Cyber Intelligence Asia 2024

Avatar
[[{“value”:”

November 13-14, 2024
Location: Kuala Lumpur, Malaysia

We are pleased to bring our annual Cyber Intelligence Asia conference and exhibition back to Kuala Lumpur, Malaysia. Our international event brings together leading cyber security officials from across Asia-Pacific to discuss the latest national cyber security strategies and policies.

Besides reviewing the national cyber security strategies and policies, our event will also look at combating cybercrimes across the region, new threats being seen to critical infrastructures, threat intelligence and cyber awareness and education.

Governments in the region are facing new threats, and protecting vulnerable citizens from online scams and abuse is high on the agenda due to the digitalization of day-to-day life. Our Cyber Intelligence Asia show will analyse what different governments are doing to help protect their vulnerable citizens from cyber criminals.

The event is officially supported by the National Cyber Security Agency (NACSA) and CyberSecurity Malaysia who have both provided input into the event topics. They are the leading cyber security agencies in Malaysia who have created a strong cyber security capability across Malaysia.

To be part of our 11th annual Cyber Intelligence Asia conference and exhibition either as a speaker, sponsor, exhibitor or as a delegate please contact us at events@intelligence-sec.com or +44 (0)7792 473 246.

The post Cyber Intelligence Asia 2024 appeared first on CISO MAG | Cyber Security Magazine.

“}]] 

Total
0
Shares
Previous Post

Future AI Summit Indonesia

Next Post

Counter-Insider Threat Symposium

Related Posts

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. "The threat actor then demonstrated their ability to persist in target environments across equipment from multiple
Avatar
Read More