3
DAY 1 (25th AUG,2020) AGENDA 25 - 26 August 2020 | 09:00 AM - 01:00 PM TOPICS Welcome Address by Tradepass Opening speech Co-partner, BeyondTrust Universal Privilege Management – Securing Today's Expansion of Privilege Universe Ÿ Why is Identity Governance foundational to your security program Ÿ The impact of Covid-19 on the Cyber Security Market Ÿ Does Working from Home Create New Cybersecurity Threats? Ÿ Securing the Future in a Multi-cloud Environment Ÿ The Rise of Cloud Security Risks During the Coronavirus Pandemic NETWORKING BREAK Digital Forensics- Advancing Solutions for Indonesia's Escalating Cybercrime Ÿ The Appliance for Digital Investigation and Analysis Ÿ How to Maintain Security when Employees work Remotely Bpk. Anton Setiawan, Director of Digital Economy Protection, BSSN Cybersecurity and Coronavirus: Keeping your Business Safe Ÿ How Cybercriminals are Exploiting Public Fear of Rising COVID-19 Ÿ How to Stay Safe from Cyber-attacks During the Pandemic Rudi Lumanto, Chairman, CSIRT.ID Ÿ Work from Anywhere. Cyber Everywhere. Ÿ How to Build a Secure Remote Work Environment Ÿ Monitor your Privileged Accounts using Technology Leny Suwardi, Cyber Risk Leader, Indonesia, Deloitte Hisashi Ohta, Cyber Risk Director, PAM practice lead for SEA, Deloitte Ÿ How to Secure your Crown Jewel The Importance of Identity in a Zero Trust Environment Ÿ What is Identity Governance Ÿ How can you leverage Identity Governance to accelerate your zero trust initiative Grady Summers, Executive Vice President, Solutions and Technology, SailPoint Technologies Cloud with Confidence Ÿ Rise of the Adoption of Cloud in Indonesia - Impact on Cybersecurity Gary Gardiner, Head of Security Engineering, APAC, Check Point Software Technologies Ÿ The importance of Digital forensics in Cybersecurity Ÿ Making Digital Forensics a Critical part of your Cyber security Defences How COVID-19 Changed the Cyber-threat Landscape Ÿ How has COVID-19 changed how we implement Cyber-security? Ÿ What can we do to Protect ourselves in an Ongoing Pandemic world? Ÿ Digital Forensics and the Important Aspects of Data Recovery Ÿ How Cyber-threats have changed to take advantage of COVID-19? Guy Rosefelt, Director, International Product Marketing, Sangfor Dig Deeper: Acquisition and Analysis of AWS Cloud Data Ewaldo Simon, Digital Forensics Investigator, Directorate General of Taxes Ÿ How to Accelerate your internal investigations across Amazon Web Services with the Acquisition of S3 Buckets and EC2 Instances Ÿ How Examiners can Acquire these Remote Systems and Analyze the Contents alongside other Evidence items related to the investigation Ÿ How Forward-thinking Labs can scale up their Existing Resources and Processes with the Power of Orchestration and Automation in both Cloud and Hybrid Environments Trey Amick- Manager of Forensic Consultants, Magnet Forensics TIME 09:00 – 09:15 09:15 – 09:30 09:30 - 10:00 10:00 – 10:30 10:30 – 11:00 11:00 – 11:30 11:30 – 11:45 11:45 – 12:15 12:15 – 12:45

DAY 1 (25th AUG,2020) - IndoSec Summit AGENDA.pdfHana Abriyansyah, VP and Head of Information Security, Gojek MITRE ATTACK 2020 What the Results Really Mean to the CISO & SOC Moderator:

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

  • DAY 1 (25th AUG,2020)

    AGENDA25 - 26 August 2020 | 09:00 AM - 01:00 PM

    TOPICS

    Welcome Address by Tradepass

    Opening speech

    Co-partner, BeyondTrust

    Universal Privilege Management – Securing Today's Expansion of Privilege Universe

    Ÿ Why is Identity Governance foundational to your security program

    Ÿ The impact of Covid-19 on the Cyber Security Market

    Ÿ Does Working from Home Create New Cybersecurity Threats?

