Enhance Your Cybersecurity Strategy
Download the Latest White Paper for Free!

In today's digital age, the methods of cyberattacks are becoming increasingly diverse. Simply strengthening software security still leaves many risks. Only by addressing security at the most fundamental level - hardware security - can comprehensive protection be achieved. With the changing trends in global regulations, how can businesses and individuals ensure that their systems comply with the latest security standards and defend against constantly evolving cyber threats?

We have prepared two expert white papers to help you understand the critical role of hardware security and stay updated on the latest regulatory trends:

  • 《Securing the Future - The Basics of Hardware Cybersecurity》
    • In-depth analysis of the differences between hardware and software attacks
    • How Root of Trust (RoT) serves as the foundation of security
    • Understand the security encryption logic of stored data
    • Integrating software and hardware security for comprehensive protection
  • 《New Security Regulations, Trends, and the Importance of Hardware Security》
    • Overview of the latest global cybersecurity regulations (EU RED/EN 18031and U.S. NIST SP 800-218 security standards)
    • Analysis of emerging cyber threats, such as firmware attacks and supply chain attacks
    • How hardware security technology helps ensure compliance with security regulations.
Download now to stay ahead of future security trends!
All fields are required.
For the purpose of event notifications and communications, DIGITIMES, Winbond, and their partners will jointly retain your personal information.
DIGITIMES privacy information policy

Welcome to register for various events organized, hosted, or co-organized by DIGITIMES Inc. (hereinafter referred to as "DIGITIMES"). By completing the registration, you agree to exercise your legal right to consent via electronic documents, which carries the effect of written consent.

DIGITIMES is committed to protecting the personal data, privacy, and rights of participants. During the registration process, participants' personal information will be used in accordance with Article 8 of the Personal Data Protection Act, with the following disclosures:

  1. 1. Purpose and Method of Collection The company collects personal data for event registration management, marketing, and internal statistical analysis (specific legal purpose codes: 090, 040, 157). Collection methods include digital forms, telephone, paper-based forms, and fax registration.
  2. 2. Categories of Collected Personal Data During event registration, the company collects the following personal information:
    1. C001 Personal Identification: Name, address, phone number, email, etc.
    2. C002 Financial Identification: Credit card or bank transfer account information (only for paid events)
  3. 3. Usage Duration, Location, Recipients, and Methods
    1. Duration: Throughout the company's operational period.
    2. Location: Personal data will be used within Taiwan.
    3. Recipients and Usage: Collected personal data will be used for event management, inquiries, and cooperation with partner organizations (including organizers, co-hosts, co-organizers, partners, and exhibitors). Additionally, usage includes:
      • Participant Data Analysis: Statistical analysis based on collected information.
      • Marketing: With participant consent, DIGITIMES and its partners (organizers, co-hosts, co-organizers, partners, exhibitors) may use personal data for marketing, contact, and information delivery.
  4. 4. Rights of Participants Once personal data is provided to the company, participants may request to review, access, obtain copies, supplement, correct, stop collection/processing/utilization, or delete their personal data. Requests can be made by contacting the event customer service at +886-2-87128866*375.
Download White Paper