2023 Agenda

8:00 - 9:00

REGISTRATION & COFFEE

9:00 - 9:10

INAUGURAL CEREMONY

9:10 - 9:20

Opening Remarks

HINSA SIBURIAN

HINSA SIBURIAN

Head

National Cyber and Crypto Agency (BSSN)

9:20 - 9:30

Empowering Data Sovereignty: Navigating Personal Data Protection in the Digital Age

  • Focus on strengthening personal data protection regulations thereby enabling the nation to have control over their own
    data
  •  How to balance data sovereignty with the need for cross-border data flows to facilitate global trade and collaboration?
  • Addressing the measures taken to ensure data privacy does not impede the development and accessibility of digital services and innovation while protecting personal data

9:30 - 9:50

Stopping the Next Breach: The Power of Consolidation and AI-Enabled Platforms

As the use of Living Off The Land binaries and the complexity of security architectures continue to grow, adversaries are
becoming more elusive and harder to detect. CrowdStrike has pioneered the use of artificial intelligence (AI) since we first
introduced AI-powered protection to replace signature-based antivirus over 10 years ago, and we’ve continued to deeply
integrate it across our platform since. In this engaging presentation, we will delve into the current Threat Landscape and
explore why the adoption of security consolidation and AI-enabled platforms is crucial in preventing future breaches.

ADI RINALDI

ADI RINALDI

Regional Sales Engineer

CrowdStrike

9:50 - 10:10

Make Every Dollar Count: Maximizing Value of Security Investments

  • Translation security investments into business value
  •  Translation security investments into business value
  • The importance of unifying security technology
PRATEEK BHAJANKA

PRATEEK BHAJANKA

Director APJ Field CISO

SentinelOne

10:10 - 10:50

PANEL DISCUSSION

The Power of Privilege: Fortifying Organisational Cyber Posture Against the Prime Attack Vector

  • With excessive lurking privileges, what can be done to narrow the security gap that companies need to address?
  • How can organizations guard against privileged escalation attacks while boosting employee productivity?
  •  Understanding the implementation of Zero Trust with least privilege models
Moderator
BEN WONG

BEN WONG

Director, Channel & Alliances, APJ

BeyondTrust

ICHWAN PERYANA

ICHWAN PERYANA

Co-Founder & Director

Pinjam Modal (PT Finansial Integrasi Teknologi)

RADITIO GHIFIARDI

RADITIO GHIFIARDI

VP, Head - Information Security & Compliance

PT Smartfren Telecom

YUDHISTIRA NUGRAHA

YUDHISTIRA NUGRAHA

Director

Jakarta Smart City

TONY BRANDO

TONY BRANDO

Head - IT Security & Governance

CIMB Niaga Finance

10:50 - 11:20

NETWORKING BREAK

11:20 - 11:30

Boosting Cyber Capacity Building to Strengthen the Regional Cyber Ecosystem

  • With mounting reliance on the internet and ICT services, how will security in cyber space impact good governance, human rights & economic freedom?
  •  Developing collective capabilities and facilitating international cooperation and partnership to effectively respond to the cyber threats in the digital age
  • Emphasizing the relevance of going beyond technical issues and sharing cyber secure best practices at the international level
EDIT PRIMA

EDIT PRIMA

Director of Cybersecurity & Cryptography for Finance, Trade & Tourism

National Cyber & Crypto Agency (BSSN)

11:30 - 11:40

New-age Cyber Threats: Looking Beyond Traditional Security Approaches to Manage a Wide Range of Risks

  • Leveraging the best of cloud, artificial intelligence, and analytics to fend off cybercriminals
  • Detecting threats in real time to protect networks, data, devices and digital ecosystem
  • Why 5G, IoT, Cloud and 4IR technologies require new approaches to cybersecurity?
BRIGADIER GENERAL IROTH SONNY EDHIE

BRIGADIER GENERAL IROTH SONNY EDHIE

Commandant of Army Cyber & Crypto Center

Indonesian National Army

11:40 - 12:00

Sangfor Simplify Security Operations

  • Simplify and centralize security operations
  • Enabling organizations to efficiently manage multiple security devices and systems from a single platform
DONNA YOWEL

DONNA YOWEL

Solution Expert

Sangfor

12:00 - 12:20

SecOps Modernization with Analytics, AI & Automation

The ever evolving threat landscape keeps businesses at risk constantly. Legacy siloed tools add to the problem with too many alerts, false positives and undetected advanced threats. With manual and tedious processes, incident response is just too slow to cope with these problems. Find out how Splunk customers address these issues & challenges by elevating their SecOps with Splunk Analytics, AI and Automation.

