Anda di halaman 1dari 31

Politeknik Enjinering Indorama

Jl. Kembang Kuning, Ubrug Jatiluhur Purwakarta


Phone : +62264 8301041 / 8301042 / 8301043
Website : www.pei.ac.id
Email : info@pei.ac.id

LAPORAN KEGIATAN SEMINAR

Sheraton Jakarta Gandaria City Hotel


Jl. Sultan Iskandar Muda, RT.10/RW.6, Kby. Lama Utara, Kec. Kebayoran. Baru
Jakarta, Daerah Khusus Ibukota Jakarta 12240

1
Daftar Isi

Latar Belakang....................................................................................................................... 3

Tujuan ................................................................................................................................... 4

Peserta Acara ........................................................................................................................ 4

Peserta PEI ............................................................................................................................ 4

Tempat, Tanggal Pelaksanaan & Website .............................................................................. 4

Undangan ............................................................................................................................. 5

Susunan Acara....................................................................................................................... 6

Ringkasan & Kesimpulan ....................................................................................................... 9

Lampiran-Lampiran ............................................................................................................. 19

Sample Presentasi dari SailPoint .................................................................................................. 19

Surat Tugas ................................................................................................................................. 24

Photo-photo Kegiatan ................................................................................................................. 25

2
Latar Belakang

Konferensi keamanan siber “Indonesia Security Summit 2019” (ISS 2019) di Jakarta.
Menghadirkan lebih dari 400 pakar keamanan siber dan dilaksanakan pada 3-4 September
2019 di Hotel Sheraton Jakarta.

Topik dalam dua hari tersebut terkait keamanan informasi, forensik, kepatuhan keamanan,
hukum siber, dan lain-lain. Secara khusus panelis juga akan mengamati sejauh mana
profesional dan hukum di Indonesia memberikan payung terhadap keamanan siber di era
digital seperti saat ini.

Selain perusahaan dari berbagai vertikal bisnis krusial, dijadwalkan akan hadir dari badan
pemerintah seperti Kemhan, Kemenkeu, Bareskrim Polri, BSSN, Telkom serta Unicorn
Indonesia.

Beberapa pemateri yang sudah dikonfirmasi akan ikut mengisi sesi di antaranya Faisal Yahya
(Head of IT – Cybersecurity & Insurance Enterprise Architect PT. IBS Insurance Broking
Service), Dr. Pratama Persadha (Chairman/Founder CISSReC – Communication & Information
System Security Research Center), Sudarto (CIO Ministry of Finance), COL CHB Ir. Bagus Artiadi
Soewardi, M.Si (Ministry of Defence KEMHAN), Rudi Lumanto (Chairman of ID-SIRTII/CC and
Head of Governance National CSOC – BSSN), Tin Tin Hadijanto (Country Manager EC-Council),
dan masih banyak lagi pembicara dalam acara tersebut.

“Keamanan siber adalah topik yang penting di era digitalisasi ini. Sesuai rilis berbagai laporan,
dengan lebih dari 150 juta pengguna internet yang saat ini ada, Indonesia diprediksi akan
rentan terhadap serangan siber hingga tahun 2025, salah satu faktornya karena kekurangan
ahli keamanan digital,” ujar Direktur Tradepass Sudhir Jena.

Jena melanjutkan, “Indonesia membutuhkan rencana dan solusi permanen untuk mengatasi
masalah keamanan siber. ISS 2019 dirancang untuk membantu menemukan jawaban
tersebut, dengan menjembatani kesenjangan antara pemerintah serta profesional dalam
penyediaan solusi keamanan siber.”

3
Agenda menarik yang coba disajikan dalam dua hari pelaksanaan. Sebagai contoh di sesi
presentasi hari pertama, akan dibahas tentang bagaimana kultur keamanan digital diterapkan
dalam sebuah lingkungan organisasi. Ini penting, tren seperti BYOD (Bring Your Own Devices)
dapat memicu celah keamanan yang disebabkan keteledoran pengguna. Pemahaman tentang
keamanan di sisi pengguna akhir perlu menjadi perhatian organisasi.

