Agenda 2024

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

08:00 – 09:00

Registration and Refreshments

09:00– 09:15

The National Privacy Commission's Role in Safeguarding the Right to Data Privacy and the Right to a Safe Cyber Space

Efforts and accomplishments of the National Privacy Commission towards finding the balance between data privacy and cybersecurity in safeguarding Filipinos right to data privacy and right to a safe cyber space.

ATTY. JOHN HENRY D. NAGA

ATTY. JOHN HENRY D. NAGA

Privacy Commissioner And Chairman

National Privacy Commission

09:15 – 09:30

Bleeding Edge Cybersecure Philippines: CICC’s Agile Stance Proving National Resilience and Global Leadership

Asec MARY ROSE MAGSAYSAY

Asec MARY ROSE MAGSAYSAY

Deputy Executive Director

Cybercrime Investigation And Coordinating Center (CICC)

09:30 – 09:50

From Risk to Resilience: A Roadmap to Zero Trust with Everywhere Security

  • Understanding the Evolving Threat Landscape
  • Cloud Security Modernization Principles
  • Benefits of Everywhere Security
LUU TUAN ANH

LUU TUAN ANH

Solutions Engineering

Cloudflare ASEAN

09:50 – 10:10

From The Front Lines: A Tale of Two Incidents

In this talk, a Sygnia incident response expert highlights the impactful role of small and simple changes in safeguarding organizations. Through a comparison of two real-life attacks by the same threat actor, witness how seemingly basic and obvious measures like awareness, effective tool usage, and swift response can prevent major disasters. It’s a compelling example that sometimes, the simplest solutions stand as the strongest defence against cyberattacks.

DANIEL ZATZ

DANIEL ZATZ

Director, Cyber Security Services, ANZ

Sygnia

10:10 – 10:30

Info Stealer Malware - Improving Investigations Using Threat Intelligence

  • The rise of Info Stealers, how they are marketed and monetised, as well as what kind of data they can capture
  • What has fuelled the recent growth in Info Stealer Malware and their targets
  • How Recorded Future can help to the threat of Info Stealer Malware
JOEY LIM

JOEY LIM

Sales Engineer

Recorded Future

10:30 – 11:00

Panel Discussion

Navigating the Ransomware Landscape: Strategies for Prevention, Response, and Resilience

  • Analyzing the most efficient preventive measures that organizations should adopt to minimize the risk of succumbing to ransomware
  • Implementing an in-depth incident response plan to boost defenses against ransomware attacks
  • Building Ransomware Resilience: Strategies for mitigation, recovery, and future preparedness
Moderator
ROBERT SANCHEZ PAGUIA

ROBERT SANCHEZ PAGUIA

Division Chief and Data Protection Officer

Cybercrime Investigation And Coordinating Center (CICC)

CHRIS THOMAS

CHRIS THOMAS

Senior Security Advisor

ExtraHop

CARLOS TENGKIAT

CARLOS TENGKIAT

Chief Information Security Officer

Rizal Commercial Banking Corporation

FRANCIS EUSTON ACERO

FRANCIS EUSTON ACERO

Vice President and Data Privacy Officer

Manila Electric Company

11:00 – 11:30

Networking Break & Visit To Exhibitor Lounge

11:30 – 11:50

Quantifying Cyber Risk

  • Economics of Cyber Risk
  • Why is Cyber Risk Quantification Critical to enterprises.
  • Board & CEO metrics for Cyber Risk.
  • Approach & Methodology of CRQ – Data Drive Approach
  • Mitigation, Solution to reducing the impact of cyber Risk (Connecting dots backwards)
  • Case Study
DERIC KARUNESUDAS

DERIC KARUNESUDAS

Director - Cybersecurity Sales

MASTERCARD

11:50 – 12:10

Where does ransomware go from here?

It is no secret that ransomware is still the biggest cyberthreat this year.  What is not well known is how ransomware has subtly evolved since the pandemic.  This session will talk about the recent evolution of ransomware and where in may be headed in the near future.

