{"id":29,"date":"2025-04-30T10:47:50","date_gmt":"2025-04-30T02:47:50","guid":{"rendered":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?page_id=29"},"modified":"2025-10-16T13:00:54","modified_gmt":"2025-10-16T05:00:54","slug":"home","status":"publish","type":"page","link":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row_content&#8221; full_height=&#8221;yes&#8221; el_id=&#8221;home-hero-section&#8221;][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; full_height=&#8221;yes&#8221;][vc_column]<div class=\"gt-countdown-slider gt-style-2\" style=\"height:100vh;\"><div class=\"swiper-container gt-swiper-slider\" data-gt-item=\"1\" data-gt-item-space=\"0\" data-gt-loop=\"false\" data-gt-speed=\"1000\" data-gt-direction=\"horizontal\" data-gt-effect=\"slide\" data-gt-centered-slides=\"false\" data-gt-free-mode=\"false\"><div class=\"swiper-wrapper\"><div class=\"swiper-slide\"><div class=\"gt-image\" style=\"background-image:url(https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg);\"><div class=\"gt-opacity\" style=\"opacity: 0.2; background-color: #000000;\"><\/div><\/div><\/div><\/div><\/div><div class=\"gt-slider-content\"><div class=\"gt-title\"><div class=\"gt-title-inner gt-relative\"><span class=\"gt-primary\">Cybersecurity<\/span><span class=\"gt-secondary\">Summit 2025<\/span><\/div><\/div><div class=\"gt-address-date\">24 July 2025 | Pullman Kuala Lumpur City Centre<\/div><div class=\"gt-counter\"><div class=\"gt-counter-inner gt-relative\"><div class=\"gt-day\"><div class=\"wrapper\"><div class=\"gt-count\" id=\"gt-day-count-78117\"><\/div><div class=\"gt-title\">Days<\/div><\/div><\/div><div class=\"gt-hour\"><div class=\"wrapper\"><div class=\"gt-count\" id=\"gt-hour-count-78117\"><\/div><div class=\"gt-title\">Hours<\/div><\/div><\/div><div class=\"gt-minute\"><div class=\"wrapper\"><div class=\"gt-count\" id=\"gt-minute-count-78117\"><\/div><div class=\"gt-title\">Minutes<\/div><\/div><\/div><div class=\"gt-second\"><div class=\"wrapper\"><div class=\"gt-count\" id=\"gt-second-count-78117\"><\/div><div class=\"gt-title\">Seconds<\/div><\/div><\/div><\/div><script type='text\/javascript'>\r\n\t\t\t\t\t\t\t\t\tjQuery(document).ready(function($){\r\n\t\t\t\t\t\t\t\t\t\t$('.gt-counter-inner').countdown('2025\/07\/24 09:00:00', function(event) {\r\n\t\t\t\t\t\t\t\t\t\t\t$('#gt-day-count-78117').html(event.strftime('%D'));\r\n\t\t\t\t\t\t\t\t\t\t\t$('#gt-hour-count-78117').html(event.strftime('%H'));\r\n\t\t\t\t\t\t\t\t\t\t\t$('#gt-minute-count-78117').html(event.strftime('%M'));\r\n\t\t\t\t\t\t\t\t\t\t\t$('#gt-second-count-78117').html(event.strftime('%S'));\r\n\t\t\t\t\t\t\t\t\t\t});\r\n\t\t\t\t\t\t\t\t\t});\r\n\t\t\t\t\t\t\t\t<\/script><\/div><div class=\"gt-buttons\"><a href=\"#contactus-section\" target=\"_parent\"><span>Join as Sponsor<\/span><\/a><a href=\"\/cybersecuritysummit\/event-registration-form\" target=\"_parent\"><span>Buy a Ticket<\/span><\/a><\/div><\/div><div class=\"gt-separator gt-style-3\"><svg fill=\"#FFFFFF\" xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1480 142.3\" preserveAspectRatio=\"none\"><path d=\"M704.6 52.7C430.3 1.4 174.9 23 0 43.7v98.7h1480V43.7c-192.5 22.8-441.9 71.3-775.4 9z\"\/><\/svg><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;home-introduction-section&#8221;][vc_row][vc_column][vc_column_text css_animation=&#8221;fadeInDown&#8221; css=&#8221;&#8221; el_class=&#8221;home-intro introduction&#8221;]<\/p>\n<p style=\"text-align: center;\">As Malaysia\u2019s digital economy grows, so do the threats that put it at risk.<\/p>\n<p style=\"text-align: center;\">Cybersecurity Summit 2025 brings together government leaders, industry experts, and business stakeholders to tackle urgent challenges and unlock bold opportunities in the cyberspace.<\/p>\n<p style=\"text-align: center;\">Explore the latest threats, evolving compliance demands, and how innovations like AI are transforming digital defense.