CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner
Julian Su

SPEAKER

Julian Su

iSecurity Inc. President

• Current position: CEO in iSecurity Inc. (35 years of Cyber security industry experience)

• Master of Technology Management, Johns Hopkins University, USA in 1991

• Master of Computer Science, New York Institute of Technology, USA in 1986

• Awarded the company's first honorary award by ATS when returned to Taiwan in 1997.

• iSecurity Inc. was invested by Macnica, Inc. in 2016, a leading brand of information security group in Japan

iSecurity Inc. brings in the latest security concepts and solutions over the years included: DLP (2004), source code inspection (2005), least privilege (2010), whitelist (2012), one-way network (2013), open source security (2014) ), EDR/CDR (2015), Web Isolation (2016), Industrial Cyber Security (2017), CASB (2019), Supply Chain Security Audit (2020), IoT/Embedded System Security (2020), IoT/Embedded System Security(2020), AI Virtual Supervisor(2021), Enterprise Account Data Leakage(2022), AD Security(2022), Supply Chain Mapping & Modeling(2023)

Speech

Tech Briefing

SEP 20

#

Using artificial intelligence to control remote/home/outsourced work environments

09/20 (Tue) 16:00 - 16:30 7F 702
iSecurity Inc. President / Julian Su

Use Artificial Intelligence and Machine Learning technology to help companies control remote/home/outsourced work environments, such as:

  • User identification
  • Identification of bystanders in the work environment 
  • Identification of objects in the work environment that could lead to a data breach, such as cell phones, cameras, keyboards, screens, notes, and papers
  • Recognition of behaviors explicitly prohibited by the company in the work environment, such as taking pictures of the screen with a mobile phone/camera
  • Actions for violations such as warning messages, blank screen, mandatory shutdown

This solution allows enterprises to fully control the Human Factor, protect data security, improve work efficiency, and assist Call Center to comply with the CLEAN DESK policy.

Supply Chain Security Forum

SEP 22

#

Gordian knot - Globalization of Supply Chain

09/22 (Thu) 11:00 - 11:30 7F 701G
iSecurity Inc. President / Julian Su

Nowadays, the cooperation of the global supply chain is as complex as the Gordian knot in ancient Greek mythology, but today, unlike Alexander the Great in ancient times, we do not have the ability to cut off problems with a single sword. Therefore, how to deal with effective management and examination of cyber supply chain security has always been the goal of enterprises. This agenda will focus on providing corresponding solutions for the strengthening of third-party cyber security risk management.