Logo
Cybersecurity

ITSEC Asia Accelerates AI-Driven Cybersecurity Growth in 2025

Press Release
2025 Highlights
Performance
Cybersecurity
Innovation
ITSEC

PT ITSEC Asia Tbk Highlights 2025 Performance: Accelerating AI-Powered Cybersecurity Innovation, Strengthening Financial Execution, and Building Future-Ready Talent Through ITSEC Cybersecurity & AI Academy

ITSEC AsiaITSEC Asia
|
Des 30, 2025
ITSEC Asia Accelerates AI-Driven Cybersecurity Growth in 2025

Jakarta, Indonesia | December 30th 2025PT ITSEC Asia Tbk (IDX: CYBR) today shared key highlights of its 2025 performance, marked by stronger execution across enterprise cybersecurity delivery, continued innovation through AI-powered solutions, expanded capability-building through the ITSEC Cybersecurity & AI Academy and improved financial performance reflecting disciplined execution and growing market demand.

In 2025, ITSEC advanced its mission of delivering cybersecurity outcomes that are measurable, scalable and built for real-world threats. The company continued to sharpen its focus on AI as a practical force multiplier, powering innovation not only in products and services, but also in developing cybersecurity and AI-ready professionals to meet accelerating demand across public and private sectors.

2025 Performance Highlights

Throughout 2025, ITSEC strengthened its position as a leading Indonesian cybersecurity and AI company through progress across the following areas:

  • Financial performance: Delivering stronger financial results in 2025, supported by disciplined execution and sustained demand for cybersecurity and AI solutions.
  • AI-powered cybersecurity innovation: Enhancing AI capabilities across solutions and services to improve detection, response speed and operational efficiency.
  • Expanded delivery impact: Supporting customers across sectors with integrated cybersecurity services and solutions designed to address modern and evolving threats.
  • Stronger end-to-end capability: Advancing a “solutions + talent” approach through the ITSEC Cybersecurity & AI Academy, helping to close the gap between technology needs and workforce readiness.
  • Operational readiness and governance: Continuing to elevate enterprise-grade delivery, governance, and stakeholder confidence as a publicly listed company.

“2025 was about execution and relevance,” said Patrick Dannacher, President Director of PT ITSEC Asia Tbk. “We strengthened our delivery and financial execution while doubling down on AI not as a buzzword, but as a capability that helps organizations detect threats faster, respond smarter, and scale security outcomes. And we complemented that innovation with what the market needs most: globally ready talent through our ITSEC Cybersecurity & AI Academy. Technology alone is not enough. The future belongs to those who build both capability and capacity.”

AI as the Engine of Innovation, Not Just a Feature

AI continues to reshape the threat landscape, including how cyber attacks are launched, scaled, and hidden. In response, ITSEC expanded the role of AI across its cybersecurity ecosystem to deliver practical impact in areas such as:

  • Faster signal-to-decision cycles (turning alerts into prioritized action with the help of agentic AI)
  • Improved detection against evolving threats through smarter agentic AI analysis
  • Higher operational efficiency for security teams through extensive automation in SOC operations and artificial intelligence-driven cybersecurity workflows
  • Enable safe and compliant use of AI, by implementing leading AI governance solutions and industry standards

This approach reflects ITSEC’s commitment to Cybersecurity & AI Delivered: translating technology into outcomes customers can trust.

Completing the Ecosystem: ITSEC Cybersecurity & AI Academy

Beyond solutions, ITSEC continues to invest in building future-ready talent through ITSEC Cybersecurity & AI Academy, a capability-building platform designed to produce cybersecurity and AI-ready talent aligned with industry needs.

The Academy reflects ITSEC’s long-term commitment to strengthening Indonesia’s cybersecurity and AI talent pipeline. As a publicly listed company operating in a fast-evolving threat landscape, ITSEC believes national and industry readiness must be built on both trusted solutions and globally ready human capability.

The Academy strengthens ITSEC’s end-to-end offering by enabling organizations and institutions to access not only technology and services, but also the trained professionals required to implement, operate, and sustain modern cyber defenses.