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css_animation=&#8221;slideInLeft&#8221; el_id=&#8221;home-insight-section&#8221;][vc_row][vc_column]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Maximize Your Experience<\/span><\/div><div class=\"gt-text\">Actionable insights from experts through keynotes, case studies, and panels - designed to elevate your cybersecurity game.<\/div><\/div>[vc_empty_space height=&#8221;40px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"gt-counter gt-align-center\" data-gt-delay=\"10\" data-gt-time=\"2000\"><div class=\"gt-number\">8<\/div><div class=\"gt-title\">Hours of content<\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"gt-counter gt-align-center\" data-gt-delay=\"10\" data-gt-time=\"2000\"><div class=\"gt-number\">19<\/div><div class=\"gt-title\">Esteemed Speakers<\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"gt-counter gt-align-center\" data-gt-delay=\"10\" data-gt-time=\"2000\"><div class=\"gt-number\">100<\/div><div class=\"gt-title\">Attendees to network with<\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;home-why-attend-section&#8221;][vc_row][vc_column]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Why You Should Attend?<\/span><\/div><div class=\"gt-text\">Level up your cybersecurity game with insights that matter\u2014here\u2019s why you shouldn\u2019t miss it.<\/div><\/div>[vc_empty_space height=&#8221;40px&#8221;][vc_row_inner el_class=&#8221;why-attend-content&#8221;][vc_column_inner el_class=&#8221;why-attend-column&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;61&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;slideInUp&#8221; css=&#8221;&#8221;][vc_column_text css_animation=&#8221;slideInUp&#8221; css=&#8221;&#8221;]<\/p>\n<h4 style=\"text-align: center;\">Outsmart Cyber Threats<\/h4>\n<p style=\"text-align: center;\">Strengthen your defenses with expert-led insights.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;why-attend-column&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;62&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;slideInUp&#8221; css=&#8221;&#8221;][vc_column_text css_animation=&#8221;slideInUp&#8221; css=&#8221;&#8221;]<\/p>\n<h4 style=\"text-align: center;\">Connect with Industry Leaders<\/h4>\n<p style=\"text-align: center;\">Build powerful connections shaping Malaysia\u2019s cyber future.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;why-attend-column&#8221; width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;63&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;slideInUp&#8221; css=&#8221;&#8221;][vc_column_text css_animation=&#8221;slideInUp&#8221; css=&#8221;&#8221;]<\/p>\n<h4 style=\"text-align: center;\">Future-Proof with AI<\/h4>\n<p style=\"text-align: center;\">Harness AI to elevate your cybersecurity strategy.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;home-speaker-section&#8221;][vc_row][vc_column]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Keynote Speaker<\/span><\/div><\/div>[vc_empty_space height=&#8221;30px&#8221;]<div class=\"gt-speakers-listing gt-style-1\"><div class=\"gt-columns gt-column-5 gt-column-space-20\"><div class=\"gt-col\"><div class=\"gt-inner\"><div class=\"gt-speaker gt-style-1\"><div class=\"gt-image\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/ir-dr-megat-zuhairy-bin-megat-tajuddin\/\"><img decoding=\"async\" alt=\"Ir Dr Megat Zuhairy bin Megat Tajuddin\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/07\/08082450\/Ir-Dr-Megat-Zuhairy.jpg\" \/><\/a><\/div><div class=\"gt-content\"><div class=\"gt-name\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/ir-dr-megat-zuhairy-bin-megat-tajuddin\/\">Ir Dr Megat Zuhairy bin Megat Tajuddin<\/a><\/div><div class=\"gt-profession\">Chief Executive<\/div><div class=\"gt-company\">National Cyber Security Agency, National Security Council (NACSA, NSC)<\/div><\/div><\/div><\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;60px&#8221;]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Speakers<\/span><\/div><\/div>[vc_empty_space height=&#8221;30px&#8221;]<div class=\"gt-speakers-listing gt-style-1\"><div class=\"gt-columns gt-column-5 gt-column-space-20\"><div class=\"gt-col\"><div class=\"gt-inner\"><div class=\"gt-speaker gt-style-1\"><div