Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:10 AM

INAUGURATION & OPENING REMARKS

09:10 AM – 09:20 AM

Fortifying the Philippines’ Digital Future: Defending National Interests in an Increasingly Hostile Digital World

  • Harnessing the power of the Philippines’ National Cybersecurity Plan (NCSP) 2023-2028 to safeguard critical infrastructure, public institutions, and private enterprises
  • Fostering a cybersecurity workforce through government-led capacity-building programs and industry certifications
  • Adapting the Philippines’ Cybersecurity Resilience Framework to counteract APTs and cyber espionage

09:20 AM – 09:30 AM

Safeguarding Data in a Hyperconnected World: Strengthening Privacy, Compliance, and Resilience

  • Enforcing the Philippines’ Data Privacy Act (RA 10173) to protect citizens and businesses from data breaches
  • Strengthening data encryption, anonymization, and access controls to prevent unauthorized exposure
  • Navigating cross-border data transfer regulations to ensure compliance with APEC, CBPR and GDPR

09:30 AM – 09:50 AM

The Rise of Hacktivism 2.0: AI-Powered Political Cyber Attacks and Digital Protest Movements

  • Exploring how hacktivist groups are using AI to conduct cyber campaigns and digital sabotage
  • Analysing state-sponsored cyber warfare and the ethical implications of digital activism
  • Strengthening cybersecurity policies to address politically motivated cyber incidents

09:50 AM – 10:10 AM

Dark AI vs. Defensive AI: A Contest of Algorithms

  • What are the implications of dark AI for an organization’s cybersecurity practices?
  • Are cybersecurity teams turning to defensive AI? Is it perfectly designed to predict and mitigate AI-driven attacks
  • The clash between dark AI & defensive AI – Pushing the boundaries of cybersecurity innovation

10:10 AM – 10:30 AM

The Impact of Public-Private Partnerships on Cybersecurity Defense

  • How public-private partnerships can contribute to the creation of effective regulations, frameworks, and industry standards
  • Collaboration between governments and private enterprises – improving real-time threat detection and response
  • The role of joint initiatives in training and upskilling the workforce to address evolving cyber threats

10:30 AM – 11:00 AM

Panel Discussion

The CISO’s Playbook: Balancing Security, Innovation, and Boardroom Expectations

  • Managing cybersecurity in an era of increasing regulations, AI-driven threats, and shrinking budgets
  • Understanding AI: The double-edge sword. How are CISOs, CAIOs and IT Leaders leveraging AI to protect from AI
  • Despite cybersecurity’s recognized importance, a gap persists between boards and CISOs, hindering strategic alignment – Solving the eye-to-eye approach

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:50 AM

Cloud Security in a Multi-Tenant World: Defending Against Misconfigurations, Breaches, and Insider Threats

  • Addressing cloud misconfigurations and security gaps that expose enterprises to breaches
  • Enforcing Zero Trust in cloud environments through identity-based access controls and segmentation
  • Leveraging cloud-native security tools like CWPP, CSPM, and CNAPP to enhance visibility and protection

11:50 AM – 12:10 PM

Zero Trust in a Hyperconnected World: Eliminating Implicit Trust in Enterprise Security

  • Implementing Zero Trust principles to secure hybrid cloud environments and remote workforces
  • Using micro-segmentation, continuous authentication, and AI-driven anomaly detection
  • Addressing challenges in adopting Zero Trust frameworks across global enterprises

12:10 PM – 12:40 PM

Panel Discussion

Cybercriminals in the Cloud: The Rise of Cloud-Based Attacks and Data Exfiltration Strategies

  • Investigating cybercriminal techniques for hijacking cloud infrastructure and stealing sensitive data
  • Strengthening cloud security with AI-driven anomaly detection and threat intelligence
  • Developing cloud-native security policies to prevent unauthorized access and data breaches

12:40 PM – 12:50 PM

Leveraging AI-Driven Data Security to Combat Emerging Cyber Threats

  • In an ever-evolving cyber landscape, can AI-driven security offer the agility and intelligence needed to outpace cybercriminals?
  • Creating an AI regulation – how can governments and organizations in the Philippines work together to establish ethical standards for AI use
  • AI is powerful but not perfect – Can AI Hack Itself?

