COVID – 19: See the latest assessments and care options, plus temporary visitor restrictions


27Days 22Hours 26Minutes 53Seconds

CONFERENCE AGENDA

8:00 - 9:00

09:00 - 09:15

Keeping Cybersecurity at the Forefront of Indonesia’s Thriving Digital Business

  • Enabling preventive and repressive measures to protect critical assets: Infrastructure and Data
  • Incorporating cybersecurity awareness models in the bureaucratic system to regulate the use of cyberspace
  • Building a tamper-proof digital eco-system to prevent cyber threats by enacting strict policies and laws

9:15 - 9:30

Outlining Cloud Security Framework: Guarding the Cloud Perimeter against Intrusions

  • How to attain visibility into security, compliance and threat exposure?
  • Creating and deploying countermeasures to combat active threats to business security
  • Maintaining security policies and governance to meet security standards

9:30 - 9:50

Modern attacks, can we prevent it in real time without affecting the business?

  • How does the traditional approach to modern attacks fail?
  • The rise of the access brokers
  • How to achieve full visibility of accounts, prevent identity-based attacks without affecting our users?

9:50 - 10:10

DevSecOps: Developer First Approach – Exploring the Potential of Readiness
in a Cyber Polluted Era

  • Enabling a sequential testing protocol to harden the security into the system
  • Is fail-fast policy better for staying ahead of security issues than a reactive policy?
  • Integrating various AST tools with their CI/CD processes to detect new open-source vulnerabilities

10:10 - 10:50

PANEL DISCUSSION
Cyber Secure Cloud: Advancing Towards Cloud with Confidence

  • Ensuring cloud security and discussing various services at risk (IaaS, PaaS, SaaS)
  • With the numerous advantages of cloud adoption, is there a compromise with the strength of data protection?
  • Focus on security, governance, and compliance issues due to increasingly sophisticated cyber threats

MODERATOR
Don Tan

Head of Asia Pacific & Japan
Lookout

Wildan Aliviyarda

VP, Head - Public Cloud & Security Solutions
Indosat Ooredoo Hutchison

Yohannes Glen

VP, IT Security
PT Indodax Nasional

Farly Halim

Regional CISO
Sodexo BRS

Pandu Poluan

Head of Security, Digital Transformation Office
Ministry of Health

10:50 - 11:20

11:20 - 11:40

Rethinking Network Security in the Flourishing Age of Cloud Services

  • Leveraging the solutions provided by adaptive control and visibility over networks and firewalls
  • Managing permitting access to effectively secure device in the network
  • Minimizing interoperability shortcomings and maximizing an environment that leaves no gap for adversaries to exploit

11:40 - 12:00

Unified Endpoint Security: The Gatekeeper to Safeguard Access Points in a Network

  • With the rapid growth of IT assets footprint in an organization, what are the challenges in securely managing all the endpoints in an enterprise?
  • Reducing complexity by improving coordination and reducing friction between IT Operations and security teams
  • IDEA – Leveraging emerging technology to deliver rich and secure user experience

12:00 - 12:20

Redefining the Security Culture in Indonesia for a Safe & Secure Digitalisation

  • Challenges in building a sustainable security culture in Indonesia
  • Aligning organizational determinants and individual determinants of culture to manifest a cyber secure conscious behavior
  • Identify and prioritize objectives for building a national culture of cybersecurity

Deni Kurniawan

VP ICT Security Management
PT Telekomunikasi Selular

12:20 - 12:40

Revealing the Fog of Cyberwar: Complementing Zero Trust with Expanded Visibility

  • A review and reflection of LogRhythm’s own Zero Trust journey
  • How to gain more security visibility using a SIEM platform?
  • How you can automate detecting anomalous user activity using a UEBA solution?

