CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner

SESSION

09/22 11:00 - 11:20 Manufacturing Security Forum

Equip yourself with XDR solutions for Advanced Threats

According to the research report, the proportion of the global manufacturing industry attacked by advanced threats has been increasing in recent years. It simply not enough to meet the ever-evolving threats by using the traditional security tools. Organizations require more open and comprehensive solutions that provide deeper visibility, more intelligent automation and situational insights across endpoints, networks, clouds, and applications. 

This session will introduce you to the industry's first comprehensive Extended Detection and Response (XDR) solution built with open standards and automation, combining Endpoint Detection and Response (EDR), Network Detection and Response (NDR) and Security Information and Event Management (SIEM) combined in a unified workflow. Save valuable time by connecting insights and leveraging AI to automate and respond quickly.

LOCATION Taipei Nangang Exhibition Center, Hall 2 7F 701D LANGUAGE English
SESSION TOPIC Threat ManagementZero Trust ArchitectureData Security

SPEAKER

Ted Liu
IBM Taiwan Senior Technical Consultant of Software Business Group

Ted Liu is a senior technical consultant of IBM, he has 25 years of professional experience in the information technology field, and has rich experience in threat management, data protection, software-defined storage and infrastructure, AI and high-performance computing. Before joining IBM, Ted was a technical director at Numerical Algorithms Group and Roguewave, responsible for software development and management.

Mike
Pershing Data Corporation Product Manager

Mike Wang is currently working at PERSHING DATA CORP. as a software product manager for IBM and HCL. He has accumulated more than 20 years of experience in software and application system planning, design, implementation and deployment. He also fully plays the role of a solution consultant to assist customers and partners in planning appropriate application security solutions to ensure that the IT system can maximize its value that under the well-managed security risk control.