Securing Digital Futures: Cyber Security & Resilience in the AI Era

As digital transformation continues to rapidly reshape the business landscape, cyber security remains a top priority for senior leaders. In the 2024 ASEAN Enterprise Innovation Survey, Indonesian enterprises (43.7%) cite cyber security and privacy concerns as their top challenge in digital transformation.

AIBP engaged with enterprise technology leaders in Indonesia to explore how emerging technologies are reshaping the threat landscape and how innovative approaches can secure digital transformation. This engagement surfaced a diverse range of insights—from leveraging AI for predictive threat detection to the critical need for a zero-trust framework and comprehensive identity maturity assessments.

This discussion builds on our recent AIBP InsightsBuilding AI-Driven Cyber Resilience in Malaysia and The Evolution of Digital Trust in the Age of AI—which highlighted the need to prioritise cyber security investments and implement robust identity-based security measures. Together, these insights underscore that agile, forward-thinking cyber security strategies are essential not only for mitigating risks but also for empowering the digital economy in an era of rapid innovation.

Key takeaways include:

  • Securing Emerging Technologies: Leveraging AI for predictive threat detection and flexible security solutions protects emerging technologies.

  • Building Cyber Resilience: Adopting continuous monitoring, agile incident response, and integrated IT-OT security measures enables organisations to quickly recover from disruptions and maintain operational continuity.

  • Strengthening Identity & Access Management: Implementing a zero-trust approach with multi-factor authentication and AI-driven risk analysis minimises internal vulnerabilities and secures both employee and customer identities.

  • Looking Ahead: Embedding cyber security into core business strategies through strategic investments and collaborative partnerships drives agile decision-making and sustainable growth.

Securing Emerging Technologies: Navigating New Attack Surfaces

The 2024 ASEAN Enterprise Innovation Survey reveals that nearly 40% of organisations in the region have identified cyber security and privacy as major obstacles in their digital transformation journeys. Emerging technologies like AI, 5G, and the Internet of Things (IoT) are revolutionising business models and operations. However, they also broaden the attack surfaces that cyber adversaries can exploit.

Key insights included:

  • AI as a Dual-Edged Sword: While AI can streamline operations and automate threat detection, it also creates novel vulnerabilities. The importance of using AI for good was highlighted, with a focus on leveraging predictive analytics to preempt attacks. However, it was also acknowledged that adversaries can exploit AI capabilities to breach systems.

  • Event-Driven Automation: The adoption of automation—such as systems that learn from network events and trigger alerts or remedial actions—was identified as a powerful tool for rapidly addressing anomalies in a hybrid environment.

  • Flexibility in Security Solutions: As organisations increasingly operate in multi-cloud and hybrid environments, security measures must be adaptable and neutral, seamlessly protecting on-premises, cloud, and even legacy systems.

By addressing these challenges with advanced encryption, continuous vulnerability assessments, and agile, AI-powered tools, enterprises can transform emerging technologies into secure, value-adding assets.

Building Cyber Resilience: Proactive Strategies for a Secure Future

Data from the 2024 ASEAN Enterprise Innovation Survey indicates a shift toward prioritising resilience. For example, 52.1% of organisations are now directing investments toward cyber security and data protection initiatives, reflecting a broader commitment to building robust defense mechanisms.

Cyber resilience extends beyond the capacity to fend off attacks—it encompasses the ability to anticipate, withstand, and recover from security incidents. Building a resilient digital infrastructure requires continuous improvement, proactive risk management, and a holistic view of security that integrates both IT and operational technology (OT).

Key insights included:

  • Identity Maturity Assessments: Organisations should start by evaluating their current identity and access practices. As mentioned in the discussion, “nobody’s safe under the sun,” stressing the importance of regularly assessing and upgrading security protocols.

  • Agile Incident Response: Agile Incident Response is essential in today's fast-paced threat landscape. Automation plays a pivotal role here—by automating routine tasks such as ticket generation for anomalous events, security teams are freed to concentrate on more complex threats, reducing response times dramatically. This approach was strongly echoed in the previously concluded AIBP Insights: Building AI-Driven Cyber Resilience which discussed how AI is increasingly integrated into cyber security strategies, particularly within Security Operations Centers (SOCs) and digital forensics.

