2025 Edition Has Been Concluded Successfully! See You All In 2026! 2025 Edition Has Been Concluded Successfully! See You All In 2026! 2025 Edition Has Been Concluded Successfully! See You All In 2026! 2025 Edition Has Been Concluded Successfully! See You All In 2026!

Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:10 AM

INAUGURATION

09:10 AM – 09:20 AM

Fortifying the Philippines’ digital future: Defending national interests in an increasingly hostile digital world

  • Harnessing the power of the Philippines’ National Cybersecurity Plan (NCSP) 2023-2028 to safeguard critical infrastructure, public institutions, and private enterprises
  • Fostering a cybersecurity workforce through government-led capacity-building programs and industry certifications
  • Adapting the Philippines’ Cybersecurity Resilience Framework to counteract APTs and cyber espionage
David Almirol Jr.

David Almirol Jr.

Undersecretary for e-Government

Department of Information and Communications Technology

09:20 AM – 09:30 AM

Safeguarding Data in a Hyperconnected World: Strengthening Privacy, Compliance, and Resilience

  • Enforcing the Philippines’ Data Privacy Act (RA 10173) to protect citizens and businesses from data breaches
  • Strengthening data encryption, anonymization, and access controls to prevent unauthorized exposure
  • Navigating cross-border data transfer regulations to ensure compliance with APEC, CBPR and GDPR
Atty. Jose Sutton Belarmino II

Atty. Jose Sutton Belarmino II

Deputy Privacy Commissioner

National Privacy Commission

09:30 AM – 09:50 AM

The Unified Cloud Security Mandate: Bridging Visibility Gaps and Automating Remediation for Enterprise-Scale Protection

  • Challenge the effectiveness of siloed cloud security solutions and identify the hidden risks they fail to address
  • Learn about essential capabilities that provide complete visibility, contextual risk analysis, and automated remediation recommendations across all cloud platforms
  • Explore how integrating unique features like blast radius visualization and AI-powered asset search can transform your security posture and deliver real business value
Oliver Patron

Oliver Patron

Assistant Director for Solutions Consulting and Architecture

Globe Business

09:50 AM – 10:10 AM

Manila Secure 2025: Insights into the Emerging Threat Horizon

  • Key threat trends observed in 2025, including ransomware evolution, supply chain compromises, and targeted fraud campaigns
  • The business and operational impact of major cyber incidents; lessons learned and strategic takeaways for improving cyber resilience
  • How organizations can move toward a more proactive, intelligence-driven defense posture
Eddie Zeng

Eddie Zeng

Senior Sales Engineer

Recorded Future

10:10 AM – 10:30 AM

Intelligent Escort, Resilient Growth: The New Paradigm of AI-Driven Cybersecurity Operations

  • Long-standing challenges that remain difficult to solve, such as security fragmentation, massive alert floods, high false positives, and the scarcity of cybersecurity talent
  • Simplifying customer security operations through AI integration, extensive third-party interoperability, and comprehensive visualization – empowering clients
  • Tackling complex and evolving security challenges
Grant Mappatao

Grant Mappatao

Senior Solutions Manager

Sangfor

10:30 AM – 11:00 AM

High Risk Users & Where to Find Them

Despite advancements in cybersecurity tools, human error remains the leading cause of breaches, with phishing attacks, insider threats, and credential misuse continuing to dominate the threat landscape. Independent research highlight 68% of cyber incidents stem from human error, reinforcing Mimecast’s human-risk research revealing that almost 10% of employees account for 80% of security incidents.
My session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk.
You will gain insights into measuring user risk effectively and implementing tailored strategies to enhance cybersecurity across their organizations. My session will also highlight how a personalized and adaptive security approach can provide customized security measures for each user. By focusing on these high-risk individuals, organizations can safeguard their workforce while maintaining operational productivity.

