-
Tuesday, 3 December
-
08:20
Registration, Coffee & Networking in the Exhibition Area
-
08:50
Welcoming Remarks from Corinium
-
08:55
Chair's Opening Remarks
Dr. Ir. Charles Lim - Deputy Head Master of IT Program - Swiss German University
-
09:00
Opening Keynote
Navigating the New Era of Data Privacy: How Centratama Group is Preparing for PDP LawDedy Mulyadi - GM – Head of IT & Security - Centratama Group
- Understanding the implications of the new law – overview of Indonesia’s upcoming personal data protection law, its key provisions, and the impact it has on Centratama Group
- Addressing the challenges in implementing data protection measures, including navigating the complexities of cross-border data transfers, ensuring data integrity, and managing consent processes effectively.
- Emphasising the importance of fostering a culture of data privacy within organisations – strategies to educate and empower employees to prioritise data protection
-
09:25
Secure by Design: Architecting Cloud Security in the Digital Age
- Senior representative - Tanium
- Examining the intricacies of cloud security as industries embrace digital transformation
- Uncovering strategies to implement robust cloud security measures and manage data across hybrid environments
- Ensuring data integrity while harnessing the benefits of cloud technologies
-
09:50
Cybersecurity Leaders Panel
Strategic Cybersecurity Governance: How CISOs Navigates the Digital Frontier- Understanding the critical role of strategic cybersecurity governance in our rapidly evolving digital landscape
- Exploring the intricacies of cyber risk management, policy implementation, and board-level decision-making
- Driving impactful cybersecurity governance that reinforces the foundation of your organization's secure digital future
Panellists
- Krisnanto Padra, Head of Information Security, AirAsia Indonesia
- Roy Dianton Leonardo, IT Security Department Head, Lion Super Indo
- Budiyanto, Head of Data Governance & Data Protection Officer, Bank Jago
- Dedy Mulyadi, GM – Head of IT & Security, Centratama Group
-
10:25
Harmonising Compliance and Innovation: Navigating Privacy Challenges in Emerging Technologies
- Senior representative - Rapid7
- Striking a balance between compliance requirements and innovation in the realm of emerging technologies
- Addressing the privacy implications of AI, IoT, and other cutting-edge innovations
- Ensuring privacy by design in your organization's technological advancements
-
10:50
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:20
Navigating Emerging Technologies in Cybersecurity
Eddy Gunawan - IT Security Expert - Pertamina
- Exploring the role of artificial intelligence, quantum computing, and blockchain in shaping the future of cybersecurity
- Understanding their potential benefits and vulnerabilities
- Harnessing these technologies to enhance protection against evolving cyber threats
-
11:45
Fostering Cybersecurity Culture for Conglomerates
- Addressing the rapid adoption of cloud workplace and its impact on cybersecurity
- Understanding that leaders must proactively invest in fostering a cybersecurity culture across the organisation
- Establishing the foundation to merge the concept of security and behaviour across business – employee engagement and leadership
-
12:10
OT and Cybersecurity: Navigating the New Frontier
Mex Martinot - VP & Global Head of Strategy & Growth, Industrial Cybersecurity - Siemens Energy
- Highlighting common mistakes made by IT professionals when dealing with OT systems, using real-world examples such as blackouts caused by IT interventions in OT environments
- Discussing the unique cybersecurity challenges faced by OT systems compared to traditional IT environments.
- Analysing the evolving regulatory landscape and its impact on OT cybersecurity, and how to stay compliant while enhancing security measures for OT systems
-
12:35
Buffet Lunch & Networking in the Exhibition Area
-
Track A
SECURITY IMPERATIVES -
13:35
Organisation Transformation with a Scalable, Sustainable Secure Framework
- Senior representative - Axonius
- Discuss approaches to balance agility with security during periods of significant change
- Building a robust security framework by taking into account the essential components of scalable and sustainable framework
- Exploring real-world examples of organizations that have successfully implemented secure frameworks that can endure the challenges of the rapidly changing digital landscape
-
14:00
Managing Challenges in Achieving Application Security
Halga Tamici - AVP Engineering - SuperApp
- Bridging the gap between intent and actual level of security achieved, and addressing the hurdles
- Exploring methods to establish a culture of continuous security testing, including automated tools and penetration testing, to maintain a resilient application security posture
- Lessons learnt from recent experience
-
14:25
Cybersecurity Risk and ESG as an Opportunity to Embrace to A Better Future
- Integrating ESG Principles into Cybersecurity Strategy – exploring the evolving landscape ESG principles intersect with cybersecurity risk management
- Discussing how organizations can integrate ESG considerations into their cybersecurity strategies, aligning security practices with broader corporate responsibility
- Exploring the potential benefits, such as enhanced brand reputation and stakeholder trust, and examining the challenges and opportunities in this integration
-
14:50
Holistic Cybersecurity: Uncovering and Mitigating Business Process Vulnerabilities
Jeremy Alfananda - Assistant Manager Information Security - Major Bank in Indonesia
- Identifying vulnerabilities in both internal applications and customer-facing systems to strengthen overall security.
