Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

07:30 AM – 08:30 AM

REGISTRATION & COFFEE

08:30 AM – 08:40 AM

INAUGURATION & OPENING CEREMONY

08:40 AM – 08:55 AM

KEY OPENING REMARKS

08:55 AM – 09:10 AM

Securing Indonesia Emas 2045: Building Cyber Resilience for a Digitally Sovereign Nation

  • Aligning cybersecurity priorities with Indonesia’s Vision 2045 agenda, ensuring that digital infrastructure, financial systems, and public services remain secure as the nation advances toward becoming a top global economy
  • Strengthening foundational cyber capabilities across banking, telecommunications, smart infrastructure, and government platforms to support long-term economic transformation
  • Integrating policy, enterprise governance, workforce development, and technology modernization into a unified national cybersecurity direction

09:10 AM – 09:30 AM

Embedding Indonesia’s Personal Data Protection Law into Enterprise Security Architecture

  • Translating UU No. 27/2022 requirements into enforceable technical controls including encryption standards, access lifecycle management, and real-time breach detection mechanisms
  • Establishing internal governance structures that clearly assign accountability for data handling, third-party processing, and regulatory reporting
  • Managing cross-border data hosting and cloud environments while maintaining compliance with Indonesian supervisory expectations

09:30 AM – 09:50 AM

Digital Resilience in High-Availability Industries: When Downtime Is Not an Option

  • Operational continuity requirements in financial services, payments, healthcare, and telecommunications where disruption directly impacts national stability
  • Designing systems that maintain service integrity under partial compromise rather than assuming full prevention
  • Measuring resilience performance through recovery capability and service restoration benchmarks

09:50 AM – 10:10 AM

Governing Cloud Infrastructure in Multi-Provider and Hybrid Enterprise Environments

  • Addressing misconfigured storage, exposed APIs, and unmanaged service accounts as primary breach entry vectors
  • Managing infrastructure-as-code discipline and configuration drift in rapidly scaling environments
  • Establishing continuous validation controls across development, deployment, and runtime layers

10:10 AM – 10:30 AM

Agentic AI in Cybersecurity: Emerging Implications for Attack and Defence

  • Increasing use of agentic AI systems capable of autonomously executing tasks such as reconnaissance, vulnerability identification, and adaptive phishing campaigns
  • Growing integration of AI agents within security operations to assist with alert prioritization, investigation workflows, and automated response actions
  • Establishing governance and accountability frameworks to manage operational dependence on AI-driven decision-making

10:30 AM – 11:00 AM

Panel Discussion

The Modern CISO Mandate – Balancing National Compliance, Innovation, and Enterprise Resilience

  • Navigating increasing regulatory scrutiny while enabling digital transformation across banking, fintech, telecommunications, and public sector ecosystems
  • Aligning cybersecurity investment with board-level risk appetite and measurable business impact
  • Strengthening collaboration between CISOs, risk officers, and executive leadership to drive enterprise-wide security accountability

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Managing Public Sector Data Breaches and Large-Scale Information Exposure

  • Strengthening incident transparency and breach notification discipline across government institutions
  • Protecting national data repositories from mass exfiltration and credential compromise
  • Rebuilding institutional trust following high-visibility breach events

11:40 AM – 12:00 PM

Implementing Zero Trust in Complex Enterprise Environments: Lessons, Pitfalls, and Operational Realities

  • Many organizations struggle with legacy infrastructure, fragmented identity systems, and inconsistent access governance, making Zero Trust adoption more complex than architectural diagrams suggest
  • Over-reliance on technology tools without aligning internal processes, role definitions, and executive sponsorship often leads to partial or ineffective implementation
  • Phased deployment strategies that prioritize identity hygiene, privileged access discipline, and network segmentation can create measurable progress without disrupting critical operations

12:00 PM – 12:20 PM

Securing Operational Technology and Industrial Control Systems in Converged IT-OT Environments

  • Integration of IT networks with industrial systems expanding exposure across manufacturing, utilities, and smart infrastructure
  • Managing legacy protocols, real-time operational requirements, and safety-critical environments
  • Bridging skill gaps between IT security teams and engineering operations personnel

12:20 PM – 12:40 PM

Securing National Digital Identity Systems and Biometric Authentication Platforms

  • Protecting biometric databases and authentication workflows from spoofing, replay, and synthetic identity manipulation
  • Strengthening digital onboarding systems across banking, fintech, and public sector platforms
  • Balancing user convenience with robust identity assurance and privacy protections

