Information Security
Summit Asia
Supporting Partners
ABOUT INFORMATION SECURITY SUMMIT ASIA
Editions
MEETING CONCLUDED
SPONSORS
SPEAKERS
Why Indonesia
Indonesia is one of the growing economies, with expanding IT infrastructure investment and rising smartphone and internet adoption.
By embracing digital technology, Indonesia can increase its economic growth by US$150 billion or 10% of its Gross Domestic Product, by 2025.
With the region’s expanding internet penetration, the usage of cybersecurity solutions is projected to increase.
By 2025, Indonesia will reach US$ 39 billion at a growing rate of 14.1% by investing in security-related products and services.
Indonesia faced more than 11 million cyber attacks in the first quarter of 2022. However, the number of cyber attacks in the first quarter of 2022 fell 2% compared to the fourth quarter of 2021.
The National Cyber and Crypto Agency (BSSN) has prepared the National Cyber Security Strategy Concept as an integral part of national security in response to the developments in technology.
The Goal of the national cybersecurity strategy is to realize cybersecurity, protect the national digital economy system, as well as improve cybersecurity strength and capability.
Indonesia's CyberSecurity Market
204.7 million
22%
14.1%
$ 3.39 billion
Why Sponsor ?
Pre-Qualified Leads
Connect with 120+ influential industry leaders empowered to make impactful decisions for their businesses.1:1 Meetings
Guaranteed one-to-one meetings with potential clientsProduct Showcase
showcase your organization’s expertise and enhance your brand exposure.Brand amplification
Be seen as a visionary tech leader through associating your brand with this summitSpeed Networking
Engage in dynamic and efficient networking to expand your professional connections.Past Speakers
Why Attend ?
Learn & Grow
Explore the Latest Innovations in Digital Solutions
Collaborative Partnerships
Connect with Trusted Technology Partners
Maximized ROI
Featured Discussions
IoT on the Fast Lane: Navigating the New Era with 5G Networks and the Unveiled Risks.
- On the diverse applications and benefits of IoT in a 5G-enabled environment.
- The unique cybersecurity challenges introduced by the extensive use of IoT devices in a 5G network.
- The role of edge computing in enhancing security for IoT devices in a 5G network.
- Incident response and recovery plans tailored for the unique challenges of 5G-enabled IoT environments.
- Strategies for fostering innovation in IoT while maintaining a strong security posture.
Efficiency through Automation - Exploring Seamless Integration in Digital Systems.
- The current state of automation technologies.
- Potential roadblocks and how to overcome them.
- The advantages of achieving seamless integration in digital systems.
- The importance of breaking down data - silos for effective integration.
- How to foster collaboration between automated systems and human workers.
- How to ensure compliance with industry regulations while implementing automation.
- Strategies for continuous improvement in automation processes.
Unveiling the Power and Potential of Artificial Intelligence.
- Leveraging AI for advanced threat detection and proactive cybersecurity measures.
- How AI accelerates incident response and digital forensics.
- Machine learning algorithms to detect unusual patterns and anomalies in network behavior.
- Integrating AI with SOAR platforms to streamline cybersecurity workflows.
- Optimizing SOC operations through AI for real-time threat monitoring.
- Legal and regulatory frameworks governing the use of AI in cybersecurity.
Beyond the Password: Navigating the Future with Multi-Factor Authentication.
- Tailoring MFA strategies to suit the diverse needs of organizations.
- Role of biometrics, smart cards, and other innovations in enhancing authentication.
- Balancing security with a seamless user experience in MFA adoption.
- Effectiveness against phishing, credential theft, and other common attack vectors.
- The challenges and opportunities in securing decentralized and remote work environments.
- Innovations that will shape the future of cybersecurity in Jakarta and beyond.
JOB TITLES
- Chief Information Security Officers
- Chief Information Security Risk Officers
- Chief Information Officers
- Data Protection Officer
- Director / President / Vice President of IT Security
- Head of Cyber Security
- Head of IT & OT Security
- Head of IT Infrastructure
- Head of Data Governance
- Head of Cloud Security
- Head of Technology Risk
INDUSTRY FOCUS
Past Partners
Keynote Partners
Networking Partner
Media Partners
Past Partners
WHAT CLIENTS SAY
Testimonials
MEDIA COVERAGE
Upcoming Events
Redefining Success for Over 14 Years with Tailored Solutions and Limitless Possibilities!
With a name that embodies triumph, Exito is not just a business solutions company; it’s a visionary force dedicated to shaping bespoke solutions and forging new pathways across diverse industries. For over 14 years, we have proudly orchestrating remarkable B2B events worldwide & cultivated a profound connection with the global tech industry, propelling innovation and driving growth. Our passion lies in crafting immersive platforms that generate untapped business opportunities for our esteemed clients.