- Introducing the risk metrics framework: A unique, self-developed strategic framework for comprehensive vulnerability assessment, inspired by MITRE and OWASP standards.
- Adopting a fresh perspective on evaluating security risks within business processes.
- Delivering actionable insights that business leaders can easily understand, ensuring their applications and processes are secure from a cybersecurity standpoint.
-
15:15
How To Do Better in Security Risk Management
- Improving return on investment - making controls more cost-effective
- Measure risk and control effectiveness
- Complexity and security
-
Track B
AI IN CYBER -
13:35
Transformative Applications of AI in Cybersecurity
- Senior representative - SNYK
- Exploring real-world examples of how AI technologies are transforming cybersecurity landscape
- Showcasing successful case studies across different sectors, emphasizing innovation and measurable outcomes
- Navigating evolving cyber threats in real time with AI-driven cybersecurity systems
-
14:00
Fireside Chat
Governance and AI in Indonesia: Navigating the Intersection of Innovation and Regulation- Exploring how AI is transforming the cybersecurity landscape in Indonesia what opportunities AI offers for detecting and mitigating threats, and the potential risks posed by AI-driven cyberattacks
- Discussing the evolving regulatory environment for AI and cybersecurity in Indonesia, including how organizations can stay compliant with emerging data protection laws while adopting cutting-edge AI technologies
- Examining the ethical implications of AI in cybersecurity and governance and ensuring AI systems are transparent, secure, and aligned with regulatory standards
Speakers:
- Indra Adillah, Head of ICT, AirAsia Indonesia
- Oliver Valentino, Head of Cyber Security, Amar Bank
-
14:25
Leveraging on AI to Fight Cybercrime
- Examining the use of AI-powered behavioural analytics to detect and prevent insider threats
- Discussing how machine learning algorithms can analyse user behaviour patterns, identify anomalies
- Enhancing the ability to pre-emptively address potential insider risks in organizations
-
14:50
AI-Driven Cybersecurity: Strengthening Defenses Against Evolving Threats
Mashrek Reza Siddique - Head of IT - Unilever Oleochemical Indonesia
- Addressing the limitations of AI in cybersecurity, including challenges related to false positives, biases in algorithms, and the need for continuous training and adaptation
- Exploring how AI is transforming cybersecurity from reactive to proactive, enabling real-time threat detection and response
- Highlighting real-world case studies of AI successfully mitigating advanced persistent threats (APTs), zero-day vulnerabilities, and insider threats
-
15:15
Harnessing the Power of AI to Strengthen Cyber Security
- Exploring use cases of how the adversaries are leveraging AI/ML
- Demonstrating how the defenders are leveraging this technology to protect against such AI/ML powered attacks
- Enabling the safe use of Generative AI and discuss the core capabilities required
-
15:40
Afternoon Tea & Networking in the Exhibition Area
-
16:10
Panel Discussion
Empowering Cybersecurity Leadership: Nurturing Skills, Culture, and Resources- Addressing the cybersecurity skills gap and strategies to bridge the shortage of skilled professionals
- cultivating a strong cybersecurity culture and fostering culture where security is ingrained in everyday practices
- Allocating resources for cybersecurity initiatives to ensure robust measures and responses
Panellists
- Yohannes Glen, SVP Head of Enterprise Security, Indosat Ooredoo Hutchison
- Willy Saputra, SVP – IT, Digital Banking & Analytics Audit Head, Bank BTPN
- Mashrek Reza Siddique, Head of IT, Unilever Oleochemical Indonesia
- Ivan Prasetyo, VP of Information Security Strategy, Project, and Initiatives, UOB
-
16:45
The Rising Complexities of Software Supply Chain: A Proactive Approach to Security
An overview of the intricate nature of modern software supply chains, demonstrated using real-world case studies
- Business Repercussions: Discussion on potential aftermaths including data exposure, operational disruptions, and reputational loss.
- Preventative Measures: Highlighting proactive measures organisations can take in identifying and countering risks in the digital supply chain.
-
17:10
Unveiling Hidden Threats: The Impact of Penetration Testing in an Organisation
- An in-depth look at vulnerabilities uncovered during the penetration testing process at highlighting the most severe flaws and their potential impact on the organization.
- Exploring the critical implications of these vulnerabilities, including remote command execution and the potential for bad actors to gain full system access, emphasizing the importance of proactive security measures.
- Discussing the steps to address these vulnerabilities, improve their security posture, and prevent future incidents
-
17:35
Chair's Closing Remarks
-
17:40
Cheers with peers
Drinks Reception & Networking in the Exhibition Area
Not Found