TENGKU SHAHRIZAM

TENGKU SHAHRIZAM

Regional Security Advisor, South Asia

Splunk

12:20 - 12:40

PANEL DISCUSSION

Peace of Mind for Your Business with Managed Security Services

  • Cybersecurity Growth: Choose The Right Cybersecurity Threat Protection SolutionHow can organizations guard against privileged escalation attacks while boosting employee productivity?
  • Crowdstrike: We stop breaches
  • Manage Detection and Response (MDR) Service
Moderator
DENNY UTAMA

DENNY UTAMA

Community Manager

Elitery

DENI BANANI

DENI BANANI

Regional Sales Manager

CrowdStrike

ABDULLOH HAQ

ABDULLOH HAQ

IT Security

Elitery

12:40 - 12:50

Effective Use of Information Security Paradigms and Frameworks

  • Distinguishing the use of infosec paradigms and frameworks
  •  Addressing overlaps and shortcomings of framework types
  • Choosing the best information security framework
MOCHAMMAD YUNNUSSAPUTRA

MOCHAMMAD YUNNUSSAPUTRA

Head of Unit 5, Sub Directorate 3

Cybercrime Investigation Centre, Indonesia National Police

12:50 - 13:00

Toward Cybersecurity Revolution: Orchestrated Global Deception and Dynamic Counter-Intelligence

  • How to learn from threats, not just resist them?
  • Luring hackers and documenting their tactics with nomadic honeypots
  • A dynamic approach that confuses attackers, transforms the battlefield and feeds our vast intelligence database to improve the future state of defence
LAURENT OUDOT

LAURENT OUDOT

Co-Founder & CTO

Tehtris

13:00 - 14:00

LUNCH BREAK

14:00 - 14:40

PANEL DISCUSSION

Expose, Assess, Safeguard: Unleashing the Potential of Proactive Exposure Management

  • What are the major obstacles organisations confront in their efforts to shield themselves against cyber exposures and breaches, and how can proactive measures address these challenges?
  •  How can automated vulnerability management and enabled focused remediation efforts reduce remediation time, costs associated with exposure risks, and optimise resource allocation?
  • With rapidly evolving cyber threats, is a proactive approach to exposure risks sufficient? Are there additional measures needed to address emerging vulnerabilities and attack vectors?
Moderator
DR CHRISTOPHER CHAI

DR CHRISTOPHER CHAI

Solution Director APJC

Hackuity

LILY WONGSO

LILY WONGSO

EVP - IT Security

PT Bank Central Asia TBK

RENDRA PERDANA

RENDRA PERDANA

Blibli.com

VP - Information Security

YOGESH MADAAN

YOGESH MADAAN

Head of Information & Cyber Security

Bukalapak

BUDIYANTO N

BUDIYANTO N

PT Bank Jago TBK

Head - IT Data Management

14:40 - 15:00

Security at GoTo: Gojek and Tokopedia’s Efforts to Protect 2% of the Economy and Hundreds of Millions of Users

  • How GoTo organizes its security processes and teams, and how we push for continuous improvement
  • A framework to help companies benchmark their security
BORIS HAJDUK

BORIS HAJDUK

CISO

GoTo Group

15:00 - 15:20

Cultivating a Secure Digital Future: A Steps Towards Sustainable Security Culture

  • What are the current challenges in building a sustainable security culture?
  • Assessing the readiness of an organisation to deal with a fallout quickly to minimize financial, technical and reputational damage
  • Promoting good cyber hygiene through a top-down approach to set the tone for the rest of the enterprise
ARIANDI PUTRA

ARIANDI PUTRA

Spokesperson

National Cyber and Crypto Agency (BSSN)

15:20 - 15:40

The Strategic Importance of National Cyber Strategy for The Asia Pacific’s Security and Development

  • National Interests & Strategic Directions: Cyberspace, Cyber power and Cyber Strategy as the Determining Factors to Win Geopolitical Competition at the Global Level
  • Cyberspace as a Strategic, Fifth Domain in National Defense
  • The Urgency of National Cyber Security Strategy
WIBAWANTO NUGROHO WIDODO

WIBAWANTO NUGROHO WIDODO

Deputy Head of Defense and Security Affairs, Director of International Engagements

IKAL strategic center, DIP institute

15:40 - 16:00

ASEAN Regional Digital Integration and Cybersecurity Initiatives

  • ASEAN digital transformation performance, post COVID-19 pandemic
  • Overview of ASEAN digital integration initiatives
  • ASEAN priorities on Cybersecurity and regional initiatives
SIVARAM SUPERAMANIAN

