EMPOWERING THE FUTURE WITH CYBERSECURITY INNOVATIONS

Asia Cybersecurity Exchange (AsiaCyberX) is determined to make Malaysia one of the major Cybersecurity Hub in the World and to grow all of our talents into world-class players, offering a new level of cybersecurity expertise to organizations worldwide.

What We Do

 

LEARN MORE

Our Mentors

Mr. Alex Liew

Mr. Boyd Jones

Mr. Choo Kok Wah

Mr. Dalbir Singh

Tan Sri Dato’ Ahmad Fuzi Haji Abdul Razak

Dato’ Ts. Dr. Haji Amirudin Abdul Wahab

Mr. David Rajoo

Mr. Fong Choong Fook

Mr. Gilbert Chu

Mr. Goh Chee Hoh

Mr. Ian Loe

Ts. Johari Jalaludin

Mr. Kho Han Yao

Mr. Mohammed Fadzil Haron

Dr. Suresh Ramasamy

Mr. Tan Chee Keong

Mr. Teng Yung-Chi

Mr. Woon Tai Hai

 

VIEW MENTORS

Supporting Organizations

 

LEARN MORE

Our Mission

AsiaCyberX’s mission is to identify undiscovered cybersecurity talents and entrepreneurs with huge growth potential. With our training and mentorship programs, we aim to elevate Malaysia’s cybersecurity ecosystem to a whole new level by strengthening the capabilities of local talent and entrepreneurs. We determined to make Malaysia one of the major cybersecurity hub in the world and to grow all of our talents into world-class players, offering a new level of cybersecurity expertise to organizations worldwide.

Our Advisors

Fong Choong Fook
Chief Executive Officer
LE Global Services Sdn Bhd

Fong is a 20-year veteran in the specialized and highly-demanding arena of information security.

When it comes to the topic of cybersecurity, Fong is a sought-after international speaker known for his enthusiasm, humor, dedication, and passion, with experience and coverage in national television programs, magazines, radio broadcasts, conferences, and webinars.

Fong has also consulted with and trained multiple government and multinational clients in the Asia Pacific, Eastern Europe, and Africa regions on information system security, enterprise risk matrix design, policy review, policy implementation assurance, penetration testing, technical configuration evaluation, security procedures, and disaster recovery/business continuity planning.