View
216
Download
0
Category
Preview:
Citation preview
8/2/2019 First Tc Programs Latest Update1
1/3
DAY 1 | THURSDAY - MARCH 29, 2012
TIME
EXHIBITION
AREAOPEN CONFERENCE ROOM #1 ROOM #2 ROOM #3
FOYER WANTILAN LEGIAN KAJA LEGIAN TENGAH LEGIAN KELOD
08:00 09:00 Registration
09:00 09:30
EXHIBITION
Keynote Speech:
"The Security & Safety Technology: a Financial Industry Perspective"
Joseph F.P. Luhukay, PhD, Chairman of IT Dept of Indonesian Bank Association
Room : Wantilan
09:30 10:00 Coffee Break
10:00 11:00
"Social Engineering
Taxonomy: the SCREAM
Method"
Prof. Richardus Eko
Indrajit, Chairman of
APTIKOM
Workshop 1:
"Backtrack: Crash
course on
Penetration
Testing"
James Baster Tamba
& Zico Ferry Ekel,
Indonesian Backtrack
Team
Workshop 2:
"Defending Privacy:
Give Your Data
Super Power"
Lance Gaines,Rune
Information Security
Workshop 3:
"Real Time IT
Security Monitoring
and Attack Analysis
using SIEM and
Honeypot"
Charles Lim
(Honeynet Indonesia)
Christian Riesaputra,
(XecureIT)
11:00 12:00
Review on
Cybersecurity Threat on
Banking and Financial
AssetsMohammad Guntur (IT
Bank Mandiri)
12:00 13:00 Lunch
13:00 14:00
"Data Center Security
Best Practices"
JanWilem, EPI
Workshop 1:
"Backtrack: Crash
course on
Penetration
Testing"
James Baster Tamba
& Zico Ferry Ekel,
Indonesian Backtrack
Team
Workshop 2:
"Defending Privacy:
Give Your Data
Super Power"
Lance Gaines,Rune
Information Security
Workshop 3:
"Real Time IT
Security Monitoring
and Attack Analysis
using SIEM and
Honeypot"
Charles Lim
(Honeynet Indonesia)
Christian Riesaputra,
(XecureIT)
14:00 15:00"Disaster RecoveryLesson Learn from NTT
CERT"
Itaru Kamiya, NTTCERT
15:00 15:30 Coffee Break
15:30 16:15
"Internet Incident
Response Strategy"
Budi Rahardjo, IDCERT
Workshop 1:
"Backtrack: Crash
course on
PenetrationTesting"
James Baster Tamba
& Zico Ferry Ekel,
Indonesian Backtrack
Team
Workshop 2:
"Defending Privacy:Give Your Data
Super Power"
Lance Gaines,Rune
Information Security
Workshop 3:
"Real Time IT
Security Monitoring
and Attack Analysisusing SIEM and
Honeypot"
Charles Lim
(Honeynet Indonesia)
Christian Riesaputra,
(XecureIT)
16:15 17:00
"Understanding Digital
Theft : Back To Basic"
Achmad Ruli (Waseda)
17:00 17:30 Wrapup
19:00 21:00 Welcome Dinner (invitation only)
PROGRAMS
8/2/2019 First Tc Programs Latest Update1
2/3
DAY 2 | FRIDAY - MARCH 30, 2012
TIME
EXHIBITION
AREAOPEN CONFERENCE ROOM #1 ROOM #2 ROOM #3
FOYER WANTILAN LEGIAN KAJA LEGIAN TENGAH LEGIAN KELOD
08:00 09:00 Registration
09:00 09:30
EXHIBITION
Keynote Speech:
"Cyber Warfare Threat, the New Frontier"
Purnomo Yusgiantoro, HE Minister of Defense of Republic Indonesia
09:30 10:00 Coffee Break
10:00 11:00
Sisfohanneg and Cyber
Defence Initiative.
Marzan A. Iskandar
(Chairman of BPPT)
Workshop 4:
"Application
Security Analysis
and Testing",
Zaki Ahmad & Sakti
Dwi Cahyono,
IndoCISC
Workshop 5:
"Network Forensics
for International
Incidents"
Mohammad Nuh,
Indonesian Police
Forensic Laboratory
Workshop 6:
Securing the Cloud:
Juang Panjaitan &
Deny Sugiri
Cloud Security
Alliance (CSA)11:00 12:00
"Analyzing the Cyber
Warfare Threat"
Bill Hagestad,
Cyberwarfare Expert
12:00 13:00 Lunch
13:00 13:45
Cyberwarfare:
Defensive and Offensive
Strategy
Connie Rahakundini
(Defence Study UI)
Workshop 4:
"Application
Security Analysis
and Testing",
Zaki Ahmad & Sakti
Dwi Cahyono,
IndoCISC
Workshop 5:
"Network Forensics
for International
Incidents"
Mohammad Nuh,
Indonesian Police
Forensic Laboratory
Workshop 6:
Securing the Cloud:
Juang Panjaitan &
Deny Sugiri
Cloud Security
Alliance (CSA)13:45 14:30
Information Asset and
Cyberwarfare"
Iwan Kustiawan (Defence
University )
14:30 15:00 Coffee Break
15:00 16:00
"Chaos Approach to
Information Security
and Information
Preservation Law"
Ken Umeno (NICT, Japan)
Workshop 4:
"Application
Security Analysis
and Testing",
Zaki Ahmad & Sakti
Dwi Cahyono,
IndoCISC
Workshop 5:
"Network Forensics
for International
Incidents"
Mohammad Nuh,
Indonesian Police
Forensic Laboratory
Workshop 6:
Securing the Cloud:
Juang Panjaitan &
Deny Sugiri
Cloud Security
Alliance (CSA)
16:00 17:00
Cryptography and
Secure Data
Transmission
Ruly Nursanto (Indonesia
National Cryptography
Agency)
16:30 17:00 Wrapup
19:00 21:00 Community and Government Networking Dinner (invitation only)
8/2/2019 First Tc Programs Latest Update1
3/3
DAY 3 | SATURDAY - MARCH 31, 2012
TIME
EXHIBITION
AREAOPEN CONFERENCE SHOWCASE
FOYER WANTILAN 1 WANTILAN 2
08:00 09:00 Registration
09:00 09:30
EXHIBITION
Keynote Speech:
"The Cyber Security ecosystem"
Tifatul Sembiring, HE Minister of Communication and IT of Republic Indonesia
Room : Wantilan
09:30 10:00 Coffee Break
10:00 10:40
Global Cybersecurity Education and Workforce Development Framework : Lessons
Learned"
Jay Bavisi, President of ECCouncil
10:40 11:20"Secure Data Transaction Technology"
Mark Cranley, Rune Information Security
11:20 12:00 Hardware - Assisted Security with Intel Architecture
Arya Sanjaya, Intel Corp
12:00 13:00 Lunch
13:00 13:30Cloud Security : Are You Forgetting Something?
Anthony Lim, Cloud Security Alliance (CSA)
13:30 14:00Securing the Cloud Infrastructure
Ben Salzman, Google
14:30 15:00 Cloud and Cybersecurity
Arthur Siahaan, Cisco
14:30 15:00 "The Danger of Malware in the Browser and Its Countermeasures"
Gildas Deograt Lumy, XecureIT
15:00 15:30 Coffee Break
15:30 16:30
Panel: The Use of Technology for Cybercrime Countermeasure,
Bill Hagestad, Sylvia Sumarlin (FTII), Ifik Arifin (AOSI), Ahmad Alkazimy (ID-CERT)
Moderator: Didik Partono
16:30 17:00Closing
by Chairman of IDSIRTII
Recommended