CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Blue Team Forum
  • May 4th (Tue)
  • 16:00 - 16:30
  • 7F 701H

Deloitte Session

The relationship between the APT organization’s attacks and the threat of ransomware threats to many companies has caused many corporate images and assets to be damaged and affected greatly.

How to deal with the challenges faced by traditional information security under the wave of technology?

The international framework for reference sharing in this agenda With the defense-in-depth strategy, discuss with the audience the simple and concise key points of the three management aspects of People / Process / Technology, assist the enterprise in creating the technical management process and response strategy, and share about the security configuration parameter evaluation

Finally, share the experience of evaluating the overall defense-in-depth mechanism, assisting clients in completing the information security blueprint planning, and analyzing the gap in information security technology maturity.

Security Architecture Security by DesignBlue Team
Kuro Huang

Kuro Huang

Senior Consultant, Deloitte

Kuro Huang is currently a senior consultant of Deloitte. He has experience in network architecture security analysis, information security strategy blueprint planning, information security technology protection maturity assessment, mobile application security and system vulnerability analysis. 

He currently focuses on information Security system assessment and defense-in-depth architecture analysis , serving customers include banking, insurance industry, high-technology industry, and government.

Currently working as a Medium Blog author, sharing articles about information security,

In addition to work, he participated in information technology community (COSCUP), information security community (HITCON) Volunteers, hoping to contribute to the development of information security.