CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
For the past many years, companies have been committed to making their supply chains follow the standard operating procedure(SOP) and automation as much as possible to reduce costs;in this way, most companies have established efficient supply chain management systems, and the cooperation model between upstream and downstream manufactures or end customers are inseparable.
However, with the continuous evolution of cyber threats and the rapid growth of digital assets of cooperative manufacturers, events of hackers launching indirect attacks through third parties emerge one after another. Therefore, how to comprehensively strengthen Third Party Risk Management (TPRM) will be the focus of this agenda.

Current Position: President, iSecurity Inc.
‧35 years of extensive experience in IT and Information Security.
‧11 years as an Information Consultant for the U.S. Federal Government.
‧M.S. in Management of Technology, Johns Hopkins University (1991)
‧M.S. in Computer Science, New York Institute of Technology (1986)
‧Founded iSecurity Inc. in 2004.
‧Secured strategic investment and partnership from Macnica, Inc. (Japan’s leading cybersecurity distributor) in 2016.