CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Brand Day - iSecurity
  • May 5th (Wed)
  • 14:45 - 15:15
  • 7F 701E

Stop More Attacks -- Advanced Deployment, block threats ouside borders

The risk of data leakage comes from external and internal threats, and the target is the endpoint. Therefore, proper endpoint protection is the foundation of data protection. Especially during the pandemic period, working from home becomes a trend to enterprises, caused the higher risk without network protection from company. It shows the importance of endpoint security apparently, but what should be done to be effective?

"No detection is good prevention", SASA SCANNER Mail and CDR prevent most phishing and malicious ransomware; and be ensured the risk of internet access security in the container of BufferZone. And finally, collocates with a full-view Digital Guardian, which completely supervise the user behavior of the endpoints, that is almost non-invasive. But it is not enough, except the endpoints, the security of IoT devices in enterprise is usually ignored. VDOO's security detection can help, we have further explanation and sharing in this session.

Intermediate
Cyber Resilience Data Loss PreventionIoT Security
Jason Lai

Jason Lai

CTO, iSecurity Inc.

• Current position: CTO in iSecurity Inc. (25 years of Cyber security industry experience)

• Experience:

1. Worked as a PM at Financial Group of III for 10 years in 1996.

2. Worked as a Pre-sales & PM in iSecurity Inc., in charge of source code inspection and DLP service.


In early years, Jason was responsible for the development of financial projects. Nearly 20 projects have been launched such as main accounting system, large sums of amount EDI to e-banking. In particular, it emphasized all the transactions are completely accurate and safe. These experiences is more important and helpful for future projects.


At the present stage, we are committed to data protection, especially helping the high-tech industry to protect intellectual property (IP) and confidence, whether it is from internal threats or external attacks, through the best technics and professional teams, to provide the best service to customers.