Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

07:30 AM – 08:30 AM

REGISTRATION & COFFEE

08:30 AM – 08:40 AM

INAUGURATION & OPENING CEREMONY

08:40 AM – 08:55 AM

KEY OPENING REMARKS

08:55 AM – 09:10 AM

Strengthening Indonesia's Digital Future: Protecting National Interests in an Era of Rising Cyber Threats

  • Utilizing Indonesia’s National Cybersecurity Strategy to safeguard critical systems, government bodies, and private sector organizations
  • Building a strong cybersecurity workforce through government-driven training initiatives and industry-recognized certifications
  • Evolving Indonesia’s Cyber Resilience Framework to effectively counter sophisticated cyberattacks and espionage activities

09:10 AM – 09:30 AM

Protecting Data in a Hyperconnected World: Enhancing Privacy, Compliance, and Resilience

  • Enforcing Indonesia’s Data Privacy Regulations (UU No. 27/2022) to protect individuals and businesses from data breaches
  • Strengthening data encryption, anonymization, and access controls to prevent unauthorized data exposure
  • Understanding cross-border data transfer regulations to ensure compliance with APAC, PDP Law, and GDPR

09:30 AM – 09:50 AM

Securing Cloud Environments in a Multi-Tenant World: Defending Against Misconfigurations, Breaches, and Insider Threats

  • Addressing vulnerabilities in cloud configurations that expose organizations to potential security breaches
  • Adopting Zero Trust principles in cloud environments by implementing identity-based access and network isolation
  • Leveraging cloud-native security solutions like CWPP, CSPM, and CNAPP to enhance monitoring and defense capabilities

09:50 AM – 10:10 AM

Dark AI vs. Defensive AI: The Battle of Cybersecurity Algorithms

  • How does the rise of dark AI threaten an organization’s cybersecurity defenses?
  • Are cybersecurity teams relying on defensive AI? Can it effectively predict and counteract AI-driven attacks?
  • The fierce clash between dark AI and defensive AI – Shaping the next frontier of cybersecurity innovation and resilience

10:10 AM – 10:30 AM

Uniting Forces for Cybersecurity: The Impact of Public-Private Partnerships

  • Exploring how partnerships between public and private sectors help shape robust regulations, frameworks, and industry benchmarks
  • Synergy between governments and private companies in enhancing real-time threat detection and mitigation efforts
  • The importance of cooperative efforts in equipping and developing a skilled workforce to tackle emerging cyber challenges

10:30 AM – 11:00 AM

Panel Discussion

The CISO’s Playbook – Mastering the Balance Between Security, Innovation, and Boardroom Demands

  • Managing cybersecurity in a climate of escalating regulations, AI-driven threats, and shrinking budgets – turning challenges into opportunities
  • AI as both a weapon and a shield: How are CISOs, CAIOs, and IT leaders harnessing AI to defend against emerging AI-powered risks?
  • Closing the critical gap between boards and CISOs to drive strategic alignment and ensure cybersecurity is at the forefront of executive decision-making

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

The Rise of Hacktivism 2.0: AI-Driven Political Cyber Attacks and Digital Protest Movements

  • Exploring how hacktivist groups in Indonesia are leveraging AI to carry out cyber campaigns and digital disruptions
  • Analyzing state-sponsored cyber warfare and the ethical challenges posed by digital activism in the Indonesian context
  • Enhancing cybersecurity policies to address politically motivated cyber incidents and safeguard national security

11:40 AM – 12:00 PM

Zero Trust in a Hyperconnected World: Breaking the Cycle of Implicit Trust in Cybersecurity

  • Deploying Zero Trust frameworks to protect hybrid cloud systems and ensure the security of remote workforces
  • Utilizing advanced techniques like micro-segmentation, continuous identity verification, and AI-powered anomaly detection to block unauthorized access
  • Tackling the obstacles in rolling out Zero Trust strategies across multinational organizations to build a resilient security architecture

12:00 PM – 12:20 PM

Cloud Under Siege – The Surge of Cloud-Centric Cyberattacks and Data Theft Tactics

  • Exploring the latest cybercriminal methods to exploit cloud systems and steal critical information
  • Enhancing cloud defense through AI-powered anomaly detection and advanced threat intelligence systems
  • Crafting cloud-specific security protocols to block unauthorized entry and safeguard sensitive data from breaches

12:20 PM – 12:40 PM

AI at War: Rewriting Cyber Defense in the Age of Intelligent Threats

  • Can machine intelligence outpace digital predators in a battlefield where threats evolve by the second?
  • What does responsible AI look like? A call for unified action between government and industry to define the moral code of machine decision-making
  • When smart systems go rogue — is AI capable of turning on itself, and what does that mean for our future defenses?

