Build a new world order, starting from 0

in safety •  6 years ago 

The 2018 ISC Internet Security Conference (formerly China Internet Security Conference) was held today. The world's top security strategy think tanks, security industry leaders, academic experts, military network forces, high-tech business leaders, and world-renowned hackers will gather. A comprehensive and in-depth discussion of the new challenges and responses to cybersecurity in the era of digital transformation.

The maturity and application of new technologies such as cloud computing, big data, IoT, and artificial intelligence are setting off a wave of the fourth industrial revolution aimed at digital transformation. This wave of smarter national, social, economic, production and life has improved user experience, efficiency and business models, while eliminating the boundaries between physics and reality, and the Pandora's Box of new cyber threats has also been opened.

Cyber ​​threats have become a global security risk: from hackers attacking refineries and power plants, terrorism with the intention of causing major damage at the explosion level, using the ransomware attack to paralyze the medical system, and using the public opinion on the Internet to trigger the "color revolution" in the Middle East and North Africa. Use social media such as Facebook to manipulate elections. The threats and risks of cybersecurity have become increasingly prominent and have become a common problem faced by countries all over the world. We need a global cyber security exchange platform to exchange and explore solutions to new threats.

World-class security exchange platform

From the first US Department of Homeland Security Minister Tom Ritchie to attend the ISC speech, the first stage of the ISC Internet Security Conference included Keith Alexander, the first US Cyber Commander, and Fred, the father of computer viruses. · Cohen, McAfee anti-virus software company founder John McAfee, heavyweight experts from Germany's world-renowned hacker Benjamin, these experts bring forward-thinking thinking and cutting-edge technology, the ISC Internet Security Conference is also known as the international "The breakthrough of network security cooperation."

2018 ISC Internet Security Conference (formerly "China Internet Security Conference") invited nearly 300 security experts from 20 countries and regions including China, the United States, Russia, France, Germany, Israel, Belgium and the European Union, and 10 multiple Belt and Road The ambassadors of the countries along the line attended the strategic summits, industry summits and technology summits held in three days and participated in more than 40 theme forums and events.

Former US Cyber ​​Command Chief of Operations, US Air Force's largest combat force, US Ambassador to Japan Okinawa Air Force Commander General Brett Williams, EU Data Protection and Inspection Agency Director Leonardo Cervera Navas, Russian Federation Security Conference former First Deputy Secretary Sherstyuk Vladislav, first The CEO of the ultra-high-speed "Capsule Train" company, the former technical leader of the mysterious Israeli 8200 network, and the academician of the Chinese Academy of Engineering, Professor Wu Jianping, and the Chinese Academy of Engineering, Fang Binxing, and other global safety supervisors and experts will share the network from the perspective of strategy, industry and technological innovation. Safe forward thinking, thinking about the safety of the new era and the new situation.

Safety starts from 0

The new security risks brought about by digital transformation make traditional security concepts and models face challenges. At the same time, the means of cyber attackers are more complicated and advanced, and the impact is even more serious. The entire network security industry is facing refactoring and re-evolution. We urgently need to address new and growing security challenges through ideas and technological innovations.

The ISC Internet Security Conference (formerly the "China Internet Security Conference") has been focusing on the latest trends in security industry concepts and technologies. In 2016, ISC took the lead in “data-driven security” and advocated the use of big data in the industry to realize the perception of known and unknown threats and enhance the industry's ability to respond to threats. In 2017, “Human is the measure of safety” became the theme of the ISC conference. It is believed that building a human-centered security operation becomes the most realistic choice for effectively responding to security threats. The best use of network security equipment is inseparable from the participation of security experts. .

The 2018 ISC Internet Security Conference, "Safety starts at 0" becomes the subject, which means that we now need to re-examine our security concepts and technologies.

The profound impact of digital transformation on the information industry. Digital transformation brings new cyber threats and security requirements, driving the network security industry to re-examine the existing security protection model from technical thinking, methodology and industrial thinking. The zero-trust model proposed eight years ago is increasingly recognized. Forrester, a well-known research institution, believes that zero trust will become one of the popular frameworks for network security within three years.

In addition, for the information industry, security has become an essential element in the digital transformation process. Let security begin with the architecture design, ensure that the system includes security protection at the beginning of the design, and minimize the security risks, which has gradually been recognized by the industry.

The top security technology experts in China, the United States, Germany, Israel and other network powers will share the security changes brought about by zero-trust network, blockchain, artificial intelligence, and chip technology based on the theme of “security starts from 0”.

The cybersecurity feast for three consecutive days in September is about to begin, bringing a more comprehensive and in-depth discussion of cybersecurity on different topics and from different angles. What you need is to ensure that you are not absent.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!