GConferenceGridThe Conference Catalogue · Vol. 2026Folio № 0688BD
Security

CISO Indonesia 2026

C

ISO Indonesia unites the nation’s cybersecurity leaders to confront escalating risks head-on. As attackers exploit AI, target public infrastructure, and breach millions of citizen records, this event delivers the strategic insight needed to protect systems, data, and digital trust at scale. Through expert keynotes, high-level discussions, and practical case…

Visit the official site
7Voices
23Underwriters
0Exhibitors
17On the bill · sessions
30Companies · in total
§I

The Voices

Programmed at CISO, in alphabetical order.
Genesha Nara Saputra
Cyber Security & IT GRC Leader · GoTo Financial
Henriko Samosir
Head of Information Security GRC & Data Privacy · Halodoc
Indra Adillah
Head of ICT · AirAsia Indonesia
Mashrek Reza Siddique
Head of IT · Unilever Oleochemical Indonesia
Mochammad Zendra Wardhaniawan
Head of Information Security Department · Citilink Indonesia
Raditio Ghifiardi
VP, Head of IT Security Strategy & Architecture · Indosat Ooredoo Hutchinson
Rita Fitria
SVP, Head of Internal Audit · China Construction Bank Indonesia
§II

Underwritten By

The houses behind the program. Tiers as disclosed.
BlanccoPlatinum
MimecastGold
ProofpointGold
SilverfortGold
SonatypeGold
TenableGold
ZimperiumGold
Abnormal SecuritySilver
BarracudaSilver
ChainguardSilver
CheckmarxSilver
CrowdstrikeSilver
Knowbe4Silver
PicusSilver
Sans GiacSilver
ACNNewswireMedia Partner
APAC CIO OutlookMedia Partner
Business of InfoSecMedia Partner
CrestIndustry Partner
Digital ExpertsMedia Partner
ECCouncilIndustry Partner
Intikom + IBMLead Partner
TechDogsMedia Partner
§III

The Programme

Selected from 17 sessions on the bill.
  • 09:00

    Chair’s Opening Remarks

  • 09:05

    Opening Keynote AI, Autonomy, and the New Cyber Battleground: What Indonesian CISOs Must Prepare For

    - Understanding the shift to AI-powered threats and autonomous attacks - How AI can strengthen real-time threat detection and incident response - What CISOs must prioritise to stay…

  • 09:30

    Data Termination: The Final Defense in a Robust Cybersecurity Strategy

    There’s a key defense that organizations often overlook: eradicating data permanently and decisively—and as soon as it’s no longer needed. Drawing on industry research, best pract…

  • 09:55

    Executive Panel CISOs at a Crossroads: From Firefighter to Forward Strategist

    - With the PDP Act and Indonesia's national push for digital resilience, the CISO role is evolving from technical enforcer to strategic business leader - Boards and regulators incr…

  • 11:05

    Technical Panel Secure by Design: Building Resilient, Digital-Native Security Architectures

    - Key principles for architecting secure, scalable environments across cloud, hybrid, and edge - How to embed resilience and agility without compromising speed or user experience -…

  • 11:45

    Hackers Love Your Smartphone (And Your Customers’ Too): Let’s Spoil Their Fun

    Indonesia’s digital economy is booming, but while we race toward the "Super App" finish line, hackers are taking a shortcut through the pocket. Mobile devices have become the new f…

  • 12:10

    Building GenAI Applications Securely: Practical Strategies for Modern Enterprises

    - Design secure GenAI architectures with isolation, controlled data access, and safe integrations (APIs, RAG, vector DBs). - Protect sensitive data through minimization, encryption…

  • 12:35

    Secure, Govern, and Scale AI with Confidence

  • 14:00

    Securing Identity from AD to AI

    Identity systems were built to enable business, not provide security. As organisations expanded from on-premises Active Directory to cloud and SaaS, identity became a fragmented, s…

    Track B: Security Architecture
Intermission
Part the Second · For the Buyer

An audience of 30 companies, parsed from the program.

30 companies in attendance.

The numbers below are derived from the speakers, sponsors, and exhibitors on this page — cross-referenced into one ledger. They are the only thing here that 10times.com cannot tell you.

01Fig. 01 — Composition of the House
0All threespeak · spons · exh
23Sponsoringsponsor only
0Exhibitingexhibitor only
7Speakingspeaker only
02Fig. 02 — The Voices, by Seniority

86% of the speakers carry senior titles — C-suite, Founder, VP, or Director-level.

  • VP-level229%
  • Director / Head of457%
  • Other roles114%

Of 7 on the bill · classified by free-text title

03Fig. 03 — The Heaviest in the Room
  1. 01Abnormal SecuritySp·S
  2. 02ACNNewswireSp·M
  3. 03APAC CIO OutlookSp·M
  4. 04BarracudaSp·S
  5. 05BlanccoSp·P
  6. 06Business of InfoSecSp·M
  7. 07ChainguardSp·S
  8. 08CheckmarxSp·S
  9. 09CrestSp·I
  10. 10CrowdstrikeSp·S
  11. 11Digital ExpertsSp·M
  12. 12ECCouncilSp·I
  13. 13Intikom + IBMSp·L
  14. 14Knowbe4Sp·S
04Fig. 04 — By Tier
platinum1
4% of 23
gold6
26% of 23
silver8
35% of 23
industry partner2
9% of 23
lead partner1
4% of 23
media partner5
22% of 23
05Fig. 05 — The Missing · who's at peer events but not here

These companies sponsored two or more peer events recently, but aren't on this program. For an organizer, that's a list of warm prospects.

06Fig. 06 — Adjacent Convocations · by shared underwriters