Fortifying the Philippines’ Digital Future: Defending National Interests in an Increasingly Hostile Digital World
Harnessing the power of the Philippines’ National Cybersecurity Plan (NCSP) 2023-2028 to safeguard critical infrastructure, public institutions, and private enterprises
Fostering a cybersecurity workforce through government-led capacity-building programs and industry certifications
Adapting the Philippines’ Cybersecurity Resilience Framework to counteract APTs and cyber espionage
09:20 AM – 09:30 AM
Safeguarding Data in a Hyperconnected World: Strengthening Privacy, Compliance, and Resilience
Enforcing the Philippines’ Data Privacy Act (RA 10173) to protect citizens and businesses from data breaches
Strengthening data encryption, anonymization, and access controls to prevent unauthorized exposure
Navigating cross-border data transfer regulations to ensure compliance with APEC, CBPR and GDPR
09:30 AM – 09:50 AM
The Rise of Hacktivism 2.0: AI-Powered Political Cyber Attacks and Digital Protest Movements
Exploring how hacktivist groups are using AI to conduct cyber campaigns and digital sabotage
Analysing state-sponsored cyber warfare and the ethical implications of digital activism
Strengthening cybersecurity policies to address politically motivated cyber incidents
09:50 AM – 10:10 AM
Dark AI vs. Defensive AI: A Contest of Algorithms
What are the implications of dark AI for an organization’s cybersecurity practices?
Are cybersecurity teams turning to defensive AI? Is it perfectly designed to predict and mitigate AI-driven attacks
The clash between dark AI & defensive AI – Pushing the boundaries of cybersecurity innovation
10:10 AM – 10:30 AM
The Impact of Public-Private Partnerships on Cybersecurity Defense
How public-private partnerships can contribute to the creation of effective regulations, frameworks, and industry standards
Collaboration between governments and private enterprises – improving real-time threat detection and response
The role of joint initiatives in training and upskilling the workforce to address evolving cyber threats
10:30 AM – 11:00 AM
Panel Discussion
The CISO’s Playbook: Balancing Security, Innovation, and Boardroom Expectations
Managing cybersecurity in an era of increasing regulations, AI-driven threats, and shrinking budgets
Understanding AI: The double-edge sword. How are CISOs, CAIOs and IT Leaders leveraging AI to protect from AI
Despite cybersecurity’s recognized importance, a gap persists between boards and CISOs, hindering strategic alignment – Solving the eye-to-eye approach
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 11:50 AM
Cloud Security in a Multi-Tenant World: Defending Against Misconfigurations, Breaches, and Insider Threats
Addressing cloud misconfigurations and security gaps that expose enterprises to breaches
Enforcing Zero Trust in cloud environments through identity-based access controls and segmentation
Leveraging cloud-native security tools like CWPP, CSPM, and CNAPP to enhance visibility and protection
11:50 AM – 12:10 PM
Zero Trust in a Hyperconnected World: Eliminating Implicit Trust in Enterprise Security
Implementing Zero Trust principles to secure hybrid cloud environments and remote workforces
Using micro-segmentation, continuous authentication, and AI-driven anomaly detection
Addressing challenges in adopting Zero Trust frameworks across global enterprises
12:10 PM – 12:40 PM
Panel Discussion
Cybercriminals in the Cloud: The Rise of Cloud-Based Attacks and Data Exfiltration Strategies
Investigating cybercriminal techniques for hijacking cloud infrastructure and stealing sensitive data
Strengthening cloud security with AI-driven anomaly detection and threat intelligence
Developing cloud-native security policies to prevent unauthorized access and data breaches
12:40 PM – 12:50 PM
Leveraging AI-Driven Data Security to Combat Emerging Cyber Threats
In an ever-evolving cyber landscape, can AI-driven security offer the agility and intelligence needed to outpace cybercriminals?
Creating an AI regulation – how can governments and organizations in the Philippines work together to establish ethical standards for AI use
AI is powerful but not perfect – Can AI Hack Itself?