12:50 PM – 13:00 PM

Securing Identity Verification in the Digital Age: Protecting Users Without Compromising Experience

  • Exploring the evolution of self-sovereign identity (SSI) and decentralized identity frameworks
  • Mitigating risks of identity fraud, credential stuffing, and password-based authentication failures
  • Enhancing trust and privacy in digital identity systems through regulatory compliance and user-centric security

13:00 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

Digital Transformation and Cybersecurity: Finding the Right Balance Between Innovation and Risk

  • Embedding security into digital transformation strategies to prevent vulnerabilities
  • Mitigating risks associated with cloud migration, remote work, and IT modernization
  • Ensuring business continuity with adaptive cybersecurity frameworks in a digital-first economy

14:15 PM – 14:35 PM

Cybersecurity for SMEs – Protecting Digital Assets on a Budget

  • Exploring affordable tools and best practices SMEs can implement to safeguard their digital assets without breaking the bank
  • Understanding the most common cyber risks faced by SMEs, such as phishing, ransomware, and data breaches, and how to mitigate them effectively
  • Learning how to prioritize cybersecurity spending, leverage free and low-cost solutions, and build a security-conscious company culture

14:35 PM – 14:55 PM

The Cyber Arms Race: AI-Driven Offensive Security vs Autonomous Cyber Defense

  • Examining how AI is enabling real-time cyberattacks and automated penetration testing
  • Deploying AI-driven defensive mechanisms that predict and neutralize threats before impact
  • Addressing the risks of AI models being manipulated or exploited by adversaries

14:55 PM – 15:15 PM

The Internet of Insecure Things: Weaponized IoT Devices and the Rise of Smart Cyber Attacks

  • Investigating large-scale botnet attacks and IoT-enabled ransomware incidents
  • Strengthening IoT security with firmware updates, network segmentation, and AI-driven anomaly detection
  • Developing global IoT security standards to protect smart homes, cities, and industries

15:15 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

Cyber Warfare and Digital Espionage: Understanding the Threats to National Security and Critical Infrastructure

  • Analysing geopolitical cyber threats, state-sponsored attacks, and cyber terrorism trends
  • Strengthening national cyber defence through regulatory frameworks and cyber intelligence sharing
  • Enhancing public-private partnerships to protect critical infrastructure from cyber sabotage

09:15 AM – 09:30 AM

Security Culture as a Strategic Advantage: Building a Cyber-Resilient Organization

  • Moving beyond compliance checkboxes to foster a proactive cybersecurity mindset
  • Measuring cybersecurity culture and employee readiness through risk-based awareness programs
  • Encouraging leadership engagement and accountability in cybersecurity initiatives

09:30 AM – 09:50 AM

Securing Mobile Devices: Preventing Cyber Threats in an Always-On, Always-Connected World

  • Addressing mobile malware, SIM swap fraud, and malicious app threats
  • Implementing mobile threat defence (MTD) and AI-driven security solutions for real-time protection
  • Strengthening enterprise security policies for mobile device management (MDM) and Zero Trust enforcement

09:50 AM – 10:10 AM

The Digital Doppelganger Threat: Deepfake Scams, AI-Cloned Voices, and Identity Takeovers

  • Investigating real-world cases of cybercriminals using deepfake technology to manipulate trust
  • Developing AI-powered verification techniques to detect synthetic media fraud
  • Strengthening corporate and personal security measures against deepfake-based attacks

10:10 AM – 10:30 AM

Code Injection to Cloud Takeover: The Next Generation of Application-Level Cyber Attacks

  • Analysing modern attack vectors like AI-generated malware, API vulnerabilities, and serverless exploits
  • Implementing DevSecOps strategies to secure the software development lifecycle
  • Leveraging AI to detect, prevent, and mitigate application-layer threats in real time