class=\"gt-image\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dato-ts-dr-haji-amirudin-abdul-wahab\/\"><img decoding=\"async\" alt=\"Dato&#8217; Ts Dr Haji Amirudin Abdul Wahab\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30163550\/dato-ts-dr-haji-amirudin-abdul-wahab.jpg\" \/><\/a><\/div><div class=\"gt-content\"><div class=\"gt-name\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dato-ts-dr-haji-amirudin-abdul-wahab\/\">Dato&#8217; Ts Dr Haji Amirudin Abdul Wahab<\/a><\/div><div class=\"gt-profession\">CEO<\/div><div class=\"gt-company\">CyberSecurity Malaysia<\/div><div class=\"gt-speaker-desc\">Member of the National Anti-Financial Crime Centre (NFCC) Advisory Board &amp; National Technologist Awardee 2024 by MOSTI<\/div><\/div><\/div><\/div><\/div><div class=\"gt-col\"><div class=\"gt-inner\"><div class=\"gt-speaker gt-style-1\"><div class=\"gt-image\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/amal-wickramasinghe\/\"><img decoding=\"async\" alt=\"Amal Wickramasinghe\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/06\/17100001\/Amal-Wickramasinghe.jpg\" \/><\/a><\/div><div class=\"gt-content\"><div class=\"gt-name\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/amal-wickramasinghe\/\">Amal Wickramasinghe<\/a><\/div><div class=\"gt-profession\">Head of Governance Risk and Compliance - Cybersecurity and Data Privacy<\/div><div class=\"gt-company\">Axiata Group<\/div><\/div><\/div><\/div><\/div><div class=\"gt-col\"><div class=\"gt-inner\"><div class=\"gt-speaker gt-style-1\"><div class=\"gt-image\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/jaco-benadie\/\"><img decoding=\"async\" alt=\"Jaco Benadie\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30162319\/jaco-benadie.jpg\" \/><\/a><\/div><div class=\"gt-content\"><div class=\"gt-name\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/jaco-benadie\/\">Jaco Benadie<\/a><\/div><div class=\"gt-profession\">Partner, Technology Consulting - Cyber<\/div><div class=\"gt-company\">Ernst &amp; Young Consulting Sdn Bhd<\/div><div class=\"gt-speaker-desc\">Leader of EY ASEAN&#039;s OT Cybersecurity Centre of Excellence<\/div><\/div><\/div><\/div><\/div><div class=\"gt-col\"><div class=\"gt-inner\"><div class=\"gt-speaker gt-style-1\"><div class=\"gt-image\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dr-mazlan-abbas\/\"><img decoding=\"async\" alt=\"Dr Mazlan Abbas\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30162100\/dr-mazlan-abbas.jpg\" \/><\/a><\/div><div class=\"gt-content\"><div class=\"gt-name\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dr-mazlan-abbas\/\">Dr Mazlan Abbas<\/a><\/div><div class=\"gt-profession\">CEO &amp; Co-founder<\/div><div class=\"gt-company\">FAVORIOT Sdn Bhd<\/div><div class=\"gt-speaker-desc\">Top 10 Global IoT Influencer (Postscapes)<\/div><\/div><\/div><\/div><\/div><div class=\"gt-col\"><div class=\"gt-inner\"><div class=\"gt-speaker gt-style-1\"><div class=\"gt-image\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/umang-varma\/\"><img decoding=\"async\" alt=\"Umang Varma\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/05\/19104634\/umang-varma.jpg\" \/><\/a><\/div><div class=\"gt-content\"><div class=\"gt-name\"><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/umang-varma\/\">Umang Varma<\/a><\/div><div class=\"gt-profession\">Head of Customer Engineering<\/div><div class=\"gt-company\">Google Cloud<\/div><\/div><\/div><\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;40px&#8221;][vc_btn title=&#8221;See More&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; css=&#8221;&#8221; link=&#8221;url:%2Fcybersecuritysummit%2Fspeaker&#8221; el_class=&#8221;speaker-see-more-button&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row_content&#8221; el_id=&#8221;home-programme-section&#8221;][vc_row full_width=&#8221;stretch_row&#8221; background-position=&#8221;center-center&#8221; el_class=&#8221;home-programme-section&#8221; css=&#8221;.vc_custom_1745993985183{background-image: