Strengthening Indonesia's Digital Future: Protecting National Interests in an Era of Rising Cyber Threats
Utilizing Indonesia’s National Cybersecurity Strategy to safeguard critical systems, government bodies, and private sector organizations
Building a strong cybersecurity workforce through government-driven training initiatives and industry-recognized certifications
Evolving Indonesia’s Cyber Resilience Framework to effectively counter sophisticated cyberattacks and espionage activities
09:10 AM – 09:30 AM
Protecting Data in a Hyperconnected World: Enhancing Privacy, Compliance, and Resilience
Enforcing Indonesia’s Data Privacy Regulations (UU No. 27/2022) to protect individuals and businesses from data breaches
Strengthening data encryption, anonymization, and access controls to prevent unauthorized data exposure
Understanding cross-border data transfer regulations to ensure compliance with APAC, PDP Law, and GDPR
09:30 AM – 09:50 AM
Securing Cloud Environments in a Multi-Tenant World: Defending Against Misconfigurations, Breaches, and Insider Threats
Addressing vulnerabilities in cloud configurations that expose organizations to potential security breaches
Adopting Zero Trust principles in cloud environments by implementing identity-based access and network isolation
Leveraging cloud-native security solutions like CWPP, CSPM, and CNAPP to enhance monitoring and defense capabilities
09:50 AM – 10:10 AM
Dark AI vs. Defensive AI: The Battle of Cybersecurity Algorithms
How does the rise of dark AI threaten an organization’s cybersecurity defenses?
Are cybersecurity teams relying on defensive AI? Can it effectively predict and counteract AI-driven attacks?
The fierce clash between dark AI and defensive AI – Shaping the next frontier of cybersecurity innovation and resilience
10:10 AM – 10:30 AM
Uniting Forces for Cybersecurity: The Impact of Public-Private Partnerships
Exploring how partnerships between public and private sectors help shape robust regulations, frameworks, and industry benchmarks
Synergy between governments and private companies in enhancing real-time threat detection and mitigation efforts
The importance of cooperative efforts in equipping and developing a skilled workforce to tackle emerging cyber challenges
10:30 AM – 11:00 AM
Panel Discussion
The CISO’s Playbook – Mastering the Balance Between Security, Innovation, and Boardroom Demands
Managing cybersecurity in a climate of escalating regulations, AI-driven threats, and shrinking budgets – turning challenges into opportunities
AI as both a weapon and a shield: How are CISOs, CAIOs, and IT leaders harnessing AI to defend against emerging AI-powered risks?
Closing the critical gap between boards and CISOs to drive strategic alignment and ensure cybersecurity is at the forefront of executive decision-making
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 11:40 AM
The Rise of Hacktivism 2.0: AI-Driven Political Cyber Attacks and Digital Protest Movements
Exploring how hacktivist groups in Indonesia are leveraging AI to carry out cyber campaigns and digital disruptions
Analyzing state-sponsored cyber warfare and the ethical challenges posed by digital activism in the Indonesian context
Enhancing cybersecurity policies to address politically motivated cyber incidents and safeguard national security
11:40 AM – 12:00 PM
Zero Trust in a Hyperconnected World: Breaking the Cycle of Implicit Trust in Cybersecurity
Deploying Zero Trust frameworks to protect hybrid cloud systems and ensure the security of remote workforces
Utilizing advanced techniques like micro-segmentation, continuous identity verification, and AI-powered anomaly detection to block unauthorized access
Tackling the obstacles in rolling out Zero Trust strategies across multinational organizations to build a resilient security architecture
12:00 PM – 12:20 PM
Cloud Under Siege – The Surge of Cloud-Centric Cyberattacks and Data Theft Tactics
Exploring the latest cybercriminal methods to exploit cloud systems and steal critical information
Enhancing cloud defense through AI-powered anomaly detection and advanced threat intelligence systems
Crafting cloud-specific security protocols to block unauthorized entry and safeguard sensitive data from breaches
12:20 PM – 12:40 PM
AI at War: Rewriting Cyber Defense in the Age of Intelligent Threats
Can machine intelligence outpace digital predators in a battlefield where threats evolve by the second?
What does responsible AI look like? A call for unified action between government and industry to define the moral code of machine decision-making
When smart systems go rogue — is AI capable of turning on itself, and what does that mean for our future defenses?
12:40 PM – 12:50 PM
Redefining Digital Identity: Defending Trust Without Disrupting User Experience
Unpacking the rise of decentralized identity and self-managed credentials in a post-password world