CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner

SESSION

09/22 14:00 - 14:30 Tech Briefing

數位身分識別與存取管理策略藍圖

Enterprises are facing great challenges due to the epidemic, but they are also accelerating the pace of digital transformation. In the post-epidemic era, while applying emerging technologies to sustainably operate, they should also pay attention to the importance of identity identification and access management. Digital Identity and Access Management (Digital Identity) is the gateway for granting access rights to all enterprise IT resources, and is also the first line of defense for information security. Therefore, as the information environment and structure become more and more complex, the security level of identity recognition should be improved. , Ensuring user productivity and IT access control becomes a top priority. Enterprises should properly define and manage the identity roles of each network user and the access rights of the resources they need, and manage the access rights to the resources they need according to the life cycle of the identity role, and implement Privileged Account Management (PAM) , Identity Governance and Customer Identity and Access Management (CIAM).

LOCATION Taipei Nangang Exhibition Center, Hall 2 7F 701E LANGUAGE English
SESSION TOPIC Identity Governance

SPEAKER

Chris Chen
Deloitte Taiwan VP

Chris focuses on privacy data protection, information security, network security and other topics, and has rich experience in industrial practice. Mainly responsible for Internet of Things (IoT) information security, financial and high-tech industry R&D data security protection, business secret protection, cloud service information security enhancement, personal data and privacy protection, network security equipment planning and construction, penetration testing and vulnerability management projects, intrusion detection and prevention system introduction, and others Risk management services in the field of information technology.