-
13:50-14:30
Influences and Opportunities Brought by Cyber Security Law to CIO
-
14:30-14:50
Early Warning and Proactive Defense Mechanism in the Era of Mobile Internet
Mobile Internet breaks the limits of time and space, and the security boundaries are gradually disappearing
The uncontrollability of fragmented office behavior results in zero trust
Security thinking mindset in mobile Internet era
-
14:50-15:10
Perceives Unknown Threats by Full Data Analysis
Security analysis based on data identification, metadata extraction and behavior model retrieval
Establish a defense system with rapid security hazard detection
Trace cyber attacks with full traffic analysis and examination
-
15:10-15:30
Tea break
-
15:30-16:10
Security Strategies in the Internet Era
Reinforce security checks in all intelligent terminals
Closely follow security and risks intelligence
Timely detect safety hazards and make timely repair
-
16:10-16:30
Redefine the New Generation of Network Security
In the era of cloud and mobility, where is the business limits of an enterprise?
Cloud business is irreversible development trend, in light of this, how can an enterprise make its cloud security automatic and controllable?
Ensure user behavior security based on user behavior big data
-
16:30-17:10
Top Talk: Internet Attack and Defense Debate
Acquire abundant resource support
Cultivate strong security operation and maintenance ability
Establish mature cloud protection technology