Winston Lo

SECUCOCX INC. / Founder

Ph.D. in Computer Science, University of Maryland, USA

Current Positions:

  • Founder of SECUDOCX INC.
  • Founder of AGILELEAN INC.
  • Director of Tunghai AI Center
  • Visiting Professor at Tunghai University

Former Positions:

  • Dean of Student Affairs, Tunghai University
  • Chair of the Department of Computer Science, Tunghai University
  • Chair of the Department of Information Management, Tunghai University
  • Director of the Computing Center, Tunghai University
  • Dean of the Cloud Innovation school
SPEECH
4/15 (Tue.) 15:30 - 16:00 4F 4A Data Security Forum
The Ultimate Guide to Protecting Enterprise Sensitive Documents

Protecting sensitive documents from leaks is a major challenge for businesses.

This talk extracts practical approaches for intelligent protection of sensitive documents from hundreds of real cases:

1.Comprehensive Strategy – Introducing a framework of ""Security Defense, Good management, and Successful litigation"" to help businesses establish a solid document protection strategy.

2.Intelligent Document Classification – The key requirement of the Trade Secrets Act is that businesses must classify and categorize their documents. This session includes practical cases on how AI technology helps identify sensitive documents and conduct classification, categorization, and auditing.

3.Encryption & Secure File Sharing – File encryption must consider various devices and file formats, as well as secure internal and external sharing, searchability, and direct integration with cloud or other business systems.

4.Implementing Zero Trust: Based on CISA’s Zero Trust Maturity Model 2.0, the ""Data"" and ""Optimal"" guidelines, this session covers best practices for data security, including anomaly access analysis and dynamic access control. Insights from nearly 100 enterprise cases will provide a practical roadmap for implementation.

5.Leak Investigation & Litigation Assessment – Evidence collection and legal assessment can be time-consuming. Automating evidence reports and enhancing user behavior anomaly detection are essential steps after a data leak.