First Tc Programs Latest Update1

Embed Size (px)

Citation preview

  • 8/2/2019 First Tc Programs Latest Update1

    1/3

    DAY 1 | THURSDAY - MARCH 29, 2012

    TIME

    EXHIBITION

    AREAOPEN CONFERENCE ROOM #1 ROOM #2 ROOM #3

    FOYER WANTILAN LEGIAN KAJA LEGIAN TENGAH LEGIAN KELOD

    08:00 09:00 Registration

    09:00 09:30

    EXHIBITION

    Keynote Speech:

    "The Security & Safety Technology: a Financial Industry Perspective"

    Joseph F.P. Luhukay, PhD, Chairman of IT Dept of Indonesian Bank Association

    Room : Wantilan

    09:30 10:00 Coffee Break

    10:00 11:00

    "Social Engineering

    Taxonomy: the SCREAM

    Method"

    Prof. Richardus Eko

    Indrajit, Chairman of

    APTIKOM

    Workshop 1:

    "Backtrack: Crash

    course on

    Penetration

    Testing"

    James Baster Tamba

    & Zico Ferry Ekel,

    Indonesian Backtrack

    Team

    Workshop 2:

    "Defending Privacy:

    Give Your Data

    Super Power"

    Lance Gaines,Rune

    Information Security

    Workshop 3:

    "Real Time IT

    Security Monitoring

    and Attack Analysis

    using SIEM and

    Honeypot"

    Charles Lim

    (Honeynet Indonesia)

    Christian Riesaputra,

    (XecureIT)

    11:00 12:00

    Review on

    Cybersecurity Threat on

    Banking and Financial

    AssetsMohammad Guntur (IT

    Bank Mandiri)

    12:00 13:00 Lunch

    13:00 14:00

    "Data Center Security

    Best Practices"

    JanWilem, EPI

    Workshop 1:

    "Backtrack: Crash

    course on

    Penetration

    Testing"

    James Baster Tamba

    & Zico Ferry Ekel,

    Indonesian Backtrack

    Team

    Workshop 2:

    "Defending Privacy:

    Give Your Data

    Super Power"

    Lance Gaines,Rune

    Information Security

    Workshop 3:

    "Real Time IT

    Security Monitoring

    and Attack Analysis

    using SIEM and

    Honeypot"

    Charles Lim

    (Honeynet Indonesia)

    Christian Riesaputra,

    (XecureIT)

    14:00 15:00"Disaster RecoveryLesson Learn from NTT

    CERT"

    Itaru Kamiya, NTTCERT

    15:00 15:30 Coffee Break

    15:30 16:15

    "Internet Incident

    Response Strategy"

    Budi Rahardjo, IDCERT

    Workshop 1:

    "Backtrack: Crash

    course on

    PenetrationTesting"

    James Baster Tamba

    & Zico Ferry Ekel,

    Indonesian Backtrack

    Team

    Workshop 2:

    "Defending Privacy:Give Your Data

    Super Power"

    Lance Gaines,Rune

    Information Security

    Workshop 3:

    "Real Time IT

    Security Monitoring

    and Attack Analysisusing SIEM and

    Honeypot"

    Charles Lim

    (Honeynet Indonesia)

    Christian Riesaputra,

    (XecureIT)

    16:15 17:00

    "Understanding Digital

    Theft : Back To Basic"

    Achmad Ruli (Waseda)

    17:00 17:30 Wrapup

    19:00 21:00 Welcome Dinner (invitation only)

    PROGRAMS

  • 8/2/2019 First Tc Programs Latest Update1

    2/3

    DAY 2 | FRIDAY - MARCH 30, 2012

    TIME

    EXHIBITION

    AREAOPEN CONFERENCE ROOM #1 ROOM #2 ROOM #3

    FOYER WANTILAN LEGIAN KAJA LEGIAN TENGAH LEGIAN KELOD

    08:00 09:00 Registration

    09:00 09:30

    EXHIBITION

    Keynote Speech:

    "Cyber Warfare Threat, the New Frontier"

    Purnomo Yusgiantoro, HE Minister of Defense of Republic Indonesia

    09:30 10:00 Coffee Break

    10:00 11:00

    Sisfohanneg and Cyber

    Defence Initiative.