url(https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30141929\/cybersecurity-bg-section.jpg?id=65) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;PROGRAMME&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23FFFFFF&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_id=&#8221;programme-title&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_separator border_width=&#8221;2&#8243; el_width=&#8221;50&#8243; css=&#8221;&#8221; el_class=&#8221;additional-separator&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_btn title=&#8221;SCHEDULE&#8221; shape=&#8221;round&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; css=&#8221;&#8221; button_block=&#8221;true&#8221; link=&#8221;url:%2Fcybersecuritysummit%2Fprogramme%2F&#8221; el_id=&#8221;programme-day-button&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_id=&#8221;home-audience-section&#8221;][vc_row][vc_column]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Who Should Attend?<\/span><\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][vc_row_inner el_class=&#8221;target-audience-column&#8221;][vc_column_inner el_class=&#8221;target-audience-content&#8221; width=&#8221;1\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div id=\"user-icon\"><\/div>\n<h4 style=\"text-align: center;\">C-Level &amp; Decision Makers<\/h4>\n<p>[\/vc_column_text]<div class=\"gt-icon-list gt-style-1\"><ul><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">CISOs, CTOs, CIOs, CEOs &amp; COOs of tech-driven businesses<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Board members overseeing cybersecurity risk<\/div><\/li><\/ul><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;target-audience-content&#8221; width=&#8221;1\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div id=\"user-icon\"><\/div>\n<h4 style=\"text-align: center;\">Cybersecurity &amp; IT Professionals<\/h4>\n<p>[\/vc_column_text]<div class=\"gt-icon-list gt-style-1\"><ul><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Analysts, Engineers, Threat Intelligence Experts<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Incident Response &amp; Digital Forensics Teams<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">IT Risk &amp; Compliance Officers<\/div><\/li><\/ul><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;target-audience-content&#8221; width=&#8221;1\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div id=\"user-icon\"><\/div>\n<h4 style=\"text-align: center;\">Government &amp; Regulatory Bodies<\/h4>\n<p>[\/vc_column_text]<div class=\"gt-icon-list gt-style-1\"><ul><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Law enforcement &amp; cybercrime divisions<\/div><\/li><\/ul><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;target-audience-content&#8221; width=&#8221;1\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div id=\"user-icon\"><\/div>\n<h4 style=\"text-align: center;\">Industry-Specific Attendees<\/h4>\n<p>[\/vc_column_text]<div class=\"gt-icon-list gt-style-1\"><ul><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Financial Services, Telecommunications &amp; Digital Infrastructure<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">SMEs &amp; Mid-Tier Companies<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Supply Chain &amp; Logistics<\/div><\/li><\/ul><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;target-audience-content&#8221; width=&#8221;1\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div id=\"user-icon\"><\/div>\n<h4 style=\"text-align: center;\">Tech &amp; Innovation Leaders<\/h4>\n<p>[\/vc_column_text]<div class=\"gt-icon-list gt-style-1\"><ul><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">AI, Cloud &amp; Emerging Tech Experts<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Startups &amp; Scaleups in Cybersecurity<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Academia &amp; Research Institutions<\/div><\/li><\/ul><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;target-audience-content&#8221; width=&#8221;1\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div id=\"user-icon\"><\/div>\n<h4 style=\"text-align: center;\">International &amp; Public-Private Collaborators<\/h4>\n<p>[\/vc_column_text]<div class=\"gt-icon-list