-
Wednesday, 28 May
-
08:00
Registration, Coffee & Networking in the Exhibition Area
-
08:40
Welcoming Remarks from Corinium
-
08:55
Chair’s Opening Remarks
Andang Nugroho - Cybersecurity Leader -
-
09:00
Opening Keynote
Building Digital Trust in the Era of Quantum Computing and AI: Navigating the New Cyber Risks- Explore the imminent impact of quantum computing on current cryptographic standards and data protection practices
- Discuss how organizations can prepare for quantum-resilient encryption and the emerging risks quantum computing poses to sensitive data
- Examine how the rapid deployment of 5G and the growing adoption of AI are transforming both the speed and complexity of cyber threats
-
09:25
Developing a Secure Future: Managing and Scaling a Modern Developer Security Program
- Focusing on the critical aspects of building and enhancing a modern developer security program.
- Implementating security practices tailored to the unique challenges of software development
- Discussing the different methods for assessing vulnerabilities based on their potential impact and likelihood of exploitation
-
09:50
CISO Panel
Navigating the Cyberstorm: Strategies for CISOs to Overcome Key Challenges in 2025- Adapting to evolving threat landscape – exploring different strategies and risk assessment framework for CISO
- Building a strong cybersecurity culture within an organisation by engaging employees through training and open communication
- Aligning cybersecurity initiatives with broader business objectives – risk management, budget, and cross-department collaboration
Panellists
Dedy Mulyadi Cybersecurity Leader
-
10:20
Commanding Your Attack Surface
Jason Heng - Regional Sales Director, ASEAN - Rapid7
-
10:45
COFFEE & CONNECT
-
11:15
Panel discussion
Building a Secure-by-Design Architecture: Integrating Security from the Ground Up- Understanding how integrating security from the start can reduce risks, improve resilience, and save costs
- Tailoring security architectures to fit the unique needs of the business, industry, and risk profile
- Addressing the challenges to implement secure-by-design architecture – investment justification, organizational silos, and aligning security
Panellists
Yohannes Glen SVP Head of Enterprise Security Indosat Ooredoo Hutchison
Krisna Kurniawan VP Operational & IT Risk Management Bank KB Bukopin
Yusfiannur Lnu IT Infrastructure & Security Specialist Medco E&P Indonesia
Christian Prasetya IT Security & Network Operations Head BFI Finance
-
11:45
Compliance, Resilience and Scalability – How Your Platform Needs to Evolve
Sarah Lim - Senior Solutions Engineer - Fastly
-
12:10
Necessity Of Cyber Readiness for The Future of Resilience AI
Mashrek Reza Siddique - Head of IT - Unilever Oleochemical Indonesia
-
12:35
Non-Tech Meets Tech - Taking the Cyber Risk Seriously Across the Board
- Aligning the different perspectives between tech and non-tech leaders to establish common goals
- Fostering a growth-focused relationship with the board
- Presentation is key: What makes a good board presentation and how do you drive board-supported cybersecurity initiatives?
-
13:00
LUNCH & NETWORKING
-
TRACK A
Incident Response -
14:00
Topic TBC
- Senior representative - Sonatype
-
14:25
Fireside Chat
Your Guide to Responding to Cyber Incident- Exploring some of the security tools to mitigate the risk in digitalisation
- Understanding how technology can create security loophole
- Addressing some of the challenges in implementing preventative care and putting in place a business continuity plan
Speakers
Fahmi Pahlevi VP Technology PMO & Business Continuity Management Indosat Ooredoo Hutchison
Volvin Irawan Head of IT Security Bank OCBC Indonesia
-
14:50
Automating Incident Response
- Exploring how automation and orchestration can streamline and optimise incident response processes
- Discussing the tools and techniques for automating tasks like alert triage, threat hunting, and incident containment
- Demonstrating the benefits of incident response automation in reducing response times and improving overall effectiveness
-
15:15
Fireside Chat
AI-Driven Cybersecurity Governance: Strengthening Policies, Compliance, and Risk Management- Establishing clear policies and regulatory guidelines to ensure AI-driven security solutions align with organizational risk management and compliance requirements.
- Addressing challenges such as AI-generated false positives, biases in threat detection models, and the ethical considerations of AI-driven cybersecurity decision-making.
- Exploring how organizations can integrate AI-powered security solutions while meeting evolving regulatory standards, ensuring transparency, accountability, and alignment with corporate governance policies.
Speakers
Indra Adillah Head of ICT AirAsia Indonesia
Henriko Samosir Head of Information Security GRC & Data Privacy Halodoc
-
15:40
Threat Intelligence and Proactive Incident Response
- Emphasising the value of leveraging threat intelligence to proactively identify and mitigate potential incidents.
- Collecting, analysing, and applying threat data to enhance an organisation's security posture and incident response capabilities.
- Showcasing real-world examples of how threat intelligence has helped organisations detect and respond to threats more effectively
-
TRACK B
SECURITY ARCHITECTURE -
14:00
Topic TBC
- Senior representative - Qualys
-
14:25
Fortifying Cybersecurity in Digital Native Organisation
Bayu Aji - SRE Lead - SuperApp
- Exploring how digital native organisation design and implement a security-first architecture tailored to the needs of the organisation
- Discussing the importance of continuous monitoring, threat intelligence, and proactive defense strategies, such as penetration testing and red teaming, to counter APTs
- Examining how organisation can ensure their cybersecurity practices align with regulatory standards, while also integrating those into broader defense strategies
-
14:50
The Role of AI and Automation in Modern Security Architecture
- Explore how AI and automation can enhance security architecture by improving threat detection, response times, and vulnerability management.
- Discuss the potential for AI to identify patterns that traditional methods may miss.
- Showcase successful AI implementations in security architecture frameworks
-
15:15
Bridging the Gap: The Convergence of IT and OT in Modern Industrial Environments
Hans Iandy - Cybersecurity Leader -
- Exploring how the convergence of IT and OT is enabling smarter, more efficient industrial operations.
- Addressing the challenges of merging legacy OT systems with modern IT infrastructures, including interoperability, scalability, and maintenance concerns.
- Discussing the increased risk landscape as IT and OT systems become interconnected, exposing operational environments to sophisticated cyber threats.
-
15:40
Cloud-Native Security Architecture: Designing for Scalability and Compliance
Purnaresa Yuliartanto - Senior Security Solutions Architect - AWS Indonesia
- Discussing how cloud-native security architecture can enable scalable defenses, adapting quickly to evolving threats.
- Embedding security into DevOps processes and adopting the ‘shift-left’ approach in cloud application development.
- Exploring the role of security automation, compliance monitoring, and Infrastructure-as-Code (IaC) in cloud-native environments.
-
16:10
COFFEE & CONNECT
-
16:40
Aligning Modern Technology with Security and Business Objectives
- Exploring how we can integrate modern technologies into business
- Planning for security with minimal disruption
- Driving change and building a cybersecurity driven culture cross-department in an organisation
-
17:05
Panel Discussion
What Modern Cybersecurity Strategies Will Help Tackle the New Cyber Battleground?- Modern strategies in cybersecurity: How can we manage new threats that are emerging?
- Risk and threat management in 2024, how has this changed and what has stayed the same?
- How can we anticipate changes that 2025 will bring?
Panellists:
Zikry Zakiyulfuadi VP of Technical Operations DANA
-
17:35
Chair’s Closing Remarks
-
17:40
Cheers with Peers: Mocktails and Mingle
-
18:30
Close of CISO Indonesia 2025
Not Found