Aug 12 - 13

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters

CYBERSEC EXPO

Brand new conference venue at Taipei Nangang Exhibition Center, Hall 2

The fastest growing cybersecurity conference in Asia with over 250 exhibitor brands. The only super-scale cybersecurity exhibition in Taiwan. The designated must-see event for industry, government, academia and research leaders.

Date: August 12 - 13, 2020

Venue: Taipei Nangang Exhibition Center, Hall 2

(Address: No.2, Jingmao 2nd Rd., Nangang District, Taipei City 11568, Taiwan)

Free registration
Taiwan’s largest cybersecurity event

Exhibitor Brands

Over 250 vendors from around the world along with renowned cybersecurity brands of Taiwan, including thousands of the latest cybersecurity products and services

Exhibition highlights

CYBERSEC EXPO 2020, with brand new extensive planning, the most anticipated exhibition experience

Flagship Exhibition Zone

First-tier cybersecurity global vendors and cybersecurity White Unicorns are fully powered-up to demonstrate the latest technology and services.

Exhibition Brands

Business Exhibition Zone

Global cybersecurity mainstream service providers with professional demonstration offer comprehensive explanation of products.

Exhibition Brands

Standard Exhibition Zone

The gathering of the most comprehensive cybersecurity products and services will provide you with variety of cybersecurity solutions.

Exhibition Brands

Cyber Taiwan Pavilion

You may understand the Taiwan’s powerful capacity in cybersecurity development through featured exhibition, in-depth guided tours, thematic forums and 1on1 Matchmaking with international vendors.

Cybersecurity situational experience zone

Situational designs will allow you to experience the most frequent cybersecurity attacks to businesses, and on-site experts will provide you with the most practical defense strategies.

Taiwan Cyber Security Landscape
“CYBERSEC Special Edition”

Taiwan Cyber Security Landscape is specially designed for you to find your necessary cybersecurity products precisely and quickly plan your personal strategy.

CYBERSEC EXPO 2019 Participants’ Feedback

72.96% Participants saidAble to find the products that helped to resolve cybersecurity issues facing by the company currently at CYBERSEC EXPO

91.84% Participants saidAble to help them in cybersecurity product procurement by visiting CYBERSEC EXPO

95.31% Participants saidAble to better understand cybersecurity products after visiting CYBERSEC EXPO

Exhibitor Products All Products

PIXIS DSI

●With PIXIS, enhance local network security, manage IP Addresses and DHCP in a single console, enforce network policies instantly and effectively.
●Best NAC,DHCP, and IP/MAC for IPv4 & IPv6
●PIXIS DSI (Dual Stack IPAM)  has 4 Features:IP Assignment、Real Time Network Monitoring、Network Access Control、Reporting & Auditing,administrator is easy to handel.
●Assign IP by integrating authentication mechanisms to keep track of logon information while ensuring accessibility.
●Set intuitive and flexible IP policies, such as assigning IPv6 addresses logically related to IPv4 addresses.
●Automatic Topology and Traffic.
●Automated subnet discovery and IP scanning reflects real time data in PIXIS DSI. Replace the old-fashioned way that uses Excel to maintain asset inventory.
●PIXIS DSI can block the access of foreign devices access the network before authorization.
●Administrators can forbid end user to spontaneously change the IP address, and can specify an IP address to be used by a specific IP. PIXIS DSI ensures that only the right device gets to access the network.
●Export reports for managerial demand on information like WSUS, after-hour usages, or other requests.
●Administrators can look up abnormal events, admin logs, IPv4 / IPv6 / MAC log on and log off records, etc.

More >

Billows OneMan SOC

Based on the big data platform of the Billows LogMaster, a large amount of relevant information from IT, OT, and IOT is collected and stored in accordance to comply with regulatory requirements. It also integrates with AT & T AlienVault USM , in which  combines with functions like intrusion detection, behavior monitoring, and vulnerability assessment , asset discovery and etc…Providing relevant SIEM's  correlation rules and characteristics of the latest information security attacks. Furthermore, our platform combined with AI analysis module of for the efficiency and accuracy of detecting malicious behavior.

In addition to continuous internal monitoring and improving the credibility of incidents, our platform provides automatic updates or manually update correlation rules. Allowing tech administrators to find and solve the problems immediately, improving the internal monitoring in a timely manner. 

