Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.



411 University St, Seattle, USA


+1 -800-456-478-23

19th Edition

Information Security
Summit Asia

Ramping Up Cyber Security in Indonesia


The Information Security Summit Asia is an invitation-only in-person event exclusive for cybersecurity leaders from leading businesses, institutions and Government representatives in Asia. The Summit, will discuss the need for adopting policies and strategies towards a proactive cybersecurity approach; the various tech-disruptions in cybersecurity for overcoming new risks inherent in digital businesses, and incorporating a culture of information security in all institutions and organization
At the Information Security Summit Asia, you will hear from the top security experts on strategy, action plans and best practices to build resilient and risk-averse digital enterprises. The summit will have panel discussions, round-tables, industry keynotes and solution showcases that will enable security leaders to chart out the optimal strategic path.
Attended by 150+ CISOs, CIOs, heads of digital transformation, IT infrastructure, cyber security, information and communication technologies and other experts in this domain, the platform will equip you with the essential tools to risk-proof your businesses.

Why Sponsor ?

  • PRE-QUALIFIED IT HEADS : Meet with the IT and Cybersecurity decision-makers from the leading enterprises who have been prequalified with a questionnaire to assess their business’s bandwidth and budget.
  • PRIOR NOTIFICATION : A database of confirmed buyers with their names, contact information, and requirements will be sent 5 days before the event so that you can cherry pick the ones who are interested in your offerings.
  • DEDICATED ACCOUNT MANAGER : Facilitating and enabling one to one pre scheduled meetings at the event.
  • WISHLIST : Please share your preferred list of targeted clients, and we will invite them to the event to assist you in meeting with them.
  • ONE TO ONE MEETINGS : Guaranteed meetings with your preferred IT decision-makers at the event.
  • SPEAKING SLOT : Address the entire audience about your offerings and solutions.
  • SPEED NETWORKING : A fun networking activity is the best and quickest way to connect with every buyer and exchange business cards.
  • BRANDING : Visibility and brand positioning are done through collaboration with the most powerful and influential media outlets, as well as branding before, during, and after the event.
The APAC cybersecurity market was valued at USD 30.45 billion in 2019, and it is expected to register a CAGR of 18.3% during the period of 2021-2026. The adoption of cybersecurity solutions is likely to grow with the increasing penetration of the internet into developing and developed countries. Additionally, the expanding wireless network for mobile devices has increased the vulnerability of data, making cybersecurity an essential and integral part of every organization. regional investment in security-related products and services growing at a rate of 14.1% (CAGR), with spending expected to reach US$ 39 billion by 2025.

Past Speakers

Obrina Candra

Head of Cyber Security Department
National Cyber and Crypto Polytechnic, Badan Siber dan Sandi Negara (BSSN)

Ivan Irawan

IT Director
Kredit Biro Indonesia Jaya (KBIJ)

Wilbertus Darmadi

Toyota Astra Motor

Jude Kannabiran

Vice President APJ (Asia)

Juan Kanggrawan

Head of Data Analytics & Digital Product
Jakarta Smart City

Ivan Irawan

IT Director
Kredit Biro Indonesia Jaya (KBIJ)

Edmund Situmorang

Managing Director & Head of AI
TechConnect Academy (Sinarmas Group)

Teddy Mantoro

Sampoerna University

Aston Nugroho

Industrial IoT Consultant and Secretary General
Automation Indonesia

Benny Jioe

Head of Digital Transformation
PT Zurich Asuransi Indonesia Tbk

Setiawan Hermanto

AVP of IT Security
PT Tokopedia

Gangga Sunu Diwangkara

Security Solution Engineer

Calvin Ho

Country Manager

Shitalkumar R Sukhdeve

Senior Data Scientist
Smartfren Telecom

Rhezandra Priatama


Jude Kannabiran

Vice President APJ (Asia)

Agus Pracoyo

Deputy Information Security and Compliance
Smartfren Telecommunication Tbk

Ichwan Peryana

Pinjam Modal

Antonius Ruslan

VP - Information Security & Data Privacy

Rajesh Grover

Group VP- Digital and Omnichannel
Kanmo Group

Why Attend ?