Lalu di hari kedua, dalam sesi panel akan membahas bagaimana perkembangan dari mobile
phone forensic di Asia Timur, Pentingnya Enkripsi di Cybersecurity, Cyber Threat Intelligence,
mengatasi perubahan dalam cyber security dan masih banyak lagi topik yang dibahas.

Tujuan
Memberikan pemahaman tentang security awareness secara luas, mencangkup web security,
aplikasi security, dan cloud security agar data tidak diambil atau dirusak oleh pihak yang tidak
berkepentingan.

Peserta Acara
Lebih dari 400 Pakar Cyber Security Indonesia dari berbagai perusahaan swasta, pemerintah,
maupun Perusahaan Luar Negeri.

Peserta PEI
Septian Rheno W, S. Kom., M. Eng., M. Kom., CEH, ECSA
Tiawan., M. Kom
Fauzi Tri Musyafa, S. Kom

Tempat, Tanggal Pelaksanaan & Website


Sheraton Jakarta Gandaria City Hotel ,
Jl. Sultan Iskandar Muda, RT.10/RW.6, Kby. Lama Utara, Kec. Kebayoran. Baru
Jakarta, Daerah Khusus Ibukota Jakarta 12240
https://www.indosecsummit.com/

4
Undangan

WELCOME LETTER

Hello Tiawan,

We are excited to welcome you on board as a VIP Delegate for the 2nd Annual Indonesia Security
Summit.

Your reference number is: #ISS2019/428


Please use this reference number for any further communication.

The summit is all set to take place on 3 – 4 September 2019 in Jakarta, Indonesia.

Focused on the theme, Accelerating Cyber Security for a Safer Indonesia, the 2nd Annual
Indonesia Security Summit will bring together 350+ pre-qualified CISOs, CIOs, CTOs, CEOs, senior
information security, risk, forensics, compliance, cyber law and law enforcement professionals from all
over Indonesia under one roof. This exclusive summit on cyber security will focus on the current state of
cybercrime in Indonesia, latest fraud and breach prevention techniques and will also showcase some of
the latest technologies that help combat cybercrime.

As a delegate, you will get a chance to gather market intelligence on industry trends, hear from
government officials, industry experts and interact with the top cyber security experts from the market.

The event is the perfect platform for you to network with your peers and meet world-class solution
providers under one roof.

For more information, log on to https://www.indonesiasecuritysummit.com/


To be a part of the #ISS2019 community, follow us on

Instagram : www.instagram.com/tradepass_global
Twitter : www.twitter.com/Tradepassglobal
Facebook : www.facebook.com/tradepassevents
LinkedIn : www.linkedin.com/company/tradepassglobal/
Youtube : www.youtube.com/channel/UCFp9q3bmmTR8N6uDIdswaSg

Thank you for choosing to join hands with us. We are thrilled to be your host for #ISS2019 and hope to
make it a grand success.

Regards

Nidhitha Shetty
Client Relations Officer
Tradepass

5
Susunan Acara
Day 1 (3 September 2019)
Time Event- Speaker
8:00 – 8:40 Registration
8:40 – 8:55 Inauguration
8:55 – 9:00 Welcome Address (Praveen Venu, Sales Director, Tradepass)
9:00 – 9:20 Cyber Security and Its Critical Role in Economic Development
(Sudarto, CIO, Ministry of Finance)
9:20 – 9:40 The Danger of Cyber Attacks in Defence Perspective (Col T Ir. Yunus
Subekti, M.AP. Head of Governance and Coorporation Division, Cyber
Defence Center, Ministry of Defence (Kemhan))
9:40 – 10:00 The evolving cyber security landscape : how the cloud helps us all be
more secure (Edy Susanto, Country Lead, Cloud & Enterprise Solution,
Microsoft)
10:00 – 10:20 Cyber Exposure – Understanding and Reducing Your Cyber Risk
(Sugiarto Koh, Regional Director – South East Asia, Tenable)
10:20 – 10:50 Coffee & Networking
10:50 – 11:30 Panel Discussion : The Evolving cyber landscape : why being “secure”
is not enough (Ishak Surjana, CIO FajarPaper,
Setiawan Hermanto, Head of IT Security & Acting CISO, Tokopedia,
Amit Sharma IT Security Head – CISO PT. Smartfren Telecom Tbk,
Rvinder Mawa CIO Sinarmas Mining,
Ewaldo Simon, Digital Forensik Investigator, Directorate General of
Taxes)
11:30 – 11:50 Building Security from the source – Whats your DevSecOps STAR
program? (Jason Khoo, Technical Account Manager, Checkmarx)
11:50 – 12:10 Cyber Threats 2020 : How to Develop Intelligence and stay current in
a multi risk environment? (Faisal Yahya, Head of IT Cybersecurity, PT.
Insurance Broking Service)
12:10 – 12:30 Jonathan Andresen, Senior Director Asia-Pacific & Japan, McAfee

