Agenda Old Layout

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

08:00 – 09:00

Registration and Refreshments

09:00– 09:15

Securing Cyber and Digital Frontiers: Charting a Path to a Resilient Cybersecurity Ecosystem in the Philippines

  • Examining the evolution of the threat landscape in recent years and identifying emerging risks
  • Nurturing a Secure Digital Future: The measures undertaken by the Philippines government to strengthen cybersecurity nationwide
  • Partnering with international organizations and other nations to collectively tackle global cyber threats

09:15 – 09:30

Maximizing Data Privacy and Security Measures to Mitigate Data Threats

  • Promoting robust cybersecurity for safeguarding data privacy
  • Investigate the implementation of advanced encryption algorithms to enhance the overall resilience of data protection infrastructure
  • Define explicit protocols for the management and storage of data, underscoring the significance of safeguarding confidential information

09:30 – 09:50

From Risk to Resilience: A Roadmap to Zero Trust with Everywhere Security

09:50 – 10:10

From The Front Lines: A Tale of Two Incidents

10:10 – 10:30

Cyber Warfare: State-Sponsored Threats and Regional Dynamics

10:30 – 11:00 Panel Discussion

Navigating the Ransomware Landscape: Strategies for Prevention, Response, and Resilience

11:00 – 11:30

Networking Break & Visit To Exhibitor Lounge

11:30 – 11:50

Quantifying Cyber Risk

11:50 – 12:10

Where does ransomware go from here?

12:10 – 12:30

Darktrace: How AI and Cyber Converge for a Full Lifecycle of Cyber Resilience

12:30 – 12:40

SOC: Respond to incidents in under 15 minutes

12:40 -13:40

Lunch Break

13:40 – 14:10 Panel Discussion

Navigating Modern Cybersecurity: The Vital Role of IAM in Today's Digital Environment

14:10 – 14:25

Investigating the Convergence of Web 3.0 and Cybersecurity

  • Building trust and collaboration among varied stakeholders in Web 3.0
  • Fostering a culture of cybersecurity in Web 3.0 organizations and communities
  • Foreseen trends and progressions in the security realm of Web 3.0

14:25 – 14:40 Fireside Chat

Cultivating an Inclusive Cybersecurity Culture for All

  • Emphasizing the significance of diversity for a comprehensive and effective cybersecurity approach
  • Delving into the importance of mentorship and supportive networks for women in cybersecurity
  • Sharing success stories, achievements, and their impact on the industry

14:40 – 14:55

Unveiling the Journey: Tackling Challenges in Implementing and Sustaining a Zero Trust Security Framework

  • Building trust and collaboration among varied stakeholders in Web 3.0
  • Fostering a culture of cybersecurity in Web 3.0 organizations and communities
  • Foreseen trends and progressions in the security realm of Web 3.0

14:55 – 15:10

Proactive Defense Strategies: Adapting to and Foreseeing Emerging Trends in Multi-Vector Attack Methodologies

  • Safeguarding all IT elements (networks and environments) through an efficient and unified security architecture
  • Recognizing vulnerable points in networks and systems prone to multi-vector attacks
  • Adopting advanced threat prevention measures to proactively avert attacks before they inflict harm

15:10 – 15:25

Harmony in Security: Navigating the Future of Authentication Methods for Seamless User Convenience

  • Finding the right equilibrium between robust security measures and a seamless, user-friendly experience.
  • Examining the effectiveness of Multi-Factor Authentication (MFA) in fortifying authentication processes.
  • Assessing the Efficacy of Adaptive Authentication in Mitigating Unauthorized Access

15:25 – 16:25

Closing Remarks & Visit to Exhibitor Lounge

08:00 – 09:00

Registration and Refreshments

09:00 – 09:15

Navigating the Current Landscape of Cybercrime in the Philippines

  • Evaluating the current and future outlook of cybercrime in the Philippines while discussing strategies to enhance national preparedness and resilience
  • Exploring government efforts to address cybercrime, including collaborations with law enforcement agencies, industry partners, and international bodies
  • Investigating the application of AI in cybercrime, delving into the risks it introduces and its potential for enhancing cybersecurity

09:15 – 09:30

Strengthening Security in IR4.0 - Mitigating Risks in the Convergence of Cyber-Physical Systems in the Industry 4.0 Framework

  • Examining cybersecurity risks and vulnerabilities introduced by the interconnected nature of smart devices and systems
  • Exploring encryption methods and communication standards enhancing data security between connected devices
  • Emphasizing the importance of information sharing and standardization in enhancing cybersecurity across the ecosystem

09:30 – 09:50

Beyond Threat Intelligence: Collective Intelligence through Federated Learning and AI-native Apps

