Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

07:30 AM – 08:30 AM

REGISTRATION & COFFEE

08:30 AM – 08:40 AM

INAUGURATION & OPENING CEREMONY

08:40 AM – 08:55 AM

KEY OPENING REMARKS

08:55 AM – 09:10 AM

Strengthening Indonesia's Digital Future: Protecting National Interests in an Era of Rising Cyber Threats

  • Utilizing Indonesia’s National Cybersecurity Strategy to safeguard critical systems, government bodies, and private sector organizations
  • Building a strong cybersecurity workforce through government-driven training initiatives and industry-recognized certifications
  • Evolving Indonesia’s Cyber Resilience Framework to effectively counter sophisticated cyberattacks and espionage activities

09:10 AM – 09:30 AM

Protecting Data in a Hyperconnected World: Enhancing Privacy, Compliance, and Resilience

  • Enforcing Indonesia’s Data Privacy Regulations (UU No. 27/2022) to protect individuals and businesses from data breaches
  • Strengthening data encryption, anonymization, and access controls to prevent unauthorized data exposure
  • Understanding cross-border data transfer regulations to ensure compliance with APAC, PDP Law, and GDPR

09:30 AM – 09:50 AM

Safeguarding the Missing Layer: Human Risk

  • Despite advancements in cybersecurity tools, human error remains the leading cause of breaches, with phishing attacks, insider threats, and credential misuse continuing to dominate the threat landscape. Independent research highlight 68% of cyber incidents stem from human error, reinforcing Mimecast’s human-risk research revealing that almost 10% of employees account for 80% of security incidents
  • The session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk
  • Gain insights into measuring user risk effectively and implementing tailored strategies to enhance cybersecurity across their organizations. This session will also highlight how a personalized and adaptive security approach can provide customized security measures for each user. By focusing on these high-risk individuals, organizations can safeguard their workforce while maintaining operational productivity
Novarica Toefliano Perdana “Dana”

Novarica Toefliano Perdana “Dana”

Senior Sales Engineer, Asia

Mimecast

09:50 AM – 10:10 AM

From Reactive to Resilient: Empowering Cyber Defence with Continuous Assurance

In today’s threat landscape, resilience isn’t a luxury; it’s a necessity. Join Aaron Bugal, Field CISO for APJ at Sophos, as he explores how organizations can empower their teams with actionable insights, enforce robust security postures through continuous penetration testing and threat exposure management, and elevate their cyber resilience with proactive risk identification and management. We’ll briefly showcase how Sophos’ integrated cybersecurity services are transforming reactive defence into a strategic advantage and dive into a real world case study

Aaron Bugal

Aaron Bugal

Field CISO, APJ

Sophos

10:10 AM – 10:30 AM

From Detection to Autonomous Response with AI: The Future of Cyber Resilience

  • How AI-driven cybersecurity delivers smarter, faster, and autonomous threat detection, prevention, and response
  • SentinelOne’s AI-native platform unifies protection across endpoints, cloud workloads, and identity layers to counter modern adversaries
  • How autonomous capabilities enable security teams to move from reactive defense to proactive strategies, reducing response times from hours to seconds
Boonchareon Chong

Boonchareon Chong

Director - Solutions Engineering ASEAN

SentinelOne

10:30 AM – 11:00 AM

Panel Discussion

The CISO’s Playbook – Mastering the Balance Between Security, Innovation, and Boardroom Demands

  • Managing cybersecurity in a climate of escalating regulations, AI-driven threats, and shrinking budgets – turning challenges into opportunities
  • AI as both a weapon and a shield: How are CISOs, CAIOs, and IT leaders harnessing AI to defend against emerging AI-powered risks?
  • Closing the critical gap between boards and CISOs to drive strategic alignment and ensure cybersecurity is at the forefront of executive decision-making

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

The Rise of Hacktivism 2.0: AI-Driven Political Cyber Attacks and Digital Protest Movements

  • Exploring how hacktivist groups in Indonesia are leveraging AI to carry out cyber campaigns and digital disruptions
  • Analyzing state-sponsored cyber warfare and the ethical challenges posed by digital activism in the Indonesian context
  • Enhancing cybersecurity policies to address politically motivated cyber incidents and safeguard national security

11:40 AM – 12:00 PM

Zero Trust in a Hyperconnected World: Breaking the Cycle of Implicit Trust in Cybersecurity

  • Deploying Zero Trust frameworks to protect hybrid cloud systems and ensure the security of remote workforces
  • Utilizing advanced techniques like micro-segmentation, continuous identity verification, and AI-powered anomaly detection to block unauthorized access
  • Tackling the obstacles in rolling out Zero Trust strategies across multinational organizations to build a resilient security architecture

12:00 PM – 12:20 PM

Cloud Under Siege – The Surge of Cloud-Centric Cyberattacks and Data Theft Tactics