6
12:30 – 12:50 Current state of Blockchain security and future implications (Iwan
Djuniardi, CIO for Directorate General of Tax (DGT), Ministry of
Finance Indonesia)
12:50 – 1:00 eKYC (Ross Oakly, Director, Salt Group)
1:00 – 2:00 Lunch & Networking
2:00 – 2:40 Panel Discussion : Privilleged Access Management – The Cyber
Security Priority (Budiman Tsjin, Solution Engineer Manager ASEAN,
CyberArk,
Jeny Mustopha, CTO, Comonwealth Life,
Agus Pracoyo, Deputy Security Lead, PT. Smartfreen Telecin Tbk
Andeka Putra, CIO, Blue Bird Group
Saladin Effendi, CISO, Bank Mandiri)
2:40 – 3:00 Identitiy at the center of a zero trust network : taking a governance –
based approach to security (Ching-Feng Ku, Director, Sales
Engineering, Asia Pacific & Japan, Sailpoint)
3:00 – 3:20 Case Study : Blue Bird’s Innovation Journey to be the first electric Taxi
Service Provider in Indonesia (Andeka Putra, CIO Blue Bird Group)
3:20 – 3:50 Coffe & Networking
3:50 – 4:10 Security in The E-Com Space/Cashless payment infrastructure (Ricky
Setiadi, Principal Information Security, Blibli.com)
4:10 – 4:30 Delving into the vulnerabilities of datacentres (Billy Yosafat, CIO, DB
Schenker Indonesia)
4:30 – 6:00 Coffe and Networking

7
Day 2 (4 September 2019)
Time Event- Speaker
8:00 – 9:00 Coffe & Networking
9:00 – 9:20 Anticipating Cybercrime : A Glimpse into the Future (AKBP Endo
Priambodo, Head of Coorporation Unit, Directorate of cybercrime,
Indonesia National Police Bareskrim Polri
9:20 – 9:40 Achieving Excellence in Cyber Security – The Evolving Pradigm (Dr.
Pratama Persadha, Chairman/Founder CISSRec)
9:40 – 10:00 Are we secure? Insight on Indonesia’s Current Cyber Threat (Rudi
Lumanto, Chairman of ID-SIRTII/CC and Head of Governance, National
CSOC-BSSN)
10:00 – 10:40 Panel Discussion : Growth of Mobile phone forensics in south east
asia (Christoper rianto, technology director Digifor Intertech Asia,
Fendy Chandra, APAC sales manager, Cellebrite, Ricky Fan, Regional
Director Digital Forensic Laboratory (Data Expert), Tintin Hadijanto
Country Manager Ec Council, Andri Puspo Heriyanto, Forensic Audit
Division, Taxation Departement, Ministry of Finance)
10:40 – 11:10 Coffee & Networking
11:10 – 11:30 Supercharge your security operations (Alfredo Damari, Sales Engineer
,Splunk)
11:30 – 11:50 The Importance of understanding encryption in cyber security
(kristono setiadi, CTO Jakarta Post)
11:50 – 12:10 Rethink Network Security in the era of cloud and mobility (Charles
Kennaway, Regional Sales Manager – Zscaler)
12:10 – 12:30 Cyber Threat Intelligence – Starting Small (Venkatesh Subramaniam,
Global CISO, Olam International)
12:30 – 1:30 Lunch & Networking
1:30 – 2:10 Panel Discussion : Technology Convergence – Driving Change to Cyber
Security (Kristiono Setiadi, CTO Jakarta Post), Eduard Pieters, CIO
Meratus Group, Amitabha Datta Director of Finance & IT Bank SBI

