Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

07:30 AM – 08:30 AM

REGISTRATION & COFFEE

08:30 AM – 08:40 AM

INAUGURATION & OPENING CEREMONY

08:40 AM – 08:55 AM

KEY OPENING REMARKS

08:55 AM – 09:10 AM

Strengthening Indonesia's Digital Future: Protecting National Interests in an Era of Rising Cyber Threats

  • Utilizing Indonesia’s National Cybersecurity Strategy to safeguard critical systems, government bodies, and private sector organizations
  • Building a strong cybersecurity workforce through government-driven training initiatives and industry-recognized certifications
  • Evolving Indonesia’s Cyber Resilience Framework to effectively counter sophisticated cyberattacks and espionage activities
Alexander Sabar

Alexander Sabar

Director General of Digital Space Monitoring

Ministry of Communications and Digital Affairs (KOMDIGI)

09:10 AM – 09:30 AM

Protecting Data in a Hyperconnected World: Enhancing Privacy, Compliance, and Resilience

  • Enforcing Indonesia’s Data Privacy Regulations (UU No. 27/2022) to protect individuals and businesses from data breaches
  • Strengthening data encryption, anonymization, and access controls to prevent unauthorized data exposure
  • Understanding cross-border data transfer regulations to ensure compliance with APAC, PDP Law, and GDPR

09:30 AM – 09:50 AM

Safeguarding the Missing Layer: Human Risk

  • Despite advancements in cybersecurity tools, human error remains the leading cause of breaches, with phishing attacks, insider threats, and credential misuse continuing to dominate the threat landscape. Independent research highlight 68% of cyber incidents stem from human error, reinforcing Mimecast’s human-risk research revealing that almost 10% of employees account for 80% of security incidents
  • The session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk
  • Gain insights into measuring user risk effectively and implementing tailored strategies to enhance cybersecurity across their organizations. This session will also highlight how a personalized and adaptive security approach can provide customized security measures for each user. By focusing on these high-risk individuals, organizations can safeguard their workforce while maintaining operational productivity
Novarica Toefliano Perdana “Dana”

Novarica Toefliano Perdana “Dana”

Senior Sales Engineer, Asia

Mimecast

09:50 AM – 10:10 AM

The Human-Technology Synergy: Levelling Up Resilience in Your Cybersecurity Journey

In today’s evolving threat landscape, resilience is no longer a luxury—it’s a necessity.
Join Jayesh Panicker, Global Solutions Engineer at Sophos, as he discusses how organizations can strengthen their security posture through expert advisory services and enhance cyber resilience by harnessing the synergy between technology and human expertise.

We’ll also provide a brief showcase of how Sophos’ integrated cybersecurity solutions and services are helping organizations shift from reactive defense to strategic advantage—delivering stronger, more proactive cybersecurity outcomes.

Jayesh Panicker

Jayesh Panicker

Global Solutions Engineer

Sophos

10:10 AM – 10:30 AM

From Detection to Autonomous Response with AI: The Future of Cyber Resilience

  • How AI-driven cybersecurity delivers smarter, faster, and autonomous threat detection, prevention, and response
  • SentinelOne’s AI-native platform unifies protection across endpoints, cloud workloads, and identity layers to counter modern adversaries
  • How autonomous capabilities enable security teams to move from reactive defense to proactive strategies, reducing response times from hours to seconds
Boonchareon Chong

Boonchareon Chong

Director - Solutions Engineering ASEAN

SentinelOne

10:30 AM – 11:00 AM

Panel Discussion

The CISO’s Playbook – Mastering the Balance Between Security, Innovation, and Boardroom Demands

  • Managing cybersecurity in a climate of escalating regulations, AI-driven threats, and shrinking budgets – turning challenges into opportunities
  • AI as both a weapon and a shield: How are CISOs, CAIOs, and IT leaders harnessing AI to defend against emerging AI-powered risks?
  • Closing the critical gap between boards and CISOs to drive strategic alignment and ensure cybersecurity is at the forefront of executive decision-making
Defi Nofitra

Defi Nofitra

Country Manager, Indonesia

Kaspersky

Farina Mutia

Farina Mutia

SVP, Information Security Head

Bank UOB Indonesia

Hasyim Gautama

Hasyim Gautama

Head of Data and Informatics Infrastructure Centre

Ministry of Communication and Digital Affairs (KOMDIGI)

