Professional Documents
Culture Documents
Supporting Partners
Confirmed Speakers
■ Police Brigadier General Asep Edi Suheri, Director ■ Doug Witschi, Assistant Director, Cybercrime Threat
Cybercrime Directorate, National Police Force, Response and Cybercrime Operations, Interpol
Indonesia ■ Shane Britten, Chief Executive Officer, Crime Stoppers
■ Intan Rahuyu, Director of Vulnerability Identification International
and Risk Assessment of National Critical Information ■ Alexandru Caciuloiu, Cybercrime and Cryptocurrency
Infrastructure, State Cyber and Cryptography Agency Programme Coordinator, UNODC
(BSSN), Indonesia
■ Vongvilai Inthasanh, Network Security Specialist, Lao
■ Joey Fontiveros, Commander, Cyber Battalion, Computer Emergency Response Team (LaoCERT)
Philippine Army
■ Montida Pattaranantakul, Researcher, Cybersecurity
■ Budi Rahardjo, President, Indonesia Computer Laboratory, National Electronics and Computer
Emergency Response Team (ID-CERT) Technology Center (NECTEC), Thailand
■ Adi Nugroho, Chairman, Indonesia Security Incident ■ Allan Cabanlong, Executive Officer, CyberGuardians
Response Team on Internet Infrastructure/Coordination
■ Senior Official, Chief Executive Officer, National Cyber
Center (IDSIRTII)
Security Agency (NACSA), Malaysia
■ Ebenezer Godomon, Head of Cyber Security Division,
Sabah State Government, Malaysia
Event Schedule
Interactive Workshop
Assessment of CyberSecurity Risks of IT Applications during Pandemic
OVERVIEW
In November 2019, when the world was struck by the Corona virus, Philippines was badly hit among
its neighbors in the Southeast Asia region. The government emergency management system was
overwhelmed by the nature of the invisible virus.
On the brighter side, Information and Communications Technology (ICT) solutions like the web and
mobile applications are perceived to be one of the tools for the governments to aid them in contact
tracing, movement of goods, hospital and logistics management, to name a few, during this pandemic.
The Philippines, one of the ASEAN member countries that has stringent data privacy law, has faced
numerous privacy and security questions from its citizens on how the Philippine government processes
and stores the data they collected.
Privacy and CyberSecurity has become one of the important concerns the government is facing during
this pandemic. Although various ICT tools are developed and used to aid the government in the fight
against COVID19 but the big question coming from citizens is the way how the personal identifiable
information (PII) is collected and what agency in the government will store it.
This workshop is projected to share best practices amongst the participants and formulate effective
and efficient measures in the assessment of cybersecurity risks and privacy protection of IT
applications, contact tracing app to name a few, during pandemic.
AGENDA
WORKSHOP HOST
09.10 COMBATING CYBERCRIMES AND CATCHING THE 12.40 NETWORKING LUNCH BREAK
CRIMINALS 13.40 ASSISTING GOVERNMENTS FIGHT CYBERCRIMES
■ Current cybercrimes faced across Indonesia ■ Overview of Crime Stoppers International
■ Combating fake news ■ How we assist governments with combating cybercrimes?
■ Cybercrime laws and prosecution ■ Recent cybercrimes being seen
■ Monitoring online content being leaked across Indonesia ■ Lessons learnt
Police Brigadier General Asep Edi Suheri, Director Cybercrime Shane Britten, Chief Executive Officer, Crime Stoppers International
Directorate, National Police Force, Indonesia
AFTERNOON SESSION – CYBER SECURITY ENGAGEMENT
09.40 INTELLIGENCE USED TO COMBAT CYBERCRIMES
■ Current techniques used to monitor Indonesian computer 14.10 BUILDING CYBER AWARENESS AND ENGAGEMENT
systems ACROSS INDONESIA
■ Threat intelligence systems in place ■ Current work ID-CERT is doing to build awareness of cyber
■ Current threats seen daily security to government agencies and the general public
■ Cooperation with other government agencies in fighting ■ Challenges faced across Indonesia
against cybercrimes ■ Government engagement on cyber security matters
Invited: Senior Official, Head of Cyber School, National Intelligence ■ What is needed next?
Agency (BIN), Indonesia Budi Rahardjo, President, Indonesia Computer Emergency
Response Team (ID-CERT)
10.10 PROTECTING CRITICAL INFRASTRUCTURES ACROSS
INDONESIA 14.40 NETWORKING COFFEE BREAK
■ Threats faced to internet infrastructures 15.10 COUNTERING CYBERCRIMES AND THE IMPORTANCE OF
■ Case studies of recent attacks OPEN ENGAGEMENT ACROSS SOUTH-EAST ASIA
■ Developments being made in cyber defence across Indonesia ■ Current UN initiatives at countering cybercrimes
■ Lessons learnt ■ Current UN engagement programs across South-East Asia
Adi Nugroho, Chairman, Indonesia Security Incident Response ■ Challenges faced across the region
Team on Internet Infrastructure/Coordination Center (IDSIRTII) ■ What is next?
