Cyber
Cyber
A unique program that features new technologies and trends, cyber security initiatives & strategies, generic overview of the latest developments in the sector and strategic information on the hottest topics.
The sessions delivered by top level game changers from the industry, will help the organisations enhance their cyber security strategies. A great platform for networking, hearing from industry leaders and peers, getting to witness latest solution, products and services from the cyber community.
![](https://www.bconnectglobal.com/frontend/assets/wp-content/uploads/2021/01/Cybersecurity.png)
![](https://www.bconnectglobal.com/frontend/assets/wp-content/uploads/2021/01/Cybersecurity.png)
![](https://www.bconnectglobal.com/frontend/assets/wp-content/uploads/2020/12/logo1.png)
![](https://www.bconnectglobal.com/frontend/assets/wp-content/uploads/2020/12/logo1.png)
![](https://www.bconnectglobal.com/frontend/assets/wp-content/uploads/2020/12/logo1.png)
![](https://www.bconnectglobal.com/frontend/assets/wp-content/uploads/2020/12/logo-17.png)
![]({{url('frontend/assets/wp-content/uploads/2020/12/logo-17.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-26.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-26.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-12.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-12.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-12.png)
![](frontend/assets/wp-content/uploads/2020/12/logo1.png)
![](frontend/assets/wp-content/uploads/2020/12/logo1.png)
![](frontend/assets/wp-content/uploads/2020/12/logo1.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-12.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-12.png)
![](frontend/assets/wp-content/uploads/2020/12/logo-12.png)
Choose your sector
![](frontend/assets/wp-content/uploads/2021/01/cyber-security.png)
![](frontend/assets/wp-content/uploads/2021/01/cyber-security.png)
![](frontend/assets/wp-content/uploads/2021/01/cyber-security.png)
Network security
![](frontend/assets/wp-content/uploads/2021/01/global-security.png)
![](frontend/assets/wp-content/uploads/2021/01/global-security.png)
![](frontend/assets/wp-content/uploads/2021/01/global-security.png)
Internet Security
![](frontend/assets/wp-content/uploads/2021/01/shield.png)
![](frontend/assets/wp-content/uploads/2021/01/shield.png)
![](frontend/assets/wp-content/uploads/2021/01/shield.png)
End point security
![](frontend/assets/wp-content/uploads/2021/01/secure-data.png)
![](frontend/assets/wp-content/uploads/2021/01/secure-data.png)
![](frontend/assets/wp-content/uploads/2021/01/secure-data.png)
Data security
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing.png)
IoT Security
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing-1.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing-1.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing-1.png)
Cloud Security
![](frontend/assets/wp-content/uploads/2021/01/applications-1.png)
![](frontend/assets/wp-content/uploads/2021/01/applications-1.png)
![](frontend/assets/wp-content/uploads/2021/01/applications-1.png)
Application security
Choose your sector
![](frontend/assets/wp-content/uploads/2021/01/cyber-security.png)
![](frontend/assets/wp-content/uploads/2021/01/cyber-security.png)
![](frontend/assets/wp-content/uploads/2021/01/cyber-security.png)
Network security
![](frontend/assets/wp-content/uploads/2021/01/global-security.png)
![](frontend/assets/wp-content/uploads/2021/01/global-security.png)
![](frontend/assets/wp-content/uploads/2021/01/global-security.png)
Internet Security
![](frontend/assets/wp-content/uploads/2021/01/shield.png)
![](frontend/assets/wp-content/uploads/2021/01/shield.png)
![](frontend/assets/wp-content/uploads/2021/01/shield.png)
End point security
![](frontend/assets/wp-content/uploads/2021/01/secure-data.png)
![](frontend/assets/wp-content/uploads/2021/01/secure-data.png)
![](frontend/assets/wp-content/uploads/2021/01/secure-data.png)
Data security
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing.png)
IoT Security
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing-1.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing-1.png)
![](frontend/assets/wp-content/uploads/2021/01/cloud-computing-1.png)
Cloud Security
![](frontend/assets/wp-content/uploads/2021/01/applications-1.png)
![](frontend/assets/wp-content/uploads/2021/01/applications-1.png)
![](frontend/assets/wp-content/uploads/2021/01/applications-1.png)