    Marzan A. Iskandar

    (Chairman of BPPT)

    Workshop 4:

    "Application

    Security Analysis

    and Testing",

    Zaki Ahmad & Sakti

    Dwi Cahyono,

    IndoCISC

    Workshop 5:

    "Network Forensics

    for International

    Incidents"

    Mohammad Nuh,

    Indonesian Police

    Forensic Laboratory

    Workshop 6:

    Securing the Cloud:

    Juang Panjaitan &

    Deny Sugiri

    Cloud Security

    Alliance (CSA)11:00 12:00

    "Analyzing the Cyber

    Warfare Threat"

    Bill Hagestad,

    Cyberwarfare Expert

    12:00 13:00 Lunch

    13:00 13:45

    Cyberwarfare:

    Defensive and Offensive

    Strategy

    Connie Rahakundini

    (Defence Study UI)

    Workshop 4:

    "Application

    Security Analysis

    and Testing",

    Zaki Ahmad & Sakti

    Dwi Cahyono,

    IndoCISC

    Workshop 5:

    "Network Forensics

    for International

    Incidents"

    Mohammad Nuh,

    Indonesian Police

    Forensic Laboratory

    Workshop 6:

    Securing the Cloud:

    Juang Panjaitan &

    Deny Sugiri

    Cloud Security

    Alliance (CSA)13:45 14:30

    Information Asset and

    Cyberwarfare"

    Iwan Kustiawan (Defence

    University )

    14:30 15:00 Coffee Break

    15:00 16:00

    "Chaos Approach to

    Information Security

    and Information

    Preservation Law"

    Ken Umeno (NICT, Japan)

    Workshop 4:

    "Application

    Security Analysis

    and Testing",

    Zaki Ahmad & Sakti

    Dwi Cahyono,

    IndoCISC

    Workshop 5:

    "Network Forensics

    for International

    Incidents"

    Mohammad Nuh,

    Indonesian Police

    Forensic Laboratory

    Workshop 6:

    Securing the Cloud:

    Juang Panjaitan &

    Deny Sugiri

    Cloud Security

    Alliance (CSA)

    16:00 17:00

    Cryptography and

    Secure Data

    Transmission

    Ruly Nursanto (Indonesia

    National Cryptography

    Agency)

    16:30 17:00 Wrapup

    19:00 21:00 Community and Government Networking Dinner (invitation only)

  • 8/2/2019 First Tc Programs Latest Update1

    3/3

    DAY 3 | SATURDAY - MARCH 31, 2012

    TIME

    EXHIBITION

    AREAOPEN CONFERENCE SHOWCASE

    FOYER WANTILAN 1 WANTILAN 2

    08:00 09:00 Registration

    09:00 09:30

    EXHIBITION

    Keynote Speech:

    "The Cyber Security ecosystem"

    Tifatul Sembiring, HE Minister of Communication and IT of Republic Indonesia

    Room : Wantilan

    09:30 10:00 Coffee Break

    10:00 10:40

    Global Cybersecurity Education and Workforce Development Framework : Lessons

    Learned"

    Jay Bavisi, President of ECCouncil

    10:40 11:20"Secure Data Transaction Technology"

    Mark Cranley, Rune Information Security

    11:20 12:00 Hardware - Assisted Security with Intel Architecture

    Arya Sanjaya, Intel Corp

    12:00 13:00 Lunch

    13:00 13:30Cloud Security : Are You Forgetting Something?

    Anthony Lim, Cloud Security Alliance (CSA)

    13:30 14:00Securing the Cloud Infrastructure

    Ben Salzman, Google

    14:30 15:00 Cloud and Cybersecurity

    Arthur Siahaan, Cisco

    14:30 15:00 "The Danger of Malware in the Browser and Its Countermeasures"

    Gildas Deograt Lumy, XecureIT

    15:00 15:30 Coffee Break

    15:30 16:30

    Panel: The Use of Technology for Cybercrime Countermeasure,

    Bill Hagestad, Sylvia Sumarlin (FTII), Ifik Arifin (AOSI), Ahmad Alkazimy (ID-CERT)

    Moderator: Didik Partono

    16:30 17:00Closing

    by Chairman of IDSIRTII