12:40 PM – 12:50 PM

Endpoint Security in a Decentralized and Remote Enterprise Landscape

  • Detecting credential harvesting, fileless malware, and endpoint persistence techniques targeting distributed workforce devices
  • Managing visibility gaps created by contractor devices, unmanaged systems, and hybrid work models
  • Strengthening endpoint telemetry integration into incident containment workflows

12:50 PM – 13:00

Developing a Security-First Organizational Culture with Measurable Impact

  • Moving beyond awareness campaigns toward behaviour-driven risk measurement and accountability frameworks
  • Embedding cybersecurity expectations into performance management and leadership oversight
  • Aligning employee behaviour with enterprise resilience objectives

13:00 – 13:45

LUNCH BREAK

13:45 – 14:15

Panel Discussion

Digital Acceleration Without Structural Weakness – Engineering Security into Large-Scale Transformation

  • Rapid cloud adoption, API expansion, platform integration, and ecosystem partnerships are increasing architectural complexity, often creating hidden dependencies that weaken long-term resilience
  • Embedding security architecture at design stage—across identity models, data flows, and third-party integrations—rather than applying controls after product launch
  • Establishing transformation governance frameworks where cybersecurity leadership participates in core product and infrastructure decisions, not only compliance validation

14:15 – 14:35

Ransomware Response and Recovery: Lessons from Regional Breaches and Operational Disruptions

  • Escalating ransomware campaigns targeting healthcare, financial institutions, and public sector entities across Southeast Asia
  • Decision-making frameworks for containment, negotiation, disclosure, and service restoration under operational pressure
  • Post-incident recovery, regulatory reporting, and rebuilding stakeholder trust after large-scale compromise

14:35 PM – 14:55 PM

Building Cybersecurity Talent Capacity to Support National Digital Growth

  • Addressing skill shortages across security operations, cloud governance, and threat intelligence functions
  • Strengthening collaboration between universities, certification bodies, and enterprise security teams
  • Creating sustainable talent pipelines to support long-term digital transformation objectives

14:55 PM – 15:15 PM

Panel Discussion

Intergovernmental and Cross-Border Cyber Cooperation in a Fragmented Threat Landscape

  • Addressing jurisdictional complexity in transnational ransomware and financial cybercrime operations
  • Aligning Indonesia’s cybersecurity strategy with ASEAN and global regulatory frameworks
  • Building trust-based intelligence-sharing models between sovereign governments

15:15 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

Digital Surveillance in Indonesia: Security Oversight, Data Visibility, and the Boundaries of Proportional Monitoring

  • Expansion of surveillance capabilities across financial systems, telecommunications networks, and public service platforms to detect fraud, cybercrime, and systemic threats
  • Regulatory and ethical boundaries governing how monitoring technologies intersect with personal data protection, civil liberties, and enterprise accountability
  • Establishing transparent oversight structures to ensure surveillance strengthens security without eroding institutional trust

09:15 AM – 09:30 AM

Protecting Critical Information Infrastructure in a Digitally Interdependent National Economy

  • Essential services including payment systems, telecommunications backbones, logistics platforms, and digital government portals now operate within tightly connected ecosystems
  • Disruption within one sector increasingly affects adjacent industries due to shared infrastructure, cloud concentration, and identity federation models
  • Structured sectoral resilience planning and mandatory security baselines are becoming foundational to national service continuity

09:30 AM – 09:50 AM

Artificial Intelligence–Enabled Scams and the Industrialization of Digital Identity Abuse

  • Deepfake voice replication, AI-generated impersonation, and automated phishing kits are enabling highly scalable fraud campaigns
  • Identity verification systems across banking, fintech onboarding, and e-commerce platforms are under pressure from synthetic identity manipulation
  • Fraud detection must evolve toward behavioural biometrics and anomaly detection models that operate in real time without degrading user experience

09:50 AM – 10:10 AM

Exploiting Cloud Misconfigurations in Distributed Application Environments

  • Leveraging exposed APIs, excessive permissions, and overlooked cloud service configurations as footholds for lateral expansion
  • Multi-stage intrusion paths originating from minor configuration weaknesses
  • Continuous runtime configuration auditing to prevent silent escalation

10:10 AM – 10:30 AM

The Dark Web as a Service Economy: Access Brokerage, Ransomware Markets, and Data Auctions