SIVARAM SUPERAMANIAN

Assistant Director of Digital Economy Division

The ASEAN Secretariat

16:00 - 17:00

NETWORKING BREAK & END OF DAY 1

8:00 - 9:00

REGISTRATION & COFFEE

9:00 - 9:10

Advocating Inclusivity and Empowering Women in the Battle of Secure Cyberspace

  • Focusing on the need for actionable measures to close the gender workforce and awareness gap
  • Strengthening the power in shared identity in building a strong and resilient cyber security posture
  • Discussing the role of government, civil society, and the private sector in making cyberspace more diverse, inclusive and safe
INTAN RAHAYU

INTAN RAHAYU

Director of Cybersecurity and Cryptography for Industrial Sector

National Cyber and Crypto Agency (BSSN)

9:10 - 9:30

Safeguarding Indonesia’s Digital Assets: The Essential Role of Resilience in CII Protection

  • Creating a strong outline of shared responsibility between private and public sector to safeguard critical infrastructure
  • Continued collaboration between key agencies and departments to aid in cyber resiliency
  • Implementing proactive monitoring measures to minimize loss and ensure continuous productivity
MUHAMMAD NEIL EL HIMAM

MUHAMMAD NEIL EL HIMAM

Deputy for Digital Economy and Creative Product

Ministry of Tourism and Creative Economy, Republic of Indonesia

9:30 - 9:50

Cyber Training in Organisations - Building a Customised Training Roadmap to Upskill Cyber Capabilities

  • Organisations in Indonesia need to improve their cybersecurity capabilities, but the problem isn’t a lack of people; rather,
    it’s a lack of the knowledge and skills needed to protect organisations against cybercrimes.
  • Learn how organisations may benefit from upskilling talent and understand which cyber security training roadmap is required to create, manage, and develop cyber security teams.
MATTHIAS CHIA

MATTHIAS CHIA

Director of Strategy & Business Development, APAC

SANS Institute

9:50 - 10:10

Going Beyond Erasure – Privacy Regulations and Best Practices

Indonesia’s Personal Data Protection (PDP) Bill passed by the House of Representatives on September 20, 2022 will become
PDP Law when it is ratified by the President. We will share:

  • What are the challenges with physical destruction to achieve data sanitization?
  • The best practices to meet legislative requirements around the world, and what organization need to do to stay compliant with Indonesia’s PDP Law
  • Recommendations to update your data security policy for implementation and ensure compliance
CALVIN NG

CALVIN NG

Regional Account Manager - Malaysia & Indonesia

Blancco

10:10 - 10:50

PANEL DISCUSSION

Beyond the Hype: Navigating Cloud Risks in a Dynamic Cybersecurity Landscape

  • Exploring the current challenges and risks in deploying a successful public or hybrid cloud in an organisation
  • Proactively handling system vulnerabilities and minimizing endpoint errors
  • Incorporating new security frameworks and strategies to evolve beyond legacy security measures
Moderator
DANIEL CHU

DANIEL CHU

VP – APJ Systems Engineering

ExtraHop

EDMUND SITUMORANG

EDMUND SITUMORANG

Chief Technology Officer

Asian Bulk Logistics

MOCHAMMAD ZENDRA WARDHANIAWAN

MOCHAMMAD ZENDRA WARDHANIAWAN

Head - Information Security Department

PT Citilink Indonesia

YOHANNES GLEN DWIPAJANA

YOHANNES GLEN DWIPAJANA

Head - Information Security Department

PT Citilink Indonesia

MAKHADIR MUKHAMAD

MAKHADIR MUKHAMAD

Head - IT, Digital & Cyber Risk Management

PT Bank Tabungan Negara TBK

10:50 - 11:00

Architecting Privileged Access Management for Cyber Defense

  • Why is protecting privileged accounts critical?
  • Pillars of Privileged Access
  • Best practices of implementing PAM solutions
  • Why Senhasegura PAM?
BRIJESH MISHRAA

BRIJESH MISHRAA

Sales Head - Asia & ME

Senhasegura

11:00 - 11:30

NETWORKING BREAK

11:30 - 11:50

Predicting Ransomware in Your Supply Chain

  • Industry studies and landscapes
  • Lessons from the ransomware incident
  • Designing a TPRM program for situational awareness
AGRIAN PANGESTU

AGRIAN PANGESTU

Manager Cyber & Intelligence Products

Mastercard

11:50 - 12:10

Cybersecurity and Identity Perimeter - Bridging the Gap through Zero Trust Approach

