CYDES

CYDES

CYDES has been supported by the National Security Council and the National Cyber Security Agency, the Government of Malaysia, the Ministry of Defence, the Ministry of Home Affairs, and the Ministry of Communications and Multimedia. On top of that, we are pleased to announce that CYDES 2020 has received national programme status.

The inaugural CYDES 2020 will be the World’s First Integrated Cyber Defence, Cyber Security and Future Technology Government and Trade Event for the Global National Security Landscape.

The event will open its doors to 10,000 trade and professional visitors. CYDES will gather VVIPs incorporating foreign VIP Delegates, Ministers, Government Offcials and Experts from around the world, and will be participated by 300 companies and organisations who will be both exhibiting as well as participating in the plethora of vital strategic events, conferences and forums.

Contact Information

Categories:
Conferences & Events
View All

Images

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Neustar

Neustar

Neustar services and solutions include Fraud Detection (identitiy & authentication), Compliance Risk (for online sales and gaming), DDoS protection and DNS services.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

TBCA

TBCA

TBCA provides SMEs, Startups and Large Enterprises access to top quality consultants. Areas of expertise include technology and cyber security.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

Cequence Security

Cequence Security

Cequence secures web, mobile, and API applications. We discover all apps, detect malicious bots, and stop attacks with an AI-integrated security platform.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Trail of Bits

Trail of Bits

Trail of Bits has helped secure some of the world’s most targeted organizations. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.