IHP Conference 2017

Your Platform to Security Insight


5th & 6th September 2017
Starting at 8am


Jakarta, Indonesia
Balai Kartini

our security experts will unveil the next generation security threats

IHPCON, an Indonesia Honeynet Project Conference, is an ideal platform to bring international security experts together to share and exchange current issues and updates on Cyber Security threats, risks and mitigation strategies as well as solutions available.  The conference on Day One will highlight cyber security topics from designing security architecture to the latest update of global as well as Indonesia cyber security threats. On the second day, four workshop tracks cover the hands-on on current honeypot technology, malware, incident response and digital forensics. Workshop tracks provide excellent learning opportunity for the attendees to work on the honeypot implementation, malware analysis, incident response investigation methods to uncover new security threats and various techniques to perform digital forensics.

The Speakers

Meet the security experts


Indonesia Honeynet Project Lead


Minister of Communication and Information Technology

Kean Siong

Honeynet Project Director

Deograt Lumy

Senior Information Security Consultant


Direktur Keamanan Informasi

Prof. Eko

Professor of computer science and information system at Asian Banking Finance and Informatics Institute (ABFI) Perbanas


CEO and chief architect of Antiy AVL Mobile Security Company

Surya Kusuma

Country Manager HPE Aruba Indonesia

Event Schedule


8:30 am - 9:30 am


9:30 am - 12:35 pm

Morning Session

Charles Lim, Semuel Abrijani Pangerapan*, Gildas Deograt Lumy, Tan Kean Siong, and Tom Pan

IHP Welcome Address – Charles Lim

Government Keynote Speaker : Strategic Policy Towards Cyber Security – Semuel Abrijani Pangerapan*

IHP Industry : Architecture of Future Security Platform – Gildas Deograt Lumy

IHP Malaysia Chapter: WannaCry Ransomware in My Honeypot! – Tan Kean Siong

HPE Aruba – Gordon Tan

Mobile Threat Escalation and Migration Beneath The Long-Tail – Tom Pan

1:35 pm - 4:35 pm

Afternoon Session

Rudi Lumanto, Yohanes Syailendra, and IGN Mantra

Palo Alto: Cost of Cyber Security & Considerations – Annamalai Chockalingam

IDSIRTII : Fact & Trend Analysis of Cyberattack in Indonesia – Rudi Lumanto

ARBOR: Know Your (DDoS) Enemy – Narumol Somboon

IHP Research Update – Yohanes Syailendra

ACAD-CSIRT Update – IGN Mantra

8:00 am - 5:00 pm

Workshop Track A – Honeypot

Enrico Hugo, Tan Kean Siong, and Rasyid Naif Dahbul

Honeypot is a decoy system that is deployed between production systems to trick cyber attacker. This is an introductory workshop to provide hands on basics of Honeypot, including type of honeypots and how to implement them.

Morning Session (Enrico Hugo & Hilman): Introduction to Honeypot and implementation

Afternoon Session (Tan Kean Siong & Rasyid Naif Dahbul): Hands on experience with Dionaea and Kippo Honeypot. Working with log and data of honeypots

Attendees: Technical or Non-technical people

Hardware Requirement: Laptop with minimal 4 GB RAM and 40 GB free storage space.

8:00 am - 5:00 pm

Workshop Track B – Malware Analysis

Digit Oktavianto and Yohanes Syailendra

This workshop will introduce the working of practical malware analysis, static and dynamic analysis. Hands on experience of using various malware analysis tools to analyze real malware samples to gain understanding the inner working of malicious code.

Morning Session (Digit Oktavianto): Basic static and dynamic malware analysis

Afternoon Session (Yohanes Syailendra): More advanced malware analysis by extracting features from malware analysis for binary program classification using machine learning.

Attendees: Technical people

Hardware Requirement: Laptop with minimal 8 GB RAM and 80 GB free storage space

8:00 am - 5:00 pm

Workshop Track C – Incident Handling

IGN Mantra, Enrico Hugo, and Rinkel

This is an introductory workshop on handling security incidents in an organization. This workshop will cover practical aspects of analyzing incident to uncover various possible security threats undetected at the security perimeter.

Morning Session (IGN Mantra): Basic security incident handling framework and process involved

Afternoon Session (Enrico Hugo & Rinkel): Practical experience of detecting network security threats, e.g. DDOS attacks using DNS and netflow traffic.

Attendees: Technical and non-technical people

Hardware Requirement: Laptop with minimal 4 GB RAM and 40 GB free storage space.


8:00 am - 5:00 pm

Workshop Track D – Digital Forensic

Christopher Rianto and Mario Marcello

This workshop will teach practical techniques to trace, detect and analyze various industry cases including cyber criminal cases. This workshop will cover basic and intermediate level digital forensic techniques and to perform investigation effectively.

Morning Session (Mario Marcello): Basic Digital Forensics on storage media

Afternoon Session (Christopher Rianto): Practical Digital Forensics techniques to investigate into various industrial fraud cases.

Attendees: Technical or Non-technical people

Hardware Requirement: Laptop with minimal 8 GB RAM and 80 GB free storage space.



This event is eagerly awaited by IT security enthusiasts in Indonesia. The previous events were participated by students, IT professionals, researchers, companies and Governments. The material discussed were very beneficial for the development of IT security in Indonesia.

Abrao Ximenes

This event is a very unusual event. The materials is high quality and able to deliver a deep knowledge to participants in the field of IT security.

Imam Asrowardi

Supported By


  • Aruba
  • Paloalto
  • First Media
  • avl mobile security
  • Arbor


  • NetSec.ID

Location & Venue


Balai Kartini

Jakarta, Indonesia

Additional details
Luna +62 828 1707 8812

Nadine +62 812 8595 7477

Fanny +62 816 898 005