  • Exploring the latest cybercriminal methods to exploit cloud systems and steal critical information
  • Enhancing cloud defense through AI-powered anomaly detection and advanced threat intelligence systems
  • Crafting cloud-specific security protocols to block unauthorized entry and safeguard sensitive data from breaches

12:20 PM – 12:40 PM

Security Operation with Sangfor MDR Service

  • Combining AI technology with human intelligence
  • Security operation for any scale of business
  • Reducing cost, maximize protection
Akhmad Rezha

Akhmad Rezha

Security Solution Expert

Sangfor

12:40 PM – 12:50 PM

Redefining Digital Identity: Defending Trust Without Disrupting User Experience

  • Unpacking the rise of decentralized identity and self-managed credentials in a post-password world
  • Combating identity-based threats—from synthetic fraud to credential abuse—with adaptive authentication strategies
  • Building secure, privacy-first identity ecosystems aligned with evolving regulations and human-centric design

12:50 PM – 13:00 PM

Modernizing SOC: SIEM in the Agentic AI Era

  • From Alert to Contextual Insight
  • Autonomous Threat detection & Incident response
  • Customer Case study for real business impact
Deric Karunesudas

Deric Karunesudas

Security Expert

Elastic

13:00 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

Bridging Innovation and Exposure: Cyber Defense for a Digitally Accelerating Indonesia

  • As digital transformation accelerates across Indonesia, organizations are navigating the growing tension between innovation and cyber risk
  • This panel will explore how to integrate security by design into cloud and infrastructure modernization, and improve visibility across hybrid environments
  • Learn how leading enterprises are building resilient, agile security architectures that align with business velocity—without compromising protection or compliance

14:15 PM – 14:35 PM

Crafting AI Agents for a Safer World: From Model Security to a Resilient Trust Ecosystem

  • Understand the end-to-end threats facing AI agents—from model poisoning and data exfiltration to runtime manipulation
  • Explore CyCraft’s strategies for hardening AI models in deployment, including the newly launched XecGuard LLM Firewall
  • Learn about building a trust ecosystem: combining model security, detection, and post-incident resilience in a unified AI safety framework
Albert Sung

Albert Sung

VP of Sales, APAC

CyCraft Technology

14:35 PM – 14:55 PM

Intelligent Warfare: Machine-Led Attacks vs Self-Defending Cyber Systems

  • Uncovering how machine intelligence is powering instant breaches, smart exploits, and automated system probing
  • Activating autonomous defense layers that foresee, intercept, and dismantle digital threats before they cause harm
  • Exposing the vulnerabilities of AI—how malicious actors manipulate learning systems and how defenders can stay ahead

14:55 PM – 15:15 PM

When Everything Connects, Everything’s at Risk: The Exploitation of Smart Devices in Modern Cyber Attacks

  • Uncovering how compromised IoT ecosystems are fuelling botnet armies and next-gen ransomware campaigns
  • Fortifying connected devices through hardened firmware, isolated networks, and intelligent threat detection
  • Establishing unified global protocols to secure the backbone of smart infrastructure—from homes to industrial systems

15:15 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

Cyber Conflict and Digital Surveillance: Assessing Risks to National Safety and Vital Systems

  • Examining international cyber risks, government-backed attacks, and trends in online terrorism
  • Bolstering national cybersecurity through legal structures and intelligence collaboration
  • Fostering cooperation between the public and private sectors to safeguard essential systems from cyber sabotage

09:15 AM – 09:30 AM

Cybersecurity Culture as a Strategic Asset: Cultivating a Resilient Organization

  • Shifting from mere compliance to cultivating an active cybersecurity mindset
  • Evaluating the cybersecurity culture and employee preparedness through risk-focused awareness initiatives
  • Promoting leadership involvement and responsibility in driving cybersecurity efforts

09:30 AM – 09:50 AM

AI Is Redefining Risk—Proactivity Is the New Security Standard

  • AI-Powered Proactive Defense: Discover how AI is transforming cybersecurity from reactive response to proactive risk prevention
  • Redefining Risk in the AI Era: Learn how AI enables earlier threat detection, smarter decision-making, and faster mitigation
  • The New Security Standard: Embrace a proactive, forward-looking approach where staying ahead of threats is no longer optional—but essential
Sapna Sumbly

Sapna Sumbly

Field CISO

Trend Micro

09:50 AM – 10:10 AM

Unmasking Synthetic Impostors: Tackling AI-Forged Scams and Digital Identity Breaches

  • Uncovering incidents where cybercriminals exploit artificial visuals and voice replication to deceive
  • Innovating intelligent validation systems to expose manipulated media and fraudulent content
  • Elevating organizational and personal defense strategies to counter AI-driven impersonation threats

10:10 AM – 10:30 AM

Evolving Threats in Application Security: From AI Attacks to Cloud Vulnerabilities