 

Leonardo Hutabarat

Enterprise Sales Engineering Manager, APAC
LogRhythm

12:40 - 13:00

Securing the Future of Biometrics in the Age of Data Theft

  • With biometric scanners becoming increasingly sophisticated, how to prevent unauthorized access?
  • Enabling multi-layer protection in a biometric system to decrease vulnerability of data breach
  • Focus on creation of strong physical and behavioral algorithms to abate duplicity

13:00 - 13:20

Zero Trust Etiquette: Elevating the Security Privilege with an Always Verify Model

  • What is the scope of a zero trust initiative? How to inspect the security provided by “Never Trust, Always Verify” security model?
  • Identity system: How to address the most critical unit for a zero-trust security posture?
  • Convergence of AI and ML in zero trust model to learn and predict employee behavior

13:20 - 14:00

14:00 - 14:40

PANEL DISCUSSION
Privileged Access Management: Elevating the Power of Access Control in an IT Environment

  • Controlling the damage arising from internal and external malfeasance
  • Addressing the risks and challenges – Lack of visibility and awareness of privileged users
  • Finding the line between over-provisioning and under-provisioning of privileges

14:40 - 15:00

Facilitating the Convergence of IT and OT – Bridging the Cybersecurity Gap

  • Drivers of IT/OT convergence – Efficiency and low operational costs
  • How to control unauthorized modification of configuration settings?
  • Limiting interference with the operation of safety systems to reduce cyber breaches

Vernando Hutagaol

VP, Head of Risk & Security
Nestlé Indonesia

15:00 - 15:20

Promoting Collective Cyber Diplomacy to Build a Strong Consensus for Cyber Stability

  • Integrating cyber diplomacy into the bureaucratic structure to overcome the novel threat posed by cyber criminals
  • Global Connexion: Cyber diplomacy is not only a necessity but also an opportunity
  • Implementing sound strategic policy to strengthen and establish clear cyber norms

Rudi Lumanto

Chairman
CSIRT.ID

15:20 - 15:40

Social Engineering Attacks - Bringing this Rampant Threat Under Control

  • Securing the passwords- Being vigilant and enabling multifactor authentication to ensure account protection
  • How to strengthen the most common attack layer – Workforce?
  • How to detect and identify the extent of the attack to significantly decrease the associated risk and lost productivity?

15:40 - 16:30

16:30 - 17:00

17:00 - 18:30

9:00 - 9:20

Securing the Future of Indonesia’s Digital Identity

  • Adopting and adapting to modern structures and regulations to a have an enhanced visibility
  • Enabling a digital identity ecosystem to foster the national economy
  • Establishing cybersecurity policy and multi-agency collaboration framework to enhance cyber resilience

9:20 - 9:40

Digital Sovereignty - The impact to your Cloud Strategy

  • Why digital sovereignty is important for businesses?
  • How can organizations approach achieving digital sovereignty, while remaining compliant and enable their businesses to grow?
  • Considerations for organizations’ cloud strategy

Melvin Koh

Head of Security Engineering, ASEAN
Thales CPL

9:40 - 10:00

Addressing the Rise in Need to Secure Online Privacy – Strengthening the Internet Security Blanket

  • With the ever-growing penetration of mobile users, how to ensure comprehensive security?
  • Enacting strict guidelines and policies to maximize online privacy
  • What are the challenges of a connected environment with the continued evolution of cyberspace?

10:00 - 10:20

Cyber Warfare: Advancement of New Age Weaponry in a Thriving Digital Ecosystem

  • Discussing the efforts taken by defence forces in combating the digital threat
  • Addressing the need for strategic steps to safeguard the national interest of the country
  • Strengthening the infrastructure, policies and governance to fight against the eminent threat

10:20 - 11:00

PANEL DISCUSSION
Identity and Access Management: Enabling a Controlled User Access to Critical Information in an Organisation

  • Aligning resource access in a distributed dynamic environment with industry’s transition from firewalls to zero trust models
  • Ensuring a centralized directory service with enhanced oversight and visibility to orchestrate accessibility
  • Retiring from manual legacy identity infrastructure and moving towards automating and modernizing the IT to scale up efficiently and effectively

11:00 - 11:30

11:30 - 11:50

Cyber Exposure Management Across the Modern Attack Surface

The modern attack surface has changed dramatically over the last decade. It’s grown not only in sheer volume of assets, but also in the variety of assets that have become exposure risks. In addition, the assets that make up your attack surface are more interconnected than ever before, so an exposure in one area can quickly become a breach in a critical part of the business.

In this session, we will discuss

  • Uncovering cyber risks across the highly dynamic and ever-changing modern attack surface including cloud, containers, custom web apps, IoT and OT
  • How organisations can extend visibility and reduce risk across the modern attack surface
  • How security professionals can communicate and manage cyber exposure risk to make better decisions at all levels

Target serangan pada era modern sekarang ini telah berubah secara dramatis dalam satu dekade terakhir. Perubahan ini bukan hanya dari sisi perkembangan banyaknya aset yang menjadi resiko eksposur tetapi juga dari macam-macam jenis asetnya. Selain itu, aset Anda yang menjadi target serangan, berintegrasi lebih banyak dibanding sebelumnya, sehingga eksposur di satu area dapat dengan cepat menjadi resiko serangan di bagian penting bisnis Anda.

