Show Name | CYDES 2025, The 3rd Edition of Malaysia's National Cyber Defence & Security Exhibition and Conference |
Theme | Advancing Cyber Resilience |
Show Date & Timing |
1 – 3 July 2025 (Tuesday - Wednesday ) Registration Counter for Access, Lanyard & Badge Collection Start at 8: 00 AM Exhibition open from 10:00 AM – 6:00 PM (Daily) Conference start from 8:00 AM – 6:00 PM |
Venue |
Level Concourse, Perdana Hall and Green Zone Putrajaya International Convention Centre (PICC), Malaysia |
If you are attending as a trade professional, gain access to the exhibition halls, networking areas, and product showcases.
Participate in the third series of The ASEAN Cyber Security Forum 2025 and Malaysia and Cyber Security Strategy Forum 2025, Malaysia, led by industry experts and government officials. Conference delegates will receive full access to all conference sessions, networking opportunities and the exhibition area.
Event, Venue and Timing Details | |||
Registration |
Pre Registered
Walk-in Register
|
||
Pouch collection and Entry |
Registration Counter Pre - Registered ONLY
|
||
Attire |
Visitors shall dress in business casual attire only. Thus shorts/Bermudas, singlet, sleeveless shirt/-shirt, slippers, flip-flops and uncovered footwear (for gentlemen and ladies) are not allowed. |
||
Details | 1st July 2025 (Tuesday) | 2nd July 2025 (Wednesday) | 3rd July 2025 (Thursday) |
Opening Ceremony |
Main Hall (Putra B2)
10:00am - 12:30pm |
||
Closing Ceremony |
TBC
3:30pm - 4:00pm |
||
Conferences |
Main Hall Putra B2,Breakout Room 6, & 7
8:00 am - 6:30 pm |
Main Hall Putra B2
8:00 am - 6:30 pm |
|
Exhibitions |
Perdana Hall, Putra Hall B1, Green Zone Foyer
10: 00 am - 6:00 pm |
||
Amenities |
Restaurant/Café: Level C Customer Service: Level M ATM Machine: Level C Prayer Room: Level C Parking: Level B1 & B2 |
Please read the following Do’s and Don’ts carefully to ensure your personal safety, data protection, and a smooth experience during the event.
✅ DO's | ❌ DON'Ts |
1. Bring Identification
2. Use Official Wi-Fi Networks Cautiously
3. Protect Your Devices
4. Be Aware of Social Engineering
5. Follow Venue and Organiser Guidelines
6. Stay Alert to Phishing or Malicious Materials
7. Ask Before Taking Photos
|
1. Don’t Bring Suspicious Devices
2. Don’t Plug in Unknown USBs
3. Don’t Share Wi-Fi or Passwords
4. Don’t Overshare on Social Media
5. Don’t Leave Your Belongings Unattended
6. Don’t Install Unknown Apps
|