12:40 PM – 12:50 PM

Redefining Digital Identity: Defending Trust Without Disrupting User Experience

  • Unpacking the rise of decentralized identity and self-managed credentials in a post-password world
  • Combating identity-based threats—from synthetic fraud to credential abuse—with adaptive authentication strategies
  • Building secure, privacy-first identity ecosystems aligned with evolving regulations and human-centric design

12:50 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

Innovation vs. Exposure – Aligning Cyber Defense with Digital Acceleration

  • Integrating security by design into transformation journeys to eliminate weak points before they emerge
  • Navigating the risk landscape of cloud adoption, distributed teams, and evolving IT infrastructures
  • Sustaining operational resilience with agile security architectures built for a fast-moving, digital-first world

14:15 PM – 14:35 PM

Cyber Resilience for SMEs: Defending What Matters with Limited Resources

  • Unpacking cost-effective strategies and practical tools to shield digital assets without straining the bottom line
  • Identifying top cyber threats targeting small businesses—like phishing, ransomware, and breaches—and actionable ways to reduce exposure
  • Maximizing impact through smart budgeting, open-source solutions, and fostering a culture of security from the ground up

14:35 PM – 14:55 PM

Intelligent Warfare: Machine-Led Attacks vs Self-Defending Cyber Systems

  • Uncovering how machine intelligence is powering instant breaches, smart exploits, and automated system probing
  • Activating autonomous defense layers that foresee, intercept, and dismantle digital threats before they cause harm
  • Exposing the vulnerabilities of AI—how malicious actors manipulate learning systems and how defenders can stay ahead

14:55 PM – 15:15 PM

When Everything Connects, Everything’s at Risk: The Exploitation of Smart Devices in Modern Cyber Attacks

  • Uncovering how compromised IoT ecosystems are fuelling botnet armies and next-gen ransomware campaigns
  • Fortifying connected devices through hardened firmware, isolated networks, and intelligent threat detection
  • Establishing unified global protocols to secure the backbone of smart infrastructure—from homes to industrial systems

15:15 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

Cyber Conflict and Digital Surveillance: Assessing Risks to National Safety and Vital Systems

  • Examining international cyber risks, government-backed attacks, and trends in online terrorism
  • Bolstering national cybersecurity through legal structures and intelligence collaboration
  • Fostering cooperation between the public and private sectors to safeguard essential systems from cyber sabotage

09:15 AM – 09:30 AM

Cybersecurity Culture as a Strategic Asset: Cultivating a Resilient Organization

  • Shifting from mere compliance to cultivating an active cybersecurity mindset
  • Evaluating the cybersecurity culture and employee preparedness through risk-focused awareness initiatives
  • Promoting leadership involvement and responsibility in driving cybersecurity efforts

09:30 AM – 09:50 AM

Fortifying Mobile Frontlines: Defending Against Cyber Threats in a Hyper-Connected Era

  • Neutralizing mobile malware, SIM hijacking, and rogue applications before they strike
  • Deploying next-gen mobile threat defense (MTD) and AI-powered security for instant, adaptive protection
  • Enforcing robust enterprise-wide mobile governance with Zero Trust at its core

09:50 AM – 10:10 AM

Unmasking Synthetic Impostors: Tackling AI-Forged Scams and Digital Identity Breaches

  • Uncovering incidents where cybercriminals exploit artificial visuals and voice replication to deceive
  • Innovating intelligent validation systems to expose manipulated media and fraudulent content
  • Elevating organizational and personal defense strategies to counter AI-driven impersonation threats

10:10 AM – 10:30 AM

Evolving Threats in Application Security: From AI Attacks to Cloud Vulnerabilities

