September 19, 2024

Search
Close this search box.

We are creating some awesome events for you. Kindly bear with us.

Unleashing the Power of Zero Trust and Gen AI: Accelerating Indonesia’s Secure Digital Future

A Platform For Collaboration

OpenGov Asia is pleased to extend an invitation to its exclusive OpenGov Breakfast Insights, focusing on integrating Zero Trust and Generative AI into cybersecurity solutions to strengthen security and resilience in the digital age. 

Meet Our Distinguished Speakers

Raditio Ghifiardi
Vice President - Head of Security Strategy & Architecture
Indosat Ooredoo Hutchinson

Mohit Sagar
CEO & Editor-in-Chief
OpenGov Asia

Capitalising on Zero Trust and Gen AI Capabilities for Enhanced Security Postures

Cybersecurity continues to pose a significant challenge for both individuals and organisations globally. With the increasing sophistication and frequency of cyber threats, businesses across all sectors need to continuously innovate to effectively mitigate these risks. 

In the current business environment in Indonesia, the banking and financial services industry (BFSI) has become a prime target for cyber attacks due to the sensitive nature of the data and the high value of financial transactions. According to Indonesia’s Financial Services Authority, cyber incidents impact the FSI nearly three times more than other industries in the country.  

While the financial services industry frequently receives the most attention for cyber attacks, advancing cybersecurity is essential across all sectors, including public services, healthcare, and retail. Cyber threats are becoming more sophisticated and widespread, impacting any industry that manages sensitive data and depends on digital infrastructure.

Strong cybersecurity measures are vital for safeguarding against data breaches, financial losses, and operational disruptions, thereby ensuring the protection and integrity of information and services across various sectors. 

One prominent solution to advancing security postures in the era of advanced threats is Zero Trust. In recent years, Zero Trust has gained significant traction across sectors. A recent study found that the adoption of this advanced security framework is on the rise, with more than 86% of respondents beginning the transition to Zero Trust. 

The prevalent adoption of Zero Trust is mainly due to its effectiveness in mitigating sophisticated cyber threats by eliminating implicit trust and continuously verifying every access request. This approach significantly enhances security by ensuring that all users, whether inside or outside the organisation, are authenticated, authorised, and continuously validated before being granted access to critical resources. 

In the context of Indonesia, the adoption of Zero Trust is particularly pertinent given the nation’s track record of cyber-attacks. Implementing this security framework allows Indonesian organisations to enhance the protection of sensitive data and maintain the integrity of their digital operations. This, in turn, strengthens their overall cybersecurity posture and ensures compliance with regulatory requirements. 

Furthermore, organisations in Indonesia can enhance the capabilities of Zero Trust by integrating Generative AI into the framework. This integration can improve threat detection and response times, enabling more proactive and adaptive security measures to protect sensitive data and critical systems.

In addition to enhancing the capabilities of Zero Trust, AI also streamlines the process by introducing behaviour-based user risk scoring. By analysing real-time data, AI detects unusual user behaviour, offering organisations customised security recommendations. 

Despite the promising potential of Zero Trust and Generative AI, adopting these solutions is often daunting. Implementing Zero Trust and AI in large networks requires meticulous planning and coordination across multiple teams. Additionally, integrating these principles into legacy systems can be difficult due to compatibility issues, often necessitating significant upgrades or replacements. 

So, how can organisations effectively implement Zero Trust and AI models to enhance their security posture? What strategies can they employ to navigate the inherent complexities? 

 

Zero Trust Revolutionising Traditional Security Paradigms 

The Zero Trust approach offers a more effective solution than traditional security methods by continuously verifying every access request rather than relying on perimeter defences. This ensures that all users and devices are authenticated and authorised, significantly reducing the risk of breaches and internal threats. 
 

AI-Powered Zero Trust Framework 

Artificial intelligence (AI) can greatly amplify the efficacy of the Zero Trust framework in bolstering security measures. By leveraging AI, a Zero Trust framework can continuously monitor and evaluate user behaviour, enhancing the identification and neutralisation of security threats. This method ensures ongoing verification and adaptable security protocols, significantly lowering the chances of unauthorised access and data breaches. 

 

Defensive AI Protecting Organisations from Next-Gen Threats  

As technology advances, the risk of AI-driven attacks has increased. To counter these threats, organisations in Indonesia can leverage AI to strengthen protection across multiple security domains, such as application security and the Zero Trust framework. This approach involves crafting customised security solutions for each client and using comprehensive attack data to train models that can detect previously unknown application threats.

The session will allow delegates to:

  • IDENTIFY Zero Trust solutions tailored to the unique needs of each organisation 
  • SECURE cloud networks with advanced Zero Trust architecture 
  • LEVERAGE AI-powered Zero Trust to protect against cyberattacks and data breaches 
  • SIMPLIFY Zero Trust by integrating AI solutions 
  • HARNESS Defensive AI to secure organisations from next-gen threats 
  • CREATE a comprehensive strategy to safeguard sensitive data and establish robust control over infrastructures 
  • ADDRESS obstacles associated with the complexities of Zero Trust and AI 

Who Should Attend

Get the Latest News From OpenGov Asia

OpenGov Asia releases new digital content daily on trending topics within technology and the public sector. Join our newsletter to have weekly digests of our content conveniently sent to your email address.

By submitting, you agree to receive email communications from Opengov Asia, including upcoming promotions and discounted tickets, news, and access to exclusive invite-only events.

in collaboration with

BROught to you by

Networking

Make valuable connections and meet peers and mentors in your industry. Share ideas with others in your field, meet your future business partner, or seek advice from people who’ve done it all before.

Learning

We live in uncertain times for tech and business. We’re welcoming the people who are tackling the big challenges facing industry today. In our current climate, upskilling has never been more important.

Exposure

Get exposed to first-hand knowledge and intelligence from subject matter experts across Asia Pacific to accelerate growth and progress.

“Good and interesting discussion, because there are interactions between the speakers and the delegates. The flow of the discussion is very smooth”

Maybank Indonesia

“Fantastic event, as usual very lively discussion and fruitful knowledge-sharing.  Mohit is fantastic in leading the discussion”

PT Bank Syariah Indonesia

“It’s good for gathering many point of view from all attendees”

PT Bank Mandiri Indonesia

Get involved

For sponsorship opportunities

For speaking opportunities

opengov@opengovasia.com

PARTNER

Cloudflare is the security, performance, and reliability company on a mission to help build a better Internet. Today, it runs one of the world’s largest networks that serve over 25 million HTTP requests per second on average, and  with approximately 19% of the Fortune 1000 companies using at least one Cloudflare product. 

PARTNER

Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.

PARTNER

As a Titanium Black Partner of Dell Technologies, CTC Global Singapore boasts unparalleled access to resources.

Established in 1972, we bring 52 years of experience to the table, solidifying our position as a leading IT solutions provider in Singapore. With over 300 qualified IT professionals, we are dedicated to delivering integrated solutions that empower your organization in key areas such as Automation & AI, Cyber Security, App Modernization & Data Analytics, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Renowned for our consulting expertise and delivering expert IT solutions, CTC Global Singapore has become the preferred IT outsourcing partner for businesses across Singapore.

PARTNER

Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit www.planview.com.

SUPPORTING ORGANISATION

SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.

PARTNER

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 

PARTNER

IBM is a leading global hybrid cloud and AI, and consulting services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,800 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity, and service. For more information, visit www.ibm.com