Barry Chen

Barry Chen

Regional Director, Asia

Mimecast

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Strengthening Cybercrime Suppression in the Philippines: A Multi-Stakeholder Approach

  • Enhancing national cyber intelligence through real-time information sharing, centralized threat tracking, and coordinated inter-agency response across CICC, PNP, NBI, and private sector partners.
  • Closing legal and technical gaps in cybercrime enforcement through updated legislation, stronger digital evidence protocols, and enhanced training for prosecutors and judges.
  • Empowering communities as the first line of defense through nationwide cyber awareness campaigns, LGU engagement, and accessible reporting tools for citizens.
Renato Paraiso

Renato Paraiso

Deputy Executive Director

Cybercrime Investigation and Coordinating Center

11:40 AM – 12:00 PM

Securing the Edge: A Modern Approach to App & API Protection

  • Defending modern apps and APIs with Fastly’s next-gen WAF, optimized for cloud environments and built to scale with your traffic
  • Embracing Detection-as-Code
  • Securing workloads seamlessly across any environment with consistent policy enforcement and edge-native protections
Shu Teng Loh

Shu Teng Loh

Senior Solutions Engineer

Fastly

12:00 PM – 12:20 PM

Future-Proofing Cybersecurity: Harnessing Emerging Tech for Resilience in 2025 and Beyond

  • Why is AI required in cybersecurity?
  • How cyber attackers can use AI?
  • What Strategies Can Enhance Cyber Resilience in Response to Evolving AI-Driven Threats?
Paul Ivan Villacrusis

Paul Ivan Villacrusis

Technical Solutions Consultant

ManageEngine

12:20 PM – 12:40 PM

Cloudy… The Future of SecOps with Disruptive AI

  • Digital resilience requires in-depth understanding of the business.
  • Having a SOC is not only about improving MTTD & MTTR. Blending the technology with people & process is a never-ending journey.
  • Business transformation driven by AI has changed the Security landscape across various industries. AI adoption gets a mixed opinions among the stakeholders. What’s your next move?
Tengku Shahrizam

Tengku Shahrizam

Senior Security Advisor, Asia

Splunk

12:40 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:00 PM

Security Culture as a Strategic Advantage: Building a Cyber-Resilient Organization

  • Moving beyond compliance checkboxes to foster a proactive cybersecurity mindset
  • Measuring cybersecurity culture and employee readiness through risk-based awareness programs
  • Encouraging leadership engagement and accountability in cybersecurity initiatives
Wilkins Win Wong

Wilkins Win Wong

Assistant Director

Securities and Exchange Commission

14:00 PM – 14:15 PM

Cybersecurity for SMEs – Protecting Digital Assets on a Budget

  • Exploring affordable tools and best practices SMEs can implement to safeguard their digital assets without breaking the bank
  • Understanding the most common cyber risks faced by SMEs, such as phishing, ransomware, and data breaches, and how to mitigate them effectively
  • Learning how to prioritize cybersecurity spending, leverage free and low-cost solutions, and build a security-conscious company culture
Francel Margareth Padilla

Francel Margareth Padilla

Cybersecurity Woman Leader and Evangelist

Armed Forces of the Philippines

14:15 PM – 14:45 PM

Panel Discussion

The CISO’s Playbook: Balancing Security, Innovation, and Boardroom Expectations

  • Managing cybersecurity in an era of increasing regulations, AI-driven threats, and shrinking budgets
  • Understanding AI: The double-edge sword. How are CISOs, CAIOs and IT Leaders leveraging AI to protect from AI
  • Despite cybersecurity’s recognized importance, a gap persists between boards and CISOs, hindering strategic alignment – Solving the eye-to-eye approach
Moderator
Albert Pangilinan Dela Cruz

Albert Pangilinan Dela Cruz

Chief Information Security Officer

GoTyme Bank

Alexander Antukh

Alexander Antukh

Chief Information Security Officer

AboitizPower

Russell Hernandez

Russell Hernandez

Chief Information Security Officer

UnionDigital Bank

Marlon Sorongon

Marlon Sorongon

Chief Information Security Officer

MayBank Philippines

14:45 PM – 15:00 PM

From Vulnerability to Resilience: Cybersecurity in Philippine Health Data Systems

