CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Zero Trust Forum
  • May 5th (Wed)
  • 16:00 - 16:30
  • 7F 701B

An overview of myths and strategies of the zero trust architecture

Chinese Onsite

In tradition, organizations usually deploy security controls on their permeters and trust computers inside permeters. The zero trust concept was proposed to address the situation that organizations "over rely" on the permeter security controls in the mid of 2000s. Currently, people usually have several myths on zero trust concept. Therefore, we need to address the misconceptions and consider how to use the zero trust concept to improve security.

Zero Trust Architecture Zero Trust Network
Shi-Cho Cha

Shi-Cho Cha

Professor, National Taiwan University of Science and Technology

Shi-Cho Cha received the B.S. and Ph.D. degrees in information management from

National Taiwan University in 1996 and 2003, respectively. He is currently a Professor at the Department of Information Management, National Taiwan University of Science and Technology, where he has been a Faculty Member since 2006. He is a certified PMP, CISSP, CSSLP, CCFP, and CISM. Before he worked at NTUST, he worked in eLand Technologies, Inc, and PricewaterhouseCoopers, Taiwan. His current research interests include security and privacy of blockchain applications, IoT security and privacy, and information security risk management.