  • Examining emerging attack vectors, including AI-driven malware, API weaknesses, and serverless computing exploits
  • Integrating DevSecOps practices to fortify the software development lifecycle against vulnerabilities
  • Harnessing AI technology to identify, prevent, and counteract application-layer threats in real time

10:30 AM – 11:00 AM

Panel Discussion

Transforming Your Data Security Strategy

  • Top data security challenges in 2025 / Challenges from CISO’s perspective
  • Lift and shift vs. transformation for data security program
  • The multi-faceted role of AI in data security
  • Data security innovations / solutions CISOs would like to have

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Breaking the Code: AI and the Evolution of Bank Fraud, Money Laundering, and Cryptocurrency Threats

  • Investigating the role of AI in executing large-scale financial fraud and digital money laundering schemes
  • Protecting digital transactions with AI-powered fraud detection and advanced blockchain analytics
  • Enhancing banking cybersecurity frameworks to combat AI-empowered financial crimes

11:40 AM – 12:00 PM

Biometric Security at Risk: Defending Against Spoofing, Replay, and Deepfake Fraud

  • Analyzing vulnerabilities in fingerprint, facial recognition, and voice authentication systems
  • Enhancing biometric security with advanced liveness detection and multi-modal authentication methods
  • Ensuring compliance with regulations and protecting privacy in biometric identity verification solutions

12:00 PM – 12:20 PM

Reimagining AI-powered SOC Orchestration with Security AI

  • Improving Security O&M Efficiency with AI Autopilot and Copilot
  • Automated Incident Responder and task management
  • Modern Customization and Expansion with AI Agents
Michael Widjaja

Michael Widjaja

International (INT) Presales Director

T-Innoware

12:20 PM – 12:40 PM

The Hacker's Edge: Ethical Hacking as the Cybersecurity Game Changer

  • Exploring how ethical hacking identifies vulnerabilities and enhances proactive defense strategies
  • Leveraging penetration testing and vulnerability assessments to uncover potential threats before exploitation
  • Understanding the role of ethical hackers in improving organizational security policies and incident response plans

12:40 PM – 12:50 PM

AI and Social Engineering 3.0: Combatting Deepfake Fraud, Phishing, and Online Manipulation

  • Analyzing the evolution of phishing, vishing, and AI-driven manipulation techniques
  • Educating employees and executives to identify and withstand advanced social engineering scams
  • Utilizing behavioral analytics and AI to proactively identify and thwart social engineering attacks

12:50 PM – 13:00 PM

The Dark Web Economy – Ransomware, Malware, and Digital Extortion Networks

  • Exploring the dark web ecosystem where cybercriminals trade hacking tools and exploit kits
  • Countering Ransomware-as-a-Service (RaaS) and the profit-driven world of cyber extortion
  • Strengthening global collaboration to dismantle cybercrime networks and syndicates

12:50 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

From Awareness to Action – Humans as Cybersecurity’s First Line of Defense

  • Cultivating a cybersecurity-conscious culture with training, gamification, and phishing simulations
  • Mitigating insider threats through behavior monitoring and risk-adjusted access controls
  • Enabling non-technical staff to identify and respond effectively to cyber threats

14:15 PM – 14:35 PM

The Path to Compliance: Protecting Data and Meeting Legal Standards in the Digital Age

  • Implementing comprehensive security protocols to safeguard sensitive data from breaches, cyberattacks, and unauthorized access
  • Protecting both personal and organizational data to foster trust among customers, stakeholders, and regulatory authorities
  • Developing a robust cybersecurity framework to detect, respond to, and mitigate data breaches while ensuring compliance with legal standards

14:35 PM – 14:55 PM

The Hidden Dangers of the Supply Chain: Cyber Threats in Third-Party Vendors and Software Dependencies

  • Analyzing real-world incidents where supply chain vulnerabilities were exploited by cybercriminals
  • Leveraging AI-powered risk assessments and security evaluations for third-party vendors
  • Strengthening software supply chain security through continuous monitoring and the adoption of zero-trust principles

14:55 PM – 15:15 PM

Cybersecurity 2.0: The Road Ahead in AI, Automation, and Evolving Threat Models

  • Exploring how AI-powered threat detection and automation are revolutionizing cybersecurity approaches
  • Understanding the shift toward a “never trust, always verify” security model to combat advancing cyber threats
  • Examining how evolving cybersecurity regulations will shape the future of data protection and risk management

15:15 – 16:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

16:30 – 16:40

Opening Ceremony

16:40 – 16:50

Grand Premier Performance

16:50 – 17:00

Keynote Address from VIP Chief Guest

17:00 – 17:20

Introductory Address by the Jury Committee

17:20 – 18:00

Awards Presentation
Ceremony

18:00 – 18:10

Closing Remarks

18:10 – 18:20

Closing Performance

18:20 – 19:30

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #IndoSec Newsletter