Join us at the CISO Leaders Indonesia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
26th October 2023, Grand Hyatt Jakarta
Join us at the CISO Leaders Indonesia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
26th October 2023, Grand Hyatt Jakarta
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Indonesia.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the CISO Leaders
Indonesia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
24TH OCTOBER 2023, GRAND HYATT, JAKARTA

Join the gathering

ABOUT THE EVENT

The upcoming CISO Leaders Indonesia Summit 2023 will bring together over 120 of the country’s leading CISOs, Heads of IT Security, Cyber Security and CIOs on the 26th of October at the Grand Hyatt Jakarta.

This years theme will be focused around 'Cybersecurity Modernisation with a Threat-Informed Defence' where we will have over 15 presentations, workshops and roundtables taking place over the day.

Our attending audience will have the opportunity to personalise their own agenda and maximise their time out of the office by engaging in only the most relevant sessions for their business.

We also invite you along to our official networking drinks where you will have the opportunity to interact and catch up with your peers in a very relaxed setting.

SPEAKERS

Wibawanto Nugroho Widodo
plus

Wibawanto Nugroho Widodo

Deputy Head of Defense and Security; Director of International Programs, Assistant Professor, IKAL Strategic Center, DIP Institute, Universitas Pelita Harapan

Hariadi
plus

Hariadi

Chief Operating Officer & Chief Digital Officer, POS Indonesia

Edmund Situmorang
plus

Edmund Situmorang

Group Chief Technology Officer, Asian Bulk Logistics

Ivan Irawan
plus

Ivan Irawan

Director of IT, Credit Bureau Indonesia

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration and Morning Refreshments

75min

Master of Ceremonies

Chief Research Advisor, Focus Network

5min

Opening Keynote Presentation: Voice of the CIO & CISO Indonesia

This presentation will provide an overview of the current state and latest trends for Chief Information Officers (CIOs) and Chief Information Security Officers (CISO’s) in Indonesia to look out for in 2023. Drawing on the latest industry research and analysis by Focus Network analysts, the presentation will explore the key trends and challenges facing CIOs, CISO’s as well as the emerging technologies and opportunities that are shaping the role.

  • The evolving role of the CIO in today's business landscape
  • The impact of digital transformation on CIOs and their organisations
  • The challenges of managing cybersecurity and data privacy in an increasingly complex threat landscape
  • The emergence of new technologies, such as cloud computing, AI, and IoT, and their potential impact on CIOs and their teams
  • Strategies for staying ahead of the curve and driving innovation in the CIO role

20min

Keynote Panel Discussion: Mitigating Ransomware Risk.

Panellists:
Makhadir Mukhamad, Head Of IT & Digital Risk, Bank Tabungan Negara (Persero), Tbk
Indra Adillah, Head of ICT, PT Indonesia Airasia
Andri Purnomo, Chief Information Security Officer, DANA
Raditio Ghifiardi, Vice President - Head of IT Security & Compliance, PT Smartfren Telecom

For today’s businesses, success means being data-driven. Generating value from vast amounts of data, engendering innovation and having agile and scalable business models necessitates the use of cloud technologies wherever possible. But adoption of new technologies creates risk which must be managed.

Cybersecurity postures need to be transformed to ensure that enterprises have visibility across expanded attack surfaces and are able to minimize the damage caused by breaches. This session will discuss accelerated adoption of new technologies as businesses rapidly digitalize, as well as the new cybersecurity risks that are created. We will also discuss the best ways to manage these risks to build resilience into your organisation.

35min

Makhadir Mukhamad

Experience and expertise in the field of IT Audit, IT GRC and Cyber Security. Having experience in any Financial Industry both local and [...]

Indra Adillah

Indra has a demonstrated track record of success in completing revolutionary initiatives and is a very passionate cybersecurity specialist. Indra [...]

Andri Purnomo

  Specialties: • Risk Management: Certified Risk Management Professional (CRMP), Enterprise Risk Management Professional (ERMCP) • [...]

