Sponsor Now

 

Past Events

Sponsors

Sponsorship Details

Diamond Sponsorship

  1. Acknowledgement during the opening of the conference
  2. Complimentary Booth of size 10 meters square
  3. Four (4) delegateā€™s complimentary registrations with lunch
  4. Include marketing document in the delegate pack
  5. Logo on Conference website, Banners, Backdrop, and conference proceedings
  6. One exhibition stand (1Ɨ1 meters) for the conference
  7. One full cover page size ad in conference proceedings
  8. Opportunities for Short speech at events
  9. Opportunity to sponsors conference kit
  10. Opportunity to sponsors conference lanyards, ID cards
  11. Opportunity to sponsors conference lunch
  12. Recognition on video ads
  13. 150-word company profile and contact details in the delegate pack

Platinum Sponsorship

  1. Three (3) delegateā€™s complimentary registrations with lunch
  2. Recognition on video ads
  3. Opportunity to sponsors conference lunch
  4. Opportunity to sponsors conference lanyards, ID cards
  5. Opportunity to sponsors conference kit
  6. Opportunities for Short speech at events
  7. One full page size ad in conference proceedings
  8. One exhibition stand (1Ɨ1 meters) for the conference
  9. Logo on Conference website, Banners, Backdrop, and conference proceedings
  10. Include marketing document in the delegate pack
  11. Complimentary Booth of size 10 meters square
  12. Acknowledgement during the opening of the conference
  13. 100-word company profile and contact details in the delegate pack

Gold Sponsorship

  1. Two (2) delegateā€™s complimentary registrations with lunch
  2. Opportunities for Short speech at events
  3. Logo on Conference website, Banners, Backdrop, and conference proceedings
  4. Include marketing document in the delegate pack
  5. Complimentary Booth of size 10 meters square
  6. Acknowledgement during the opening of the conference
  7. 100-word company profile and contact details in the delegate pack
  8. Ā½ Ā page size ad in conference proceedings

Silver Sponsorship

  1. Acknowledgement during the opening of the conference
  2. One(1) delegateā€™s complimentary registrations with lunch
  3. Include marketing document in the delegate pack
  4. Logo on Conference website, Banners, Backdrop, and conference proceedings
  5. Ā¼ Ā page size ad in conference proceedings
  6. 100 word company profile and contact details in the delegate pack

Individual Sponsorship

  1. Acknowledgement during the opening of the conference
  2. One(1) delegateā€™s complimentary registrations with lunch

Registration Fees

Details Registration fees
Diamond Ā Sponsorship USD 1500
Platinum Ā Sponsorship USD 1200
Gold Ā Sponsorship USD 1000
Silver Ā Sponsorship USD 700
Individual Ā Sponsorship USD 400

Additional Sponsor

Outside Back Cover (color) USD300.00
Inside Front Cover (color) USD500.00
Inside Back Cover (color) USD200.00
Inside Page (Black) USD100.00
Lunch Sponsor USD1,000.00
Cocktail Sponsor USD900.00
Coffee Break Sponsor USD400.00
Bag/Files/Kit Sponsor USD600.00
Bag Insert Sponsor USD150.00
Lanyard Sponsor USD160.00

 

Others

Subject Tracks

Cryptographic Algorithms and Protocols | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Emerging Technologies (e.g., blockchain, IoT) | Cryptography for Privacy and Anonymity | Post-Quantum Cryptography Cryptography Fundamentals and Principles | Cryptographic Algorithms and Techniques | Cryptography for Cloud Computing and IoT | Cryptography for Blockchain and Distributed Systems | Post-Quantum Cryptography | Cryptographic Hardware and Embedded Systems | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Privacy and Anonymity | Information Hiding and Steganography | Public Key Infrastructure and Key Management | Authentication and Digital Signatures | Cyber Threat Intelligence and Analysis | Cybersecurity Risk Management and Governance | Cybersecurity for Critical Infrastructure and Industrial Control Systems | Malware Analysis and Detection | Intrusion Detection and Prevention | Incident Response and Digital Forensics | Cybersecurity Education and Training | Cybersecurity Policies and Regulations | Human Factors in Cybersecurity and Cryptography. | Secure Multiparty Computation and Secret Sharing | Digital Signatures and Authentication | Public Key Infrastructure and Key Management | Cyber Threat Intelligence and Analysis | Cybersecurity Risk Management and Governance | Cybersecurity for Critical Infrastructure and Industrial Control Systems | Cloud Security and Virtualization | Malware Analysis and Detection | Intrusion Detection and Prevention | Incident Response and Digital Forensics | Cybersecurity Education and Training |Cybersecurity and Cryptography Policies and Regulations | Human Factors in Cybersecurity and CryptographyĀ