12:50 PM – 13:00 PM
Securing Identity Verification in the Digital Age: Protecting Users Without Compromising Experience
Exploring the evolution of self-sovereign identity (SSI) and decentralized identity frameworks
Mitigating risks of identity fraud, credential stuffing, and password-based authentication failures
Enhancing trust and privacy in digital identity systems through regulatory compliance and user-centric security
13:00 PM – 13:45 PM
LUNCH BREAK
13:45 PM – 14:15 PM
Panel Discussion
Digital Transformation and Cybersecurity: Finding the Right Balance Between Innovation and Risk
Embedding security into digital transformation strategies to prevent vulnerabilities
Mitigating risks associated with cloud migration, remote work, and IT modernization
Ensuring business continuity with adaptive cybersecurity frameworks in a digital-first economy
14:15 PM – 14:35 PM
Cybersecurity for SMEs – Protecting Digital Assets on a Budget
Exploring affordable tools and best practices SMEs can implement to safeguard their digital assets without breaking the bank
Understanding the most common cyber risks faced by SMEs, such as phishing, ransomware, and data breaches, and how to mitigate them effectively
Learning how to prioritize cybersecurity spending, leverage free and low-cost solutions, and build a security-conscious company culture
14:35 PM – 14:55 PM
The Cyber Arms Race: AI-Driven Offensive Security vs Autonomous Cyber Defense
Examining how AI is enabling real-time cyberattacks and automated penetration testing
Deploying AI-driven defensive mechanisms that predict and neutralize threats before impact
Addressing the risks of AI models being manipulated or exploited by adversaries
14:55 PM – 15:15 PM
The Internet of Insecure Things: Weaponized IoT Devices and the Rise of Smart Cyber Attacks
Investigating large-scale botnet attacks and IoT-enabled ransomware incidents
Strengthening IoT security with firmware updates, network segmentation, and AI-driven anomaly detection
Developing global IoT security standards to protect smart homes, cities, and industries
15:15 – 17:00
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
08:00 AM – 09:00 AM
REGISTRATION & COFFEE
09:00 AM – 09:15 AM
Cyber Warfare and Digital Espionage: Understanding the Threats to National Security and Critical Infrastructure
Analysing geopolitical cyber threats, state-sponsored attacks, and cyber terrorism trends
Strengthening national cyber defence through regulatory frameworks and cyber intelligence sharing
Enhancing public-private partnerships to protect critical infrastructure from cyber sabotage
09:15 AM – 09:30 AM
Security Culture as a Strategic Advantage: Building a Cyber-Resilient Organization
Moving beyond compliance checkboxes to foster a proactive cybersecurity mindset
Measuring cybersecurity culture and employee readiness through risk-based awareness programs
Encouraging leadership engagement and accountability in cybersecurity initiatives
09:30 AM – 09:50 AM
Securing Mobile Devices: Preventing Cyber Threats in an Always-On, Always-Connected World
Addressing mobile malware, SIM swap fraud, and malicious app threats
Implementing mobile threat defence (MTD) and AI-driven security solutions for real-time protection
Strengthening enterprise security policies for mobile device management (MDM) and Zero Trust enforcement
09:50 AM – 10:10 AM
The Digital Doppelganger Threat: Deepfake Scams, AI-Cloned Voices, and Identity Takeovers
Investigating real-world cases of cybercriminals using deepfake technology to manipulate trust
Developing AI-powered verification techniques to detect synthetic media fraud
Strengthening corporate and personal security measures against deepfake-based attacks
10:10 AM – 10:30 AM
Code Injection to Cloud Takeover: The Next Generation of Application-Level Cyber Attacks
Analysing modern attack vectors like AI-generated malware, API vulnerabilities, and serverless exploits
Implementing DevSecOps strategies to secure the software development lifecycle
Leveraging AI to detect, prevent, and mitigate application-layer threats in real time
10:30 AM – 11:00 AM
Panel Discussion
