• Date
  • 4 May, Thursday
  • Location
  • Fairmont Jakarta
    Ballroom 1 & 2A
    Jl. Asia Afrika No.8, Gelora Bung Karno,
    Jakarta Indonesia 10270
  • Time
  • 8.30am to 4.30pm

    Keynote Speaker

    Attend to win


    Time Event Programme
    08.30am Registration with Morning Refreshments | Viewing of Technology Showcases
    09.30am Welcome
    09.40am Keynote Presentation: The Evolving Threat Landscape

    Gildas Deograt Lumy, Coordinating Ministers for Politics, Justice & Security Republic of Indonesia
    10.05am Gaining Visibility & Control: Securing Your Organisation from Internal and Outsider Attacks

    Controlling and monitoring privileged access is extremely important to mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements. But security and IT leaders have to walk a fine line between protecting the organization’s critical data to ensure business continuity, and enabling users and administrators to be productive.

    Ho Nam Hoebeke, Channel & Strategic Alliance Director APAC, BeyondTrust
    10.35am Future of Application Protection

    Web applications are both crucial to the operations and customer service of many organizations and particularly vulnerable to the Application and DDoS attacks occurring with such prevalence today. Attacker groups understand that preserving application availability is a high priority for most organizations because availability influences application revenue, and therefore any reduction in the quality of service can reduce revenue as well as damage the organization's reputation.

    Detecting attack is the first step to mitigating it and preserving application availability. When trying to determine whether an application is under attacks, any change in the behavioral characteristics of the application should be taken under consideration, because combining information such as access and response rates can give us clear view of the state of the application.

    Ian Wijaya, F5 Senior Solution Consultant, Indonesia
    11.05am Coffee Break | Viewing of Technology Showcases
    11.25am Addressing Compliance and Emerging Security Threats

    Organizations today face increasing regulatory and compliance issues from nation and state levels to ensure the network and security infrastructure is continuously monitored and overall risk is reduced to an acceptable level.

    This presentation will highlight the problematic issues surrounding continuous security in today’s market, along with the need to comply to various regulations, and how Tenable solutions has helped organizations across the world gain control and full visibility of their networks and security program to address these challenges.

    Kannan Velayutham, Consulting Engineer, Tenable
    11.55pm Learn how SolarWinds is changing the way IT professionals monitor and manage IT infrastructure

    Learn how SolarWinds is changing the way IT professionals monitor and manage IT infrastructure with unexpected simplicity. During this interactive discussion, you will learn about SolarWinds top products, discuss new features and gain insight from real market use cases. The following product will be discussed:

    PerfStack - Visualizing and correlate data to improve troubleshooting
    NetPath – Troubleshoot network performance issues for on-premise, hybrid, and cloud environments
    AppStack– Prevent system downtime with a single view into your entire application stack

    Michael Widjaja, Senior Consultant, SolarWinds
    12.25pm Lunch | Viewing of Technology Showcases
    01.25pm Quiz & Games | Lucky Draws
    01.30pm The Future of Cloud, Network and Cybersecurity Starts Here

    Every year, record levels of money are spent on new IT security technology, yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It's time to rethink IT security – not just the technology, but the way it’s approached from a strategic, architectural perspective. There are ways to build a comprehensive set of defences – a security architecture – that can not only discourage attackers, but actually prevent data breaches.

    Palo Alto Networks raises the bar by releasing PAN-OS 8.0 which offer unified security architecture for both private and public cloud, and many innovations such as, Cloud security for SaaS application, Multi-Method Threat Prevention, Credential Theft Prevention, new Hardware Platforms, improved VM-series performance.

    Yudi Arijanto, Lead Solutions Architect, Palo Alto Networks Indonesia
    02.00pm BlueCat Enterprise DNS Solutions

    Today’s typical large enterprise uses inadequate and limited DNS implementations, forcing them to maintain an environment that relies on manual processes that often lead to errors, complexity, poor visibility, and an insecure environment that is almost impossible to properly service or grow. BlueCat transforms network infrastructures, empowering IT to move the organization forward. BlueCat is the leader in Enterprise DNS, with a software-centric approach to solutions that enables the centralization and data management of DNS, the automation of DNS and leverages DNS data for significantly increased values for business.

    Muhammad Heidir, Technical Sales Manager, South East Asia, BlueCat
    02.30pm Connected Threat Defense with X-GEN

    X-Gen Approach to Tackle Modern Cyberattack in a Connected Platform Across Multiple Defenses

    Teguh Wilidarma, Presales Consultant, Trend Micro
    03.00pm Networking with Refreshments | Viewing Technology Showcases
    03.45pm Grand Lucky Draws | Event End