih, Ping-An / Innovation & Intellectual Property Center in Science & Technology Law Institute, Institute for Information Industry Section Manager
Fang, Wen-Chen / Innovation & Intellectual Property Center in Science & Technology Law Institute, Institute for Information Industry Project Manager
Lin, Liu-Chin / Innovation & Intellectual Property Center in Science & Technology Law Institute, Institute for Information Industry Project Manager
Hsu, Chieh-Yi / Innovation & Intellectual Property Center in Science & Technology Law Institute, Institute for Information Industry Researcher
The Threats of Quantum Computers to the Security of Subscription Concealed Identifier (SUCI) and the Importance of Quantum Safe Network
Yi-Hsueh-Tsai / Institute for Information Industry Technical Manager
Building cybersecurity resilience in the cloud era
Jarvis Luo / Axis Communications Key Account Manager