• 13:50-14:30

    Influences and Opportunities Brought by Cyber Security Law to CIO

  • 14:30-14:50

    Early Warning and Proactive Defense Mechanism in the Era of Mobile Internet

    Mobile Internet breaks the limits of time and space, and the security boundaries are gradually disappearing
    The uncontrollability of fragmented office behavior results in zero trust
    Security thinking mindset in mobile Internet era

  • 14:50-15:10

    Perceives Unknown Threats by Full Data Analysis

    Security analysis based on data identification, metadata extraction and behavior model retrieval
    Establish a defense system with rapid security hazard detection
    Trace cyber attacks with full traffic analysis and examination

  • 15:10-15:30

    Tea break

  • 15:30-16:10

    Security Strategies in the Internet Era

    Reinforce security checks in all intelligent terminals
    Closely follow security and risks intelligence
    Timely detect safety hazards and make timely repair

  • 16:10-16:30

    Redefine the New Generation of Network Security

    In the era of cloud and mobility, where is the business limits of an enterprise?
    Cloud business is irreversible development trend, in light of this, how can an enterprise make its cloud security automatic and controllable?
    Ensure user behavior security based on user behavior big data

  • 16:30-17:10

    Top Talk: Internet Attack and Defense Debate

    Acquire abundant resource support
    Cultivate strong security operation and maintenance ability
    Establish mature cloud protection technology