“The market doesn’t just need better tools. It needs people who can operate them,” added Dannacher. “ITSEC Cybersecurity & AI Academy is a long-term commitment to Indonesia’s cybersecurity and AI-ready talent. We are here to deliver solutions, and we are open to supporting any organization that needs our expertise, from the public sector to enterprises and institutions across the country.”

Looking Ahead

Entering 2026, ITSEC will continue to advance AI-powered cybersecurity innovation while scaling talent development to support national and regional demand for cyber resilience, supported by a focus on sustainable growth and responsible execution as a listed company.

Share this post

You may also like

A Guide to CSOC
Cybersecurity

A Guide to CSOC

Hacks

CSOC stands for Cyber Security Operation Center, but it can be a bit confusing because CSOC teams can also be referred to as Computer Security Incident Response Teams (CSIRT), Computer Incident Response Centers (CIRC), Security Operations Centers (SOC), or Computer Emergency Response Teams (CERT). For the purpose of this article, we will stick to the term CSOC. CSOC works in defense to combat unauthorized activities occurring in strategic networks. Its activities include monitoring, detection, analysis, response, and restoration. CSOC is a team of network security analysts organized to detect, analyze, respond to, report, and prevent network security incidents 24/7, 365 days a year. There are various types of CSOCs categorized based on their organizational and operational models, so let's delve deeper and take a closer look at the different types of CSOCs. Virtual CSOC: As the name suggests, this type of operation often lacks dedicated facilities, and team members work periodically using a reactive approach to cyber threats. I believe that the reactive capabilities of virtual CSOCs cannot be sustained

ITSEC AsiaITSEC Asia
|
Jul 10, 2023 7 minutes read
Top Five Cybersecurity Threats to Small Business Owners
Cybersecurity

Top Five Cybersecurity Threats to Small Business Owners

According to a recent Verizon Data Breach Investigations Report, over the past two years, small and medium-sized businesses have become the primary target of cybercriminals, and they are now more affected by cyber breaches than large-scale businesses. Cyberattacks on SMEs have increased because cybercriminals have predicted that small and medium-sized enterprises have fewer resources to dedicate to their security. Most SMEs lack dedicated security professionals, and they are too small to afford them. This makes them vulnerable and easy targets for cybercriminals. In this context, neglecting security is no longer an option, and the assumption that your business is too small to attract the interest of cybercriminals is unrealistic. TOP FIVE CYBER THREATS AFFECTING SMALL AND MEDIUM-SIZED ENTERPRISES Incompatible Operating Systems and Software: Ensure that your computers and the software running on them are up to date. This is crucial and forms a solid foundation for good security practices. Hackers exploit vulnerabilities in outdated software and operating systems, often infiltrating organizations. Failing to apply software and operating system updates when they

ITSEC AsiaITSEC Asia
|
Jul 20, 2023 5 minutes read
Post-Quantum Cryptography Readiness with ITSEC
Cybersecurity

Post-Quantum Cryptography Readiness with ITSEC

For decades, public-key cryptography has been the backbone of protecting sensitive information, such as financial transactions, personal data, corporate communications, and government secrets. Whether logging into a secure banking app, shopping online, or browsing encrypted websites (like HTTPS), public key infrastructure (PKI) protects your data from cybercriminals. However, the rise of quantum computing introduces transformative and potentially disruptive challenge to this foundation of digital trust. THE QUANTUM REVOLUTION Quantum computers can perform complex computations faster than even the most advanced current supercomputers. While this capability promises breakthroughs in drug discovery and healthcare, materials science or Artificial Intelligence (AI), it also poses a significant threat to current cryptographic systems. Quantum computers could break widely used publickey cryptographic systems (e.g., RSA, ECC), compromising critical infrastructure security such as energy grids, financial systems, and sensitive government communication networks. Compromised public-key cryptography could lead to forged digital certificates or signatures, undermining trust in banking, healthcare, and government services. Quantum cryptography attacks could also compromise billions of connected devices, from smart homes to Industrial Control Systems (ICS), by

ITSEC AsiaITSEC Asia
|
Jul 11, 2025 4 minutes read

Receive weekly
updates on new posts

Subscribe