gt-style-1\"><ul><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Global cybersecurity firms &amp; solution providers<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Cybersecurity consultants &amp; law firms<\/div><\/li><li><i class=\"fa-solid fa-circle\"><\/i><div class=\"text\">Public-private partnership leaders<\/div><\/li><\/ul><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_id=&#8221;home-ticket-section&#8221;][vc_row][vc_column]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Buy Ticket<\/span><\/div><div class=\"gt-separate\"><div class=\"gt-icon\"><svg fill=\"currentColor\" viewBox=\"0 -98 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m492 0h-472c-11.046875 0-20 8.953125-20 20v275.335938c0 11.042968 8.953125 20 20 20h472c11.046875 0 20-8.957032 20-20v-275.335938c0-11.046875-8.953125-20-20-20zm-118.324219 275.335938h-235.351562c-8.453125-50.175782-48.148438-89.871094-98.324219-98.324219v-38.6875c50.175781-8.453125 89.871094-48.148438 98.324219-98.324219h235.351562c8.453125 50.175781 48.148438 89.871094 98.324219 98.324219v38.6875c-50.175781 8.453125-89.871094 48.148437-98.324219 98.324219zm98.324219-177.867188c-28.070312-7.25-50.21875-29.398438-57.46875-57.46875h57.46875zm-374.53125-57.46875c-7.25 28.070312-29.398438 50.21875-57.46875 57.46875v-57.46875zm-57.46875 177.867188c28.070312 7.25 50.21875 29.394531 57.46875 57.46875h-57.46875zm374.53125 57.46875c7.25-28.074219 29.398438-50.21875 57.46875-57.46875v57.46875zm-158.53125-216.335938c-54.40625 0-98.667969 44.261719-98.667969 98.667969 0 54.402343 44.261719 98.667969 98.667969 98.667969s98.667969-44.265626 98.667969-98.667969c0-54.40625-44.261719-98.667969-98.667969-98.667969zm0 157.335938c-32.347656 0-58.667969-26.320313-58.667969-58.667969 0-32.351563 26.320313-58.667969 58.667969-58.667969s58.667969 26.316406 58.667969 58.667969c0 32.347656-26.320313 58.667969-58.667969 58.667969zm0 0\"><\/path><\/svg><\/div><\/div><div class=\"gt-text\">Secure your spot now, save up to RM300 off when you book 3 or more tickets!<\/div><\/div>[vc_empty_space height=&#8221;40px&#8221;][vc_row_inner el_class=&#8221;ticket-column&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][vc_pricing_table heading=&#8221;Standard Fee&#8221; subheading=&#8221;(6 July 2025 onwards)&#8221; currency=&#8221;RM&#8221; price=&#8221;1,199&#8243; period=&#8221;&#8221; btn_title=&#8221;Buy Now&#8221; css=&#8221;.vc_custom_1754640523093{background-color: #ECECEC !important;}&#8221; el_class=&#8221;price-table&#8221; btn_link=&#8221;url:%2Fcybersecuritysummit%2Fevent-registration-form&#8221; btn_el_class=&#8221;disabled&#8221;][\/vc_pricing_table][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_pricing_table heading=&#8221;Group Rate&#8221; subheading=&#8221;(3 pax and above)&#8221; currency=&#8221;RM&#8221; price=&#8221;888&#8243; period=&#8221;&#8221; btn_title=&#8221;Buy Now&#8221; css=&#8221;.vc_custom_1754640529322{background-color: #ECECEC !important;}&#8221; btn_link=&#8221;url:%2Fcybersecuritysummit%2Fevent-registration-form&#8221; el_class=&#8221;price-table&#8221; btn_el_class=&#8221;disabled&#8221;][\/vc_pricing_table][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_pricing_table heading=&#8221;Student Fee&#8221; subheading=&#8221;&#8221; currency=&#8221;RM&#8221; price=&#8221;300&#8243; period=&#8221;&#8221; btn_title=&#8221;Buy Now&#8221; css=&#8221;.vc_custom_1754640534889{background-color: #ECECEC !important;}&#8221; btn_link=&#8221;url:%2Fcybersecuritysummit%2Fevent-registration-form&#8221; el_class=&#8221;price-table&#8221; btn_el_class=&#8221;disabled&#8221;][\/vc_pricing_table][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row_content&#8221; el_id=&#8221;home-next-conference&#8221;][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;middle&#8221; min_height=&#8221;400px&#8221;][vc_column]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Interested in the next chapter of BIG TECH?