11th
ICITDA
(International Conference on Information Technology and Digital Applications)
9 - 10 November 2026
Starts in
ICITDA 2026
News / Information
ICITDA 2026
Important Links
ICITDA 2026
Main Topic
“From Data to Defense: Advancing Cybersecurity Through Intelligence and Automation”
The rapid digital transformation across industries has led to an unprecedented growth in data generation, interconnected systems, and cloud-based infrastructures. While this evolution enhances operational efficiency and innovation, it simultaneously expands the attack surface for cyber threats. Organizations today face increasingly sophisticated adversaries who exploit vulnerabilities using automation, artificial intelligence, and coordinated attack strategies. Traditional rule-based and reactive cybersecurity approaches are no longer sufficient to cope with the scale, speed, and complexity of modern cyberattacks.
One of the primary challenges in contemporary cybersecurity lies in managing and interpreting massive volumes of heterogeneous data generated by networks, endpoints, applications, and users. Security teams are often overwhelmed by alerts, resulting in delayed responses, alert fatigue, and missed critical incidents. Furthermore, advanced persistent threats (APTs), zero-day vulnerabilities, ransomware campaigns, and supply-chain attacks require adaptive and intelligence-driven defense mechanisms rather than static security controls.
The central issue, therefore, is how to transform raw security data into actionable intelligence that supports proactive and automated defense strategies. This transformation requires the integration of data analytics, machine learning, threat intelligence platforms, and security orchestration tools. By leveraging intelligent systems, organizations can identify anomalies, predict potential attack vectors, prioritize risks, and automate incident response processes in real time.
Several research directions emerge from this theme. First, the development of scalable data-driven threat detection models using artificial intelligence and deep learning remains a critical area of investigation. Research may focus on improving detection accuracy, reducing false positives, and enhancing model interpretability. Second, the design of automated security orchestration and response frameworks (SOAR) can significantly reduce response time and operational costs. Third, integrating cyber threat intelligence sharing mechanisms across organizations while preserving privacy and compliance presents both technical and regulatory challenges. Finally, adaptive defense architectures—such as zero trust models and autonomous security systems—offer promising avenues for building resilient cyber infrastructures.
In conclusion, advancing cybersecurity through intelligence and automation is not merely a technological enhancement but a strategic necessity. By converting data into defensive capabilities, researchers and practitioners can move toward predictive, autonomous, and resilient security ecosystems capable of confronting the evolving cyber threat landscape.
The theme emphasizes how data analytics, threat intelligence, artificial intelligence, and machine learning can be leveraged to detect, predict, and mitigate cyber threats in real time. It highlights the integration of security intelligence platforms, automated incident response, behavioral analytics, and adaptive defense architectures to strengthen resilience across networks, cloud systems, and critical infrastructures.
About
Conference Tracks and Topics
TOP PERSONALITIES
Keynote Speakers (TBA)
Check
Important Dates
April 30, 2026
- Submission Deadline
June 1, 2026
- Acceptance Notification
June 15, 2026
- Revision
June 30, 2026
- Camera Ready
July 15, 2026
- Author Registration (Early Bird)
October 10, 2026
- Author Registration
November 9-10, 2026
- Conference Date
GET IN TOUCH
Contact
Organized By:
Universitas Islam Indonesia (Indonesia)
Telephone
+62 274 895287 Ext. 122 (UII)
Venue
Yogyakarta, Indonesia.
icitda@uii.ac.id
informatics@uii.ac.id
Organized by:

Supported by:




