Employing an abundant level of foresight, experience, perspectives and vision into cybersecurity, leading international and local cybersecurity experts gather to offer an inspirational tour, introducing a different side of cybersecurity in practice.
An endless string of attack methods and target arenas continually challenges cybersecurity protection based on traditional methodologies. However, due to the pandemic, working-from-home has become the latest trend, which further highlights the insufficiency of traditional defense frameworks. The Zero Trust Architecture that emerged in recent years has become highly valued because it differs from the traditional border protection methodology. This is a brand-new cybersecurity future that all guardians on the front line of cybersecurity defense must learn about ASAP.
The US-Taiwan AIT Day, launched by iThome in collaboration with the AIT Business Group, will debut at CYBERSEC for the first time, featuring the latest cybersecurity trends and foresight technology. It is also an innovative and excellent platform facilitating collaboration, interaction and exchange between the cybersecurity industries of Taiwan and the U.S.
Trust must be established as the foundation of finance, and the longevity of fintech in the process of financial industry transformation will not be possible without the integration of FinSec to ensure the resilience of the financial industry. Come and learn about brand new finance innovation opportunities in open banking and APIs, as well as the big challenge of formulating financial resilience.
The manufacturing industry has become the target of cybercriminal organizations, with continuous attempts via targeted ransomware attacks, extortion style DDoS attacks, and supply-chain attacks. Furthermore, the trend of malicious national cyber armies stealing intelligence from high-tech industries has worsened. How should the manufacturing industry deal with the new norm of persistent cybersecurity threats and strengthen response mechanisms? Experts will be providing their analysis on site.
Ransomware attacks on medical institutions have led to disastrous tragedies. Disruptions to medical services have resulted in many unnecessary deaths, as patients requiring emergency treatment were forced to transfer to other hospitals. Putting patients first is an essential principle to medical practices, and cybersecurity has gradually become one of the keys to healthcare safety. As a result, the Healthcare Security Forum has invited the cybersecurity chiefs of several hospitals to share the latest in healthcare cybersecurity trends as well as their experiences managing cybersecurity in a medical setting.
Ransomware integration and APT cyber-warrior tactics have evolved into targeted cyberattacks, becoming the biggest cyber weaponry to date! Numerous well-known corporations have suffered from such attacks. Notorious cyber criminal organizations not only encrypt corporate data for extortion, but also threaten to expose corporate data for even higher ransoms. Come and learn how to prevent this major type of threat, which will likely target corporations for the next few years.
Operational technology (OT) cybersecurity breaches are occurring with greater frequency, with ever increasing deadly impacts. For example, a water purification plant system was tempered by hackers recently, causing the addition of a large amount of sodium hydroxide (NaOH) in the water, making it too dangerous for drinking. The security of OT systems has always been a major challenge. As a result, the OT Security Forum invites experts to explore OT security from various aspects.
Standing guard at the corporate cybersecurity defense front line, the Blue Team shoulders major responsibilities such as intrusion prevention, detection of malicious behavior, intelligence analysis and responding to cybersecurity incidents. They can be considered as the heroes of corporate cybersecurity operations. The Blue Team must also keep up to date and adopt more effective tools and methods to handle cyberattack tactics that are constantly evolving. Come together with cybersecurity experts in a brainstorming challenge to strengthen the Blue Team’s safeguarding capacity.
In response to the latest trend of DevOps - a cloud-based development model featuring rapid launch and frequent updates – how to safeguard the security of such automated software development methods will become the internal requirement of every development team in the next few years. High quality software service is only possible with rapid launch paired with solid cybersecurity.
Welcome to the 701 Vulnerability Research Lab. Provided by CYBERSEC for cybersecurity researchers, this stage is dedicated to the exploration of software vulnerabilities. They shall present vulnerability and malware discovered on the frontline of cyber warfare, explore the principles of software vulnerability, analyze the vulnerability exploitation mechanisms, and share the solutions in response to cybersecurity vulnerabilities.
Witness diverse applications of AI and machine-learning technology integrated into the cybersecurity field. Here, you can exchange information on methods to strengthen cybersecurity protection via machine-learning technology. Moreover, data scientists will share AI/ML applications in the intelligence analysis of cyber threats, as well as the first revelation of the password habits of the people in Taiwan through the use of big data analysis.
Following the launch of a new generation of high-speed 5G mobile networks, the highly anticipated innovative network applications and Internet of Everything (IoE) will gradually become reality. The operational flow of the world will further integrate with the Internet. As a result, 5G networks must shoulder the greater responsibility in terms of operational safety or resilience. 5G network security is not just an issue of telecommunication, but also a requirement of national security. Thus, 5G security issues must be explored as soon as possible.
“Cyber Free Talk” serves as a stage exclusively for cybersecurity experts without predetermined topics or content restrictions. Here, experts are free to speak on any topic of interest, which may be technical discussions, personal perspectives on particular subjects, or impromptu subjects. Expect to be surprised!
Do you want to better understand the leading brands of cybersecurity protection? Just make sure you are here on the cybersecurity Brand Day! All the leading cybersecurity brands are gathered here, each preparing a whole afternoon of agenda that will share the latest and greatest of cybersecurity knowledge. Experts will also be on hand for exchanges and to answer all your questions.
In Taiwan, there is no lack of world-class cybersecurity researchers. They have long been defending against hostile forces from around the world, while gaining international recognition for their research and analyses. Today, as geopolitical conflicts rise around the globe, they are sure to garner even more attention with their contributions to the international community.
We would like to express our gratitude to the numerous cybersecurity researchers who will be sharing their expertise at CYBERSEC 2021. The schedule for presentations by Taiwan researchers is listed as follows. Looking to master the latest in cybersecurity research? Want to get to know the style of Taiwan cybersecurity researchers? Don’t miss the following sessions!
In this portion of the Brand Day, Systex Corporation shall focus on the transformations brought about by the IOB era. We will tackle how the human factor consists an increasing concern in the face of connectivity and steps in which corporations may take to prevent these risks, including the building of a human firewall. Following this topic, we shall walk you through the cybersecurity landscape post-Covid 19 coming from the hacker point of view, reflecting on the necessary measures to effectively safeguard our business environments.
Systex Corporation shall share its recipe of cybersecurity success: an evolution of passive reaction to active engagement, accomplished through faithful implementation of cybersecurity simulations, building awareness and developing an experienced team within the whole organization. We end the talk with a return to the legal aspect, directing thought to the scarcity of qualified cybersecurity talent in the country and how we, as a leading firm, are being the change to address this shortfall to ensure that national goals for cybersecurity and good governance are continuously achieved.
There is no 100% security in cyber world. The SolarWinds third-party supply chain issue proved that no matter how strong the defense is, it is impossible to guarantee 100% security. The hacker and malicious attacks are always a continuous problem to enterprise, and sooner or later matters. Cyber Resilience is the primary to be focus and enhanced to any enterprise, advanced planning and deployment that prepares for the breach of the security defense line. iSecurity pointed out 4 steps for cyber resilience to be more stronger: Stop More Attacks, Find Breach Faster, Fix Breaches Faster, Reduce Breach Impact.