  • Brilliant Content : In-depth, trend-forward sessions – with tons of practical takeaways and ideas to keep you ahead in the IT security space.
  • Brilliant Speakers : Gain in-depth guidance from expert speakers on fine-tuning your IT security and risk management and the industry best practices.
  • Continued Learning : Gain access to speaker presentation slides and recordings, for your company to reference and use in your marketing and business initiatives, year-round.
  • Connections : Hundreds of seasoned cyber security experts, strategists, risk managers, data heads, marketers, and more to mingle and connect with. Meet your customers, vendors, expert resources, friends and colleagues of tomorrow.
  • Showcase of Technology solutions against Cyber Threat : Gather practical perspectives from many real-world use-cases shared by the market’s leading players, including early adopters and leaders from across the region.
  • Network with leading solution providers : As a delegate, you will experience cutting-edge technology from solution providers from around the world that can fulfil your business requirements.

Featured Discussions

Enforcing Disruptive Technology to gain confidence in the multi-cloud space
  • Balancing cyber security & regulatory compliance in today's hybrid cloud environment
  • Adopting a multi cloud strategy & securing the future in a multi cloud environment
  • Enhancing user access control mechanism with cloud IAM (Identity access management) and PAM (privileged access management)
  • Adoption to Understanding: AI/ML in strategies involved in cloud and cyber security
  • Securing Cloud Infrastructure with Cloud Security Posture Management
Overcoming Cybersecurity Hurdles with Artificial Intelligence
  • Use of Cyber AI in detection of fraud and improving overall Network security to prevent data breaches
  • How is Autonomous Cyber AI revolutionizing cyber defence against future AI attacks?
  • How Cyber AI can protect the Dynamic workforce?
  • How do we ensure that AI is designed and used responsibly?
  • Using artificial intelligence and machine learning to help track user access
Fortifying Business With Zero Trust Security Model
  • Build and implement zero trust security frame work
  • Use zero trust security to go beyond perimeter-centric view of security and improve user authentication
  • How network wide visibility is becoming a determining factor for zero trust security?.
  • How can a zero trust architecture be used in building security transformation in a cloud-ready environment?
Building Cybersecurity Immunity- Ransomware Strategy Plan, Prevention and Response
  • Building an active ransomware defence to prevent recurrence and anticipate new and evolving threats
  • How to secure IoT environments against ransomware
  • How to take advantage of the power of the cyber kill-chain to stop ransomware
Adoption of Threat Intelligence: Making organisations safer with Threat Management
  • Common challenges and approach to enterprise security optimization
  • Threat Hunting and incident response tactics: Advanced skills to hunt, identify, counter & recover from threats
  • Open sourcing threat intelligence to tackle cyber threats
  • How IT Leaders are combatting ransomware attacks and what solutions they are coming up with?
Fortifying Endpoint security solution and Ensuring Compliance
  • Use of End point Security to overcome the cyberthreats caused by hybrid workforce
  • Evolving endpoint security for a hybrid working future.
  • How to close the gap between IT and security with integrated end-to-end remediation.
  • How to use integrated end point security to improve security and stop zero-day malware



BFSI & Fintech
Logistics & Supply Chain
Ecommerce & Retail
Oil & Gas

Partners 2022

Supporting Partner

Gold Partners

Keynote Partners

Silver Partners

Bronze Partner

Media Partners

Past Partners

  • With a meticulously curated agenda, the Digital Transformation Summit brings you engaging panel discussions, inspiring keynote sessions, and insightful case-studies relevant to your specific challenges
  • Digital Transformation Summit is designed to give you a fulfilling event experience through its seamless networking and meeting options.
  • The event will house renowned solution providers who will showcase their digital capabilities to support your digital roadmap
  • A great mix of industry experts sharing their transformation stories; highlighting their setbacks and success
  • Be an active part of crucial discussions pertaining to digitization of various business value chains
  • Hear from industry veterans, luminaries and early adopters who will share the best practices, case studies and transformation stories
  • Discuss the integrated approach needed to tackle the critical infrastructure requirements
  • Understanding the competitive dynamics of technology
  • Learn a systematic framework for evaluating, experimenting with, and prototyping your ideas
  • Network with industry leaders and peers in innovative virtual formats
  • Explore the latest technology solutions that can empower your organization to overcome challenges and expand your capabilities


Emilia Clarke
Jay Chavez
( Chief Operating Officer), Ionics EMS Inc
I found the event very insightful and learnt a lot especially on the case studies in different industries.
Emilia Clarke
Sandy R
IT Development Leader (Section Head) Astrido Group
It was a great opportunity to meet executives from many countries and glad to have insights about technologies used in various companies.

Upcoming Events

(CONSENT) I provide my consent to Exito to send me latest updates via email/Telegram/Whatsapp with information related to their events and activities
Copyright © 2022 Exito Media Concepts.
digital transformation summit_phone icon image