Due to the outbreak of the coronavirus, CYBERSEC 2020 will be rescheduled to August 12 (Wednesday) to August 14 (Friday), 2020. We apologize for any inconvenience this may have caused and your consideration will be much appreciated. CYBERSEC 2020 will continue open for registration. New updates regarding the event will also continue to be posted on the official website.×
03/17 14:00-14:30 701 H
Across the globe, organizations are being attacked by well-funded hacking groups who succeed in breaching traditional perimeter defenses. These attacks serve to remind us that we can no longer rely entirely on preventive security measures. The reality is that if a group is well-funded and determined enough, they are likely to identify an organization’s vulnerabilities and slip through the net of their perimeter defenses, often without us even noticing.
If you look back through history, successful battles often saw the strategic and effective use of terrain. For example, in 480 B.C. Persian forces invaded Greece. They deployed massive forces into the Gulf of Malia where they were required to negotiate the Pass of Thermopylae. Just 300 warriors from Sparta were waiting for them and held them off for several days. Many members of the Persian army died.
Fundamentally, if you do not know your terrain, you do not know what to defend and if you do not know what to defend, then there is no way for you to be able to institute protections for a robust defense.
So then, how can organizations strengthen their defense posture? We should start with the notion of terrain in cyber space and Terence Heah explains why.
Terence is from Fidelis Cybersecurity responsible for Asia Pacific Region including Taiwan. He is a professional Cybersecurity Consultant with more than 15 years of wide Security Product and Services Experience. Coupled with rich Incident Response and Forensics exposure. He has been promoting Modern Cybersecurity Concept and Practices in the Asia Pacific for many years. He also possesses experience in Security Product Integration for Enterprise Security Operation Environment. He has successfully revolutionalized Proactive Cybersecurity Defense on the foundation of Enterprise Security, Data Protection and Security Operations. He is currently holding the responsibility of Regional Security Architect.