cloudsec 2017 Sept. 6, 2017 to Sept. 6, 2017, taipei,china

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening speech Hongwei Gan N/A
Risk Management Level Up to establish a full range of network security strategy on - site simultaneous translation Simon Piff A variety of new technologies such as artificial intelligence (AI), machine learning, in-depth data analysis, ...
IoT hacker attack simulation display Luo Yiqi N/A
Blueprint Level Up Zheng Yi Li IT technology evolves rapidly, enterprise IT architecture changes, along with the use of cloud architecture, ...
Level Up information security policy of the government-owned through security roadmap Jane Hong Wai The blueprint for the development of government resources in the next four years from the ...
Information security Strain Level Up Asia-Pacific information security experience and examples of strain -site simultaneous translation Adl Wahid The resilience of enterprises is an indispensable part of the enterprise security plan. However, many ...
Level Up Expert Forum Hongwei Gan , Zheng Yi Li , Hong Wai , Yuanzhang Guangzu N/A
[AWS] - Scaling security without scaling cost - Is it possible? Iolaire Mckinnon This session will focus on how you can maintain or how to improve your cloud ...
[Trend Micro] - How did money disappear? A Case Study of Financial Crimes Serena Lin With the scientific and technological innovation, the threat of security is also evolving, let us ...
[Akamai] - Protect and do not panic Ou Zhipeng Discovering the current attack and threat and how the basics of security is apply but ...
[Nutanix] - to ensure that corporate cloud platform is not compromised by the security Dong Baiyi Nutanix makes the infrastructure cloudable, enabling IT staff to focus more on business applications and ...
[Trend Micro] - use machine learning to create machine learning security (Machine Learning for Security) Zhang Jiayan In the face of rapid evolutionary security threats, we need to quickly and accurately detect ...
[VMware] - private cloud micro-segment program maintenance mechanism sharing Rao Kangli The VMware NSX Differential Segmentation Program has become the standard mechanism for many customers to ...
[Google] - information security for billions of cloud users Harry Lin Security is like DNA is deeply rooted in Google's culture and everything done. Google invests ...
[Tenable] - cloud on the cloud - Tenable how to manage the 21st century network security Zeng Xuehui With the popularity of the platform, many companies began to use the cloud program, while ...
[DLP Endpoint Protection] protects internal data against external attacks Chen Bo Yu In the past, DLP protection is mainly for the prevention of internal data leakage, including ...
[Trend Micro] - APT x Ransomware Huang Zexuan Does the company have enough defensive energy to get out of this wave of attacks ...
[Microsoft] - How to detect threats before it is too late? Kevin Liu Real cyber threat intelligence requires more data than most organizations can acquire. But you can ...
[Trend Micro] - everything on the Internet can all horror? Ye Junting According to estimates, the number of Internet of Things devices in 2017 has reached 8.4 ...
[China Telecom] - Corporate security in depth defense strategy to share Cai Jiangang Security threats are changing, the challenges facing enterprises in addition to the outside, there are ...
[Citrix] - five key points of information security Pan Xianguo IT departments must reduce security risks, ensure that sensitive customer data is protected, and continue ...