-
Wednesday, 13 May
-
08:00
Registration, Coffee & Networking in the Exhibition Area
-
08:55
Welcoming Remarks from Corinium
-
09:00
Chair’s Opening Remarks
Dr. Ir. Charles Lim - Deputy Head Master of IT Program - Swiss German University
-
09:05
Opening Keynote
AI, Autonomy, and the New Cyber Battleground: What Indonesian CISOs Must Prepare ForGenesha Nara Saputra - Cyber Security and IT GRC Leader - GoTo Financial
-
Understanding the shift to AI-powered threats and autonomous attacks
-
How AI can strengthen real-time threat detection and incident response
-
What CISOs must prioritise to stay resilient in 2025 and beyond
-
-
09:30
AI-Powered Threats & Defences: Navigating the Double-Edged Sword
- Unpacking how attackers are using AI to automate, personalise, and scale cyber-attacks—from deepfakes to intelligent phishing
- Exploring defensive applications of AI in threat detection, anomaly analysis, and response orchestration
- Addressing the governance, ethical, and operational risks of embedding AI into your cybersecurity stack
-
09:55
Executive Panel
CISOs at a Crossroads: From Firefighter to Forward Strategist- With the PDP Act and Indonesia's national push for digital resilience, the CISO role is evolving from technical enforcer to strategic business leader
- Boards and regulators increasingly expect CISOs to articulate risk, trust, and resilience in business terms—beyond compliance
- Balancing real-time threat response with long-term transformation, regulatory alignment, and enterprise value creation
Panellists
Henriko Samosir Head of Information Security GRC & Data Privacy Halodoc
Indra Adillah Head of ICT AirAsia Indonesia
Mochammad Zendra Wardhaniawan Head of Information Security Department Citilink Indonesia
-
10:35
COFFEE & CONNECT
-
11:05
Technical Panel
Secure by Design: Building Resilient, Digital-Native Security Architectures-
Key principles for architecting secure, scalable environments across cloud, hybrid, and edge
-
How to embed resilience and agility without compromising speed or user experience
-
Real-world approaches to modernising legacy infrastructure while preparing for future threats
Panellists
Raditio Ghifiardi VP - Head of IT Security Strategy & Architecture Indosat Ooredoo Hutchinson
Mashrek Reza Siddique Head of IT Unilever Oleochemical Indonesia
Christian Prasetya IT Security & Network Operations Head BFI Finance
-
-
11:45
Securing Active Directory & Critical Infrastructure: Lessons from Ransomware Incidents
- Analysing real-world ransomware attacks that exploited AD and disrupted critical systems
- Implementing foundational controls to detect lateral movement and privilege escalation
- Strengthening recovery, segmentation, and monitoring strategies to harden AD environments
-
12:10
Cloud-Native Security Architecture: Designing for Scalability and Compliance
Purnaresa Yuliartanto - Senior Security Solutions Architect - AWS Indonesia
- Discussing how cloud-native security architecture can enable scalable defences, adapting quickly to evolving threats.
- Embedding security into DevOps processes and adopting the ‘shift-left’ approach in cloud application development.
- Exploring the role of security automation, compliance monitoring, and Infrastructure-as-Code (IaC) in cloud-native environments.
-
12:35
The First 72 Hours – Real-World Crisis Playbooks
- How leading teams coordinate across security, legal, comms, and business during an active breach
- What real-world playbooks reveal about decision-making, escalation, and containment
- Turning crisis into resilience through post-incident learning and tabletop exercises
-
13:00
LUNCH & NETWORKING
-
TRACK A
INCIDENT RESPONSE -
14:00
The Ghost in the Machine: Shedding Light on Hidden AI Risks with Tenable
- Senior representative - Tenable
As organizations rapidly adopt Generative AI, they face a critical choice: embrace innovation or manage the "shadow AI" and data exposure risks that follow. This session explores Tenable’s journey in securing the AI revolution, moving beyond the hype to provide a practical framework for AI Security Posture Management (AISPM).
In this session, you will uncover:
-
Uncover shadow AI usage and data exposure
-
Identify misconfigurations in AI platforms
-
Detect unsafe third-party tools and integrations
-
Pinpoint and mitigate prompt injection and jailbreak attempts
-
-
14:25
Resilience Planning: From Incident Response to Cyber Insurance
Halga Tamici - AVP Engineering - SuperApp
-
Building effective incident response plans tailored to today’s threat landscape
-
Using tabletop exercises to validate readiness and improve cross-functional coordination
-
Exploring the role of cyber insurance as part of a broader resilience strategy
-
-
14:50
The Evolution of Enterprise AI: Navigating New Trends and Challenges
- Senior representative - Sonatype
-
15:15
Fireside Chat
Changing the DNA: Leading Culture Shifts in Cyber Security-
Turning policy into practice through behaviour, incentives, and leadership modelling
-
How to embed security ownership across departments, not just in IT
-
Lessons from leaders driving organisation-wide change in mindset and accountability
Speakers
Rita Fitria SVP, Head of Internal Audit China Construction Bank Indonesia
Eddy Gunawan IT Security Expert Pertamina -
-
15:40
When Downtime Becomes a Cyber Weapon: Securing Industrial Resilience in a Connected Era
-
How do OT and IT leaders collaborate to prepare for cyber incidents that can halt physical operations?
