CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Steven Hsu

Steven Hsu

VP, Marketing, TXOne Networks

26 years+ experience in the cybersecurity industry, software development and quality management consultant, and former director of global consumer business development in Trend Micro. The primary interest and focus area are on the cybersecurity management framework. 

I have worked in the security software field for 20 years, starting as an engineer, project manager, product planner, and business development. That career journey enriches me in familiar with product development life cycle and marketing planning. My current primary interest is the subject of cybersecurity management framework and planning.   

Professional summary:

  • Director, Global Consumer Business Development.
  • Trend Micro Consultant.
  • Software Development and Quality Management

Education:

  • Master of Business Computing, Victoria University, Australia
  • Postgraduate Diploma in Computer Science, RMIT University, Australia

Publication:

  • Software Design and Quality Management ISBN:9574668509, 9789574668502
OT Security Forum
  • May 4th (Tue)
  • 16:45 - 17:15
  • 7F 701G

Back to the basic, why network segmentation is easy to understand but so hard to implement. (Zero-Trust Network Concept in ICS Cybersecurity )
Chinese Onsite

Using quarantine to prevent human disease spreading and infections of viruses is a very effective method. A similar methodology is also a well-known countermeasure in cybersecurity, it is so difficult in real word implementation because the challenge is due to excessive restrictions and lack of supporting measures. Applying the network segmentation in the industrial control environment requires extremely high availability for the continuous operation of the field. This sharing will provide an appropriate recommendation to deal with different implementation-oriented challenges.

ICS/SCADA SecurityOT SecurityZero Trust Network
Read More