CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Albert Jen

Albert Jen

Senior Technical Consultant, Trend Micro
Taiwan's Cybersecurity Researchers
CyberLAB
  • May 5th (Wed)
  • 13:00 - 15:00
  • 7F 703AB

Oh my gosh! That's how container security should be done. What's involved in container security.

While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.

This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.

Read More
Taiwan's Cybersecurity Researchers
CyberLAB
  • May 5th (Wed)
  • 15:30 - 17:30
  • 7F 703AB

Oh my gosh! That's how container security should be done. What's involved in container security.

While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.

This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.

Read More
Taiwan's Cybersecurity Researchers
CyberLAB
  • May 6th (Thu)
  • 10:00 - 12:00
  • 7F 703AB

Oh my gosh! That's how container security should be done. What's involved in container security.

While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.

This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.

Read More
Taiwan's Cybersecurity Researchers
CyberLAB
  • May 6th (Thu)
  • 13:00 - 15:00
  • 7F 703AB

Oh my gosh! That's how container security should be done. What's involved in container security.

While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.

This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.

Read More