The fastest growing cybersecurity conference in Asia with over 250 exhibitor brands. The only super-scale cybersecurity exhibition in Taiwan. The designated must-see event for industry, government, academia and research leaders.
Over 250 vendors from around the world along with renowned cybersecurity brands of Taiwan, including thousands of the latest cybersecurity products and services
CYBERSEC EXPO 2020, with brand new extensive planning, the most anticipated exhibition experience
First-tier cybersecurity global vendors and cybersecurity White Unicorns are fully powered-up to demonstrate the latest technology and services.Exhibition Brands
Global cybersecurity mainstream service providers with professional demonstration offer comprehensive explanation of products.Exhibition Brands
The gathering of the most comprehensive cybersecurity products and services will provide you with variety of cybersecurity solutions.Exhibition Brands
You may understand the Taiwan’s powerful capacity in cybersecurity development through featured exhibition, in-depth guided tours, thematic forums and 1on1 Matchmaking with international vendors.
Situational designs will allow you to experience the most frequent cybersecurity attacks to businesses, and on-site experts will provide you with the most practical defense strategies.
Taiwan Cyber Security Landscape is specially designed for you to find your necessary cybersecurity products precisely and quickly plan your personal strategy.
72.96% Participants saidAble to find the products that helped to resolve cybersecurity issues facing by the company currently at CYBERSEC EXPO
91.84% Participants saidAble to help them in cybersecurity product procurement by visiting CYBERSEC EXPO
95.31% Participants saidAble to better understand cybersecurity products after visiting CYBERSEC EXPO
Based on the big data platform of the Billows LogMaster, a large amount of relevant information from IT, OT, and IOT is collected and stored in accordance to comply with regulatory requirements. It also integrates with AT & T AlienVault USM , in which combines with functions like intrusion detection, behavior monitoring, and vulnerability assessment , asset discovery and etc…Providing relevant SIEM's correlation rules and characteristics of the latest information security attacks. Furthermore, our platform combined with AI analysis module of for the efficiency and accuracy of detecting malicious behavior.
In addition to continuous internal monitoring and improving the credibility of incidents, our platform provides automatic updates or manually update correlation rules. Allowing tech administrators to find and solve the problems immediately, improving the internal monitoring in a timely manner.
Incident response is also integrated into our platform. For example, in order to improve the processing time, we have added communication APP function so that administrator will not miss anything. If there is new malicious IP / URL information, we can block it automatically through our proactive defense system . When emergency incident needs to be reported and handled immediately , You’ll be notified by our security notification and it’ll be handle accordingly through our forensics analysis. Our OneMan SOC platform assists in the entire
process management workflow: from generating notification forms to completing the entirety of each case. Helping customers to secure their internal monitoring.
Dogfight hackers in the cloud to secure vulnerable choke points and neutralize threat flows
An impregnable Email IPS and APT Gateway
Sandbox malicious hyperlink download analysis.
APT attack connection counter Sandbox malware behavior analysis
Double authentication whitelist.
Next-gen AI unknown malicious threat program behavior analysis
A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including
The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).
OSecure Cloud Security Service is cloud service brand by Openfind. It provides additional Email security services for corporate, especially good for Office 365/G Suite. OSecure offers advanced prevention with precision filtering technology, upgraded mail protection to ensure the security of corporate communications. Also it offers adjustable filtering settings and comprehensive review of corporate security requirements and with high-speed interception and report generation for optimal management efficiency.
A Network Traffic Analysis tool helps enterprise, government, and critical infrastructure users make their IT operations secure and reliable through advanced artificial intelligence, machine learning, and big data analysis.
#Provides round-the-clock security monitoring
#Gives you powerful rapid detection & response capabilities
#Take advantage of the solution’s powerful detection capabilities
#Let’s you gain a deep visibility into the internal network
#Powerful and easy to use
Our “Gateway Solution Service” provides domestic and foreign cyber security information, blacklists, websites, various Trojans and viruses, and real-time blocking, as well as 24/7 monitoring and threat warning and 24-hour professional customer service consulting services. We use a monthly rent model, so SMEs can easily have national-level security protection.
Digicentre uses secure, high-performance, and cost effective infrastructure. With professional expert advice digicentre provide tailor-made solutions for customers’ operating demands.
Build digital security into the fabric of your enterprise.
Enterprises are facing more sophisticated and more persistent attacks, both from outside and within, while they’re under pressure to take advantage of emerging digital technologies.
DXC Technology serves as a trusted advisor and primary security integrator to protect your enterprise and enable your digital transformation. Backed by more than 3,500 security experts and a global network of 24x7 security operations centers, DXC’s industry-leading solutions help protect data, applications, infrastructure and endpoints; detect and predict attacks; and proactively respond to threats.
Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.
We have an order theory of criminal which explains stages of committing a crime. For example, crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.
According to the above principle, we developed our order theory of android malware. We develop five stages to see if the malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. Certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of a malware.
Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.
Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.