
Agenda
We’ve got it all.
The agenda is specially curated to bring out the most pressing topics from the industry.
8:00 AM – 9:00 AM
REGISTRATION
9:00 AM – 9:20 AM
Fortifying Digital Philippines: Integrating Cyber Capacity to Ensure Secured Digital Society
· Safeguarding the nation’s digital ecosystem through innovations in cybersecurity
· Creating a robust cybersecurity policy to build a thriving digital economy
· Steering the digital nation agenda with data protection and secured networks to protect its citizens and its own sovereignty
9:20 AM – 9:40 AM
Safeguarding CI With Framework Based on Layered Vigilance and Readiness for a Resilient Philippines
· Defending Critical Information Infrastructure Against Evolving Threats and Vulnerabilities
· Expanding readiness and resilience with continued collaboration amongst key security agencies
· Guiding elements of risk management: Identify, Protect, Detect, Respond & Recover
9:40 AM – 10:00 AM
New-age Cyber Threats: Looking Beyond Traditional Security Approaches to Manage a Wide Range of Risks
· Leveraging the best of cloud, artificial intelligence, and analytics to fend off cybercriminals
· Detecting threats in real time to protect networks, data, devices and digital ecosystem
· Why 5G, IoT, Cloud and 4IR technologies require new approaches to cybersecurity?
10:00 AM – 10:20 AM
Zero Trust - The Vigilant Enterprise: Building a Suitable ZTA to Minimize the Attack Surface
• Embracing Zero Trust Architecture to Address Critical Security Gaps and Ensure Continued IT Transformation
• Identity system: How to address the most critical unit for a zero-trust security posture?
• Inspecting the impact of security offered by “Never Trust, Always Verify” security model?
10:20 AM – 11:00 AM
CISO Panel
The CISO Evolution: Upgrading the Cybersecurity Stack to be Ahead in the Quest for Reliable & Resilient Security
· Creating a simple and agile 360-degree security strategy to ensure comprehensive security
· In a constantly shifting technological environment, leveraging the CISO leadership in enabling scalable, low-risk business frameworks to maximise enterprise protection
· Accelerating collaboration and succinctly communicating top priorities for efficient and effective workplace order

11:00 AM – 11:30 AM
Networking Break
11:30 AM – 11:50 AM
DevSecOps: Building an Effective Software and Open-Source Security Program to Minimize the Attack Surface
• Enabling regulated testing since the beginning of the software evolution to avoid reckless cyber attacks
• Will automating manual processes and integrating DevSecOps congruent tools into CI/CD delivery pipeline enhance workflow and deliver services efficiently?
• Integrating SAST in the building stage to identify and prevent vulnerabilities from passing on to the further stages
11:50 AM – 12:10 PM
Protecting Web Applications and APIs From a Rising Tide of Sophisticated Attacks
• Implementing security strategy to protect WAAPs while expanding scope and security depth
• Analyzing web transactions using a set of AI engines that operate simultaneously to protect against the most sophisticated attacks
• Integrating automated intelligence to provide contextual threat analysis and superior protection
12:10 PM – 12:30 PM
Supply Chain Security: Securing the ITC Ecosystem from Code to Cloud
· Gathering effective and practicable input into supplier risk assessments to determine risk
· Implementing lifecycle management to mitigate and assess security threats
· Enforcing encryption practices at the interface of third-party integrations
12:30 PM – 12:50 PM
Addressing New Cyber Threats with the Confluence of AI, ChatGPT and ML in Building a Cybersecure Future
· AI helps in shaping the future of cybersecurity and contributes enormously to making minimal human errors, but how trustworthy and reliable are they?
· Intelligent Security: How can AI become the strongest cybersecurity ally in an already convoluted world?
· Addressing the challenges in the convergence of AI, ML and Security
12:50 PM – 13:00 PM
DFIR | Digital Forensics and Incident Response: Streamlining the process to Safeguard the Network
• Investigating and evaluating incidents to respond with speed and precision
• Recovering from security events quickly and with limited disruption to business operations
• Leveraging emerging technology to help shape and strengthen preventative security measures

13:00 PM – 14:00 PM
Lunch Break
14:00 PM – 14:40 PM
Panel Discussion
Cyber Secure Cloud - Protecting Cloud Data, Applications and Infrastructure from Threats
· Understanding the challenges in establishing a regulatory compliance management system for enterprises using public or hybrid cloud deployments
· Enhancing visibility into data through various controls – Data classification, DLP & Encryption
· Discussing different levels of cloud security – SaaS, PaaS & IaaS
14:40 PM – 15:00 PM
Cloud Security Framework: Fortifying the Dynamic Cloud Environment to Address the Evolving Challenges & Risks
· Rethinking network security in the flourishing age of cloud services
· How will security, risk control and compliance impact cloud adoption?
· Emphasizing on the growing challenge of securing sensitive data with the rise of Data Breach
15:00 PM – 15:20 PM
Breaking the Cyber Kill Chain - The Importance of Endpoint Security
· Securing endpoints or entry points of end-user devices from being exploited by malicious actors and campaigns
· Enhancing endpoint security as it’s cybersecurity’s frontline and represents one of the first places organizations look to secure their enterprise networks
· Providing comprehensive protection from sophisticated malware and evolving zero-day threats
15:20 PM – 15:40 PM
Stranger Things: Scratching the Surface of the Dark Web and Equipping to Deal with Ambiguous Risks
• Is Dark Web monitoring and scanning service worth it?
• Leveraging external threat hunting and CTI to prevent cyber attacks
• Using dark web to gain an advantage over your adversaries
15:40 PM – 16:00 PM
Social Engineering Prevention: Mitigating the Mounting Cyber Attacks
· Securing the passwords- Being vigilant and enabling multifactor authentication to ensure account protection
· How to strengthen the most common attack layer – Workforce?
· How to detect and identify the extent of the attack to significantly decrease the associated risk and lost productivity?