GUY ROSEFELT

GUY ROSEFELT

Chief Product Officer

Sangfor Technologies

12:10 – 12:30

Darktrace: How AI and Cyber Converge for a Full Lifecycle of Cyber Resilience

In this session, learn how AI is being used by threat actors and how security teams can apply the right AI algorithms to the right problem to stay ahead. Cyber AI can assist security teams in providing a full lifecycle of resilience starting with prevention, detection, response and remediation of incidents. The result? Your teams gain greater visibility, insight, and control while mitigating risk.

GERMAINE TAN

GERMAINE TAN

VP, Cyber Risk Management

Darktrace

12:30 – 12:40

SOC: Respond to incidents in under 15 minutes

  • Achieving an Industry-Best SOC Response Time: Learn the methodologies and tools that enable SOC teams to respond to incidents in under 15 minutes.
  • Overcoming SOC Challenges: Gain practical strategies to address common SOC issues such as detecting advanced threats, managing alert fatigue, and mitigating talent shortages.
  • Innovative SOC Management Techniques: Discover real-world applications of cutting-edge SOC management practices to improve efficiency and effectiveness in cybersecurity operations
ALEX HUDELOT

ALEX HUDELOT

Founder and CEO

Theos Cyber

12:40 -13:40

Lunch Break

13:40 – 14:10

Panel Discussion

Navigating Modern Cybersecurity: The Vital Role of IAM in Today's Digital Environment

  • Addressing common challenges in implementing IAM/PAM solutions and suggesting effective remedies
  • Exploring emerging technologies and future trends shaping identity access management
  • Mitigating insider threats through access control and user activity monitoring
Moderator
ALBERT DELA CRUZ

ALBERT DELA CRUZ

FVP - Head of Information Security

Security Bank Corporation

HENRY FARAHAR

HENRY FARAHAR

Strategic Account Director

Ping Identity

ROLAND OSCURO

ROLAND OSCURO

FSVP – CISO / DPO

Philippine National Bank

RB BANEZ

RB BANEZ

Deputy Chief Information Security Officer and Head of Cyber Security Governance

CIS Bayad

14:10 – 14:30

The Nation's Way of Guarding Customer Trust

The rise of our digital economy came with challenges & threats to cybersecurity. This would involve threat actors and fraudsters who continuously develop subtle but effective schemes that target us and our customers. What can we do together, as a Nation, to secure our Customers’ Trust?

MIGUEL GERONILLA

MIGUEL GERONILLA

Chief Information Security Officer

GCash

14:30 – 15:00

Fireside-Chat

Cultivating an Inclusive Cybersecurity Culture for All

  • Emphasizing the significance of diversity for a comprehensive and effective cybersecurity approach
  • Delving into the importance of mentorship and supportive networks for women in cybersecurity
  • Sharing success stories, achievements, and their impact on the industry
Moderator
DR. MARY JOY ABUEG

DR. MARY JOY ABUEG

Vice President

National ICT Confederation
Of The Philippines

SAM JACOBA

SAM JACOBA

President

National Association of Data Protection Officers of the Philippines (NADPOP)

KELSEY HARTIGAN GO

KELSEY HARTIGAN GO

VP Head – IT

SM Prime Holdings, Inc.

15:00 – 15:20

Are Filipinos ready?

Filipinos are susceptible to cyber scams. More than half of cybercrimes documented this year were online scams, according to the police Anti-Cybercrime Group (ACG).We need to look at this seriously and not just create penalties and punishments.

DAVID BALAMON

DAVID BALAMON

Chairman

ICT Industry Council

15:20 Onwards

Closing Remarks & Visit to Exhibitor Lounge

08:00 – 09:00

Registration and Refreshments

09:00 – 09:20

Cybercrime Trends: PNP ACG DATA

  • The PNP ACG data on Cybercrime
  • Addressing the investigative limitations
  • Elaborating the PNPs Initiative
JAY D GUILLERMO

JAY D GUILLERMO

Police Colonel Chief, Cyber Response Unit

Philippine National Police
Anti-cybercrime Group

09:20 – 09:40

Fireside-Chat

Cybersecurity Resilience: Safeguarding Critical Infrastructure and Digital Assets

