COVID – 19: See the latest assessments and care options, plus temporary visitor restrictions


61Days 01Hours 41Minutes 43Seconds

AGENDA
12 - 13 JULY
9:00 AM - 3:00 PM (GMT + 7)

09:00 - 09:20

Cyber Defense for Philippineโ€™s Critical Infrastructure: Protecting Digital Assets Essential To Nationโ€™s Economy

  • Accentuating the National Cybersecurity Plan 2022 as a vision to reach a trusted and resilient infostructure
  • Addressing the strategic initiatives of the government to deal with sophisticated attacks
  • Establishing program for National Cyber Drills & Exercises to raise awareness & adopt the right norms in cybersecurity

09:20 - 09:40

Cloud Security Framework: Fortifying The Dynamic Cloud Environment To Address The Evolving Challenges & Risks

  • Combating common DDoS attacks against a web server with instant mitigation and real-time threat detection
  • Emphasizing on the growing challenge of securing sensitive data with the rise of Data Breach
  • Protecting enterprise business from cloud data loss through accidental installation of malware

09:40 - 10:00

Breaking the Cyber Kill Chain - The Importance of Endpoint Security

  • Securing endpoints or entry points of end-user devices from being exploited by malicious actors and campaigns
  • Enhancing endpoint security as itโ€™s cybersecurity’s frontline and represents one of the first places organizations look to secure their enterprise networks.
  • Providing comprehensive protection from sophisticated malware and evolving zero-day threats.

10:00 - 10:20

Social Engineering Attacks Getting Smarter: Discussing The Types of Phishing

  • How is social engineering practice manipulating people into giving up sensitive information?
  • Demonstrating the stages of a social engineering attack: Investigation, Hook, Play, Exit
  • Comprehending the outlook of organizations today in adapting highly localized, and geo-targeted threats

10:20 - 11:00

CISO PANEL: The Current And Future Of IT Security Strategy & Improving Cyber Maturity To Counteract CISO Burnout

  • Addressing the current and upcoming cybersecurity risk: A CISO Solution
  • Underscoring the degree of difficulty for CISOs in this era of heightened cyber threats
  • Ways to Establish your Zero Trust Readiness: CISOs’ Manifestations

11:00 - 11:30

๐˜•๐˜Œ๐˜›๐˜ž๐˜–๐˜™๐˜’๐˜๐˜•๐˜Ž ๐˜‰๐˜™๐˜Œ๐˜ˆ๐˜’

11:30 - 11:50

Enforcing Zero Trust Capabilities By Taking Back Control of Unwanted Privileges

  • Building a Zero Trust architecture to streamline your existing security and networking toolset
  • Improving security postures while reducing the risk of malware
  • Identifying the right vendor – seamlessly integrating zero-trust solutions with the organizationโ€™s infrastructure without replacing existing investments

11:50 - 12:10

AI And Cybersecurity: How New Tech Is Shaping The Cybersecurity Arms Race

  • Enabling AI-based tool analyses zero- day malware attack even if unseen to help calculate new risks
  • Identifying new threats with predictive intelligence and NLP to curate intelligence of new anomalies, cyberattacks, and prevention strategies
  • Leveraging AI to create Intelligent automation to respond to high volumes of risk alerts and help companies deal with cybersecurity skill shortage

12:10 - 12:30

Identity Management: Steering Toward a Password-Free Future with Privileged Access Management

  • Enabling organization to centralize user administration and improving controls for granting user access and monitor privileged access to critical assets
  • Implementing PAM to prevent privileged account attacks enabling organization to isolate and track the activity
  • Guarding organizations against the risks by incorporating PAM ensures every individual restrains credential sharing/uses a unique login

12:30 - 12:50

Online Infringement of Intellectual Property โ€“ The Dark Side of the Digital Age

  • Implementing a multifaceted online enforcement strategy is integral for maintaining strong IP rights
  • Spotting Online Infringement: Factors important for a brand owner to forecast when they spot online infringement
  • Enforcing IP rights in a digital environment to protect companies from the misuse of their know-how by promoting originality, creativity, and innovation within the society

12:50 - 13:00

Network Security Strategy: Protecting Your Enterprise Network from Unauthorized Access And Data Theft

  • Maintaining appropriate security procedures to protect your data whether held on-premises or in the cloud
  • Producing relevant policies and establishing anti-malware defenses across organization
  • Establishing an incident response and disaster recovery capability to achieve maximum network security

13:00 - 14:00

๐˜“๐˜œ๐˜•๐˜Š๐˜ ๐˜‰๐˜™๐˜Œ๐˜ˆ๐˜’

14:00 - 14:40

Panel Discussion: Adapting To The New Threat Environment: The Rise Of Ransomware

  • Evolving threat landscape is using COVID -19 as an attraction to increasing ransomware in the network
  • Developing a comprehensive, defensive security posture to protect against ransomware
  • Creating safeguards to ensure delivery of critical services and business processes to limit or contain the impact of a potential cybersecurity incident or attack