<\/span><\/div><div class=\"gt-text\">Secure your tickets to the next conference<\/div><\/div><div class=\"gt-countdown-slider gt-style-2\" style=\"height:100vh;\"><div class=\"swiper-container gt-swiper-slider\" data-gt-item=\"1\" data-gt-item-space=\"0\" data-gt-loop=\"false\" data-gt-speed=\"1000\" data-gt-direction=\"horizontal\" data-gt-effect=\"slide\" data-gt-centered-slides=\"false\" data-gt-free-mode=\"false\"><div class=\"swiper-wrapper\"><div class=\"swiper-slide\"><div class=\"gt-image\" style=\"background-image:url(https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30151814\/cloudtech-bg.png);\"><div class=\"gt-opacity\" style=\"opacity: 0.2; background-color: #000000;\"><\/div><\/div><\/div><\/div><\/div><div class=\"gt-slider-content\"><div class=\"gt-title\"><div class=\"gt-background-text\">CloudTech<\/div><div class=\"gt-title-inner\"><span class=\"gt-primary\">CloudTech &amp;<\/span><span class=\"gt-secondary\">DataCentre 2.0<\/span><\/div><\/div><div class=\"gt-address-date\">6 &amp; 7 August 2025 | Pullman Kuala Lumpur City Centre<\/div><div class=\"gt-buttons\"><a href=\"https:\/\/conference.thestar.com.my\/cloudtech\" target=\"_blank\"><span>Learn More<\/span><\/a><\/div><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_id=&#8221;home-newsletter-section&#8221; css=&#8221;.vc_custom_1745995734500{background-image: url(https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg?id=13) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_empty_space height=&#8221;40px&#8221;]<div class=\"gt-heading gt-dark gt-size1 gt-align-center\"><div class=\"gt-title\"><span>Newsletter<\/span><\/div><div class=\"gt-separate\"><div class=\"gt-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z\"><\/path><polyline points=\"22,6 12,13 2,6\"><\/polyline><\/svg><\/div><\/div><div class=\"gt-text\">Stay updated on top events, exclusive promotions, and expert tips for unforgettable experiences.<\/div><\/div>[vc_empty_space height=&#8221;25px&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f239-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"239\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/29#wpcf7-f239-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"239\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.2\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f239-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\" id=\"newsletter_subscription\">\n\t<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"cybersecurity\" type=\"hidden\" name=\"website\" \/>\n\t<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"newsletter\" type=\"hidden\" name=\"form-type\" \/>\n\t<div class=\"col-md-4 contact-us-form-split-inputs\">\n\t\t<label><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" id=\"newsletter-email\" autocomplete=\"your-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter your email address*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><\/label>\n\t<\/div>\n\t<div class=\"col-md-4 contact-us-form-split-inputs\">\n\t\t<label><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" id=\"newsletter-name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter your name*\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><\/label>\n\t<\/div>\n        <div class=\"wpcf7-turnstile cf-turnstile\" data-sitekey=\"0x4AAAAAAB5adcEpWwsgZnzi\" data-response-field-name=\"_wpcf7_turnstile_response\"><\/div>\n\t<div class=\"col-md-4 contact-us-form-full-inputs\">\n\t\t<input class=\"wpcf7-form-control wpcf7-submit has-spinner newsletter-subscribe-btn\" type=\"submit\" value=\"Submit\" \/>\n\t<\/div>\n\t<span class=\"wpcf7-form-control-wrap\" data-name=\"your-consent\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"your-consent\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I agree to the terms &amp; conditions.<\/span><\/label><\/span><\/span><\/span>\n<\/div><p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"188\"\/><script>document.