  • Formulating a comprehensive framework for cybersecurity resilience
  • Components of a robust security resilience program
  • The significance of cybersecurity resilience in business operations
Moderator
GABRIEL TUASON

GABRIEL TUASON

Head, Information Security

Energy development corporation

Maria Francesca Del Rosario

Maria Francesca Del Rosario

Undersecretary

Department of Budget and Management

09:40 – 10:00

Beyond Threat Intelligence: Collective Intelligence through Federated Learning and AI-native Apps

  • Collaboration through federated learning is the best defense and innovation strategy in the world of AI-powered threats and opportunities
  • Business context and industry context must be built as Nano Models for localised intel
  • AI native apps enable sharing localised threat intelligence while preserving privacy
SALEEM JAVED

SALEEM JAVED

Chief Architect & Founder

Human Managed Pte. Ltd

10:00 – 10:20

Zero Client, 0% Ransomware

As ZTNA evolved into one of the biggest buzz words, one of the best ways to ensure Zero Trust starts with a Zero Client. With zero surface of attack, you can almost be sure no amount of ransomware can penetrate your end-client and access your precious data. Join Edwin Lee as he unravels the sure-fire way to achieve 0% ransomware.

EDWIN LEE

EDWIN LEE

Business Development Director

D’Crypt

10:20 – 10:50

Panel Discussion

Fortifying Cybersecurity Measures in Response to Rising Threats across Diverse Industries

  • Assessing the challenges confronting CISO’s today and preparing industries for the evolving threats of the future
  • Navigating the balance: Data privacy versus strong cybersecurity measures
  • Integrating state-of-the-art technologies to enhance cybersecurity resilience
Moderator
RICSON SINGSON QUE

RICSON SINGSON QUE

Lumify Work Philippines Speaker
& CompTIA Ambassador

De La Salle - College of Saint Benilde

FRANK VIBAR

FRANK VIBAR

Chief Information Officer

Metro Pacific Health

JC PRINCIPE

JC PRINCIPE

Chief Information and Transformation Officer

FWD Life Insurance Corporation

JOSEPH FELIX PACAMARRA

JOSEPH FELIX PACAMARRA

Chief Executive Officer

CSP-CERT

10:50 – 11:00

Managing and Protecting Business Data with Synology's Hybrid Cloud Solution

  • Importance of protecting business data amid rising cyber threats
  • Best practices for data protection
  • Real-life implementations and case studies
CLAIRE HUANG

CLAIRE HUANG

Country Manager – Philippines

Synology

11:00 – 11:30

Networking Break & Visit to Exhibitor Lounge

11:30 – 11:50

The Art of Cyber War: Ancient Tactics for Modern Threats

  • Strategic Preparation: Learn why knowing your adversary and meticulous planning are crucial for mitigating cyber threats and outmaneuvering competitors
  • Adaptive Tactics: Discover the importance of flexibility and rapid response in both cybersecurity defenses and business strategies
  • Psychological Warfare: Understand how deception and psychological tactics can disrupt opponents in cyber conflicts and competitive business landscapes
COL FRANCEL MARGARETH PADILLA

COL FRANCEL MARGARETH PADILLA

AFP Spokesperson

Armed Forces of The Philippines

11:50 – 12:10

Understanding The Role of Techno Culture in Maritime Operation

The importance of digitalization and innovation cannot be overstated. As emphasized in various relevant industry reports over the years, there is no other way but to innovate and digitize. Innovation is the fuel of technology, it is an essential component in any maritime digital strategy or structure shift. The general impression is that integrating the culture of innovation is a precious asset in the process of maritime operation appealing to many aspects of its stakeholders, hence, it is vital to develop or design a culture for stakeholders to adopt technology as a supplementary tool for learning and operation. Initiating this culture may be difficult but not impossible. It may be challenged with resistance by the stakeholders and other reasonable factors, hence, the government should take the lead and enable all related efforts towards this end.

