CISO Indonesia

Avatar
[[{“value”:”

May 28, 2025
Location: Pullman Thamrin CBD Jakarta
website: https://ciso-id.coriniumintelligence.com/

Corinium Intelligence is thrilled to present CISO Indonesia 2025, the leading cybersecurity conference, happening on 28 May 2025 at the Pullman Thamrin CBD Jakarta. This event will bring together the nation’s top cybersecurity leaders to address pressing security challenges, explore emerging threats, and share best practices for safeguarding digital infrastructure.

With a focus on the latest cybersecurity trends and innovations, CISO Indonesia 2025 will feature key discussions on:

AI in cyber security Navigating the double-edged sword of AI in cyber security – understanding the profound influence of AI on the offensive and defensive sides of cyber security.
Government framework – Aligning cyber security strategies with government regulations and initiatives to effectively safeguard critical digital assets against emerging threats
Resilience for a digital future – Tackling the cyber security challenges related to emerging technologies, IoT, cloud security, and digital transformation in an increasingly connected world.
Cyber security leadership – Addressing the talent shortage in cyber security by exploring initiatives to close the talent gap, including how AI can assist in this critical endeavour.

Bringing together 20+ leading cybersecurity experts, this event offers unparalleled networking opportunities, interactive discussions, and actionable insights to help organisations stay resilient in an evolving threat landscape.

Register today and receive 20% off with discount code APAC20. Secure your seat now at: https://hubs.ly/Q03hz-rs0.

For further event details, visit: ciso-id.coriniumintelligence.com

Who Should Attend:

This premier gathering is tailored for CISOs, CIOs, CTOs, IT Directors, and Heads of Information Security across industries. Professionals specialising in compliance, risk management, cloud security, governance, and digital transformation will find immense value in attending.

Learn more about the events and register today! We hope to see you there!

“}]] 

Total
0
Shares
Previous Post

Google says hackers behind UK retail cyber campaign now also targeting US

Next Post

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

Related Posts

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

In what has been described as an "extremely sophisticated phishing attack," threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google's infrastructure and redirect message recipients to fraudulent sites that harvest their credentials. "The first thing to note is that this is a valid, signed email – it really was sent from no-reply@google.com," Nick Johnson
Avatar
Read More

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a new report from Tenable. MCP, launched by Anthropic in November 2024, is a framework designed to connect
Avatar
Read More