  • Emergence of structured marketplaces selling network access, ransomware toolkits, and bulk stolen credentials
  • Specialization within cybercrime networks where reconnaissance, exploitation, and monetization are separated into services
  • Incorporating underground intelligence monitoring into proactive enterprise defence strategy

10:30 AM – 11:00 AM

Panel Discussion

Artificial Intelligence as a Defining Force in the Future of Cybersecurity

  • Expanding use of predictive analytics and behavioural modelling to strengthen proactive threat detection
  • Understanding how threat actors leverage AI to enhance deception, scale, and evasion
  • Establishing operational frameworks that balance intelligent automation with human oversight

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:50 AM

Offensive Security as a Continuous Discipline: Institutionalizing Ethical Hacking

  • Transitioning from compliance-based penetration testing toward adversary simulation aligned with current threat tactics
  • Using red team findings to redesign system architecture rather than applying isolated technical fixes
  • Developing internal offensive security capabilities that evolve alongside emerging attack techniques

11:50 AM – 12:10 PM

Social Engineering 3.0: AI-Augmented Psychological Manipulation at Scale

  • Highly personalized phishing, voice cloning, and video-based deception targeting executives and financial controllers
  • Exploiting urgency, authority, and behavioural bias through automated social manipulation
  • Establishing verification discipline and layered communication controls to reduce human exploitation vectors

12:10 PM – 12:30 PM

Third-Party Ecosystem Risk: Managing Hidden Exposure Across Digital Partnerships

  • Expanding API connectivity, outsourced services, and platform integrations creating interconnected risk beyond direct enterprise control
  • Compromise of smaller ecosystem participants providing indirect access into high-value networks and sensitive data repositories
  • Embedding real-time third-party risk visibility into procurement, vendor lifecycle management, and contractual security governance

12:30 PM – 12:40 PM

Compliance Enforcement in Practice: From Documentation to Demonstrable Assurance

  • Regulatory scrutiny shifting from policy existence to evidence of operational effectiveness
  • Real-time reporting expectations during data breaches and service disruptions
  • Building traceable audit trails that withstand forensic and supervisory review

12:40 PM – 12:50 PM

Protecting Data Integrity in an Era of Silent Manipulation and Systemic Tampering

  • Threat actors increasingly targeting data accuracy rather than availability, altering records without triggering immediate detection
  • Financial reporting systems, transaction logs, and operational dashboards vulnerable to subtle manipulation
  • Designing integrity validation mechanisms that detect tampering before operational decisions are compromised

12:50 PM – 13:45

LUNCH BREAK

13:45 – 14:15

Panel Discussion

The Limits of Technology – Why Human Behaviour Still Defines Cybersecurity Success

  • Technical controls and AI-driven detection systems cannot eliminate behavioural shortcuts, credential misuse, and executive misjudgement
  • Insider exposure often emerging from process gaps, operational pressure, and unclear accountability rather than malicious intent
  • Designing measurable behaviour frameworks that translate security awareness into verifiable operational discipline

14:15 – 14:30

Strategic Cybersecurity Investment in High-Growth Digital Economies: Balancing Expansion, Regulation, and Resilience

  • Rapid expansion of digital banking, fintech platforms, telecommunications services, and public digital infrastructure is increasing exposure faster than security budgets scale
  • Prioritizing investment across fraud prevention, cloud governance, incident response readiness, and workforce capability within cost-sensitive and resource-constrained environments
  • Aligning cybersecurity capital allocation with regulatory expectations, supervisory inspections, and long-term national digital transformation goals

14:30 PM – 15:00 PM

Panel Discussion

Cybersecurity 3.0 – Securing the Future of Hyperconnected and Autonomous Digital Economies

  • Machine-driven transactions, decentralized services, and digital identity ecosystems reshaping how trust is established and enforced
  • Defensive strategies shifting from reactive containment toward predictive, adaptive protection models
  • Preparing enterprises for sustained exposure in environments where automation, scale, and speed define competitive advantage

15:00 – 16:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

16:30 – 16:40

Opening Ceremony

16:40 – 16:50

Grand Premier Performance

16:50 – 17:00

Keynote Address from VIP Chief Guest

17:00 – 17:20

Introductory Address by the Jury Committee

17:20 – 18:00

Awards Presentation
Ceremony

18:00 – 18:10

Closing Performance

18:10 – 18:20

Closing Remarks

18:20 – 19:30

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #IndoSec Newsletter