-
Can automation and AI-driven analytics improve visibility and reduce response time in critical environments?
-
How can industry, government, and technology providers work together to safeguard Indonesia’s critical infrastructure ecosystem?
-
-
TRACK B
SECURITY ARCHITECTURE -
14:00
Identity Is a System: Why Visibility and Intelligence Are Now a Board-Level Requirement
- Senior representative - Silverfort
AI agents, automation, and non-human identities are reshaping how enterprises operate—but they are also breaking the assumptions that identity security has relied on for decades. Boards are rightly asking whether AI can be trusted to make decisions. Yet a more fundamental risk often goes unaddressed: do we have visibility into which identities are actually acting inside the enterprise, at machine speed, and with what authority?
Identity is no longer a static access control function. It has become a dynamic, distributed system—executing continuously across cloud platforms, legacy infrastructure, APIs, SaaS, and autonomous AI agents. Managing identity as configuration rather than behavior creates blind spots that traditional IAM, PAM, and CIEM platforms cannot close.
This session introduces Identity Visibility and Intelligence Platforms (IVIP) as a necessary evolution of identity security in the AI era. IVIP treats identity as an observable system, collecting authentication telemetry across environments, applying behaviorral intelligence, and enabling adaptive Zero Trust enforcement in real time.
Using Silverfort’s evolution as an illustrative case study, this talk demonstrates how identity visibility becomes a foundational capability for AI trust, cyber risk quantification, and digital resilience—without requiring application rewrites or operational disruption. -
14:25
Securing Blended Infrastructure: IT, OT & IoT Convergence
Mashrek Reza Siddique - Head of IT - Unilever Oleochemical Indonesia
- Identifying strategic risks at the intersection of IT, OT, and IoT
- Establishing unified frameworks for asset visibility, segmentation, and incident response
- Ensuring governance, safety, and uptime in mission-critical environments
-
14:50
Rethinking DLP: Harnessing a Human-Centric Approach to Safeguarding Your Data
- Senior representative - Proofpoint
In this session, we will explore how a human-centric approach to cybersecurity can significantly transform your data protection efforts. Moving beyond traditional technical solutions, we’ll highlight how integrating data classification, behavioural insights (i.e. user intent), and threat context creates a dynamic defence against data loss.
-
15:15
Architecting Compliance: Integrating GRC into Enterprise Security
- Embedding compliance into security architecture from the design stage
- Translating organisational risk appetite into resilient architectural decisions
- Moving beyond “bolt-on” compliance to proactive risk management
-
15:40
Zero Trust in Action: Leadership Playbooks for Real-World Implementation
- Translating Zero Trust strategy into executable enterprise initiatives
- Applying identity, segmentation, and continuous verification in hybrid environments
- Navigating organisational resistance and legacy challenges for scalable adoption
-
16:05
COFFEE & CONNECT
-
16:35
Fireside Chat
Beyond Compliance: Building Digital Trust in Indonesia’s High-Velocity Digital Economy- Moving from regulatory compliance to true digital trust – Why compliance alone is no longer enough in Indonesia’s digital landscape.
- Embedding trust into products, data governance, and user experience
- Strengthening transparency, accountability, and security to earn stakeholder confidence
Speakers
Ivan Irawan Director of Information Technology Credit Bureau Indonesia
Zulfikar Ahmad BCM QA & Continues Improvement Indosat Ooredoo Hutchison
-
17:00
Closing Panel
Mapping Threats in 2026: From Ransomware to AI-Chaos- Anticipating the next generation of ransomware, APTs, and AI-powered attacks
- Understanding how geopolitical shifts and AI misuse could destabilise security ecosystems
- Rethinking playbooks, tooling, and collaboration for the threat landscape of tomorrow
Panellists
Volvin Irawan Head of IT Security Bank OCBC Indonesia
Dedy Mulyadi Cybersecurity Leader
-
17:35
Deputy Head Master of IT Program
Dr. Ir. Charles Lim - AI Customer Engineer - Swiss German University
-
17:40
Cheers with Peers: Mocktails and Mingle
-
18:30
Close of CISO Indonesia 2026
Not Found