10:30 AM – 11:00 AM

Panel Discussion

PAM Reimagined: The Ultimate Shield Against Insider Threats and Credential-Based Attacks

  • Preventing privilege abuse, lateral movement, and ransomware attacks through least-privilege access
  • Implementing Just-in-Time (JIT) access controls to minimize exposure of high-value accounts
  • Integrating PAM with Zero Trust and Identity Threat Detection & Response (ITDR) for proactive security

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:50 AM

Cyber Heists of the Future: AI-Powered Bank Fraud, Digital Money Laundering, and Cryptocurrency Attacks

  • Analysing how AI is being used to conduct large-scale financial fraud and money laundering
  • Securing digital transactions with AI-driven fraud detection and blockchain analytics
  • Strengthening banking cybersecurity policies to prevent AI-enhanced financial crime

11:50 AM – 12:10 PM

Biometric Security Under Attack: Protecting Against Spoofing, Replay, and Deepfake Fraud

  • Examining vulnerabilities in fingerprint, facial recognition, and voice-based authentication
  • Strengthening biometric security with liveness detection and multi-modal authentication
  • Ensuring regulatory compliance and privacy in biometric-based identity verification solutions

12:10 PM – 12:40 PM

Panel Discussion

Cybercrime as a Service: The Underground Economy of Ransomware, Malware, and Digital Extortion

  • Unveiling the dark web ecosystem where cybercriminals sell hacking tools and exploit kits
  • Disrupting Ransomware-as-a-Service (RaaS) and the monetization of cyber extortion
  • Strengthening international cooperation to dismantle cybercrime syndicates

12:40 PM – 12:50 PM

The Impact of Public-Private Partnerships on Cybersecurity Defense

  • How public-private partnerships can contribute to the creation of effective regulations, frameworks, and industry standards
  • Collaboration between governments and private enterprises – improving real-time threat detection and response
  • The role of joint initiatives in training and upskilling the workforce to address evolving cyber threats

12:50 PM – 13:00 PM

The Rise of Social Engineering 3.0: Defending Against Deepfake Fraud, Phishing, and Digital Manipulation

  • Examining the next evolution of phishing, vishing, and AI-generated deception tactics
  • Training employees and executives to recognize and resist highly sophisticated scams
  • Leveraging behavioural analytics and AI to detect and prevent social engineering attacks

12:50 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:15 PM

Panel Discussion

The Human Factor in Cybersecurity: Turning Employees into the First Line of Defense

  • Creating a cybersecurity-aware culture through training, gamification, and phishing simulations
  • Reducing insider threats through behaviour monitoring and risk-based access controls
  • Empowering non-technical staff to recognize and respond to cyber threats effectively

14:15 PM – 14:35 PM

Navigating Compliance in the Digital Age & Complying with Data Protection Laws

  • Implementing robust security measures to protect sensitive data from breaches, cyber threats, and unauthorized access
  • Safeguarding personal and organizational data to build confidence among customers, stakeholders, and regulatory bodies.
  • Establishing a robust cybersecurity framework to detect, respond to, and mitigate data breaches in compliance with legal requirements

14:35 PM – 14:55 PM

The Shadow Supply Chain: Cyber Threats Lurking in Third-Party Vendors and Software Dependencies

  • Analysing real-world attacks where supply chain vulnerabilities were exploited
  • Implementing AI-driven risk assessment and vendor security evaluation strategies
  • Enhancing software supply chain security through continuous monitoring and zero-trust principles

14:55 PM – 15:15 PM

The Road Ahead: Cybersecurity Innovations & Future Trends

  • Exploring how AI-driven threat detection and automation are transforming cybersecurity strategies
  • Understanding the shift towards a “never trust, always verify” security model to combat evolving cyber threats
  • How evolving cybersecurity regulations will shape the future of data protection and risk management

15:15 PM – 16:00 PM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #PhilSec Newsletter