Your Platform to Security Insight
When
5th & 6th September 2017
Starting at 8am
Where
Jakarta, Indonesia
Balai Kartini
IHPCON, an Indonesia Honeynet Project Conference, is an ideal platform to bring international security experts together to share and exchange current issues and updates on Cyber Security threats, risks and mitigation strategies as well as solutions available. The conference on Day One will highlight cyber security topics from designing security architecture to the latest update of global as well as Indonesia cyber security threats. On the second day, four workshop tracks cover the hands-on on current honeypot technology, malware, incident response and digital forensics. Workshop tracks provide excellent learning opportunity for the attendees to work on the honeypot implementation, malware analysis, incident response investigation methods to uncover new security threats and various techniques to perform digital forensics.
Meet the security experts
at the Indonesia Honeynet Project Conference,
Our security experts will speak on the following topics: Cyber Security and Incident Response Government Policy and Regulation, Enterprise Security Architecture, Cyber Security Threats in the era of Internet of Things, and latest cyber security threats and statistics from local as well as regional countries.
Indonesia Honeynet Project Lead
Minister of Communication and Information Technology
Honeynet Project Director
Senior Information Security Consultant
Direktur Keamanan Informasi
Professor of computer science and information system at Asian Banking Finance and Informatics Institute (ABFI) Perbanas
CEO and chief architect of Antiy AVL Mobile Security Company
Country Manager HPE Aruba Indonesia
PACKED WITH HIGH QUALITY CONTENT, JUST FOR YOU.
Charles Lim, Semuel Abrijani Pangerapan*, Gildas Deograt Lumy, Tan Kean Siong, and Tom Pan
IHP Welcome Address – Charles Lim
Government Keynote Speaker : Strategic Policy Towards Cyber Security – Semuel Abrijani Pangerapan*
IHP Industry : Architecture of Future Security Platform – Gildas Deograt Lumy
IHP Malaysia Chapter: WannaCry Ransomware in My Honeypot! – Tan Kean Siong
HPE Aruba – Gordon Tan
Mobile Threat Escalation and Migration Beneath The Long-Tail – Tom Pan
Rudi Lumanto, Yohanes Syailendra, and IGN Mantra
Palo Alto: Cost of Cyber Security & Considerations – Annamalai Chockalingam
IDSIRTII : Fact & Trend Analysis of Cyberattack in Indonesia – Rudi Lumanto
ARBOR: Know Your (DDoS) Enemy – Narumol Somboon
IHP Research Update – Yohanes Syailendra
ACAD-CSIRT Update – IGN Mantra
Enrico Hugo, Tan Kean Siong, and Rasyid Naif Dahbul
Honeypot is a decoy system that is deployed between production systems to trick cyber attacker. This is an introductory workshop to provide hands on basics of Honeypot, including type of honeypots and how to implement them.
Morning Session (Enrico Hugo & Hilman): Introduction to Honeypot and implementation
Afternoon Session (Tan Kean Siong & Rasyid Naif Dahbul): Hands on experience with Dionaea and Kippo Honeypot. Working with log and data of honeypots
Attendees: Technical or Non-technical people
Hardware Requirement: Laptop with minimal 4 GB RAM and 40 GB free storage space.
Digit Oktavianto and Yohanes Syailendra
This workshop will introduce the working of practical malware analysis, static and dynamic analysis. Hands on experience of using various malware analysis tools to analyze real malware samples to gain understanding the inner working of malicious code.
Morning Session (Digit Oktavianto): Basic static and dynamic malware analysis
Afternoon Session (Yohanes Syailendra): More advanced malware analysis by extracting features from malware analysis for binary program classification using machine learning.
Attendees: Technical people
Hardware Requirement: Laptop with minimal 8 GB RAM and 80 GB free storage space
IGN Mantra, Enrico Hugo, and Rinkel
This is an introductory workshop on handling security incidents in an organization. This workshop will cover practical aspects of analyzing incident to uncover various possible security threats undetected at the security perimeter.
Morning Session (IGN Mantra): Basic security incident handling framework and process involved
Afternoon Session (Enrico Hugo & Rinkel): Practical experience of detecting network security threats, e.g. DDOS attacks using DNS and netflow traffic.
Attendees: Technical and non-technical people
Hardware Requirement: Laptop with minimal 4 GB RAM and 40 GB free storage space.
Christopher Rianto and Mario Marcello
This workshop will teach practical techniques to trace, detect and analyze various industry cases including cyber criminal cases. This workshop will cover basic and intermediate level digital forensic techniques and to perform investigation effectively.
Morning Session (Mario Marcello): Basic Digital Forensics on storage media
Afternoon Session (Christopher Rianto): Practical Digital Forensics techniques to investigate into various industrial fraud cases.
Attendees: Technical or Non-technical people
Hardware Requirement: Laptop with minimal 8 GB RAM and 80 GB free storage space.
Balai Kartini
Jakarta, Indonesia