The world of cybersecurity
Singapore Cloud Computing and Network Security Exhibition (Cyber Security World) is one of the largest and most professional cloud computing and network security exhibitions in Asia. The high-level content and discussions will focus on cybersecurity and cloud and their impact on government, energy, financial services, healthcare and other sectors. The exhibition site will also invite industry leaders to share their real-world case studies and participate in expert panel discussions on enterprise security, IoT and digital transformation, cloud security solution development and emerging regulations for enterprise security technologies.
The Singapore Cloud Computing and Network Security Exhibition (Cyber Security World) has a total area of 16,000 square meters and features 325 exhibitors from China, Taiwan, Japan, South Korea, Dubai, Australia, Mexico and the United Kingdom.
Topics covered at Cyber Security World Singapore include cybersecurity, cloud infrastructure, gateways, interoperability, GDPR and other regulations, cybercrime and intelligence, hackers, identity access, IoT, automotive, regional blockchain, energy, government and financial services. It attracts a large number of cloud computing and cybersecurity professionals from all over the world. At the same time, many companies and enterprises specializing in cloud computing and network security came to showcase their excellent products and advanced technologies.
Exhibition Address: Marina Bay Sands Convention and Exhibition Center, Singapore
Sponsoring organization:ASP Exhibition Company
Standard stand price:
Please login to see stand prices
Gross space stand price:
Please login to see stand prices
Detention period:Once a year
Exhibition space:16,000 square meters
Number of exhibitors:325
Number of visitors:18,000 visitors
Things to note:There is some risk of change of time and place of exhibition, please confirm before going there.
Commercial applications of cryptography, database security, file transmission encryption, key management and recovery, computer keys, copy-protected floppy disks, encrypted storage devices, encrypted computers and secure communications, etc.
Firewalls, routers, gateways, anti-spam products, intrusion detection, network antivirus, physical isolation, e-government security, network security and management, virus and worm control, authentication and authorization
Iris recognition, retina recognition technology, voice recognition technology, fingerprint recognition system, hand shape and palm print recognition technology, vein recognition technology, face recognition technology, handwriting recognition technology, seal recognition, etc.
Trusted Computing, Trusted Software, Information Adversarial, Network Forensics, Information Security Management, Disaster Recovery and Backup, Network Encryption, E-Commerce Security, Network Security, Digital Content Security, Information Hiding and Digital Watermarking, Electronic Seals, Electronic Signatures, Electronic Label Read, Write and Authorize
Other experiences and application cases of commercial cryptography, information encryption and biometric identification in the fields of finance, securities, taxation, national defense, public security, government, etc.