10.40 NETWORKING COFFEE BREAK Alexandru Caciuloiu, Cybercrime and Cryptocurrency Programme
Coordinator, UNODC
11.10 REGIONAL CYBERCRIMES – INTERPOL COOPERATION
■ Overview of the cybercrime department at Interpol 15.40 ARTIFICIAL INTELLIGENCE AND CHILD ONLINE
■ Collaboration with regional governments to help tackle PROTECTION IN ASEAN
cybercrimes Overview of CyberGuardians work regarding protecting children
■ Importance of sharing information online
■ Case studies of recent cybercrimes Interpol has intercepted Current threats to children online – what protection is needed
Doug Witschi, Assistant Director, Cybercrime Threat Response and Using AI to help protect children
Cybercrime Operations, Interpol Roadmap
11.40 CYBERCRIME LAW ENFORCEMENT – HONG KONG Allan Cabanlong, Executive Officer, CyberGuardians
PERSPECTIVE 16.10 CHAIRMAN’S CLOSING REMARKS
■ Monitoring cybercrimes across Hong Kong
Budi Rahardjo, President, Indonesia Computer Emergency
■ Threats and Attacks faced
Response Team (ID-CERT)
■ Current enforcement measures of cybercrimes
■ Hong Kong Police cyber readiness
Invited: Senior Official, Section 2, Collaborations, Cyber Security
Division, Hong Kong Police
Cyber Intelligence Asia 2022
Conference and Exhibition Jakarta, Indonesia | 21st – 23rd June 2022
Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams in
reducing exposure by uncovering unknown threats and informing better, faster decisions. Working to
provide a singular view of digital, brand, and third-party risk, the Recorded Future platform provides
proactive and predictive intelligence, analyzing data from open, proprietary, and aggregated customer-
provided sources. Recorded Future arms threat analysts, vulnerability management teams, security
operations centers, and incident responders with context-rich, actionable intelligence in real time
that’s ready for integration across the security ecosystem. Learn more at www.recordedfuture.com.
Military / Two Day Conference & Exhibition 600 USD 800 USD
Government,
Workshop 150 USD 200 USD
Public Sector
Rate Two Day Conference & Exhibition PLUS Workshop 750 USD 1,000 USD
Private Two Day Conference & Exhibition 1,200 USD 1,600 USD
Sector
Workshop 300 USD 400 USD
Rate
Two Day Conference & Exhibition PLUS Workshop 1,500 USD 2,000 USD
Delegate Details
Title/Rank: Tel:
Surname: Email:
Job Title:
Company:
Address:
Signature: Date:
Please tick the box below if you Hotel Name: Wire Transfer:
are happy for us to share your Pullman Jakarta Hotel, Jalan Barclays, 16 High Street North,
email address with the event M.H. Thamrin 59, 10350, Dunstable, Bedfordshire,
sponsors and exhibitors post Jakarta, Indonesia LU6 1JZ, UK
event.
Please tick here if you would Sort Code: 20 55 33
I am happy for you to share my us to contact you to Account Number: 53554104
email address with book your
the sponsors/exhibitors accommodation Debit/Credit Card Book Online
Payments - All bookings made prior to the conference must be Alterations to Programme - Cancellation/Postponement of Data Protection - By submitting registration details,
paid in full to guarantee registration. Once payment has been Event - Intelligence-Sec reserves the right to make alterations delegates agree to allow Intelligence-Sec and companies
received, an email confirmation and a receipted invoice will be to the conference programme, venue and timings. associated with the conference to contact them regarding
sent. If payment is not made at the time of booking, registration their services. Delegates who do not wish to receive such
In the unlikely event of the programme being cancelled
will be provisional. Bookings received less than two weeks communications please email events@intelligence-sec.com.
by Intelligence-Sec, a full refund will be made. Liability will
before the conference date can only be paid by credit card. The contact details of registered delegates will be placed
be limited to the amount of the fee paid by the delegate.
on the attendee list which will be passed to sponsoring
Early Bird Rate - In order to qualify for any ‘early bird’ rates, In the event of it being found necessary, for whatever
companies and to all attendees for them to see who is at
booking must be received before the deadline date listed in reason, that the conference is being postponed or the dates
the conference for the purpose of networking and meetings.
the conference marketing material. being changed, the organisers shall not be liable for any
Delegates who do not wish to be included on this list should
expenditure, damage or loss incurred by the delegate. If
Substitutions & Cancellations - Delegates may nominate advise at the time of booking.
by re-arrangement or postponement the event can take
an alternative person from their organisation to attend
place, the booking between the delegate and the organisers Websites & Links - The conference and associated
up to 24 hours prior to the start of the event, at no extra
shall remain in force and will be subject to the cancellation Intelligence-Sec websites may link to other websites and
charge. Should substitution not be possible, cancellation
schedule in paragraph 3 networking tools provided for the convenience of the users.
charges apply as follows: 8 weeks or more prior to start of
The contents of these websites are maintained by their
event: 10% of the delegate fee , 4 to 8 weeks prior to start Speakers - Views expressed by speakers are their own.
owners, for which Intelligence-Sec takes no responsibility.
of event: 50% of the delegate fee , 4 weeks or less prior to Intelligence-Sec cannot accept liability for advice given, or
Neither can responsibility be taken for contents of any
start of event: 100% of the delegate fee. All substitutions and views expressed, by any speaker at the conference or in any
website linking to this website.
cancellations must be received in writing material provided to delegates.
Insurance - It is the responsibility of the delegate to arrange
Access Requirements - Delegates should advise of any Photography & Filming - For promotional purposes, there
appropriate insurance cover in connection with their
special access requirements at the time of registration. may be a professional photographer and video production
attendance at the conference. Intelligence-Sec cannot be held
Registration Information - Registration information will be taking place during the conference. Delegates who do not
liable for any loss, liability or damage to personal property.
sent to registered delegates by email at least seven days wish to be filmed or recorded should advise the organisers
prior to the event. Any delegate not receiving the registration by email to events@intelligence-sec.com prior to the event. If you have any questions about these Terms & Conditions,
information should contact us by email to events@ please contact – events@intelligence-sec.com
intelligence-sec.com