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

The Rise of Hacktivism 2.0: AI-Driven Political Cyber Attacks and Digital Protest Movements

  • Exploring how hacktivist groups in Indonesia are leveraging AI to carry out cyber campaigns and digital disruptions
  • Analyzing state-sponsored cyber warfare and the ethical challenges posed by digital activism in the Indonesian context
  • Enhancing cybersecurity policies to address politically motivated cyber incidents and safeguard national security

11:40 AM – 12:00 PM

Modernize Your SOC With Applied Intel & Agentic AI

SOC’s are often the most expensive investment organizations make in cyber defense.  But in many cases traditional SOCs are failing to deliver protection from business impacting cyber attacks.  We’ll look at how SOCs can be modernized with the ability to operate at scale, without blindspots, informed by world class cyber threat intelligence, and supercharged with agentic AI

Marcel Judodihardjo

Marcel Judodihardjo

Security Engineer

Google Cloud Security

12:00 PM – 12:20 PM

Cloud Under Siege – The Surge of Cloud-Centric Cyberattacks and Data Theft Tactics

  • Exploring the latest cybercriminal methods to exploit cloud systems and steal critical information
  • Enhancing cloud defense through AI-powered anomaly detection and advanced threat intelligence systems
  • Crafting cloud-specific security protocols to block unauthorized entry and safeguard sensitive data from breaches
Ichsan Hasibuan

Ichsan Hasibuan

Technical Consultant

ManageEngine

12:20 PM – 12:40 PM

Security Operation with Sangfor MDR Service

  • Combining AI technology with human intelligence
  • Security operation for any scale of business
  • Reducing cost, maximize protection
Akhmad Rezha

Akhmad Rezha

Security Solution Consultant

Sangfor

12:40 PM – 12:50 PM

Data Security & Recovery: Fortifying Your Business Against Ransomware

  • Protect Critical Data Assets: Learn how to strengthen your organization against ransomware and cyber threats
  • Ensure Compliance & Business Continuity: Stay aligned with Indonesian regulations while maintaining reliable backups and guaranteed data restorability
  • Enterprise-Ready Solutions: Leverage Synology’s comprehensive data protection solutions trusted by leading global organizations
CLARA HSU

CLARA HSU

Country Manager

Synology Inc.

12:50 PM – 13:00 PM

Modernizing SOC: SIEM in the Agentic AI Era

  • From Alert to Contextual Insight
  • Autonomous Threat detection & Incident response
  • Customer Case study for real business impact
Deric Karunesudas

Deric Karunesudas

Security Expert

Elastic

13:00 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

Bridging Innovation and Exposure: Cyber Defense for a Digitally Accelerating Indonesia

  • As digital transformation accelerates across Indonesia, organizations are navigating the growing tension between innovation and cyber risk
  • This panel will explore how to integrate security by design into cloud and infrastructure modernization, and improve visibility across hybrid environments
  • Learn how leading enterprises are building resilient, agile security architectures that align with business velocity—without compromising protection or compliance
Moderator
Firlie Ganinduto

Firlie Ganinduto

Chairman

ADIGSI

Suryaprakash MR

Suryaprakash MR

Senior Manager, Solutions Engineering

Gigamon

Purnama Sulfa

Purnama Sulfa

CISO

Bank Mandiri Taspen

14:15 PM – 14:35 PM

Crafting AI Agents for a Safer World: From Model Security to a Resilient Trust Ecosystem

  • Understand the end-to-end threats facing AI agents—from model poisoning and data exfiltration to runtime manipulation
  • Explore CyCraft’s strategies for hardening AI models in deployment, including the newly launched XecGuard LLM Firewall
  • Learn about building a trust ecosystem: combining model security, detection, and post-incident resilience in a unified AI safety framework
Albert Sung

Albert Sung

VP of Sales, APAC

CyCraft Technology

14:35 PM – 14:55 PM

Intelligent Warfare: Machine-Led Attacks vs Self-Defending Cyber Systems

  • Uncovering how machine intelligence is powering instant breaches, smart exploits, and automated system probing
  • Activating autonomous defense layers that foresee, intercept, and dismantle digital threats before they cause harm
  • Exposing the vulnerabilities of AI—how malicious actors manipulate learning systems and how defenders can stay ahead
BORIS HAJDUK