8
Indonesia, Wildan Aliviyarda Vice President – Head of Information
Security Solution, Indosat Ooredoo.
2:10 – 2:30 Role of Dta Science in Cyber Security : Answering Cyber Security
Challenges (Agus Laksono, Head of Data Science, Telkom Indonesia)
2:30 – 2:50 Jakarta Safe City from Analytics Perspective (Juan Kanggrawan, Head
of Data & Analytics, Jakarta Smart City)
2:50 – 3:00 Closing Speech (Priyanka Sachidanandan, Sr. Conference Producer,
Tradepass
3:00 – 4:00 Coffe & Networking

Ringkasan & Kesimpulan


Dari acara tersebut di dapat beberapa kesimpulan diantaranya :
a. Keamanan Politeknik Enjinering Indorama sangatlah rentan sebagai contoh kasus
keamanan di website maupun keamanan sistem local yang ada di Politeknik Enjinering
Indorama, sebagai contoh :

9
b. Pengetahuan Tim IT tentang bidang security masih sangat kurang sehingga diperlukan
training serta pelatihan, berikut list daftar pelatihan yang harus diikuti :

Perm at a Senayan E2-E5


Jl. Tent ara Pelajar 5
Jakart a 12210
62-21-57940868

QUOTATI ON
To: No :663/IX/Q/INIX/19
Bapak : Tiaw an Dat e :04-09-19
PT. Indo Ram a Synt het ics Tbk Valid Unt il :18-10-19

No Cou rse Tit le Sch e d u le D ay( s) /H our ( s) Pa x U nit Pr ice ( Rp . ) D iscoun t Am ou n t ( Rp . )


MikroTik Cert if ed Net w ork Associat e
1 09 – 11 Sept em ber 2019 3/15 1 3,500,000 3,500,000
(MTCNA)
2 MikroTik Cert if ed Rout ing Engineer (MTCRE) 02 – 03 Okt ober 2019 2/10 1 3,500,000 3,500,000
Cert if ed Secure Com put er User (CSCU) +
3 09 – 11 Desem ber 2019 2/12 1 5,500,000 5,500,000
Exam
4 Cert if ed Et hical Hacker (CEH) + Exam 25 – 29 Novem ber 2019 5/25 1 13,500,000 13,500,000
Com put er Hacking Forensic Invest igat or
5 14 – 18 Okt ober 2019 5/25 1 12,500,000 12,500,000
(CHFI) + Exam
6 Cert if ed Net w ork Defender (CND) + Ex am 16 – 20 Sept em ber 2019 5/25 1 10,250,000 10,250,000
Cert if ed Applicat ion Securit y Engineer
7 (Upon Request ) 3/18 1 7,200,000 7,200,000
(ECSP) Jav a + Ex am
Sub Tot al 55,950,000
Tax 10% 5,595,000
Tot al 6 1 ,5 4 5 ,0 0 0

Te r m s a nd Cond it ions
1. Class conf rm at ion will be valid when paym ent done or by signing regist rat ion form from bot h side.
2. Paym ent should be m ade 5 (f ve) days before t raining st art (for personal) and 7 (seven) days aft er invoice receipt (for group corporat e)
3. 20% of t he t raining price will be charged if reschedule is m ade by t he cust om er t hree days before t raining st art .
4. 50% of t he t raining price will be charged if cancellat ion is m ade by t he cust om er seven days before t raining st art .
5. 100% of t he t raining price will be charged if cancellat ion is m ade by t he cust om er on t he day before t raining st art .
6. We reserve t he right t o change t he schedule by t he condit ions m ent ioned previously.
7. Training Locat ion :
PT. Inixin d o Ja k a r t a
8. Course Tim e :
0 9 .0 0 – 1 5 . 0 0
9. Paym ent : (Cash, Cek/Giro or bank t ransfer)
An : PT. Inixin d o Pe r sa d a Re k ay a sa Kom p ut e r
Acc: 1 0 2 -0 0 0 -4 9 3 3 4 1 9
Bank Mandiri KCP Senayan Cit y
10. Ot hers
Cour se w a r e , 2 x Cof e e Br e a k s, 1 x Lu n ch , Fr e e Pa r k in g

