Slide Download
How today's shifting AI powered Criminal Business Models affect modern Enterprise Defence Strategies
4/15 10:00 - 10:30
How today's shifting AI powered Criminal Business Models affect modern Enterprise Defence Strategies
Robert McArdle
Robert McArdle
Trend Micro
The Digital Blockade War Game: What we learned at DefCon and Blackhat
4/15 11:00 - 11:30
The Digital Blockade War Game: What we learned at DefCon and Blackhat
Nina Kollars
Nina Kollars
United States Naval War College
Jason Vogt
Jason Vogt
United States Naval War College
CRA Countdown: Bridging the Gap between ISA/IEC 62443 and CRA
4/15 13:30 - 14:00
CRA Countdown: Bridging the Gap between ISA/IEC 62443 and CRA
Michael Yao
Michael Yao
ISA Taiwan Section
AI-driven risks: Machine identity management and the challenge of TLS certificates
4/15 14:00 - 14:30
AI-driven risks: Machine identity management and the challenge of TLS certificates
Billy Chuang
Billy Chuang
CyberArk
Experience sharing on introducing NIST CSF to address cybersecurity risks
4/15 14:00 - 14:30
Experience sharing on introducing NIST CSF to address cybersecurity risks
Lai, ChuCheng (George)
Lai, ChuCheng (George)
Fubon Life Insurance
From Basic Defense to Advanced Threat Hunting: Building Comprehensive Cybersecurity Resilience
4/15 14:00 - 14:30
From Basic Defense to Advanced Threat Hunting: Building Comprehensive Cybersecurity Resilience
Edward Yu
Edward Yu
Blackcat Information Corp.
Global AI-Powered Threat Prediction: Building Joint Security Defense for the Digital Era
4/15 14:00 - 14:30
Global AI-Powered Threat Prediction: Building Joint Security Defense for the Digital Era
Tom Lin
Tom Lin
Twister5
Immerse Taipei : Opening & CyberSecurity Survey Report
4/15 14:00 - 14:30
Immerse Taipei : Opening & CyberSecurity Survey Report
Ben Munroe
Ben Munroe
Cloudflare
The key ingredient in modern cyber attack - an Infostealer
4/15 14:00 - 14:30
The key ingredient in modern cyber attack - an Infostealer
Leonid Rozenberg
Leonid Rozenberg
Hudson Rock
The Silent Pandemic Strikes: A Triple Approach to Defending Against Mobile Network Vulnerabilities in IIoT
4/15 14:30 - 15:15
The Silent Pandemic Strikes: A Triple Approach to Defending Against Mobile Network Vulnerabilities in IIoT
Alpha Chen
Alpha Chen
Proscend Communications Inc.
Jason Huang
Jason Huang
CTOne Inc.
A Decade of Trust:HCLSoftware Empowering Digital Transformation with Proven Security
4/15 14:45 - 15:15
A Decade of Trust:HCLSoftware Empowering Digital Transformation with Proven Security
Terry Leung
Terry Leung
HCLSoftware
Black Hat Update Techniques: Exploiting Overtrusted System Updates to Weaken All Security Defenses
4/15 14:45 - 15:15
Black Hat Update Techniques: Exploiting Overtrusted System Updates to Weaken All Security Defenses
Yi-An Lin
Yi-An Lin
TXOne Network Inc.
Blind spots in compliance: When database audits become a self-defeating investment
4/15 14:45 - 15:15
Blind spots in compliance: When database audits become a self-defeating investment
Santa Ye
Santa Ye
Dataisec Technology Inc.
Cybersecurity Threats response strategies in the AI era
4/15 14:45 - 15:15
Cybersecurity Threats response strategies in the AI era
null

Decoding 5G Big Data: Practical Applications and New Perspectives in Network-Wide Traffic Analysis and Security
4/15 14:45 - 15:15
Decoding 5G Big Data: Practical Applications and New Perspectives in Network-Wide Traffic Analysis and Security
Jacob Chiang
Jacob Chiang
Genie Networks
From Data Classification to Behavioral Analysis: How Forcepoint Uses AI to Safeguard Critical Data?