BORIS HAJDUK

Group CISO

GoTo group

14:55 PM – 15:15 PM

Fireside Chat

Digital Trust as the New Currency: Securing Economies, Citizens, and Critical Systems

  • Embedding cybersecurity at the heart of economic growth and innovation-
  • Protecting digital identity, payments, and cross-sector infrastructure
  • Building trust frameworks that underpin global digital trade
Moderator
ANDANG NUGROHO

ANDANG NUGROHO

Task Force Head - Cybersecurity & Digital Sovereignity

Mastel (Masyarakat Telekomunikasi Indonesia)

AVM. Chalermchai Wonggate

AVM. Chalermchai Wonggate

Director of Cyber Security Research Center

National Cyber Security Agency (NCSA)

15:15 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

Cyber Conflict and Digital Surveillance: Assessing Risks to National Safety and Vital Systems

  • Examining international cyber risks, government-backed attacks, and trends in online terrorism
  • Bolstering national cybersecurity through legal structures and intelligence collaboration
  • Fostering cooperation between the public and private sectors to safeguard essential systems from cyber sabotage

09:15 AM – 09:30 AM

Securing Indonesia’s Maritime Borders in the Digital Age: Threats, Strategies & Cooperation

  • Strengthening maritime border security through digital and operational measures
  • Implementing strategies to ensure effective monitoring and protection of maritime territories
  • Enhancing cooperation and coordination at national and international levels for maritime security

09:30 AM – 09:50 AM

AI Is Redefining Risk—Proactivity Is the New Security Standard

  • AI-Powered Proactive Defense: Discover how AI is transforming cybersecurity from reactive response to proactive risk prevention
  • Redefining Risk in the AI Era: Learn how AI enables earlier threat detection, smarter decision-making, and faster mitigation
  • The New Security Standard: Embrace a proactive, forward-looking approach where staying ahead of threats is no longer optional—but essential
Lustan Wijaya

Lustan Wijaya

Technical Manager, Indonesia

Trend Micro

09:50 AM – 10:10 AM

Unmasking Synthetic Impostors: Tackling AI-Forged Scams and Digital Identity Breaches

  • Uncovering incidents where cybercriminals exploit artificial visuals and voice replication to deceive
  • Innovating intelligent validation systems to expose manipulated media and fraudulent content
  • Elevating organizational and personal defense strategies to counter AI-driven impersonation threats
Sze Rong Tham

Sze Rong Tham

Regional Solutions Engineer

Cloudflare ASEAN

10:10 AM – 10:30 AM

The New Imperative: Identity Security

  • Understand the Evolving Threat Landscape: Learn why traditional security measures are no longer enough to combat modern, sophisticated attacks
  • Embrace an Identity-First Approach: Discover why identity is now the most critical security perimeter and how to build a modern security fabric around it
  • Enable Seamless Security: See how Okta’s solutions help you stay ahead of risks while providing seamless, secure user experiences for everyone in your organization
Ferdinand Gunadi Abadi

Ferdinand Gunadi Abadi

Regional Sales Manager

Okta

10:30 AM – 11:00 AM

Panel Discussion

Transforming Your Data Security Strategy

  • Top data security challenges in 2025 / Challenges from CISO’s perspective
  • Lift and shift vs. transformation for data security program
  • The multi-faceted role of AI in data security
  • Data security innovations / solutions CISOs would like to have
Moderator
Philip Sow

Philip Sow

Head of Systems Engineering, Southeast Asia, Korea and India

Proofpoint

Raditio Ghifiardi

Raditio Ghifiardi

VP, Head - Security Strategy & Architecture

Indosat

Hans Christianto

Hans Christianto

VP - IT Architecture

PT Bank Central Asia Tbk

Anas Dwi Vidianto

Anas Dwi Vidianto

Cloud Cybersecurity & Operation Division Head

Astra International

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Breaking the Code: AI and the Evolution of Bank Fraud, Money Laundering, and Cryptocurrency Threats

  • Investigating the role of AI in executing large-scale financial fraud and digital money laundering schemes
  • Protecting digital transactions with AI-powered fraud detection and advanced blockchain analytics
  • Enhancing banking cybersecurity frameworks to combat AI-empowered financial crimes
Muhammad Neil El Himam

