How to promote information security and password applications in various industries? The "Technology Afternoon Tea" event in Pudong has been clarified
Recently, the Pudong New Area Science and Technology Afternoon Tea event was held with the theme of "consolidating data security in various fields and promoting password application security construction". The event was co sponsored by Big data Center in Pudong New Area, Shanghai Digital Industry Development Co
Recently, the Pudong New Area Science and Technology Afternoon Tea event was held with the theme of "consolidating data security in various fields and promoting password application security construction". The event was co sponsored by Big data Center in Pudong New Area, Shanghai Digital Industry Development Co., Ltd., and co sponsored by Shanghai Commercial Cryptography Industry Association and Shanghai Yinjiang Intelligent Technology Co., Ltd., aiming to thoroughly implement the Password Law and the Regulations on the Administration of Commercial Cryptography, implement the strategy of digital China and network power, and strengthen the promotion of medical care, education Information construction and password application in related fields such as state-owned assets.
During this period, the relevant person in charge of the Commercial Password Management Department of the Shanghai Municipal Password Management Bureau interpreted policies related to password applications, focusing on providing detailed explanations on three aspects: the basis of password application policies, the scope and implementation plan of password applications, and the implementation process of password applications. This provided participants with a clear understanding of the requirements for password application work. The relevant person in charge of Shanghai Information Technology Application Innovation Comprehensive Service Center further elaborated on the functions and unique advantages of the Information Technology Application Innovation Comprehensive Service Center, and proposed the adaptation verification service functions and capabilities provided by the service center in terms of confidential evaluation and testing. They shared relevant technical support cases for adaptation verification on domestic software and hardware, as well as the scope of talent cultivation for adaptation verification The specific requirements for the adaptation process application and the development of ecological partners.
Shi Weiguo, Director of Marketing Department of Zhixun Password (Shanghai) Testing Technology Co., Ltd., pointed out in the theme sharing of "Commercial Password Application and Security Assessment" that the focus of security assessment work should run through the planning, construction, and operation of the system; Secondly, it is important to point out the importance of synchronous planning, construction, operation, and regular evaluation. At the same time, detailed explanations were provided on the implementation process and content of confidential evaluation, specific confidential evaluation items, and key evaluation points, providing attendees with a clear overall understanding of how to carry out confidential evaluation work. At the same time, as the part-time deputy secretary general of the Shanghai Commercial Cryptography Industry Association, he gave a detailed introduction to the role and related work of the association in promoting the development of the Shanghai commercial cryptography industry, improving the level of network security, and promoting the social and economic development of Shanghai.
The reporter learned that "Science and Technology Afternoon Tea" is a brand activity of digital Pudong. Focusing on the key work of reform and innovation in Pudong's leading area, focusing on the hot topics of urban Digital transformation and high-quality industrial development, the reporter regularly invited industry leaders, technology experts, front-line scholars, and relevant heads of functional departments to start the collision of ideas, stimulate the spark of inspiration, and jointly enlighten wisdom, broaden vision, stimulate innovation, and solve problems. On the same day, Li Yuliang, Product Director of Shanghai Shangxun Information Technology Co., Ltd., shared the theme of "Utilizing AI Big Model to Realize Intelligent Management and Application of Data Assets in Innovative IT Environment". He pointed out that the regulatory requirements for medical data security come from policies and regulations such as the Data Security Law, the Personal Information Protection Law, and the Network Security Management Measures for Medical and Health Institutions. He relies on rich experience in data security industry, A solution and idea for intelligent management and application of medical data based on AI big model has been proposed to address the challenges of medical data security management and the contradiction between data classification and classification.
Four guests participated in the second half of the round table exchange session, including Yang Champions, Director of Data Operations at Shanghai Digital Industry Development Co., Ltd., Xing Fei, Chairman of Shanghai Shangxun Information Technology Co., Ltd., Wei Jie, General Manager of Shanghai Ge'er Anxin Technology Co., Ltd., and Shi Weiguo, Deputy Secretary General of Shanghai Commercial Cryptography Industry Association, Discussions will be conducted around issues such as "how to plan and construct in the field of data operation and data security", "how associations can play a functional role in promoting commercial password and information construction", "how to implement data security in the construction of information system substitution", and "how top enterprises can create value for the ecological construction of information systems in fields such as healthcare and education".
2023 is a transitional year for the comprehensive upgrade and transformation of Pudong's information system. Pudong will continue to strengthen communication and exchange with various industries and fields, and accelerate the construction of information systems and password applications in key areas such as healthcare, education, and state-owned assets.
Column Editor in Chief: Tang Ye
Source: Author: Du Chenwei
Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])