The agenda is specially curated to bring out the most pressing topics from the industry.
In this keynote, we’ll explore how Cloudflare’s AI-driven threat protection empowers Indonesian enterprises to secure their digital assets by:
Large-scale data breaches continue to dominate headlines while threat actors continue to adapt their craft with blinding speed. Against this challenging backdrop for organisations, one constant remains: humans and their identities are the most targeted links in the attack chain. Ensuring your organisation is well protected requires defenders to adopt proactive and adaptive strategies, using the latest in innovative technologies to stay ahead of these sophisticated and evolving threats.
Mobile applications are an integral part of our everyday personal and professional lives. As both public and private organizations rely more on mobile applications, ensuring that they are reasonably free from vulnerabilities and defects becomes paramount. Mobile apps continue to provide unprecedented support for facilitating organizational objectives. Despite their utility, these apps can pose serious security risks to an organization and its users due to vulnerabilities that may exist within their software. IT and security leaders need to build a modern AppSec strategy designed to support demanding development cycles while also ensuring application security.
The session will cover:
Why do many of us fall for dirty tricks even after we understand how they work? From the slight-of-hand used by magicians to the sleight-of-tongue used by politicians and pundits, to the sleight-of-mind that accompanies cognitive bias, we are all wired to deceive and to be deceived.
Join David Bochsler, Vice President of Sales, Asia Pacific and Japan for KnowBe4 for an engaging exploration into the dark world of deception. After laying the groundwork for a basic understanding into our own inclinations and predispositions, David will provide interactive examples of how human nature can be used against us. Key topics will include understanding perception vs reality, how to make people believe anything in 3 easy steps, and what it all implies.
Modernization for Security Operations is long overdue. It’s time for an unified Intel-driven, AI-powered SecOps platform to be at the heart of cyber defense which effectively drives threat detection, investigation, and response.
As ZTNA evolved into one of the biggest buzz words, one of the best ways to ensure Zero Trust starts with a Zero Client. With zero surface of attack, you can almost be sure no amount of ransomware can penetrate your end-client and access your precious data. Join Edwin and Irwan as they unravel the sure-fire way to achieve 0% ransomware.
Everyone understands the risks and challenges that passwords pose today. However, eliminating them completely may not be as easy as one might think, especially if you have to support a lot of legacy applications or different user populations that do not all have smart devices. Come join Ping Identity to learn how you can still get started on a journey to passwordless with practical examples.
The transition from traditional on-premises datacenters and environments to dynamic cloud infrastructure is complex and introduces new challenges for enterprise security. Through this presentation, you will discover how you can overcome obstacles to secure multi-cloud applications, network, remote user access and build a successful zero trust security strategy while complying with the PDP Law in Indonesia.
*The above is a running agenda and is subject to change