    Ÿ Securing the Future in a Multi-cloud Environment

    Ÿ The Rise of Cloud Security Risks During the Coronavirus Pandemic

    NETWORKING BREAK

    Digital Forensics- Advancing Solutions for Indonesia's Escalating Cybercrime

    Ÿ The Appliance for Digital Investigation and Analysis

    Ÿ How to Maintain Security when Employees work Remotely

    Bpk. Anton Setiawan, Director of Digital Economy Protection, BSSN

    Cybersecurity and Coronavirus: Keeping your Business Safe

    Ÿ How Cybercriminals are Exploiting Public Fear of Rising COVID-19

    Ÿ How to Stay Safe from Cyber-attacks During the Pandemic

    Rudi Lumanto, Chairman, CSIRT.ID

    Ÿ Work from Anywhere. Cyber Everywhere.

    Ÿ How to Build a Secure Remote Work Environment

    Ÿ Monitor your Privileged Accounts using Technology

    Leny Suwardi, Cyber Risk Leader, Indonesia, Deloitte

    Hisashi Ohta, Cyber Risk Director, PAM practice lead for SEA, Deloitte

    Ÿ How to Secure your Crown Jewel

    The Importance of Identity in a Zero Trust Environment

    Ÿ What is Identity Governance

    Ÿ How can you leverage Identity Governance to accelerate your zero trust initiative

    Grady Summers, Executive Vice President, Solutions and Technology, SailPoint Technologies

    Cloud with Confidence

    Ÿ Rise of the Adoption of Cloud in Indonesia - Impact on Cybersecurity

    Gary Gardiner, Head of Security Engineering, APAC, Check Point Software Technologies

    Ÿ The importance of Digital forensics in Cybersecurity

    Ÿ Making Digital Forensics a Critical part of your Cyber security Defences

    How COVID-19 Changed the Cyber-threat Landscape

    Ÿ How has COVID-19 changed how we implement Cyber-security?

    Ÿ What can we do to Protect ourselves in an Ongoing Pandemic world?

    Ÿ Digital Forensics and the Important Aspects of Data Recovery

    Ÿ How Cyber-threats have changed to take advantage of COVID-19?

    Guy Rosefelt, Director, International Product Marketing, Sangfor

    Dig Deeper: Acquisition and Analysis of AWS Cloud Data

    Ewaldo Simon, Digital Forensics Investigator, Directorate General of Taxes

    Ÿ How to Accelerate your internal investigations across Amazon Web Services with the Acquisition of S3 Buckets

    and EC2 Instances

    Ÿ How Examiners can Acquire these Remote Systems and Analyze the Contents alongside other Evidence items

    related to the investigation

    Ÿ How Forward-thinking Labs can scale up their Existing Resources and Processes with the Power of Orchestration

    and Automation in both Cloud and Hybrid Environments

    Trey Amick- Manager of Forensic Consultants, Magnet Forensics

    TIME

    09:00 – 09:15

    09:15 – 09:30

    09:30 - 10:00

    10:00 – 10:30

    10:30 – 11:00

    11:00 – 11:30

    11:30 – 11:45

    11:45 – 12:15

    12:15 – 12:45

  • AGENDA25 - 26 August 2020 | 09:00 AM - 01:00 PM

    NextGen Approach to Digital Identities & Vaults with ARCON

    Hana Abriyansyah, VP and Head of Information Security, Gojek

    MITRE ATTACK 2020 What the Results Really Mean to the CISO & SOC

    Moderator: Ishak Surjana, CIO, Fajar Surya Wisesa

    Jan Tietze, Director Security Strategy EMEA, Sentinel One

    Phishing Attack Prevention: How to Identify & Avoid Phishing Scams

    NETWORKING BREAK

    Wildan Aliviyarda, Vice President - Head of Information Security Solution, Indosat Ooredoo

    Ÿ Implementation of End-to-End Security

    Ÿ The CISOs’ most pressing cybersecurity challenges

    Ÿ Common Mistakes made by many Organizations that Lead to Phishing Attacks

    Ÿ Lack of Employee Education

    Endo Priambodo, Head of Unit IV Sub Directorate III, Directorate of Cybercrime, BARESKRIM Polri (Criminal

    Investigation Board, Indonesian National Police)

    TOPICS

    Panel Discussion: Cyber Threats 2020 - How to Develop Intelligence and Stay Current in a Multi-risk

    Environment?

