What does Buzheng do?

Bu Zheng

Bu Zheng, the current vice president of Didi Information Security, comprehensively leads the information security team.

"Didi is a representative Internet company. Starting from Didi, we hope to bring positive changes to the security behavior of the entire Internet industry, so that every user around us can enjoy the convenience brought by the mobile Internet revolution and get better daily protection. " Bu Wei said.

Bu Zheng once served as vice president of Huoyan and spoke at the "20 16 Ali Security Summit" hosted by Alibaba Group. In addition, he has made many speeches at various top international security conferences.

Chinese name: Buzheng

Nationality: USA

Occupation: Vice President of Didi Information Security

Graduate school: Beijing University of Posts and Telecommunications

Masterpiece: OperationBeebus

Personal hobbies: running, mountaineering, badminton.

Main projects: network intrusion prevention system

Personal experience

Bu Zheng has rich experience in information security enterprises.

In 2000, Lumeng Technology, founded by Bu Zheng, was one of the earliest enterprises engaged in network security in China.

He has been the director of threat research in McAfee, one of the three major security software companies in the United States for nearly ten years, led the team to conduct information security research around the world, and made many speeches at top international security conferences.

20 16 In August, at the China Internet Security Elite Summit of the 4th China Internet Security Conference (ISC20 16), Bu Zheng believed that cloud computing would set off a great innovation in the field of enterprise architecture.

2065438+In September 2006, Bu Zheng joined Didi Chuxing as the vice president of Didi Information Security, leading the information security team in an all-round way.

Bu Zheng and his team are advocates and pioneers of advanced threat protection combining virtual technology and threat intelligence technology. They have in-depth research in intrusion detection, malware, advanced threats and threat intelligence, and are widely praised.

Personal point of view

3C security architecture. The so-called 3C refers to cloud, object and environment:

Clouds are clouds. In other words, the terminal is not credible, the network equipment is not credible, and everything in others' hands is not credible. Your own logic and judgment should be in your own wisdom cloud.

Content is content. When designing a security product, we should try our best to let the security operation and maintenance department use it with the least cost and the most efficient use.

Context is context. The association between different protocols, different file formats and the context of the whole system and network level is a key point in the security system.

In the field of enterprise architecture, cloud computing will set off a huge innovation point.

Personal realization

Project completion

mcafeeintrushieldnetworkkintrusionprevention system

patented invention

System and method for fingerprint printing and correlation reproduction U.S. 9,106,680,

Issue date: 2065438+August 5 1 1.

Publish a work

Operation bus