Raditio Ghifiardi

  20 years+ Experience in IT & Cyber Security, Senior-level IT professional with telecom & banking experience and proven track [...]

Keynote Presentation: AI-Powered Threat Intelligence: Enhancing Cybersecurity Defense.

Edmund Situmorang, Group Chief Technology Officer, Asian Bulk Logistics

Synopsis coming soon.

 

30min

Edmund Situmorang

Edmund Situmorang as the Group Chief Technology Officer of ABL, has over 15 years of senior management experience in multiple businesses across [...]

Networking Break

15min

1-1 Business Meeting

30min

Roundtable Discussion: Shared Responsibility In The Cloud.

Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.  Key discussion point in this roundtable are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer. 

30min

Roundtable Discussion: Modernising Cyber Operations With AI And ML.

SOCs are becoming overwhelmed with alerts, many of which are false positives. The modern SOC needs to fully leverage automation and AI to detect and respond to threats in the most efficient way. This roundtable with discuss how and why today’s SOCs are overwhelmed and how automating SOCs and using AI are essential.    Key discussion points will include, managing the growing number of false positives and using AI and ML to detect and respond to threats.  

30min

Roundtable Discussion: Policy As Code And Application Security.

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.     Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

1-1 Business Meeting

30min

Roundtable Discussion: Shared Responsibility In The Cloud.

Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.    Key discussion point in this roundtable are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer. 

30min

Roundtable Discussion: Modernising Cyber Operations With AI And ML.

SOCs are becoming overwhelmed with alerts, many of which are false positives. The modern SOC needs to fully leverage automation and AI to detect and respond to threats in the most efficient way. This roundtable with discuss how and why today’s SOCs are overwhelmed and how automating SOCs and using AI are essential.    Key discussion points will include, managing the growing number of false positives and using AI and ML to detect and respond to threats.

30min

Roundtable Discussion: Policy As Code And Application Security.

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.     Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

Speaking Session: The New Threat Landscape: The Cyber Physical World.

Intan Rahayu, Director of Cyber Security and Cryptography for Industrial Sector, National Cyber and Crypto Agency (BSSN)

Attacks on critical infrastructure have highlighted the vulnerabilities that emerge as operational technology converges with information technology. Greater digitalisation of the physical world combined with edge computing and new IoT technologies are accelerating the pace of this convergence. 

This presentation will discuss the blending of information technology with operational technology and the new threats that this brings, particularly with reference to critical infrastructure. 

Key takeaways will include an explanation of the types of vulnerabilities that operational technology presents and the best practices in mitigating the risk of attacks on operational technology.

30min

Networking Lunch

40min

Speaking Session: Moving Beyond Prevention to Proactive Defence.

Volvin Irawan, IT Security Head, OCBC NISP Bank
Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated. Key discussion points in this presentation include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach.  

30min

Volvin Irawan

Volvin Irawan is currently accountable for leading the IT Security functions in one of the top 10 Indonesian Bank; in which the team is [...]

Speaking Session: Unleashing the Power of Zero Trust for Next-Level Security.

Zero trust architecture is a game-changing approach to enhance your company's security maturity. In this session, we will explore the core principles and components of zero trust, challenging traditional security models in the face of evolving cyber threats and data breaches.Discover how zero-trust architecture redefines trust, focusing on explicit verification rather than blind faith. We'll delve into granular access controls, multifactor authentication, and behavior-based analytics that form the foundation of zero trust, ensuring every access request is meticulously scrutinized, regardless of user location or network environment.Drawing on real-world examples and industry best practices, we'll explore the benefits and challenges of implementing zero trust. Uncover strategies for success

30min

Keynote Speaking Presentation:

20min

Networking Break

15min

Keynote Panel Discussion: Addressing Diversity and Digital Skills Deficiency in a Rapidly Changing Future.