    Ÿ What Emerging Cyber-threats will we Face in the next 10 years?

    Rajesh Ganesan, VP of Product Management, ManageEngine

    Overview of Indonesia’s Cybersecurity Readiness

    Ÿ Overview of Indonesia’s cybersecurity readiness

    Ÿ How Prepared is Indonesia for Cyber-attacks?

    Juan Intan Kanggrawan, Head of Data Analytics, Jakarta Smart City

    Ÿ How Organizations can prepare for the Next Cybersecurity Threat

    Ÿ A Few Steps a Company can Take to Protect itself against Phishing

    When responding to cybersecurity incidents, the CISO and their Security Operations Center (SOC) have a lot of

    options at their disposal. The constant fight to ensure the confidentiality, integrity and availability of our

    organization's assets can make us miss critical insights into improvements that can have a drastic impact when

    timing is critical. In this talk we will discuss the time it takes to adequately respond to threats and factors that can

    affect it, factors that influence it, and ultimately, how it can be improved

    Ÿ Evolving Cybersecurity Threats, Protection and Counter Measure Strategies

    Welcome Address by Tradepass

    Marsma TNI. Raja H. Manalu, Former Head of Cyber Defense Centre, Ministry of Defence (KEMHAN)

    Ÿ Various Phishing Techniques used by Attackers

    Ÿ Manage your vaults seamlessly

    Ÿ Monitor the behavior of any risky profiles

    Ÿ Secure your privileged ids for networking devices & IoTs

    Ÿ Converge your cybersecurity platforms for a better ROSI

    Anil Bhandari, Chief Mentor, ARCON

    The impact of COVID -19 on Cybersecurity in Indonesia

    Ÿ Challenges and threats during COVID-19

    Ÿ The Need for Collaborative Partnerships from Cybersecurity Ecosystem Businesses

    Ÿ Importance of Strengthening the information Security of Online Transactions

    Setiaji, Head of Department at ICT - Digital Services of West Java Province

    The Growing Importance of Cybersecurity Skills

    Ÿ Strategies to Help Employees become more Security Savy

    Ÿ Why Security Awareness Training is Important to every Organization

    Ÿ The Effectiveness and ROI of Security Awareness Training

    Muhammad Suhada, GM, Head of Tech & Dev at Blue Bird Group

    TIME

    12:45 –1:30

    09:00 – 09:15

    09:15 - 09:30

    09:30 – 10:00

    10:00 - 10:30

    10:30 - 11:00

    11:00 - 11:15

    11:15 - 11:30

    DAY 2 (26th AUG,2020)

  • AGENDA25 - 26 August 2020 | 09:00 AM - 01:00 PM

    TIME

    11:30 - 12:15

    Ÿ Cybercrime in the Digital age

    Ÿ The Benefits of Tools like Partner Authentication, Fraud and Risk Management, Behavioural Biometrics, Identity

    and Access Management (IAM)

    Billy Yosafat, Vice President of IT, Sicepat Ekspres

    Hans Iandy, Head of Compliance and Information Security, Sinar Mas Land

    TOPICS

    Panel Discussion: Enabling Exceptional Digital Experiences while Ensuring Security

    Wahyu Agung Prasetyo, Information Security Management Head, Bank Danamon

    Note of Thanks by Tradepass

    Ÿ The Need to invest in Cybersecurity

    Moderator: Ajay Biyani, Managing Director ASEAN, ForgeRock

    Ÿ Understanding the Risk Posture of a Person, Device, and Session