  • Surveying the landscape
  • Demystifying cyber-attack kill chain
  • Top threats targeting Active Directory
  • Major threats for the perimeter beyond Active Directory
  • Advanced Threat Intelligence through UEBA
BHARATHWAJAN SWAMINATHAN

BHARATHWAJAN SWAMINATHAN

Senior Technology Evangelist - IAM & Cybersecurity

ManageEngine

12:10 - 12:20

Fortify Business Data Protection with Synology Hybrid Cloud Solution

  • Unveiling Common Data Backup Challenges in Business
  • Synology’s Comprehensive Data Protection: Tailoring Solutions for Varied Business Needs
  • Showcasing Key Features and Real-World Backup Use Cases for Practical Insights
CLARA HSU

CLARA HSU

Country Manager, Indonesia

Synology

12:20 - 12:40

Empowering National Cyber Resilience: Strategies for a Resilient Cyber Future

  • Understanding the collaboration with private sector entities to develop comprehensive strategies for enhancing national
    cyber resilience?
  • What role do international partnerships play in bolstering a nation’s cyber resilience?
  • How can governments strike a balance between safeguarding citizens’ privacy and collecting essential cyber threat
    intelligence for national security purposes?
DR PRATAMA PERSADHA

DR PRATAMA PERSADHA

Chairman

CISSREC

12:40 - 13:00

Securing the Future of Biometrics in the Age of Vulnerable Data Theft

  • With biometric scanners becoming increasingly sophisticated, how to prevent unauthorized access?
  • Enabling multi-layer protection in a biometric system to decrease vulnerability of data breach
  • Focus on creation of strong physical and behavioral algorithms to abate duplicity
ANTO SATRIYO NUGROHO

ANTO SATRIYO NUGROHO

Head of Research Center for Artificial Intelligence and Cyber Security

National Research And Innovation Agency, Indonesia

13:00 - 14:00

LUNCH BREAK

14:00 - 14:40

PANEL DISCUSSION

The Ransomware Menace: Mitigating Data Exfiltration in an Evolving Cyber Landscape

  • What are some effective strategies for mitigating the risk of data exfiltration in the face of an evolving cyber landscape?
  • How to mitigate user-initiated actions? Categorizing the data based on organizational value
  • Deploying endpoint detection and response (EDR) solutions that can help detect and respond to ransomware attacks in real-time
Moderator
ANDANG NUGROHO

ANDANG NUGROHO

President

ISC2 Jakarta Chapter

BUDI RAHARDJO

BUDI RAHARDJO

Founder & Head

ID-CERT

KRISNANTO PADRA

KRISNANTO PADRA

Head of Information Security

Bluebird Group

VOLVIN IRAWAN

VOLVIN IRAWAN

Head - IT Security

OCBC NISP Bank

ADRIANTO HENDRAPUTRA

ADRIANTO HENDRAPUTRA

Cybersecurity Specialist

14:40 - 15:00

The Cyber Battlefront: Indonesia’s Quest for a Safe Digital Ecosystem

  • Addressing the major challenges in protecting the sensitive information and safeguarding the national assets
  • Implementing strategic policies and promoting awareness among the Indonesian workforce to curb the threat
  • Prioritizing public-private cooperation and the need for developing and implementing cybersecurity protocols
TAUFIK NURHIDAYAT, S.ST

TAUFIK NURHIDAYAT, S.ST

Sandiman Madya

National Cyber and Crypto Agency (BSSN)

14:40 - 15:00

Supply Chain Security: Strengthening the Integrity of Sensitive Data

  • Continuous attack surface monitoring to minimize the exposure to software vulnerabilities
  • Focus on regular third-party risk assessments to ensure continuous improvement in the security posture of an organisation
  • Enforcing encryption practices at the interface of third-party integrations
DR MARCELINO PANDIN

DR MARCELINO PANDIN

Commissioner

Telkom Indonesia

15:20 - 16:30

NETWORKING BREAK & END OF DAY 2

17:00 - 17:30

Registration & Coffee

17:30 - 18:00

Paparazzi Lights & Pictures

18:00 - 18:10

Opening Performance

18:10 - 18:15

Opening by EMCEE

18:15 - 18:30

Welcome Speech by Jury Committee

18:30 - 19:15

Awards Presentation:

  • Cyber Woman of the Year
  • CISO of the Year
  • Digital Leader of the Year
  • Best Security Practitioner – Public Sector
  • Best Security Practitioner – Private Sector
  • GRC Leader of the Year

19:15 - 19:20

Closing Speech

19:20 - 19:30

Penampilan Menari

19:30 - 21.00

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #IndoSec Newsletter