Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

ICE71 is a partnership between Singtel Innov8, the venture capital arm of the Singtel Group, and the National University of Singapore (NUS), through its entrepreneurial arm NUS Enterprise. ICE71 is strengthening the region’s growing cybersecurity ecosystem by attracting and developing competencies and deep technologies to help mitigate the rapidly increasing cybersecurity risks in the region.
 
Supported by the Cyber Security Agency of Singapore (CSA) and Info-Communications Media Development Authority (IMDA), ICE71 is focused on developing and supporting early and growth stage cybersecurity entrepreneurs and start-ups from around the world. ICE71 runs a range of programmes designed to support cybersecurity individuals and start-ups from idea development to the creation, acceleration and scaling of cybersecurity start-ups.

 

Contact Information

Directory of Suppliers

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Nextgov

Nextgov

Nextgov is an information resource for federal technology decision makers. Topic areas include cybersecurity.

Utimaco

Utimaco

Utimaco security modules are certified to the highest security standards, enabling them to optimally protect your data and business processes.

Druva

Druva

Druva provides integrated data protection and governance solutions including data backup and disaster recovery.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

Jericho Systems

Jericho Systems

Jericho Systems Corporation was established to meet the need to securely share information in increasingly complex and sophisticated environments.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.