-
Wednesday, 29 November
-
08:20
Registration, Coffee & Networking in the Exhibition Area
-
08:50
Welcoming Remarks from Corinium
-
08:55
Chair's Opening Remarks
Charles Lim - Deputy Head Master of IT Program - Swiss German University
-
09:00
Opening Keynote
Security and Resiliency: Global Overview of Cyber Threats and AttacksEryk Budi Pratama - Head of Corporate Information Security - Sinar Mas Mining Group
- Overview of attacks that happened in the last year and the trends
- Analysing the effectiveness of incident responses and what could have been done better
- Examining ways to protect an organisation from new risks
-
09:25
The Value of Time
Mun How Chin - Sales Director - Tanium
- Testing current processes to detect potential attack surface and mitigating the vulnerabilities
- Revising processes to ensure vulnerabilities are mitigated and new attack prevention methods are in place
- Assessing the benefits of threat intelligence sharing across different organisation
-
09:50
AI-Driven Threat Detection and Mitigation
Edmund Situmorang - Head of Strategy and Transformation - BUMI Resources
- Exploring how artificial intelligence is revolutionizing cybersecurity by enabling advanced threat detection and mitigation capabilities
- Analysing vast amounts of data in real-time, identifying potential cyber threats with unprecedented accuracy
- Exploring various AI-driven technologies and techniques used in cybersecurity
-
10:15
State Of Devsecops Report: Application Security Posture Management (ASPM) And Its Impact on Software Security
Darence Tan - Country Manager, SEA and Australia/New Zealand - Synopsys
- Key observations on the state of DevSecOps in Asia
- Common barriers to effectively implement and manage DevSecOps
- How to gain a single view of software risk across your organization
-
10:40
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:10
People Management in Infosec and How It Strengthen Security Posture
Genesha Nara Saputra - Cyber Security and IT GRC Leader - GoTo Financial
-
11:35
How to Strengthen Your Organisation's Last Line of Defense: Your Human Firewall
David Bochsler - VP of Sales, APAC - KnowBe4
Social Engineering attacks, in the form of phishing, BEC, and Ransomware attacks are becoming ever more commonplace. The number of cyberattacks that start by manipulating a human into allowing access to protected systems or sensitive information steadily increases.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. This session will help you better understand how you can keep your users on their toes with security top of mind. It will also include a product demonstration of the innovative Kevin Mitnick Security Awareness Training Platform, which will show how easy it is to train and phish your users:
- Send fully automated simulated phishing attacks, using thousands of customisable templates with unlimited usage.
- Train your users with access to the world's largest library of always-fresh awareness training content.
- AI-driven phishing and training recommendations based on your users' phishing and training history.
- Use assessments to gauge proficiency of your users in security knowledge and security culture attitudes.
- Easy user management using Active Directory or SCIM integration.
-
12:15
Cybersecurity Leaders Panel
Reframing the Role of a CISO in the New Normal- Changing the role of a CISO from preventing breaches to facilitating risk management
- Understanding how the role of CISO has evolved and why it must evolve
- Working with cross-functional team to drive cybersecurity culture and building organisation’s steppingstones for cyber resiliency
Moderator:
- Antonius Ruslan, Information Security Professional, HALODOC
Panellist
- Volvin Irawan, Head of IT Security, Bank OCBC Indonesia
- Indra Adillah, Head of ICT, AirAsia Indonesia
- Andri Purnomo, VP of Information Security, DANA.Id
- Raditio Ghifiardi, Vice President - Head of IT Security Strategy & Architecture, Indosat Ooredoo Hutchinson
-
12:55
Roundtable Lunch – by invite-only
Hosted by Synopsys -
12:55
Buffet Lunch & Networking in the Exhibition Area
-
13:55
Connecting the Dots: A Cybersecurity Dichotomy Towards Challenge and Opportunity
Joko Umar - CEO - Sinergi Mutual Globalindo
- Understanding the growth of Indonesia’s digital landscape
- Dissecting cybersecurity incidents in the country
- Navigating digital frontiers – empowering Indonesian MSME and digital savvy
-
14:20
Realizing Zero Trust with AI-driven Identity Security
Ratih Sudirham - Senior Solutions Engineer - Okta
While Zero Trust has become an industry slogan among security advocates, it also has been diluted by being associated with specific solutions and technologies.
Let’s move beyond the buzzword and the diatribe of repeated messages that fall short in providing a clear and concise path forward. At this session, we are going to provide practical and actionable steps on your journey to implementing Zero Trust within your environment and realize value for your organization, furthermore, we’re going to share how AI can help us fight against cyber attacks and finally introduce Okta AI and how it helps organization strengthen security, enhance productivity, and improve user experience.
-
14:45
Cybersecurity, Digital Transformation, and Impact on Businesses
Chrisando Ryan - Lecturer Specialist in Cybersecurity - BINUS University
- Managing the risks introduced by digital transformation initiatives
- Implementing secure-by-design practices
- Developing robust security frameworks
-
15:10
The Rising Complexities of Software Supply Chain: A Proactive Approach to Security
Koushik Sivaraman - Global Head, Security Consulting & Research - CloudSEK
An overview of the intricate nature of modern software supply chains, demonstrated using real-world case studies
- Business Repercussions: Discussion on potential aftermaths including data exposure, operational disruptions, and reputational loss.
- Preventative Measures: Highlighting proactive measures organisations can take in identifying and countering risks in the digital supply chain.
-
15:35
Orca High Tea In The Cloud – by invite-only
Hosted by Orca Security -
15:35
Afternoon Tea & Networking in the Exhibition Area
-
16:05
Panel Discussion
Data Privacy and Compliance in Indonesia and Its Implication on Cybesecurity Practice- Understanding the update on data protection laws and regulations
- Navigating cross-border data transfer and how other country’s/international regulation applies
- Strengthening cybersecurity in the era of enhanced data privacy
Moderator:
- Hendro, Cyber Risk Director, Deloitte
Panellists:
- Bayu Ramadhan, Head of Information Security Management System, NH Korindo Sekuritas Indonesia
- Yohannes Glen, SVP Head of Corporate Security, Indosat Ooredoo Hutchinson
- Mochammad Zendra Wardhaniawan, Head of Information Security Department, Citilink Indonesia
- Rajesh Grover, Group VP – Digital & Omnichannel, Kanmo Group
-
16:45
Panel Discussion
Empowering Cybersecurity Leadership: Nurturing Skills, Culture, and Resources- Addressing the cybersecurity skills gap and strategies to bridge the shortage of skilled professionals
- cultivating a strong cybersecurity culture and fostering culture where security is ingrained in everyday practices
- Allocating resources for cybersecurity initiatives to ensure robust measures and responses
Moderator:- Andang Nugroho, President, ISC2 Jakarta Chapter
Panellists:
- Roy Dianton Leonardo, IT Security Department Head, Lion Super Indo
- Krisna Kurniawan, VP Operational & IT Risk Management, Bank KB Bukopin
- Ivan Irawan, Director of Information Technology, Credit Bureau Indonesia
- David Bochsler, VP of Sales, APAC, KnowBe4
-
17:25
Chair's Closing Remarks
-
17:30
Cheers with peers
Drinks Reception & Networking in the Exhibition Area
Not Found