  • The growing appeal of medical records to threat actors and the rise in healthcare-specific cyberattacks
  • Challenges around outdated infrastructure, fragmented systems, and limited cybersecurity readiness
  • Building resilience through policy reforms, workforce training, public-private collaboration, and investment
Bently Roxas

Bently Roxas

Director IV-Knowledge Management and Information Technology

Department of Health

15:00 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:30 AM – 09:30 AM

REGISTRATION & COFFEE

09:30 AM – 09:50 AM

Operational Accomplishments of the Anti-Cybercrime Group: Safeguarding the Digital Frontier

  • Targeted enforcement against cybercriminals through high-impact operations, successful case resolutions, and strong inter-agency and international collaboration
  • Advancing cybercrime investigations through modern tools, specialized training, and intelligence-driven operational planning
  • Strengthening public protection through digital safety campaigns, multi-sector collaboration, and initiatives that promote responsible online behavior and real-time reporting
Police Brigadier General Bernard R. Yang

Police Brigadier General Bernard R. Yang

Director

Philippine National Police – Anti-Cybercrime Group

09:50 AM – 10:10 AM

Digital Transformation and Cybersecurity: Finding the Right Balance Between Innovation and Risk

  • Embedding security into digital transformation strategies to prevent vulnerabilities
  • Mitigating risks associated with cloud migration, remote work, and IT modernization
  • Ensuring business continuity with adaptive cybersecurity frameworks in a digital-first economy
Alwell Mulsid

Alwell Mulsid

Head Cyber Incident Response Team – Information Technology Officer

Cybersecurity Bureau – Department of Information and Communications Technology

10:10 AM – 10:30 AM

Smart & Secure: Rethinking Cybersecurity Procurement in a Rapidly Evolving Threat Landscape

  • Shifting from checkbox compliance to strategic, risk-based cybersecurity procurement that supports long-term resilience
  • Effectively evaluate AI-driven, Zero Trust solutions in a crowded vendor landscape.
  • Balancing compliance, agility, and collaboration across departments to navigate public sector and supply chain complexities
Maria Francesca Del Rosario

Maria Francesca Del Rosario

Undersecretary

Department of Budget and Management

10:30 AM – 11:00 AM

Panel Discussion

Assume-breach: The New Standard in Cyber Resilience

  • Enabling organizations to prepare, respond, and recover swiftly from cyber threats, ensuring uninterrupted business operations
  • Leveraging artificial intelligence to boost data protection, threat detection, and automated recovery
  • Securing data across hybrid and multi-cloud environments with real-world applications and hands-on learning
Moderator
Carlos Tengkiat

Carlos Tengkiat

Chief Information Security Officer

Rizal Commercial Banking Corporation

John Alarcon

John Alarcon

Chief Information Security Officer

PJ Lhuillier Inc.

Soh Kiat Hiong

Soh Kiat Hiong

Head of Solutions Engineering, Asia

Rubrik

Jonathan Pineda

Jonathan Pineda

VP-Chief Information Security Officer

Government Service Insurance System

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:50 AM

The Ultimate Goal: Making IT Security Simple, Scalable & Secure

  • Knowing what to protect
  • Policy and the link to technology
  • Layering your defenses
Francisco Castillo

Francisco Castillo

SVP-CIO

Maynilad Water Services, Inc.

11:50 AM – 12:10 AM

Cyber Heists of the Future: AI-Powered Bank Fraud, Digital Money Laundering, and Cryptocurrency Attacks

  • Analysing how AI is being used to conduct large-scale financial fraud and money laundering
  • Securing digital transactions with AI-driven fraud detection and blockchain analytics
  • Strengthening banking cybersecurity policies to prevent AI-enhanced financial crime
Joseph Victor Generato

Joseph Victor Generato

Director II

Maritime Industry Authority (MARINA)

12:10 AM – 12:40PM

Panel Discussion

Biometric Security Under Attack: Protecting Against Spoofing, Replay, and Deepfake Fraud