15:40 PM – 16:30 PM
NETWORKING BREAK

16:30 PM – 18:30 PM
AFTER HOURS
8:00 AM – 9:00 AM
REGISTRATION
9:00 AM – 9:20 AM
Redefining the Security Culture in the Philippines for a Safe & Secure Digital Infrastructure
• Challenges in building a sustainable security culture in the Philippines
• Aligning organizational determinants and individual determinants of culture to manifest a cyber secure conscious behavior
• Identify and prioritize objectives for building a national culture of cybersecurity
9:20 AM – 9:40 AM
Boosting Cyber Capacity Building to Strengthen the Regional Cyber Ecosystem
• With mounting reliance on internet and ICT services, how will security in cyber space impact good governance, human rights & economic freedom?
• Developing collective capabilities and facilitating international cooperation and partnership to effectively respond to the cyber threats in the digital age
• Emphasizing the relevance of going beyond technical issues and sharing cyber secure best practices at the international level
9:40 AM – 10:00 AM
Digital Identity for Everyone: Delivering a Secure Future We Can All Trust
· Securing the proof of identity and authentication with controlled access and encrypted data
· Identity of Things: Ensuring data confidentiality and integrity at the source as well as for the user
· Convergence of IAM and Privileged Access Management to secure access to systems and data
10:00 AM – 10:20 AM
Combating the Weaponization of Deepfakes, Identity Fraud, Disinformation and Ever-expanding Arsenal of Malicious Software
· You thought disinformation was harmful? Deepfakes is where truth goes to die
· Protecting Information: Start with what you must safeguard and how you must safeguard it
· Employing automated technologies that identify and analyze your digital footprint
10:20 AM – 11:00 AM
Panel Discussion
Multi-Vector Attack - Fortifying Security Edges of a Growing Digital Landscape
· Understanding the various entry points used by hackers to infiltrate a network
· Use of quality threat intelligence to mitigate damaging events in an organizational cyberspace
· Securing the internal and external perimeters and verifying every entry point before granting access

11:00 AM – 11:30 AM
NETWORKING BREAK
11:30 AM – 11:50 AM
Amplifying Resilience Against Complex DDoS Threats With Multi-layered Defense Approach
· Defending your business from blended, sophisticated, multi-vector attacks
· Managing and deflecting malicious automated targeting of web-facing assets from myriad threats
· Ensuring network protection from remote botnet infestation that can customize attacks
11:50 AM – 12:10 PM
Digital Forensics: Leveraging the Power of Threat Intelligence in Recovery and Cyber Investigation
· With anti-forensics growing powerful, can digital forensics framework ensure user privacy?
· Focus on cloud forensics with digital transformation pacing up
· Addressing the factors affecting the integrity and credibility of the digital forensics process – easy implementation, low cost, and the availability of encryption tools
12:10 PM – 12:30 PM
Security at the Intersection of IoT and 5G: Building a Cyber Safe Connected Nation
· Discussing the rise in need to encrypt and protect 5G network traffic to avoid endpoint vulnerabilities
· Addressing the necessity to secure vulnerable cellular-connected devices from the unique threats faced by IoT devices on cellular networks
· Strengthening IoT security: Only way forward to a secure connected world
12:30 PM – 12:50 PM
CyberAgility: Incorporating an Agile and Robust Security Strategy to Maximize Value Delivery
· Employing a company-wide recovery plan which serves as a lifesaver for different attack scenarios
· Creating a cyber vault as a backup system by crypto locking the vault storage
· Analyzing the security gaps in the network and taking prompt measures to bridge and strengthen the system
12:50 PM – 13:10 PM
Securing the Pocket Device: Protecting the Critical Mobile Device from Data Thefts
· How safe is public Wi-Fi access? Is it truly free or is the free access traded with personal data theft?
· Understanding the various threat actors in mobile devices – Credential Stuffing, Brute Forcing and Guessing Attacks
· How to protect mobile devices from the rigorous phishing attacks?

13:10 PM – 14:00 PM
LUNCH BREAK
14:00 PM – 14:40 PM
Panel Discussion
Evolving Ransomware Landscape - Ceasing Data Exfiltration and Preventing the Thriving Threat
· Addressing the vulnerabilities in the system that allow the attackers to penetrate successfully
· How to use deception-based model to identify the earliest attack stage?
· How to mitigate user-initiated actions? Categorizing the data based on organizational value
14:40 PM – 15:00 PM
Implementing Information Security Governance and Risk Management to Protect the Digital Enterprises
• Assuring the continuous operation of Philippines critical infostructures, public and military networks
• Implementing cyber resiliency measures to enhance the country’s ability to respond to threats before, during and after the attacks
• Adopting an effective coordination with law enforcement agencies while creating a cybersecurity educated society

15:00 PM – 16:30 PM