{"id":67143,"date":"2012-08-24T17:52:17","date_gmt":"2012-08-24T09:52:17","guid":{"rendered":"http:\/\/www.i-sprint.com\/the-international-conference-on-cyber-security-cyber-terrorism\/"},"modified":"2023-04-13T16:25:15","modified_gmt":"2023-04-13T08:25:15","slug":"the-international-conference-on-cyber-security-cyber-terrorism","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/the-international-conference-on-cyber-security-cyber-terrorism\/","title":{"rendered":"The International Conference on Cyber Security &#038; Cyber Terrorism"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><h2 style=\"text-align: center;\"><strong>The International Conference on Cyber Security &amp; Cyber Terrorism<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-2\"><div align=\"justify\">\n<div class=\"vc_row wpb_row vc_row-fluid dt-default\">\n<div class=\"wpb_column vc_column_container vc_col-sm-12\">\n<div class=\"vc_column-inner \">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>i-Sprint joins the International Conference on Cyber Security &amp; Cyber Terrorism.<\/p>\n<p>\u201cThe International Conference on Cyber Security &amp; Cyber Terrorism\u201d will be held in Singapore from 23rd to 24th August 2012. i-Sprint joins this prestigious event as a gold sponsor and our CEO, Mr. Albert Ching is one of the invited speakers in the conference to share his insights with topic on \u201cAuthentication as the first line of defense for cyber security\u201d.<\/p>\n<p>This event is co-organized by The Institute of Systems Science of the National University of Singapore (NUS-ISS) and The Association of Information Security Professionals (AISP) to discuss solutions and implementation on enhancing cyber security and combating cyber terrorism. It served as a premier networking platform for high-level representatives from across Asia.<\/p>\n<p>Some photos from the event (click to enlarge)<\/p>\n<p>Speaker \u2013 Albert Ching<br \/>\nCEO, i-Sprint Innovations Pte Ltd, Singapore<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"fusion-image-carousel fusion-image-carousel-auto fusion-image-carousel-1 fusion-carousel-border\"><div class=\"awb-carousel awb-swiper awb-swiper-carousel\" data-autoplay=\"yes\" data-columns=\"2\" data-itemmargin=\"13\" data-itemwidth=\"180\" data-touchscroll=\"yes\" data-imagesize=\"auto\" style=\"--awb-columns:2;\"><div class=\"swiper-wrapper awb-image-carousel-wrapper fusion-flex-align-items-center\"><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/2012Cyber-Security1-min-300x200.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/2012Cyber-Security7-min-300x186.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/2012Cyber-Security6-min-300x200.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/2012Cyber-Security5-min-300x201.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/2012Cyber-Security4-min-300x207.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/2012Cyber-Security3-min-300x200.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/2012Cyber-Security2-min-300x200.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><\/div><div class=\"awb-swiper-button awb-swiper-button-prev\"><i class=\"awb-icon-angle-left\" aria-hidden=\"true\"><\/i><\/div><div class=\"awb-swiper-button awb-swiper-button-next\"><i class=\"awb-icon-angle-right\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This event is co-organized by The Institute of Systems Science of the National University of Singapore (NUS-ISS) and The Association of Information Security Professionals (AISP) to discuss solutions and implementation on enhancing cyber security and&#8230;&#8230;<\/p>\n","protected":false},"author":141,"featured_media":67124,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[174],"tags":[],"class_list":["post-67143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ja-2"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/67143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=67143"}],"version-history":[{"count":2,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/67143\/revisions"}],"predecessor-version":[{"id":83830,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/67143\/revisions\/83830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/67124"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=67143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=67143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=67143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}