4/15 14:45 - 15:15
From Data Classification to Behavioral Analysis: How Forcepoint Uses AI to Safeguard Critical Data?
Ray Pai
Ray Pai
Forcepoint
Modernize Your Applications with AI and Advanced Security
4/15 14:45 - 15:15
Modernize Your Applications with AI and Advanced Security
Steven Yang
Steven Yang
Cloudflare
Security First: Building a Zero Trust Network
4/15 14:45 - 15:15
Security First: Building a Zero Trust Network
Alex Chen
Alex Chen
Hewlett Packard Enterprise
Strengthening the Core of the Enterprise: Fortifying Data Defense with NetApp Technology
4/15 14:45 - 15:15
Strengthening the Core of the Enterprise: Fortifying Data Defense with NetApp Technology
Wayne Wu
Wayne Wu
NetApp
Supply Chain Vulnarability In DevSecOps, Incidents, Lesson Learned.
4/15 14:45 - 15:15
Supply Chain Vulnarability In DevSecOps, Incidents, Lesson Learned.
Lambert Lin
Lambert Lin
Docutek Solutions Inc.
Chips Are Still Under Risk: A Look at Chip Fabrication Security from the SECS/GEM Standard Perspective
4/15 15:20 - 15:50
Chips Are Still Under Risk: A Look at Chip Fabrication Security from the SECS/GEM Standard Perspective
Yenting Lee
Yenting Lee
TXOne Networks Inc.
From OT to CPS: The Evolution of OT Security
4/15 15:30 - 16:00
From OT to CPS: The Evolution of OT Security
Jason Chan
Jason Chan
Claroty
Hybrid Everywhere: How Does Citrix Address Security Challenges?
4/15 15:30 - 16:00
Hybrid Everywhere: How Does Citrix Address Security Challenges?
Heitorson Hung
Heitorson Hung
Citrix Asean
Information Security Challenges in the AI Era
4/15 15:30 - 16:00
Information Security Challenges in the AI Era
Kent Chou
Kent Chou
OPSWAT
Post-Quantum Cryptography Migration Trends
4/15 15:30 - 16:00
Post-Quantum Cryptography Migration Trends
Jimmy Chen
Jimmy Chen
National Taiwan University
Constructing Trusted Execution Environments (TEE) Using RISC-V
4/15 15:50 - 16:20
Constructing Trusted Execution Environments (TEE) Using RISC-V
Warren Chen
Warren Chen
Andes Technology
AI Cybersecurity Decoded: Future-Proofing Against Threats
4/15 16:15 - 16:45
AI Cybersecurity Decoded: Future-Proofing Against Threats
Bruce Lan
Bruce Lan
Palo Alto Networks
Do you think having an EDR makes you secure? Explore how attackers bypass defense systems.
4/15 16:15 - 17:00
Do you think having an EDR makes you secure? Explore how attackers bypass defense systems.
Andy Chuang
Andy Chuang
CHT Secueiry Co., Ltd.
Red Team Assessment and Cybersecurity Product Collaboration Cycle: Best Practices for Strengthening Organizational Defense
4/15 16:15 - 17:00
Red Team Assessment and Cybersecurity Product Collaboration Cycle: Best Practices for Strengthening Organizational Defense
Bowen Hsu
Bowen Hsu
DEVCORE Co., Ltd.
The SuperHat Trick of Game Protection: Teardown of Modern Hyper-V Architecture to Defeat Kernel Exploit Threats like a King
4/15 16:15 - 16:45
The SuperHat Trick of Game Protection: Teardown of Modern Hyper-V Architecture to Defeat Kernel Exploit Threats like a King
Yao-De Tsai
Yao-De Tsai
TXOne Networks Inc
Shenghao Ma
Shenghao Ma
TXOne Networks Inc.
Unlocking Potential Together: The Role of Partners in Cloudflare's Vision
4/15 16:15 - 16:45
Unlocking Potential Together: The Role of Partners in Cloudflare's Vision
Jo Goh
Jo Goh
Cloudflare