You are on page 1of 3

PROGRAMS

DAY 1 | THURSDAY - MARCH 29, 2012


EXHIBITION AREA TIME FOYER WANTILAN LEGIAN KAJA LEGIAN TENGAH LEGIAN KELOD OPEN CONFERENCE ROOM #1 ROOM #2 ROOM #3

08:00 09:00

Registration Keynote Speech: "The Security & Safety Technology: a Financial Industry Perspective"
Joseph F.P. Luhukay, PhD, Chairman of IT Dept of Indonesian Bank Association

09:00 09:30

Room : Wantilan 09:30 10:00 EXHIBITION "Social Engineering Taxonomy: the SCREAM Method"
Prof. Richardus Eko Indrajit, Chairman of APTIKOM

Coffee Break

10:00 11:00

Workshop 1: "Backtrack: Crash course on Penetration Testing"


James Baster Tamba & Zico Ferry Ekel, Indonesian Backtrack Team

Workshop 2: "Defending Privacy: Give Your Data Super Power"


Lance Gaines, Rune Information Security

Workshop 3: "Real Time IT Security Monitoring and Attack Analysis using SIEM and Honeypot"
Charles Lim (Honeynet Indonesia) Christian Riesaputra, (XecureIT)

11:00 12:00

Review on Cybersecurity Threat on Banking and Financial Assets


Mohammad Guntur (IT Bank Mandiri)

12:00 13:00 "Data Center Security Best Practices" Jan Wilem, EPI

Lunch Workshop 1: "Backtrack: Crash course on Penetration Testing"


James Baster Tamba & Zico Ferry Ekel, Indonesian Backtrack Team

13:00 14:00

14:00 15:00

"Disaster Recovery Lesson Learn from NTT CERT"


Itaru Kamiya, NTTCERT

Workshop 2: "Defending Privacy: Give Your Data Super Power"


Lance Gaines, Rune Information Security

Workshop 3: "Real Time IT Security Monitoring and Attack Analysis using SIEM and Honeypot"
Charles Lim (Honeynet Indonesia) Christian Riesaputra, (XecureIT)

15:00 15:30 "Internet Incident Response Strategy"


Budi Rahardjo, IDCERT

Coffee Break Workshop 1: "Backtrack: Crash course on Penetration Testing"


James Baster Tamba & Zico Ferry Ekel, Indonesian Backtrack Team

15:30 16:15

16:15 17:00

"Understanding Digital Theft : Back To Basic"


Achmad Ruli (Waseda)

Workshop 2: "Defending Privacy: Give Your Data Super Power"


Lance Gaines, Rune Information Security

Workshop 3: "Real Time IT Security Monitoring and Attack Analysis using SIEM and Honeypot"
Charles Lim (Honeynet Indonesia) Christian Riesaputra, (XecureIT)

17:00 17:30

Wrapup

19:00 21:00

Welcome Dinner (invitation only)

DAY 2 | FRIDAY - MARCH 30, 2012


EXHIBITION AREA TIME FOYER WANTILAN LEGIAN KAJA LEGIAN TENGAH LEGIAN KELOD OPEN CONFERENCE ROOM #1 ROOM #2 ROOM #3

08:00 09:00

Registration Keynote Speech: "Cyber Warfare Threat, the New Frontier"


Purnomo Yusgiantoro, HE Minister of Defense of Republic Indonesia

09:00 09:30

09:30 10:00 Sisfohanneg and Cyber Defence Initiative. 10:00 11:00


Marzan A. Iskandar (Chairman of BPPT)

Coffee Break

11:00 12:00

"Analyzing the Cyber Warfare Threat"


Bill Hagestad, Cyberwarfare Expert

Workshop 4: "Application Security Analysis and Testing",


Zaki Ahmad & Sakti Dwi Cahyono, IndoCISC

Workshop 5: "Network Forensics for International Incidents"


Mohammad Nuh, Indonesian Police Forensic Laboratory

Workshop 6: Securing the Cloud:


Juang Panjaitan & Deny Sugiri Cloud Security Alliance (CSA)

12:00 13:00 Cyberwarfare: Defensive and Offensive Strategy


(Defence Study UI)

Lunch

13:00 13:45

EXHIBITION Connie Rahakundini

Workshop 4: "Application Security Analysis and Testing",


Zaki Ahmad & Sakti Dwi Cahyono, IndoCISC

Workshop 5: "Network Forensics for International Incidents"


Mohammad Nuh, Indonesian Police Forensic Laboratory

Workshop 6: Securing the Cloud:


Juang Panjaitan & Deny Sugiri Cloud Security Alliance (CSA)

13:45 14:30

Information Asset and Cyberwarfare"


Iwan Kustiawan (Defence University )

14:30 15:00 "Chaos Approach to Information Security and Information Preservation Law"
Ken Umeno (NICT, Japan)

Coffee Break

15:00 16:00

16:00 17:00

Cryptography and Secure Data Transmission


Ruly Nursanto (Indonesia National Cryptography Agency)

Workshop 4: "Application Security Analysis and Testing",


Zaki Ahmad & Sakti Dwi Cahyono, IndoCISC

Workshop 5: "Network Forensics for International Incidents"


Mohammad Nuh, Indonesian Police Forensic Laboratory

Workshop 6: Securing the Cloud:


Juang Panjaitan & Deny Sugiri Cloud Security Alliance (CSA)

16:30 17:00 19:00 21:00

Wrapup Community and Government Networking Dinner (invitation only)

DAY 3 | SATURDAY - MARCH 31, 2012


EXHIBITION AREA TIME FOYER WANTILAN 1 WANTILAN 2 OPEN CONFERENCE SHOWCASE

08:00 09:00

Registration Keynote Speech: "The Cyber Security ecosystem"


Tifatul Sembiring, HE Minister of Communication and IT of Republic Indonesia Room : Wantilan

09:00 09:30

09:30 10:00 10:00 10:40

Coffee Break EXHIBITION Global Cybersecurity Education and Workforce Development Framework : Lessons Learned"
Jay Bavisi, President of ECCouncil

10:40 11:20 11:20 12:00 12:00 13:00 13:00 13:30 13:30 14:00 14:30 15:00 14:30 15:00

"Secure Data Transaction Technology"


Mark Cranley, Rune Information Security

Hardware - Assisted Security with Intel Architecture


Arya Sanjaya, Intel Corp

Lunch Cloud Security : Are You Forgetting Something?


Anthony Lim, Cloud Security Alliance (CSA)

Securing the Cloud Infrastructure


Ben Salzman, Google

Cloud and Cybersecurity


Arthur Siahaan, Cisco

"The Danger of Malware in the Browser and Its Countermeasures"


Gildas Deograt Lumy, XecureIT

15:00 15:30

Coffee Break Panel: The Use of Technology for Cybercrime Countermeasure, Bill Hagestad, Sylvia Sumarlin (FTII), Ifik Arifin (AOSI), Ahmad Alkazimy (ID-CERT)
Moderator: Didik Partono

15:30 16:30

16:30 17:00

Closing by Chairman of IDSIRTII

You might also like