GConferenceGridThe Conference Catalogue · Vol. 2026Folio № AFEC4E
Of the Field

IndoSec 2026

I

ndoSec 2026 is Indonesia’s largest and most prestigious cybersecurity summit, bringing together cybersecurity experts, government officials, industry leaders, and tech innovators for two days of knowledge sharing, networking, and solution showcases. The event covers evolving threats, hands-on product demos, zero trust, cloud security, and digital identity.…

Visit the official site
9Voices
16Underwriters
9Exhibitors
30On the bill · sessions
33Companies · in total
§I

The Voices

Programmed at IndoSec, in alphabetical order.
Alexander Sabar
Director General of Digital Space Monitoring · Ministry of Communications and Digital Affairs (KOMDIGI)
Arif Rahman Hakim
Spokesperson · Badan Siber dan Sandi Negara (BSSN)
Boris Hajduk
CISO · GoTo
Dr. Fandhy Haristha Siregar
Vice President · ISC2 Jakarta Chapter
GUNTUR MUHAMMAD TARIQ, S.I.K.
Intermediate Crime Investigator, Level Ill Cyber Crime Division · Criminal Investigation Department, Indonesia National Police
Purnama Sulfa
CISO · Bank Mandiri Taspen
Rendra Perdana
VP - Information Security · DANA Indonesia
Tommy Prihananto
Directorate of Strategy for Cybersecurity & Cryptography · Badan Siber dan Sandi Negara (BSSN)
Wiyogo Albertus Indarko
EVP - IT · PT Kereta Api Indonesia (Persero)
§II

Underwritten By

The houses behind the program. Tiers as disclosed.
Google Cloud SecurityGold
ManageEngineGold
Ping IdentityGold
SentinelOneGold
SOCRadarGold
SophosGold
TKMTSilver
BitdefenderLunch
CrowdStrikeStrategic
Energy LogserverLunch
GuardsquareLunch
HackerOneLunch
QualysLunch
SanatelLunch
SilverfortLunch
ThalesStrategic
§III

The Programme

Selected from 30 sessions on the bill.
  • 08:55 AM – 09:10 AM

    Securing Indonesia Emas 2045: Building Cyber Resilience for a Digitally Sovereign Nation

    Aligning cybersecurity priorities with Indonesia’s Vision 2045 agenda, ensuring that digital infrastructure, financial systems, and public services remain secure as the nation adva…

  • 09:00 AM – 09:15 AM

    Digital Surveillance in Indonesia: Security Oversight, Data Visibility, and the Boundaries of Proportional Monitoring

    Expansion of surveillance capabilities across financial systems, telecommunications networks, and public service platforms to detect fraud, cybercrime, and systemic threats Regulat…

  • 09:10 AM – 09:30 AM

    Embedding Indonesia’s Personal Data Protection Law into Enterprise Security Architecture

    Translating UU No. 27/2022 requirements into enforceable technical controls including encryption standards, access lifecycle management, and real-time breach detection mechanisms E…

  • 09:15 AM – 09:30 AM

    Protecting Critical Information Infrastructure in a Digitally Interdependent National Economy

    Essential services including payment systems, telecommunications backbones, logistics platforms, and digital government portals now operate within tightly connected ecosystems Disr…

  • 09:30 AM – 09:50 AM

    Artificial Intelligence–Enabled Scams and the Industrialization of Digital Identity Abuse

    Deepfake voice replication, AI-generated impersonation, and automated phishing kits are enabling highly scalable fraud campaigns Identity verification systems across banking, finte…

  • 09:30 AM – 09:50 AM

    Digital Resilience in High-Availability Industries: When Downtime Is Not an Option

    Operational continuity requirements in financial services, payments, healthcare, and telecommunications where disruption directly impacts national stability Designing systems that …

  • 09:50 AM – 10:10 AM

    Exploiting Cloud Misconfigurations in Distributed Application Environments

    Leveraging exposed APIs, excessive permissions, and overlooked cloud service configurations as footholds for lateral expansion Multi-stage intrusion paths originating from minor co…

  • 09:50 AM – 10:10 AM

    Governing Cloud Infrastructure in Multi-Provider and Hybrid Enterprise Environments

    Addressing misconfigured storage, exposed APIs, and unmanaged service accounts as primary breach entry vectors Managing infrastructure-as-code discipline and configuration drift in…

  • 10:10 AM – 10:30 AM

    Agentic AI in Cybersecurity: Emerging Implications for Attack and Defence

    Increasing use of agentic AI systems capable of autonomously executing tasks such as reconnaissance, vulnerability identification, and adaptive phishing campaigns Growing integrati…

Intermission
Part the Second · For the Buyer

An audience of 33 companies, parsed from the program.

33 companies in attendance.

The numbers below are derived from the speakers, sponsors, and exhibitors on this page — cross-referenced into one ledger. They are the only thing here that 10times.com cannot tell you.

01Fig. 01 — Composition of the House
0All threespeak · spons · exh
16Sponsoringsponsor only
9Exhibitingexhibitor only
8Speakingspeaker only
02Fig. 02 — The Voices, by Seniority

67% of the speakers carry senior titles — C-suite, Founder, VP, or Director-level.

  • C-suite222%
  • VP-level333%
  • Director / Head of111%
  • Other roles333%

Of 9 on the bill · classified by free-text title

03Fig. 03 — The Heaviest in the Room
  1. 01BitdefenderSp·L
  2. 02CrowdStrikeSp·S
  3. 03Energy LogserverSp·L
  4. 04Google Cloud SecuritySp·G
  5. 05GuardsquareSp·L
  6. 06HackerOneSp·L
  7. 07ManageEngineSp·G
  8. 08Ping IdentitySp·G
  9. 09QualysSp·L
  10. 10SanatelSp·L
  11. 11SentinelOneSp·G
  12. 12SilverfortSp·L
  13. 13SOCRadarSp·G
  14. 14SophosSp·G
04Fig. 04 — By Tier
gold6
38% of 16
silver1
6% of 16
lunch7
44% of 16
strategic2
13% of 16
05Fig. 05 — The Missing · who's at peer events but not here

These companies sponsored two or more peer events recently, but aren't on this program. For an organizer, that's a list of warm prospects.

06Fig. 06 — Adjacent Convocations · by shared underwriters