JOSEPH VICTOR S. GENERATO

JOSEPH VICTOR S. GENERATO

Director II - Management Information Systems Service

Maritime Industry Authority (MARINA)

12:10 – 12:30

Cyber Security for Organizations in the Age of AI: Key Takeaways

  • AI enhances threat detection, incident response, and adaptive defense systems, while enabling predictive analytics for proactive security measures
  • AI-powered attacks, deepfakes, and adversarial attacks pose significant threats to cybersecurity and information integrity
  • Organizations should invest in AI expertise, prioritize secure AI development, implement AI-specific defenses, and foster collaboration and information sharing
CHARMAINE VALMONTE

CHARMAINE VALMONTE

Chief Information Security Officer

Aboitiz Equity Ventures

12:30 – 13:30

Lunch Break

13:30 – 14:00

Panel Discussion

Adopting Cutting-Edge Technologies for Securing Digital Environments

  • Leveraging threat intelligence and predictive analytics to anticipate and proactively respond to cyber threats
  • Strategies for building resilience against emerging cyber threats
  • Innovations in DevSecOps methodologies to ensure continuous security throughout the development pipeline
Moderator
JED KENLEY CHUA

JED KENLEY CHUA

Chief Information Security Officer

Asia United Bank

HECTOR MELENCIO

HECTOR MELENCIO

Assistant Vice President

Philippine Amusement and Gaming Corporation

MARLON SORONGON

MARLON SORONGON

Chief Information Security Officer

Maybank PH

GERI CAUILAN

GERI CAUILAN

AVP, Head - Cybersecurity Strategy & Innovations

PLDT / Smart Communications

14:00 – 14:20

Build and sustain Cyber, Data, DX and AI Resilience through GRC

  • Integrating GRC to enhance cyber and data resilience
  • Utilizing GRC frameworks to ensure robust DX and AI security
  • Fostering a culture of compliance and accountability to sustain long-term resilience
SAM JACOBA

SAM JACOBA

President

National Association of Data Protection Officers of the Philippines (NADPOP)

14:20 – 14:40

Making Sense of Cybersecurity Table Top Exercises

  • Cybersecurity table top exercise – what it is and what it is NOT
  • Top cybersecurity scenarios applicable to many enterprises
  • 6 areas that need to be evaluated when conducting table top exercises
LAURO MATIAS

LAURO MATIAS

VP IT

EEI Corporation

14:40- 15:00

Exploring the Synergy Between Human Expertise and AI capabilities for Effective Cybersecurity Defense.

  • Employing AI and machine learning to gather, analyze, and share threat intelligence effectively.
  • Utilizing AI to scrutinize user and system behavior by pinpointing activities that deviate from the norm.
  • Embedding artificial intelligence into advanced firewalls of the next generation to improve the detection and prevention of threats.
ROBERT JOSEPH LICUP

ROBERT JOSEPH LICUP

Chapter Governor

Institute of Electronics Engineers of the Philippines (IECEP)

15:00 - 15:20

Fireside-chat

CISO Mindset for Non-CISO: Espousing Inclusive Cybersecurity Culture in the Workplace and at Home

Addressing the importance of integrating a cybersecurity mindset into corporate culture and daily life. This approach ensures that data protection and digital safety are prioritized both at work and at home, making cybersecurity a shared responsibility and a fundamental part of daily routines, thereby reducing risks and enhancing overall security.

Moderator
ALAN SILOR

ALAN SILOR

Former Undersecretary

Department of Information and Communications Technology (DICT)

JOCEL DE GUZMAN

JOCEL DE GUZMAN

Co-Founder

Scam Watch Pilipinas

15:20 - 16:00

Closing Remarks & Visit to Exhibitor Lounge

16:00 – 16:30

Registration & Champagne Reception

16:30 – 16:40

Paparazzi Lights & Photo Sessions

16:40 – 16:50

Opening Performance

16:50 – 17:00

Opening by EMCEE

17:00 – 17:10

Keynote Address by VIP Chief Guest

17:10 – 17:30

Welcome Speech by Jury Committee

17:30 – 18:00

Awards Presentation

  • Cyber Woman of the Year
  • GRC Leader of the Year
  • Digital Leader of the Year
  • GovCyber Innovator Award
  • Enterprise Security Leader
  • CISO of the Year

18:00 - 18:10

Closing Remarks

18:10 - 18:20

Closing Performance

18:20 Onwards

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #PhilSec Newsletter