Panellists:
Edisono Limin, Executive Director, Country Head of Channels and Digitalisation, UOB Indonesia
Widianty Oey, Head of Business Solution, PT Kalbe Farma Tbk
Rajesh Grover, Group VP - Digital and Omnichannel, Kanmo Group
Juan Kanggrawan, Head of Data, Research, Digital Product, Jakarta Smart City

Businesses need to have access to the right technology and skills in order to succeed now more than ever. After all, digital tools and technology are now necessary for any global business to be successful. However, there is a "digital skills gap" that many businesses have to deal with because they can't find skilled professionals who have the right knowledge and experience with new technologies. As a result, businesses are at a competitive disadvantage as they struggle to bridge the skills gaps between their current workforce and the digital economy's requirements.

Key discussion points in this panel will touch on how to maximise the power of technology by leveraging on trained and capable digital talents, understanding how diversity help business transform and innovate, discovering new business opportunities by having a diverse voice and how citizen-led automation can optimize and support digital transformation strategy.

30min

Edisono Limin

He joined UOB Indonesia in 2013 and currently serves as the Country Head of Channels & Digitalisation. He has more than 23 years of [...]

Widianty Oey

Widianty is Digital Technology professional with comprehensive 15++ years of exposure in business, product and technology, especially in [...]

Rajesh Grover

  An entrepreneur at heart with over 20 years of experience across various industries ranging from FMCG, Retail, CPG, Consumer [...]

Juan Kanggrawan

Analytics, product management, technocrat & business strategy professional with comprehensive 15++ years of exposure in business, government [...]

Closing Keynote Presentation: National Cyber Policy and Strategy.

Wibawanto Nugroho Widodo, Deputy Head of Defense and Security, Director of International Programs, Assistant Professor, IKAL Strategic Center, DIP Institute, Universitas Pelita Harapan

Indonesia’s (RI) cybersecurity is the significant factor for the achievement of Asia Pacific’s overall security, stability, and development. That said, the very pressing agenda for the Indonesian cybersecurity is the existence of RI cyber policy and strategy as the very foundation for the creation of RI cybersecurity, cyberpower and cyber capability involving governmental, industrial-business, academia, and community actors.

20min

Wibawanto Nugroho Widodo

  Deputy Head of Defense and Security Affairs at RI National Resilience Institute Alumni Association’s Strategic Center (IKAL Strategic [...]

Closing Remarks from the Chair and End of Forum

5min

Networking Drinks

60min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

ROUNDTABLE
DISCUSSIONS

Allowing both buyers and sellers the opportunity to engage together onsite as one via a range of targeted sessions . These provide both parties a great opportunity to build new relationships and get greater insights into one another's needs and capabilities.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable or panel discussion.

NETWORKING
LUNCH

Interact and relax amongst your peers at the Networking lunch where you will have the opportunity to be part of the entertainment.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming CISO Leaders Summit Indonesia on the 26th of October 2023, please purchase your tickets below

1 Ticket

USD $1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

USD $1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

USD $1470

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

Meet leading IT Security executives from Indonesia's strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Indonesia.

''Great event !!! Always looking forward to the next one. Well done to the Speakers and organizers! Very professionally done…'

 

– EMERY OLEOCHEMICALS

'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

 

– GENESYS

'Overall great experience meeting all the CIO’s and having the chance to talk and understand current ongoing topics within their environment'

 

– ALLIANZ PARTNERS

“This is one of the better events that I've been to in terms of the content. There's been a good amount of challenge sharing and practical examples that I was able to connect to. I've had conversations that I will follow up on and have already scheduled a catch up for next week from one of my one to one meetings.”

 

– OLAM INTERNATIONAL

PLATINUM SPONSOR

GOLD SPONSORS

BRONZE SPONSOR

BECOME A SPONSOR

OUR PARTNERS

Grand Hyatt Jakarta
Jalan M. H. Thamrin Kav. 28-30, Jakarta,
Indonesia
Telephone: +62 21 29921234
Website: Click here

More Information

REGISTER YOUR INTEREST

Copyright 2023 ©Focus Network. All rights reserved