Securing Indonesia Emas 2045: Building Cyber Resilience for a Digitally Sovereign Nation
Aligning cybersecurity priorities with Indonesia’s Vision 2045 agenda, ensuring that digital infrastructure, financial systems, and public services remain secure as the nation advances toward becoming a top global economy
Strengthening foundational cyber capabilities across banking, telecommunications, smart infrastructure, and government platforms to support long-term economic transformation
Integrating policy, enterprise governance, workforce development, and technology modernization into a unified national cybersecurity direction
09:10 AM – 09:30 AM
Embedding Indonesia’s Personal Data Protection Law into Enterprise Security Architecture
Translating UU No. 27/2022 requirements into enforceable technical controls including encryption standards, access lifecycle management, and real-time breach detection mechanisms
Establishing internal governance structures that clearly assign accountability for data handling, third-party processing, and regulatory reporting
Managing cross-border data hosting and cloud environments while maintaining compliance with Indonesian supervisory expectations
09:30 AM – 09:50 AM
Digital Resilience in High-Availability Industries: When Downtime Is Not an Option
Operational continuity requirements in financial services, payments, healthcare, and telecommunications where disruption directly impacts national stability
Designing systems that maintain service integrity under partial compromise rather than assuming full prevention
Measuring resilience performance through recovery capability and service restoration benchmarks
09:50 AM – 10:10 AM
Governing Cloud Infrastructure in Multi-Provider and Hybrid Enterprise Environments
Addressing misconfigured storage, exposed APIs, and unmanaged service accounts as primary breach entry vectors
Managing infrastructure-as-code discipline and configuration drift in rapidly scaling environments
Establishing continuous validation controls across development, deployment, and runtime layers
10:10 AM – 10:30 AM
Agentic AI in Cybersecurity: Emerging Implications for Attack and Defence
Increasing use of agentic AI systems capable of autonomously executing tasks such as reconnaissance, vulnerability identification, and adaptive phishing campaigns
Growing integration of AI agents within security operations to assist with alert prioritization, investigation workflows, and automated response actions
Establishing governance and accountability frameworks to manage operational dependence on AI-driven decision-making
10:30 AM – 11:00 AM
Panel Discussion
The Modern CISO Mandate – Balancing National Compliance, Innovation, and Enterprise Resilience
Navigating increasing regulatory scrutiny while enabling digital transformation across banking, fintech, telecommunications, and public sector ecosystems
Aligning cybersecurity investment with board-level risk appetite and measurable business impact
Strengthening collaboration between CISOs, risk officers, and executive leadership to drive enterprise-wide security accountability
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 11:40 AM
Managing Public Sector Data Breaches and Large-Scale Information Exposure
Strengthening incident transparency and breach notification discipline across government institutions
Protecting national data repositories from mass exfiltration and credential compromise
Rebuilding institutional trust following high-visibility breach events
11:40 AM – 12:00 PM
Implementing Zero Trust in Complex Enterprise Environments: Lessons, Pitfalls, and Operational Realities
Many organizations struggle with legacy infrastructure, fragmented identity systems, and inconsistent access governance, making Zero Trust adoption more complex than architectural diagrams suggest
Over-reliance on technology tools without aligning internal processes, role definitions, and executive sponsorship often leads to partial or ineffective implementation
Phased deployment strategies that prioritize identity hygiene, privileged access discipline, and network segmentation can create measurable progress without disrupting critical operations
12:00 PM – 12:20 PM
Securing Operational Technology and Industrial Control Systems in Converged IT-OT Environments
Integration of IT networks with industrial systems expanding exposure across manufacturing, utilities, and smart infrastructure
Managing legacy protocols, real-time operational requirements, and safety-critical environments
Bridging skill gaps between IT security teams and engineering operations personnel
12:20 PM – 12:40 PM
Securing National Digital Identity Systems and Biometric Authentication Platforms
Protecting biometric databases and authentication workflows from spoofing, replay, and synthetic identity manipulation
Strengthening digital onboarding systems across banking, fintech, and public sector platforms
Balancing user convenience with robust identity assurance and privacy protections
12:40 PM – 12:50 PM
Endpoint Security in a Decentralized and Remote Enterprise Landscape
Embedding cybersecurity expectations into performance management and leadership oversight
Aligning employee behaviour with enterprise resilience objectives
13:00 – 13:45
LUNCH BREAK
13:45 – 14:15
Panel Discussion
Digital Acceleration Without Structural Weakness – Engineering Security into Large-Scale Transformation
Rapid cloud adoption, API expansion, platform integration, and ecosystem partnerships are increasing architectural complexity, often creating hidden dependencies that weaken long-term resilience
Embedding security architecture at design stage—across identity models, data flows, and third-party integrations—rather than applying controls after product launch
Establishing transformation governance frameworks where cybersecurity leadership participates in core product and infrastructure decisions, not only compliance validation
14:15 – 14:35
Ransomware Response and Recovery: Lessons from Regional Breaches and Operational Disruptions
Escalating ransomware campaigns targeting healthcare, financial institutions, and public sector entities across Southeast Asia
Decision-making frameworks for containment, negotiation, disclosure, and service restoration under operational pressure
Post-incident recovery, regulatory reporting, and rebuilding stakeholder trust after large-scale compromise
14:35 PM – 14:55 PM
Building Cybersecurity Talent Capacity to Support National Digital Growth
Addressing skill shortages across security operations, cloud governance, and threat intelligence functions
Strengthening collaboration between universities, certification bodies, and enterprise security teams
Creating sustainable talent pipelines to support long-term digital transformation objectives
14:55 PM – 15:15 PM
Panel Discussion