  • Examining vulnerabilities in fingerprint, facial recognition, and voice-based authentication
  • Strengthening biometric security with liveness detection and multi-modal authentication
  • Ensuring regulatory compliance and privacy in biometric-based identity verification solutions
Moderator
Allan Cabanlong

Allan Cabanlong

Regional Director

Southeast Asia Hub, Global Forum on Cyber Expertise

Roland Oscuro

Roland Oscuro

Chief Information Security Officer / Data Protection Officer

Philippine National Bank

Dexter Erro

Dexter Erro

Chief Information Security Officer

UNO Digital Bank

Jonah Dunca

Jonah Dunca

Chief Information Security Officer

Philippine Veterans Bank

12:40 PM – 13:40 PM

LUNCH BREAK

13:40 PM – 14:00 PM

The Human Factor in Cybersecurity: Turning Employees into the First Line of Defense

  • Creating a cybersecurity-aware culture through training, gamification, and phishing simulations
  • Reducing insider threats through behaviour monitoring and risk-based access controls
  • Empowering non-technical staff to recognize and respond to cyber threats effectively
Judy Ulysses Lacsamana

Judy Ulysses Lacsamana

AVP - Cybersecurity

2Go Group Inc

14:00 PM – 14:20 PM

Fireside Chat

The Shadow Supply Chain: Cyber Threats Lurking in Third-Party Vendors and Software Dependencies

  • Analysing real-world attacks where supply chain vulnerabilities were exploited
  • Implementing AI-driven risk assessment and vendor security evaluation strategies
  • Enhancing software supply chain security through continuous monitoring and zero-trust principles
Moderator
ROBERT SANCHEZ PAGUIA

ROBERT SANCHEZ PAGUIA

Division Chief and Data Protection Officer

Cybercrime Investigation And Coordinating Center (CICC)

Jojo Nufable

Jojo Nufable

VP and Group Chief Information & Cyber Security Officer

St. Luke’s Medical Center

Gonz Gonzales

Gonz Gonzales

President

Cloud Security Alliance Philippines

14:20 PM – 14:50 PM

Panel Discussion

Navigating Compliance in the Digital Age & Complying with Data Protection Laws

  • Implementing robust security measures to protect sensitive data from breaches, cyber threats, and unauthorized access
  • Safeguarding personal and organizational data to build confidence among customers, stakeholders, and regulatory bodies.
  • Establishing a robust cybersecurity framework to detect, respond to, and mitigate data breaches in compliance with legal requirements
Moderator
Algen Nazareno

Algen Nazareno

Head of Content Protection and Information Security

ABS-CBN

Maria Concepcion Gloria-Rubio

Maria Concepcion Gloria-Rubio

Data Protection Officer

Philippine Amusement and Gaming Corporation

Henry Macasiano

Henry Macasiano

Head of Information Security

Metro Pacific Tollways Corporation

Steffen Minkmar

Steffen Minkmar

Head, IT Risk and IT Resilience

Asian Development Bank

14:50 PM – 15:00 PM

The effect of Synthetic Media in Cyber Policing

  • Exploring how deepfakes and AI-generated content are exploited for cybercrime and misinformation
  • Tools and techniques for identifying and verifying manipulated media in cyber investigations
  • Addressing policy gaps, enforcement hurdles, and capacity-building needs in cyber policing synthetic media
Jay Guillermo

Jay Guillermo

Chief - Cyber Response Unit

Philippine National Police – Anti-Cybercrime Group

15:00 PM – 16:00 PM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

16:30 – 16:40

Opening Ceremony

16:40 – 16:50

Grand Premier Performance

16:50 – 17:00

Keynote Address from VIP Chief Guest

17:00 – 17:20

Introductory Address by the Jury Committee

17:20 – 18:00

Awards Presentation
Ceremony

18:00 – 18:10

Closing Remarks

18:10 – 18:20

Closing Performance

18:20 – 19:30

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #PhilSec Newsletter