PAM Reimagined: The Ultimate Shield Against Insider Threats and Credential-Based Attacks
Preventing privilege abuse, lateral movement, and ransomware attacks through least-privilege access
Implementing Just-in-Time (JIT) access controls to minimize exposure of high-value accounts
Integrating PAM with Zero Trust and Identity Threat Detection & Response (ITDR) for proactive security
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 11:50 AM
Cyber Heists of the Future: AI-Powered Bank Fraud, Digital Money Laundering, and Cryptocurrency Attacks
Analysing how AI is being used to conduct large-scale financial fraud and money laundering
Securing digital transactions with AI-driven fraud detection and blockchain analytics
Strengthening banking cybersecurity policies to prevent AI-enhanced financial crime
11:50 AM – 12:10 PM
Biometric Security Under Attack: Protecting Against Spoofing, Replay, and Deepfake Fraud
Examining vulnerabilities in fingerprint, facial recognition, and voice-based authentication
Strengthening biometric security with liveness detection and multi-modal authentication
Ensuring regulatory compliance and privacy in biometric-based identity verification solutions
12:10 PM – 12:40 PM
Panel Discussion
Cybercrime as a Service: The Underground Economy of Ransomware, Malware, and Digital Extortion
Unveiling the dark web ecosystem where cybercriminals sell hacking tools and exploit kits
Disrupting Ransomware-as-a-Service (RaaS) and the monetization of cyber extortion
Strengthening international cooperation to dismantle cybercrime syndicates
12:40 PM – 12:50 PM
The Impact of Public-Private Partnerships on Cybersecurity Defense
How public-private partnerships can contribute to the creation of effective regulations, frameworks, and industry standards
Collaboration between governments and private enterprises – improving real-time threat detection and response
The role of joint initiatives in training and upskilling the workforce to address evolving cyber threats
12:50 PM – 13:00 PM
The Rise of Social Engineering 3.0: Defending Against Deepfake Fraud, Phishing, and Digital Manipulation
Examining the next evolution of phishing, vishing, and AI-generated deception tactics
Training employees and executives to recognize and resist highly sophisticated scams
Leveraging behavioural analytics and AI to detect and prevent social engineering attacks
12:50 PM – 13:45 PM
LUNCH BREAK
13:45 PM – 14:15 PM
Panel Discussion
The Human Factor in Cybersecurity: Turning Employees into the First Line of Defense
Creating a cybersecurity-aware culture through training, gamification, and phishing simulations
Reducing insider threats through behaviour monitoring and risk-based access controls
Empowering non-technical staff to recognize and respond to cyber threats effectively
14:15 PM – 14:35 PM
Navigating Compliance in the Digital Age & Complying with Data Protection Laws
Implementing robust security measures to protect sensitive data from breaches, cyber threats, and unauthorized access
Safeguarding personal and organizational data to build confidence among customers, stakeholders, and regulatory bodies.
Establishing a robust cybersecurity framework to detect, respond to, and mitigate data breaches in compliance with legal requirements
14:35 PM – 14:55 PM
The Shadow Supply Chain: Cyber Threats Lurking in Third-Party Vendors and Software Dependencies
Analysing real-world attacks where supply chain vulnerabilities were exploited
Implementing AI-driven risk assessment and vendor security evaluation strategies
Enhancing software supply chain security through continuous monitoring and zero-trust principles
14:55 PM – 15:15 PM
The Road Ahead: Cybersecurity Innovations & Future Trends
Exploring how AI-driven threat detection and automation are transforming cybersecurity strategies
Understanding the shift towards a “never trust, always verify” security model to combat evolving cyber threats
How evolving cybersecurity regulations will shape the future of data protection and risk management
15:15 PM – 16:00 PM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
16:00– 16:30
Red Carpet Moment with Paparazzi Lights
*The above is a running agenda and is subject to change