Incident response is also integrated into our platform. For example, in order to improve the processing time, we have added communication APP function so that administrator will not miss anything. If there is new malicious IP / URL information, we can block it automatically through our proactive defense system . When emergency incident needs to be reported and handled immediately , You’ll be notified by our security notification and it’ll be handle accordingly through our forensics analysis. Our OneMan SOC platform assists in the entire 
process management workflow: from generating notification forms to completing the entirety of each case. Helping customers to secure their internal monitoring.

More >

Alteon

Alteon is Radware’s next-generation application delivery controller (ADC) and the only load balancer that guarantees application SLA. It provides advanced, end-to-end local and global load balancing capabilities for all Web, cloud and mobile-based applications.
Alteon load balancer combines best-of-breed application delivery capabilities, market-leading SSL performance that supports all of the latest encryption protocols, and advanced services to companies with ongoing application lifecycle management challenges that impact the performance of web applications (such as heavier, more complex web content); mobility, and the migration to the cloud.
 

More >

CrowdStrike Falcon

The CrowdStrike Falcon® platform is pioneering cloud-delivered endpoint protection. It both delivers and unifies IT Hygiene, next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence — all delivered via a single lightweight agent. Using its purpose-built cloud-native architecture, the Falcon platform collects and analyzes over 1 trillion endpoint events per week from millions of sensors deployed across 176 countries.

More >

RUITING RKMS Key Management System 2.0

[ "" ]

More >

Penetration Testing

In the aspects of hackers, we attempt to invade a corporate's website and information system, from exterior to interior, in purpose of doxing the possibility of potential threats for issuance of complete report and advice of improvement.

More >

OWL TECHNOLOGY

Data diodes are hardware based, bound by the laws of physics and not susceptible to zero day vulnerabilities or any other hacks. These solutions are data and network agnostic, have been deployed across a range of industries and are recommended by the Department of Homeland Security. 
Being data agnostic we can move files, streaming video, TCP/IP, UDP, database records, historians, sensor data, high-res images, system backups, personnel records and many other types of data; along with industrial protocols like Modbus and OPC.  And our network independence lets us work on unclassified, secret and top secret networks for government solutions and IT and OT (Operations Technology) networks for our commercial and industrial customers.

We offer all-in-one solutions with a standard 19” 1U rackmount form factor and a DIN rail form factor for industrial environments.  We also offer server based solutions that utilize off-the-shelf servers populated with our data diode cards.

Designed to be scalable, new software licenses and modules allow end-users to increase bandwidth, add-on new interfaces, and support new protocols.

More >

Radware:Application Delivery and Cybersecurity

[ "" ]

More >

OT cybersecurity consulting services

The popularity of the Internet and IT system architecture has blurred the gap between OT and IT environment, and with the development of emerging IT technologies such as cloud and big data in recent years, many manufacturers or critical infrastructure providers are more likely to have their existing control systems and components (e.g. IACS, DCS, The OT (Operation Technology) of SCADA introduces intelligent manufacturing solutions to connect all the components and systems, so called Industrial Internet of Things (IIoT, Industrial IoT) environment.
The likelihood of cyberattacks was increased on automated production, manufacturing equipment and critical infrastructure in industries that rely on industrial control systems with this trend of interconnecting and data sharing/analyzing. In further, there was a semiconductor manufacturing company's entire plant was paralyzed by malware for hours and cost billions of Taiwan dollars. As manufacturing and information security industries shocked by this case, management and stakeholders have been concerned about the issue of the Industrial Internet of Things.
Although management, stakeholders and OT environment asset owners have begun to recognize the importance of information security, but it is difficult to carry out the risk analysis of the industrial control Internet of Things, but also the lack of relevant knowledge to develop a sustainable improvement of the level of capital security protection of security plan, let alone risk communication with stakeholders.
In order to enable management, stakeholders and OT environment asset owners to escape this “unable to do” circumstances, We deliver professional consulting services based on international industrial security、Internet of Things security management standards and operational practices to help enterprises achieve following goals:

  • Policy and organizations formulation
  • Security risk identification/analysis/mitigation
  • Continuous improvement program
  • Hardware and software implementation
  • Communication with third-party suppliers or stakeholders
  • Cyber Security Management System implementation

More >