  • Integrating IT and OT: With digitalisation affecting everything from customer-facing applications to critical infrastructure (e.g., port operations), converging IT and OT security practices is essential. The discussion emphasised how securing environments where OT disruptions could lead to severe operational consequences is critical for overall resilience.

  • Continuous Monitoring and Pre-Emptive Action: Leveraging AI-driven “identity track protection” systems that collect signals from various sources helps organisations detect and neutralise threats before they manifest into full-blown incidents.

These proactive measures enable organisations to not only recover quickly from cyber events but also to continually enhance their defenses as threats evolve.

Strengthening Identity & Access Management: The Foundation of Digital Trust

In a digitally interconnected landscape, robust Identity & Access Management (IAM) is the cornerstone of digital trust. The discussion reinforced that effective IAM is critical for both internal security and customer-facing interactions. With rising incidents of credential breaches—often stemming from internal vulnerabilities—implementing a zero-trust approach is more important than ever.

Key insights included:

  • Zero Trust in Practice: Adopting a “never trust, always verify” stance is essential. As highlighted in the discussion, even when access credentials are valid, continuous verification is necessary to mitigate risks posed by internal errors or misconfigurations.

  • Multi-Factor and Adaptive Authentication: Incorporating multi-factor authentication (MFA) and adaptive measures—such as monitoring user behavior and access patterns—can significantly reduce the risk of unauthorised access.

  • AI-Driven Risk Analysis: Modern IAM solutions now incorporate AI to collect signals from surrounding systems (e.g., firewalls, network monitors, and XDR tools). This “identity track protection” can prevent billions of unauthorised access attempts by analysing and acting on risk signals in real time.

  • From Internal to Customer Identity: Beyond managing employee access, organisations must secure customer identities. Effective IAM frameworks ensure that only authorised users can access sensitive services, thereby building trust and enabling secure digital interactions.

By investing in advanced IAM solutions, enterprises can fortify their digital ecosystems, mitigate internal vulnerabilities, and foster a culture of security that resonates with both employees and customers.

Looking Ahead: Integrating Security with Business Strategy

The future of cyber security lies in its integration with overall business strategy. The discussion made it clear that security should no longer be viewed solely as a cost center but as a strategic asset that drives business agility and growth.

Key insights included:

  • Aligning IT with Business Outcomes: Many leaders stressed the importance of linking cyber security initiatives with business goals. For instance, it was noted that secure environments enable more agile decision-making and smoother consolidation or de-consolidation processes—thereby driving operational efficiency.

  • Budgeting for Cyber Security: Despite a growing recognition of its importance, there is a significant budget gap. While many enterprises aspire to allocate over 20% of their IT budgets to cyber security, actual spend often remains below 5%. This disparity underscores the need for a shift in how organisations view cyber security—as both a shield and a competitive differentiator.

  • Fostering Strategic Partnerships: Collaboration between government agencies, industry peers, and technology providers is crucial. Through shared best practices and pooled expertise, organisations can better navigate the complexities of multi-cloud environments and rapidly evolving threat landscapes.

  • Driving Business Growth: When executed correctly, robust cyber security frameworks not only protect assets but also enhance customer confidence, enabling businesses to capture new opportunities in the digital marketplace.

Integrating cyber security into the core business strategy ensures that organisations remain resilient, competitive, and poised for future growth.

Moving Forward

As organisations continue to leverage disruptive technologies like AI, 5G, and IoT, it is essential to adopt a proactive, integrated approach to security—one that not only safeguards digital operations but also drives business value. With continuous improvement, strategic investments, and collaborative partnerships, cyber security can evolve from being viewed as mere insurance into a key enabler of innovation and growth.


For more insights into the cyber security landscape in Southeast Asia, check out our report highlighting key Identity Access Management (IAM) and Privileged Access Management (PAM) strategies for businesses in Southeast Asia.

⇢ To access the full report, register here.

If you are interested to be involved or participate in our upcoming activities, do drop us a note at aibp@industry-platform.com

Next
Next

From Cost to Competitive Edge: Making AI & IT Investments Work For You