CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner

SESSION

09/22 15:40 - 16:00 Security Vision Forum

Review the way been through, talking about the new situation of information security strategy

In recent years, the information security situation in Taiwan has become increasingly tense. At the end of last year, the Financial Supervisory Commission issued a draft amendment of "Regulations Governing Establishment of Internal Control Systems by Public Companies", which clearly stipulated that Taiwan listed companies should set up a CISO (Chief Information Security Officer) and information security responsible units, according to the company's size and industry category.

Upon the announcement, relevant issues have become the top priority of listed companies, and many companies are looking for feasible experiences to learn from. This agenda will share how enterprises can establish strategic thinking of information security, explain the key to implement, how to face the challenges of digital transformation, and how to integrate relevant regulatory requirements to strengthen the resilience of enterprises' information security.

LOCATION Taipei Nangang Exhibition Center, Hall 2 7F 701B LANGUAGE English
SESSION TOPIC Security StrategySecurity Architecture

SPEAKER

Jason Chu
FETnet Chief Information Security Officer

Mr. Chu is currently the Chief Information Security Officer (CISO) of FarEasTone Telecommunications Co., Ltd., and holds a Master's degree from the Information Management Institute of Shih Hsin University. He has been engaged in information security related work for nearly 20 years, and has served as an Associate researcher of the Executive Yuan, Security consultant for ISSDU(Information Security Service Digital United Inc), and the CISO of 104 company. He is responsible for the formulation and strategy execution of an organization or company's information security structure, specifically designed for SOC mechanism, defense-in-depth framework, information security data analysis, and incident investigation and management system, etc. Also, he has assisted many enterprises, providing information security structure and protection advice.