Pada sesi ini, kita akan membahas:

  • Resiko siber di berbagai target serangan modern yang sangat dinamis dan selalu berubah, yang antara lain pada cloud, container, aplikasi web modern, IoT, dan OT
  • Bagaimana sebuah organisasi dapat memperluas visibilitas dan mengurangi resiko di berbagai target serangan modern
  • Bagaimana team security di organisasi Anda dapat berkomunikasi lebih baik ke top management dan dapat mengelola resiko siber untuk membuat keputusan yang lebih baik

Rio Sibuea

Security Consultant, Indonesia
Tenable

11:50 - 12:10

Ethical Hacking: Incorporating a Fierce Cyber Defense Mindset to Evade Cyber Breach

  • Is “Hack for good” a solid step towards building a safe cyber space?
  • Leveraging the mindset of a hacker to identify and correct vulnerabilities within networks
  • Promoting early identification of blind spots in an organizational network to enhance cyber resiliency

12:10 - 12:30

Blockchain Impulse: Securing the Heart of Crypto and Metaverse from Cyber Criminals

  • With the potential to yield significant returns for users, what are the challenges in securing the digital ledger?
  • Ensuring due diligence to protect the digital assets and mitigate cyber risks
  • Safeguarding the critical information and preserving the virtual identity of the users

12:30 - 12:50

Cyber-Hygiene and Data Compliance – Tackling the Known Unknowns

  • How to employ a sound cyber hygiene routine with the varying risks of vulnerabilities?
  • How to ensure the protection of sensitive data from unauthorized usage? Is data compliance the key solution in managing the data throughout its lifecycle?
  • Powering an organization with various data protection strategies to overcome the compliance regulation challenges

12:50 - 13:10

Owning Your Cybersecurity Mid-Game Strategy

  • Conventional approach for ransomware focuses on preventing initial access and relying on backup recovery—but it hasn’t slowed the extortion menace.
  • Prevention is an uphill battle for defenders: attackers only need to succeed once. And restoring data doesn’t negate downtime or the consequences of a data breach.
  • Defenders need a much broader window to catch and stop ransomware before the damage is done and take necessary actions that can alert your team to the intrusion – command and control communications, data staging and lateral movement

13:10 - 14:00

14:00 - 14:40

PANEL DISCUSSION
Ransomware Rush - The Rise in Need to Detect and Disrupt the Malware

  • Addressing the vulnerabilities in the system that allow the attackers penetrate successfully
  • How to use deception-based model to identify the earliest attack stage?
  • Ensuring the use of standard practices to wipe ransomware and reimage the system

14:40 - 15:00

Incorporating a Robust Security Strategy for Quick Recovery from Cyber Attacks

  • Employing a company-wide recovery plan which serves as a lifesaver for different attack scenarios
  • Creating a cyber vault as a backup system by crypto locking the vault storage
  • Analyzing the security gaps in the network and taking prompt measures to bridge and strengthen the system

15:00 - 16:00

SILVER SPONSOR

EXHIBITOR

EXHIBITOR

EXHIBITOR

EXHIBITOR

GOLD SPONSOR

EXHIBITOR

EXHIBITOR

EXHIBITOR

EXHIBITOR

EXHIBITOR

EXHIBITOR

EXHIBITOR

GOLD SPONSOR

GOLD SPONSOR

GOLD SPONSOR

GOLD SPONSOR

GOLD SPONSOR

EXHIBITOR

GOLD SPONSOR

GOLD SPONSOR

EXHIBITOR

GOLD SPONSOR

GOLD SPONSOR

SILVER SPONSOR

GOLD SPONSOR

GOLD SPONSOR

GOLD SPONSOR

#IndoSec2022

MEDIA ENQUIRY

Fill out the form to enquire about IndoSec 2022.

#IndoSec2022

SPONSORSHIP ENQUIRY

Fill out the form to enquire about IndoSec 2022.

#IndoSec2022

GENERAL ENQUIRY

Fill in this form to receive more information about IndoSec 2022.