  • Examining emerging attack vectors, including AI-driven malware, API weaknesses, and serverless computing exploits
  • Integrating DevSecOps practices to fortify the software development lifecycle against vulnerabilities
  • Harnessing AI technology to identify, prevent, and counteract application-layer threats in real time

10:30 AM – 11:00 AM

Panel Discussion

PAM in Action – The Unyielding Shield Against Insider and Credential-Centric Cyber Threats

  • Preventing privilege escalation, lateral movement, and ransomware attacks with least-privilege access controls
  • Leveraging Just-in-Time (JIT) access to minimize exposure of high-risk accounts
  • Integrating PAM with Zero Trust and Identity Threat Detection & Response (ITDR) for proactive, layered security

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:50 AM

Breaking the Code: AI and the Evolution of Bank Fraud, Money Laundering, and Cryptocurrency Threats

  • Investigating the role of AI in executing large-scale financial fraud and digital money laundering schemes
  • Protecting digital transactions with AI-powered fraud detection and advanced blockchain analytics
  • Enhancing banking cybersecurity frameworks to combat AI-empowered financial crimes

11:50 AM – 12:10 PM

Biometric Security at Risk: Defending Against Spoofing, Replay, and Deepfake Fraud

  • Analyzing vulnerabilities in fingerprint, facial recognition, and voice authentication systems
  • Enhancing biometric security with advanced liveness detection and multi-modal authentication methods
  • Ensuring compliance with regulations and protecting privacy in biometric identity verification solutions

12:10 PM – 12:30 PM

The Dark Web Economy – Ransomware, Malware, and Digital Extortion Networks

  • Exploring the dark web ecosystem where cybercriminals trade hacking tools and exploit kits
  • Countering Ransomware-as-a-Service (RaaS) and the profit-driven world of cyber extortion
  • Strengthening global collaboration to dismantle cybercrime networks and syndicates

12:30 PM – 12:40 PM

The Hacker's Edge: Ethical Hacking as the Cybersecurity Game Changer

  • Exploring how ethical hacking identifies vulnerabilities and enhances proactive defense strategies
  • Leveraging penetration testing and vulnerability assessments to uncover potential threats before exploitation
  • Understanding the role of ethical hackers in improving organizational security policies and incident response plans

12:40 PM – 12:50 PM

AI and Social Engineering 3.0: Combatting Deepfake Fraud, Phishing, and Online Manipulation

  • Analyzing the evolution of phishing, vishing, and AI-driven manipulation techniques
  • Educating employees and executives to identify and withstand advanced social engineering scams
  • Utilizing behavioral analytics and AI to proactively identify and thwart social engineering attacks

12:50 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

From Awareness to Action – Humans as Cybersecurity’s First Line of Defense

  • Cultivating a cybersecurity-conscious culture with training, gamification, and phishing simulations
  • Mitigating insider threats through behavior monitoring and risk-adjusted access controls
  • Enabling non-technical staff to identify and respond effectively to cyber threats

14:15 PM – 14:35 PM

The Path to Compliance: Protecting Data and Meeting Legal Standards in the Digital Age

  • Implementing comprehensive security protocols to safeguard sensitive data from breaches, cyberattacks, and unauthorized access
  • Protecting both personal and organizational data to foster trust among customers, stakeholders, and regulatory authorities
  • Developing a robust cybersecurity framework to detect, respond to, and mitigate data breaches while ensuring compliance with legal standards

14:35 PM – 14:55 PM

The Hidden Dangers of the Supply Chain: Cyber Threats in Third-Party Vendors and Software Dependencies

  • Analyzing real-world incidents where supply chain vulnerabilities were exploited by cybercriminals
  • Leveraging AI-powered risk assessments and security evaluations for third-party vendors
  • Strengthening software supply chain security through continuous monitoring and the adoption of zero-trust principles

14:55 PM – 15:15 PM

Cybersecurity 2.0: The Road Ahead in AI, Automation, and Evolving Threat Models

  • Exploring how AI-powered threat detection and automation are revolutionizing cybersecurity approaches
  • Understanding the shift toward a “never trust, always verify” security model to combat advancing cyber threats
  • Examining how evolving cybersecurity regulations will shape the future of data protection and risk management

15:15 – 16:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #IndoSec Newsletter