Virtual Roundtable
The Evolving Focus of the CIO
Digital businesses expect and rely on the Internet to provide mission-critical levels of speed, reliability, and security. Meanwhile, the consequences of cyber attacks on revenue, business operations, and brand reputation can be extremely high.
As enterprises embrace the cloud, they still have the same requirements for security, protection of sensitive data, and compliance as they always have. Yet the attack surface and risk profile are now exponentially larger, and those requirements must be met in new ways. The digital-age CIO is challenged with finding a way to ensure security and compliance on the increasingly distributed and cloud-based network the business is relying on more every day.
- How can businesses be secure in the cloud?
- How is the threat landscape changing?
- What are some of the new approaches the companies have tried this year?
- What are some specific ways that enterprises can leverage cloud-based security to reconfigure and improve their protection?
Attended by:
Co-Founder and CTO at Akseleran
CTO at Teknologi Tujuh
CTO at VIVA Networks
CTO at Mora Telematika
CTO at Gudang Ada Globalindo
Acting CTO at UangTeman
Chief Strategy Officer at Prudential
Group Head of ICT at Austindo Nusantara Jaya
Group Head of Big Data and Analytics at LinkAja
Head of Engineering at Investree
Head of Human Capital Development and Technology at Bank Mandiri
Head of IT Development at Perum DAMRI
Head of IT Operations at Perum DAMRI
Head of IT at Dos Ni Roha
Head of IT Core Systems Innovation at Bank Danamon
VP of Information Security Architecture and Development at Indosat Ooredoo
VP of Engineering at Moka
VP of Corporate Strategy and Performance at Bank Negara
AVP of IT Platform at UangTeman
General Manager of Corporate IT Business Solutions at Kino Indonesia
Director of Application Development Solutions at Red Hat
Network Infrastructure at Sprint Asia Technology
2:20 pm: Log in of the guests
2:30 pm: Welcome address by The Ortus Club and a short address from Akamai
2:45 pm: Discussion instigated by the moderator and continued by the group
3:45 pm: Discussion brought to a close and guests are encouraged to continue networking