|08.30am||Registration with Morning Refreshments | Viewing of Technology Showcases|
|09.40am||Keynote Presentation: The Evolving Threat Landscape
Gildas Deograt Lumy, Coordinating Ministers for Politics, Justice & Security Republic of Indonesia
|10.05am||Gaining Visibility & Control: Securing Your Organisation from Internal and Outsider Attacks
Controlling and monitoring privileged access is extremely important to mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements. But security and IT leaders have to walk a fine line between protecting the organization’s critical data to ensure business continuity, and enabling users and administrators to be productive.
Ho Nam Hoebeke, Channel & Strategic Alliance Director APAC, BeyondTrust
|10.35am||Future of Application Protection
Web applications are both crucial to the operations and customer service of many organizations and particularly vulnerable to the Application and DDoS attacks occurring with such prevalence today. Attacker groups understand that preserving application availability is a high priority for most organizations because availability influences application revenue, and therefore any reduction in the quality of service can reduce revenue as well as damage the organization's reputation.
Detecting attack is the first step to mitigating it and preserving application availability. When trying to determine whether an application is under attacks, any change in the behavioral characteristics of the application should be taken under consideration, because combining information such as access and response rates can give us clear view of the state of the application.
Ian Wijaya, F5 Senior Solution Consultant, Indonesia
|11.05am||Coffee Break | Viewing of Technology Showcases|
|11.25am||Addressing Compliance and Emerging Security Threats
Organizations today face increasing regulatory and compliance issues from nation and state levels to ensure the network and security infrastructure is continuously monitored and overall risk is reduced to an acceptable level.
This presentation will highlight the problematic issues surrounding continuous security in today’s market, along with the need to comply to various regulations, and how Tenable solutions has helped organizations across the world gain control and full visibility of their networks and security program to address these challenges.
Kannan Velayutham, Consulting Engineer, Tenable
|11.55pm||Learn how SolarWinds is changing the way IT professionals monitor and manage IT infrastructure
Learn how SolarWinds is changing the way IT professionals monitor and manage IT infrastructure with unexpected simplicity. During this interactive discussion, you will learn about SolarWinds top products, discuss new features and gain insight from real market use cases. The following product will be discussed:
Michael Widjaja, Senior Consultant, SolarWinds
|12.25pm||Lunch | Viewing of Technology Showcases|
|01.25pm||Quiz & Games | Lucky Draws|
|01.30pm||The Future of Cloud, Network and Cybersecurity Starts Here
Every year, record levels of money are spent on new IT security technology, yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It's time to rethink IT security – not just the technology, but the way it’s approached from a strategic, architectural perspective. There are ways to build a comprehensive set of defences – a security architecture – that can not only discourage attackers, but actually prevent data breaches.
Palo Alto Networks raises the bar by releasing PAN-OS 8.0 which offer unified security architecture for both private and public cloud, and many innovations such as, Cloud security for SaaS application, Multi-Method Threat Prevention, Credential Theft Prevention, new Hardware Platforms, improved VM-series performance.
Yudi Arijanto, Lead Solutions Architect, Palo Alto Networks Indonesia
|02.00pm||BlueCat Enterprise DNS Solutions
Today’s typical large enterprise uses inadequate and limited DNS implementations, forcing them to maintain an environment that relies on manual processes that often lead to errors, complexity, poor visibility, and an insecure environment that is almost impossible to properly service or grow. BlueCat transforms network infrastructures, empowering IT to move the organization forward. BlueCat is the leader in Enterprise DNS, with a software-centric approach to solutions that enables the centralization and data management of DNS, the automation of DNS and leverages DNS data for significantly increased values for business.
Muhammad Heidir, Technical Sales Manager, South East Asia, BlueCat
|02.30pm||Connected Threat Defense with X-GEN
X-Gen Approach to Tackle Modern Cyberattack in a Connected Platform Across Multiple Defenses
Teguh Wilidarma, Presales Consultant, Trend Micro
|03.00pm||Networking with Refreshments | Viewing Technology Showcases|
|03.45pm||Grand Lucky Draws | Event End|
© Copyright 2017. WestconGroup, Inc. All Rights Reserved.