Muhammad Neil El Himam

Deputy for Digital & Technology Creativity

Ministry of Creative Economy/Creative Economy Agency

11:40 AM – 12:00 PM

Redefining Digital Identity: Defending Trust Without Disrupting User Experience

  • Unpacking the rise of decentralized identity and self-managed credentials in a post-password world
  • Combating identity-based threats—from synthetic fraud to credential abuse—with adaptive authentication strategies
  • Building secure, privacy-first identity ecosystems aligned with evolving regulations and human-centric design

12:00 PM – 12:20 PM

Reimagining AI-powered SOC Orchestration with Security AI

  • Improving Security O&M Efficiency with AI Autopilot and Copilot
  • Automated Incident Responder and task management
  • Modern Customization and Expansion with AI Agents
Michael Widjaja

Michael Widjaja

International (INT) Presales Director

T-Innoware

12:20 PM – 12:40 PM

The Hacker's Edge: Ethical Hacking as the Cybersecurity Game Changer

  • Exploring how ethical hacking identifies vulnerabilities and enhances proactive defense strategies
  • Leveraging penetration testing and vulnerability assessments to uncover potential threats before exploitation
  • Understanding the role of ethical hackers in improving organizational security policies and incident response plans

12:40 PM – 12:50 PM

From EDR to XDR: 3 Moves to Cut Dwell Time

  • Unify telemetry, not just agents
  • Correlate → prioritize → one-click contain
  • MDR 24/7 as a safety net
Surya Dharma

Surya Dharma

Channel Sales Engineer

Bitdefender

12:50 PM – 13:00 PM

The Dark Web Economy – Ransomware, Malware, and Digital Extortion Networks

  • Exploring the dark web ecosystem where cybercriminals trade hacking tools and exploit kits
  • Countering Ransomware-as-a-Service (RaaS) and the profit-driven world of cyber extortion
  • Strengthening global collaboration to dismantle cybercrime networks and syndicates

12:50 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

From Awareness to Action – Humans as Cybersecurity’s First Line of Defense

  • Cultivating a cybersecurity-conscious culture with training, gamification, and phishing simulations
  • Mitigating insider threats through behavior monitoring and risk-adjusted access controls
  • Enabling non-technical staff to identify and respond effectively to cyber threats
Moderator
Farly Halim

Farly Halim

President

ISC2 Jakarta Chapter

Rendra Perdana

Rendra Perdana

VP - Information Security

DANA Indonesia

Wiyogo Albertus Indarko

Wiyogo Albertus Indarko

EVP - IT

PT Kereta Api Indonesia (Persero)

Bayu Pinasthika

Bayu Pinasthika

CISO

PT Pertamina Bina Medika IHC

14:15 PM – 14:30 PM

The Path to Compliance: Protecting Data and Meeting Legal Standards in the Digital Age

  • Implementing comprehensive security protocols to safeguard sensitive data from breaches, cyberattacks, and unauthorized access
  • Protecting both personal and organizational data to foster trust among customers, stakeholders, and regulatory authorities
  • Developing a robust cybersecurity framework to detect, respond to, and mitigate data breaches while ensuring compliance with legal standards
Arif Ilham Adnan

Arif Ilham Adnan

Co-Chairman/ Permanent Committee

APDI / KADIN Jakarta

14:30 PM – 15:00 PM

Panel Discussion

Cybersecurity 2.0: The Road Ahead in AI, Automation, and Evolving Threat Models

  • Exploring how AI-powered threat detection and automation are revolutionizing cybersecurity approaches
  • Understanding the shift toward a “never trust, always verify” security model to combat advancing cyber threats
  • Examining how evolving cybersecurity regulations will shape the future of data protection and risk management
Dr. Fandhy Haristha Siregar

Dr. Fandhy Haristha Siregar

Vice President

ISC2 Jakarta Chapter

Hana Abriyansyah

Hana Abriyansyah

CEO

Cisometric

15:00 – 16:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

16:30 – 16:40

Opening Ceremony

16:40 – 16:50

Grand Premier Performance

16:50 – 17:00

Keynote Address from VIP Chief Guest

17:00 – 17:20

Introductory Address by the Jury Committee

17:20 – 18:00

Awards Presentation
Ceremony

18:00 – 18:10

Closing Remarks

18:10 – 18:20

Closing Performance

18:20 – 19:30

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #IndoSec Newsletter

Popup