Regards,

Cy nd i Ana nd a Put r i
Cust om er Relat ion Of cer

For m or e info:
Mobile Phone : 0858-8856-9101 (WA)
Em ail: cyndi@inixindo.co.id

10
Berikut ini beberapa course dari pelatihan-pelatihan tersebut :

Certified Ethical Hacker

Course Length:
5 Days

What you will learn:


This class will immerse the students into an interactive environment where they will be shown
how to scan, test, hack and secure their own systems. The lab intensive environment gives each
student in-depth knowledge and practical experience with the current essential security systems.
Students will begin by understanding how perimeter defenses work and then be lead into
scanning and attacking their own networks, no real network is harmed. Students then learn how
intruders escalate privileges and what steps can be taken to secure a system. Students will also
learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer
Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have
hands on understanding and experience in Ethical Hacking. This course prepares you for EC-
Council ANSI accredited Certified Ethical Hacker exam 312-50.

Course Outline
Day 1 Day 3
• Introduction to Ethical Hacking • Session Hijacking
• Footprinting and Reconnaissance • Evading IDS, Firewalls, and
• Scanning Networks Honeypots
• Enumeration • Hacking Web Servers
• System Hacking • Hacking Web Applications
Day 2 Day 4
• Malware Threats • SQL Injection
• Sniffing • Hacking Wireless Networks
• Social Engineering • Hacking Mobile Platforms
• Denial of Service Day 5
• IoT Hacking
• Cloud Computing
• Cryptography

11
12
CND – Certified Network Defender

Duration: 5 Days
Course Content
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network
security certification training program. It is a skills-based, lab intensive program based on a job-task analysis
and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).
The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD)
job roles for system/network administrators. The course is designed and developed after extensive market
research and surveys.

The program prepares network administrators on network security technologies and operations to attain
Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to
network security. The course contains hands-on labs, based on major network security tools and techniques
which will provide network administrators real world expertise on current network security technologies and
operations. The study-kit provides you with over 10 GB of network security best practices, assessments and
protection tools. The kit also contains templates for various network policies and a large number of white
papers for additional learning.

Who Should Attend


• Network Administrators
• Network security Administrators
• Network Security Engineer
• Network Defense Technicians
• CND Analyst
• Security Analyst
• Security Operator
• Anyone who involves in network operations

Prerequisites
Having knowledge of operating systems and networking

Course Objectives
After completing this course, students will gain the skills to:
• Understand about computer network and fundamental of defense
• Understand the network security threats, vulnerability, and attacks
• Understand the network security controls, protocols, and devices
• Understand the network security policy design and implementation
• Understand about physical security
• Understand and implement host security
• Understand about managing and implementing Firewall, IDS and VPN
• Understand about wireless network defense

13
14
15
Certified Secure Computer User

Course Length:
2 Days

COURSE DESCRIPTION
The purpose of the CSCU training program is to provide students with the necessary knowledge
and skills to protect their information assets. This class will immerse students into an interactive
environment where they will acquire fundamental understanding of various computer and
network security threats such as identity theft, credit card fraud, online banking phishing scams,
virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information,
hacking attacks and social engineering. More importantly, the skills learnt from the class helps
students take the necessary steps to mitigate their security exposure.

WHO SHOULD ATTEND


This course is specifically designed for todays' computer users who uses the internet and the
www extensively to work, study and play.

Course Outline
Module 01: Foundations of Security
Module 02: Securing Operating Systems
Module 03: Protecting System Using Antiviruses
Module 04: Data Encryption
Module 05: Data Backup and Disaster Recovery
Module 06: Internet Security
Module 07: Securing Network Connection
Module 08: Securing Online Transactions
Module 09: Securing Email Communications
Module 10: Social Engineering and Identity Theft
Module 11: Security on Social Networking Sites
Module 12: Information Security and Legal Compliance
Module 13: Securing Mobile Devices

16
Jadwal training dari pelatihan-pelatihan tersebut :

17
18
Lampiran-Lampiran

Sample Presentasi dari SailPoint

19
20
21
22
23
Surat Tugas

24
Photo-photo Kegiatan

25
26
27
28
29
30
31

Anda mungkin juga menyukai