Intergovernmental and Cross-Border Cyber Cooperation in a Fragmented Threat Landscape
Addressing jurisdictional complexity in transnational ransomware and financial cybercrime operations
Aligning Indonesia’s cybersecurity strategy with ASEAN and global regulatory frameworks
Building trust-based intelligence-sharing models between sovereign governments
15:15 – 17:00
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
08:00 AM – 09:00 AM
REGISTRATION & COFFEE
09:00 AM – 09:15 AM
Digital Surveillance in Indonesia: Security Oversight, Data Visibility, and the Boundaries of Proportional Monitoring
Expansion of surveillance capabilities across financial systems, telecommunications networks, and public service platforms to detect fraud, cybercrime, and systemic threats
Regulatory and ethical boundaries governing how monitoring technologies intersect with personal data protection, civil liberties, and enterprise accountability
Establishing transparent oversight structures to ensure surveillance strengthens security without eroding institutional trust
09:15 AM – 09:30 AM
Protecting Critical Information Infrastructure in a Digitally Interdependent National Economy
Essential services including payment systems, telecommunications backbones, logistics platforms, and digital government portals now operate within tightly connected ecosystems
Disruption within one sector increasingly affects adjacent industries due to shared infrastructure, cloud concentration, and identity federation models
Structured sectoral resilience planning and mandatory security baselines are becoming foundational to national service continuity
09:30 AM – 09:50 AM
Artificial Intelligence–Enabled Scams and the Industrialization of Digital Identity Abuse
Deepfake voice replication, AI-generated impersonation, and automated phishing kits are enabling highly scalable fraud campaigns
Identity verification systems across banking, fintech onboarding, and e-commerce platforms are under pressure from synthetic identity manipulation
Fraud detection must evolve toward behavioural biometrics and anomaly detection models that operate in real time without degrading user experience
09:50 AM – 10:10 AM
Exploiting Cloud Misconfigurations in Distributed Application Environments
Leveraging exposed APIs, excessive permissions, and overlooked cloud service configurations as footholds for lateral expansion
Multi-stage intrusion paths originating from minor configuration weaknesses
Continuous runtime configuration auditing to prevent silent escalation
10:10 AM – 10:30 AM
The Dark Web as a Service Economy: Access Brokerage, Ransomware Markets, and Data Auctions
Emergence of structured marketplaces selling network access, ransomware toolkits, and bulk stolen credentials
Specialization within cybercrime networks where reconnaissance, exploitation, and monetization are separated into services
Incorporating underground intelligence monitoring into proactive enterprise defence strategy
10:30 AM – 11:00 AM
Panel Discussion
Artificial Intelligence as a Defining Force in the Future of Cybersecurity
Expanding use of predictive analytics and behavioural modelling to strengthen proactive threat detection
Understanding how threat actors leverage AI to enhance deception, scale, and evasion
Establishing operational frameworks that balance intelligent automation with human oversight
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 11:50 AM
Offensive Security as a Continuous Discipline: Institutionalizing Ethical Hacking
Transitioning from compliance-based penetration testing toward adversary simulation aligned with current threat tactics
Using red team findings to redesign system architecture rather than applying isolated technical fixes
Social Engineering 3.0: AI-Augmented Psychological Manipulation at Scale
Highly personalized phishing, voice cloning, and video-based deception targeting executives and financial controllers
Exploiting urgency, authority, and behavioural bias through automated social manipulation
Establishing verification discipline and layered communication controls to reduce human exploitation vectors
12:10 PM – 12:30 PM
Third-Party Ecosystem Risk: Managing Hidden Exposure Across Digital Partnerships
Expanding API connectivity, outsourced services, and platform integrations creating interconnected risk beyond direct enterprise control
Compromise of smaller ecosystem participants providing indirect access into high-value networks and sensitive data repositories
Embedding real-time third-party risk visibility into procurement, vendor lifecycle management, and contractual security governance
12:30 PM – 12:40 PM
Compliance Enforcement in Practice: From Documentation to Demonstrable Assurance
Regulatory scrutiny shifting from policy existence to evidence of operational effectiveness
Real-time reporting expectations during data breaches and service disruptions
Building traceable audit trails that withstand forensic and supervisory review
12:40 PM – 12:50 PM
Protecting Data Integrity in an Era of Silent Manipulation and Systemic Tampering
Threat actors increasingly targeting data accuracy rather than availability, altering records without triggering immediate detection
Financial reporting systems, transaction logs, and operational dashboards vulnerable to subtle manipulation
Designing integrity validation mechanisms that detect tampering before operational decisions are compromised
12:50 PM – 13:45
LUNCH BREAK
13:45 – 14:15
Panel Discussion
The Limits of Technology – Why Human Behaviour Still Defines Cybersecurity Success
Technical controls and AI-driven detection systems cannot eliminate behavioural shortcuts, credential misuse, and executive misjudgement
Insider exposure often emerging from process gaps, operational pressure, and unclear accountability rather than malicious intent
Designing measurable behaviour frameworks that translate security awareness into verifiable operational discipline
14:15 – 14:30
Strategic Cybersecurity Investment in High-Growth Digital Economies: Balancing Expansion, Regulation, and Resilience
Rapid expansion of digital banking, fintech platforms, telecommunications services, and public digital infrastructure is increasing exposure faster than security budgets scale
Prioritizing investment across fraud prevention, cloud governance, incident response readiness, and workforce capability within cost-sensitive and resource-constrained environments
Aligning cybersecurity capital allocation with regulatory expectations, supervisory inspections, and long-term national digital transformation goals
14:30 PM – 15:00 PM
Panel Discussion
Cybersecurity 3.0 – Securing the Future of Hyperconnected and Autonomous Digital Economies
Machine-driven transactions, decentralized services, and digital identity ecosystems reshaping how trust is established and enforced