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );<\/script><\/p><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[vc_empty_space height=&#8221;70px&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section full_width=&#8221;stretch_row_content&#8221; full_height=&#8221;yes&#8221; el_id=&#8221;home-hero-section&#8221;][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; full_height=&#8221;yes&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;home-introduction-section&#8221;][vc_row][vc_column][vc_column_text css_animation=&#8221;fadeInDown&#8221; css=&#8221;&#8221; el_class=&#8221;home-intro introduction&#8221;] As Malaysia\u2019s digital economy grows, so do the threats that put it at risk. Cybersecurity Summit 2025 brings together government leaders, industry experts, and business stakeholders to tackle urgent&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-29","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Summit 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Summit 2025\" \/>\n<meta property=\"og:description\" content=\"[vc_section full_width=&#8221;stretch_row_content&#8221; full_height=&#8221;yes&#8221; el_id=&#8221;home-hero-section&#8221;][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; full_height=&#8221;yes&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;home-introduction-section&#8221;][vc_row][vc_column][vc_column_text css_animation=&#8221;fadeInDown&#8221; css=&#8221;&#8221; el_class=&#8221;home-intro introduction&#8221;] As Malaysia\u2019s digital economy grows, so do the threats that put it at risk. Cybersecurity Summit 2025 brings together government leaders, industry experts, and business stakeholders to tackle urgent...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Summit 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T05:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"name\":\"Cybersecurity Summit 2025\",\"isPartOf\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website\"},\"datePublished\":\"2025-04-30T02:47:50+00:00\",\"dateModified\":\"2025-10-16T05:00:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"name\":\"Cybersecurity Summit 2025\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization\",\"name\":\"Cybersecurity Summit\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png\",\"contentUrl\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png\",\"width\":220,\"height\":224,\"caption\":\"Cybersecurity Summit\"},\"image\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Summit 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Summit 2025","og_description":"[vc_section full_width=&#8221;stretch_row_content&#8221; full_height=&#8221;yes&#8221; el_id=&#8221;home-hero-section&#8221;][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; full_height=&#8221;yes&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;home-introduction-section&#8221;][vc_row][vc_column][vc_column_text css_animation=&#8221;fadeInDown&#8221; css=&#8221;&#8221; el_class=&#8221;home-intro introduction&#8221;] As Malaysia\u2019s digital economy grows, so do the threats that put it at risk. Cybersecurity Summit 2025 brings together government leaders, industry experts, and business stakeholders to tackle urgent...","og_url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","og_site_name":"Cybersecurity Summit 2025","article_modified_time":"2025-10-16T05:00:54+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","name":"Cybersecurity Summit 2025","isPartOf":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website"},"datePublished":"2025-04-30T02:47:50+00:00","dateModified":"2025-10-16T05:00:54+00:00","breadcrumb":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.thestar.com.my\/cybersecuritysummit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","name":"Cybersecurity Summit 2025","description":"","publisher":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization","name":"Cybersecurity Summit","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/","url":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png","contentUrl":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png","width":220,"height":224,"caption":"Cybersecurity Summit"},"image":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":28,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":240,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/29\/revisions\/240"}],"wp:attachment":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}