Aug 11 - 12

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters


Brand new conference venue at Taipei Nangang Exhibition Center, Hall 2

The fastest growing cybersecurity conference in Asia with over 250 exhibitor brands. The only super-scale cybersecurity exhibition in Taiwan. The designated must-see event for industry, government, academia and research leaders.

Date: August 11 - 12, 2020

Venue: Taipei Nangang Exhibition Center, Hall 2

(Address: No.2, Jingmao 2nd Rd., Nangang District, Taipei City 11568, Taiwan)

Free registration
Taiwan’s largest cybersecurity event

Exhibitor Brands

Over 250 vendors from around the world along with renowned cybersecurity brands of Taiwan, including thousands of the latest cybersecurity products and services

Exhibition highlights

CYBERSEC EXPO 2020, with brand new extensive planning, the most anticipated exhibition experience

Flagship Exhibition Zone

First-tier cybersecurity global vendors and cybersecurity White Unicorns are fully powered-up to demonstrate the latest technology and services.

Exhibition Brands

Business Exhibition Zone

Global cybersecurity mainstream service providers with professional demonstration offer comprehensive explanation of products.

Exhibition Brands

Standard Exhibition Zone

The gathering of the most comprehensive cybersecurity products and services will provide you with variety of cybersecurity solutions.

Exhibition Brands

Cyber Taiwan Pavilion

You may understand the Taiwan’s powerful capacity in cybersecurity development through featured exhibition, in-depth guided tours, thematic forums and 1on1 Matchmaking with international vendors.

Cybersecurity situational experience zone

Situational designs will allow you to experience the most frequent cybersecurity attacks to businesses, and on-site experts will provide you with the most practical defense strategies.

Taiwan Cyber Security Landscape
“CYBERSEC Special Edition”

Taiwan Cyber Security Landscape is specially designed for you to find your necessary cybersecurity products precisely and quickly plan your personal strategy.

CYBERSEC EXPO 2019 Participants’ Feedback

72.96% Participants saidAble to find the products that helped to resolve cybersecurity issues facing by the company currently at CYBERSEC EXPO

91.84% Participants saidAble to help them in cybersecurity product procurement by visiting CYBERSEC EXPO

95.31% Participants saidAble to better understand cybersecurity products after visiting CYBERSEC EXPO

Exhibitor Products All Products

Billows OneMan SOC

Based on the big data platform of the Billows LogMaster, a large amount of relevant information from IT, OT, and IOT is collected and stored in accordance to comply with regulatory requirements. It also integrates with AT & T AlienVault USM , in which  combines with functions like intrusion detection, behavior monitoring, and vulnerability assessment , asset discovery and etc…Providing relevant SIEM's  correlation rules and characteristics of the latest information security attacks. Furthermore, our platform combined with AI analysis module of for the efficiency and accuracy of detecting malicious behavior.

In addition to continuous internal monitoring and improving the credibility of incidents, our platform provides automatic updates or manually update correlation rules. Allowing tech administrators to find and solve the problems immediately, improving the internal monitoring in a timely manner. 

Incident response is also integrated into our platform. For example, in order to improve the processing time, we have added communication APP function so that administrator will not miss anything. If there is new malicious IP / URL information, we can block it automatically through our proactive defense system . When emergency incident needs to be reported and handled immediately , You’ll be notified by our security notification and it’ll be handle accordingly through our forensics analysis. Our OneMan SOC platform assists in the entire 
process management workflow: from generating notification forms to completing the entirety of each case. Helping customers to secure their internal monitoring.

More >

WhatsUp® Gold

[ "" ]

More >

ArmorX APT - Anti-Malicious Mail Stronghold

Dogfight hackers in the cloud to secure vulnerable choke points and neutralize threat flows
An impregnable Email IPS and APT Gateway
Technological Adavantage
Sandbox malicious hyperlink download analysis.
APT attack connection counter Sandbox malware behavior analysis
Double authentication whitelist.

Next-gen AI unknown malicious threat program behavior analysis 
A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including

  • Attachment type:attachment encryption, forged subfile name, bomb compression (ZIP Bomb), decompression times.
  • Characteristic database:complete (Md5), multi-segment (Ssdeep), loading (Imphash) sampling, original database.
  • Program behavior:Antidebug Antivm, CVE Vulnerability, encryption calculus, Exploit Kits, Packers Hidden, Webshells , email identification, malicious files, malware, mobile malware, malicious URLs.
  • Sandbox analysis (optional - independent dynamic sandbox simulation system):behavior analysis, network analysis.

Forensic Report
The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).

More >

Openfind Secure Cloud Service

OSecure Cloud Security Service is cloud service brand by Openfind. It provides additional Email security services for corporate, especially good for Office 365/G Suite. OSecure offers advanced prevention with precision filtering technology, upgraded mail protection to ensure the security of corporate communications. Also it offers adjustable filtering settings and comprehensive review of corporate security requirements and with high-speed interception and report generation for optimal management efficiency. 

More >


A Network Traffic Analysis tool helps enterprise, government, and critical infrastructure users make their IT operations secure and reliable through advanced artificial intelligence, machine learning, and big data analysis.
#Provides round-the-clock security monitoring
#Gives you powerful rapid detection & response capabilities
#Take advantage of the solution’s powerful detection capabilities
#Let’s you gain a deep visibility into the internal network
#Powerful and easy to use

More >

Gateway Solution Service

Our “Gateway Solution Service” provides domestic and foreign cyber security information, blacklists, websites, various Trojans and viruses, and real-time blocking, as well as 24/7 monitoring and threat warning and 24-hour professional customer service consulting services. We use a monthly rent model, so SMEs can easily have national-level security protection.

More >


Digicentre uses secure, high-performance, and cost effective infrastructure. With professional expert advice digicentre  provide tailor-made solutions for customers’ operating demands.

More >

DXC Security Services

Build digital security into the fabric of your enterprise.
Enterprises are facing more sophisticated and more persistent attacks, both from outside and within, while they’re under pressure to take advantage of emerging digital technologies.
DXC Technology serves as a trusted advisor and primary security integrator to protect your enterprise and enable your digital transformation. Backed by more than 3,500 security experts and a global network of 24x7 security operations centers, DXC’s industry-leading solutions help protect data, applications, infrastructure and endpoints; detect and predict attacks; and proactively respond to threats.

More >

QUARK Android-An Obfuscation-Neglect Android Malware Scoring System

Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.

We have an order theory of criminal which explains stages of committing a crime. For example, crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.

According to the above principle, we developed our order theory of android malware. We develop five stages to see if the malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. Certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of a malware.

Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.

Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.

More >