09:50 – 10:10

Zero Client, 0% Ransomware

10:10 – 10:30

Cybersecurity Resilience: Safeguarding Critical Infrastructure and Digital Assets

  • Formulating a comprehensive framework for cybersecurity resilience
  • Components of a robust security resilience program
  • The significance of cybersecurity resilience in business operations

10:30 – 11:00 Panel Discussion

Fortifying Cybersecurity Measures in Response to Rising Threats across Diverse Industries

11:00 – 11:30

Networking Break & Visit to Exhibitor Lounge

11:30 – 11:45

Safeguarding Trust: Strategies and Implications of Consumer Data Protection for Enterprises and Agencies

  • Exploring current consumer data protection regulations and compliance standard
  • Examining the connection between data protection efforts and building/maintaining consumer trust
  • Strategies for staying ahead of emerging threats and adapting cybersecurity measures accordingly

11:45 – 12:05

Navigating Social Engineering Threats to Empower and Secure Organizations

  • Striking a balance between implementing robust security measures and ensuring a user-friendly environment for employees
  • Identifying vulnerabilities and assessing the company’s readiness to defend against social engineering attacks
  • Training employees and staff to understand social engineering attacks and how to identify and prevent such attacks

12:05 – 12:25

Enhancing Cybersecurity Protocols Through Collaborative Defense and Information Sharing Among Organizations

  • Emphasizing the significance of sharing information among organizations
  • Facilitating the exchange of threat intelligence
  • Employing collaborative strategies to fortify overall defense

12:25 – 12:45

Fortifying Digital Frontiers: Navigating the Landscape of Endpoint Security

  • Ensuring a smooth integration between endpoint security and overarching network security strategies to achieve thorough protection
  • Adopting cutting-edge solutions such as AI and machine learning for shaping the future of endpoint security
  • Discussing the implementation of a zero trust model in securing endpoints and mitigating the risk of unauthorized access

12:45 – 13:30

Lunch Break

13:30 –14:00 Panel Discussion

Securing Cloud Infrastructure: Protecting Data in the Era of Digitalization to Ensure Robust Security

  • Navigating Cloud Security Threats: Understanding both current and emerging threats in cloud security
  • Leveraging Threat Intelligence in Cloud Security Monitoring: Examining the integration of threat intelligence to elevate the efficiency of cloud security monitoring
  • Overcoming Challenges in Multi-Cloud Security Monitoring

14:00 – 14:15 Fireside Chat

Decoding the Hacker's Mind: Understanding the Psychology Behind Cyber Intrusions

  • Learning from hackers’ tactics to better anticipate and counteract potential cyber threats
  • Measures organizations can take to battle a hacker and mitigate cyber threats
  • Emerging trends organizations should be aware of to enhance their defensive strategies

14:15 – 14:30

Advancing Identity Verification: The Role of Biometrics in Cybersecurity for the Digital Age

  • Examining the role of biometrics in enhancing user experience through the elimination of password requirements
  • Tackling concerns pertaining to the storage and safeguarding of biometric data.
  • Exploring the contribution of biometrics as a crucial element within multi-factor authentication strategies

14:30 – 14:45

Striking the Right Balance: Providing Flexibility while Minimizing Security and Business Risks in Hybrid Work Environments

  • Examining the challenges and opportunities associated with data protection amid the rise of remote work
  • Gaining insights from C-Suite leaders to assess technology solutions, as well as people and processes, to effectively mitigate cyber risks across the entire enterprise
  • Identifying cybersecurity measures that organizations should prioritize to ensure the security of remote work environments

14:45 - 15:00

Exploring the Synergy Between Human Expertise and AI capabilities for Effective Cybersecurity Defense.

  • Employing AI and machine learning to gather, analyze, and share threat intelligence effectively.
  • Utilizing AI to scrutinize user and system behavior by pinpointing activities that deviate from the norm.
  • Embedding artificial intelligence into advanced firewalls of the next generation to improve the detection and prevention of threats.

15:00 – 16:00

Closing Remarks & Visit to Exhibitor Lounge

16:00 – 16:30

Registration & Champagne Reception

16:30 – 16:40

Paparazzi Lights & Photo Sessions

16:40 – 16:50

Opening Performance

16:50 – 17:00

Opening by EMCEE

17:00 – 17:10

Keynote Address by VIP Chief Guest

17:10 – 17:30

Welcome Speech by Jury Committee

17:30 – 18:00

Awards Presentation

  • Cyber Woman of the Year
  • GRC Leader of the Year
  • Digital Leader of the Year
  • GovCyber Innovator Award
  • Enterprise Security Leader
  • CISO of the Year

18:00 - 18:10

Closing Remarks

18:10 - 18:30

Closing Performance

18:30 Onwards

Cocktail & Gala Dinner

Stay Informed Subscribe to Our #PhilSec Newsletter