 

 

14:40 - 15:00

Addressing The Importance of DevSecOps: Building Security From The Source

  • Improving overall security by enabling immutable infrastructure which further involves security automation
  • Building public trust through Digital (web and mobile) Applications – Fulfilling customer-convenience without compromising on security
  • Developerโ€™s Approach – Embedding security earlier in the software development life cycle (SDLC) determines the best ways to work

15:00 - 15:20

Growth Of Hacktivism: A Newer Version Of Breaking Into Cybersecurity Systems

  • Safeguarding organization from hacktivists to have an unauthorized access to organizationโ€™s assets
  • Anonymous Hacktivists: Breaking into cybersecurity systems of the government to launch a shuttle of defacement of the reputation immorally
  • Promoting politically influenced cause and deface the security protocols of government being tampered by the Hacktivist

15:20 - 15:40

Examining The Rise Of Insider Threats To Avoid Confidential Data Lead And Misuse

  • Improving the Built-In-Security in an organization to ensure only a legitimate user can decrypt any important file
  • Implementing work-from-home & BYOD Policy becoming ubiquitous with the increase of insider threats
  • Approaching techniques of data security including disk encryption, controlling access to file shares plays major role in security measures

15:40 - 16:00

Dark Web and Cryptocurrencies: Cybersecurity Nightmare for Businesses and Law Enforcement

  • Challenges posed by Dark web and crypto currencies for enterprise security
  • How is law enforcement responding to the investigation process and building technical capabilities?
  • New techniques and approaches being used to combat security threats from the ‘dark web’

16:00 - 16:30

๐˜•๐˜Œ๐˜›๐˜ž๐˜–๐˜™๐˜’๐˜๐˜•๐˜Ž ๐˜Š๐˜–๐˜๐˜๐˜Œ๐˜Œ ๐˜‰๐˜™๐˜Œ๐˜ˆ๐˜’

16:30 - 19:00

๐‘จ๐‘ญ๐‘ป๐‘ฌ๐‘น-๐‘ท๐‘จ๐‘น๐‘ป๐’€/๐‘จ๐‘พ๐‘จ๐‘น๐‘ซ๐‘บ

09:00 - 09:20

Keeping Cybersecurity at the Forefront of Philippineโ€™s Digital Business

  • Integrating cybersecurity into government initiatives to prevent and respond to cyber attacks
  • Establishing cybersecurity policy and multi-agency collaboration framework to enhance cyber resilience
  • Promoting responsible societal cybersecurity culture to assure data protection and online privacy

09:20 - 09:40

Digital Forensics โ€“ Advancing Solutions for Philippinesโ€™ Escalating Cybercrime

  • Identifying network vulnerabilities and developing counterintelligence against virus intruding network infrastructure
  • Analysing digital assets through digital forensics as a crucial factor to combat cybercrime
  • Investigating tools and techniques to mitigate recurrence of subsequent attacks

09:40 - 10:00

Achieving Cybersecurity Risks In The Midst Of IT/OT Convergence

  • Building convergence between IT and OT to achieve a streamlined process in organizations resulting in greater efficiencies
  • Addressing the importance of application of AI in Strengthening IT and OT Convergence
  • Enhancing security orchestration thereby bridging the gap between cybersecurity and physical security for organizations with centralized monitoring systems and tools

10:00 - 10:20

Understanding Digital Identity โ€“ Lessons Learned from an Ethical Hacker

  • Importance of creating a secure culture and enhance digital identity
  • What is the role of an ethical hacker?
  • The best way to understand digital identity from the perspective of an ethical hacker

10:20 - 11:00

Panel Discussion: Empowering Organization With Secured Industrial Control Systems from Cyber Threats

  • Securing IoT networks and devices to safeguard organization from threats and breaches
  • Building trust in IoT connected devices enables chip-to-server secure data transmission and object secure authentication
  • Applying network segmentation for reducing the attack surface and helps fixing the vulnerabilities

11:00 - 11:30

๐˜•๐˜Œ๐˜›๐˜ž๐˜–๐˜™๐˜’๐˜๐˜•๐˜Ž ๐˜‰๐˜™๐˜Œ๐˜ˆ๐˜’

11:30 - 11:50

Improving Multi-Factor Authentication: Taking The Gold Standard Of Authentication One Step Ahead

  • Leveraging Multi-Factor Authentication to manage account access and ensuring that accounts have multiple layers of security
  • Enabling customizable security solution for the users to meet their needs
  • How does MFA increase security for enterprises working with third parties?

11:50 - 12:10

The Growing Importance of Cybersecurity Skills & Developing Skilled Cyber Security Experts

  • Why is it important in investing on skill development met by enhanced AI-driven capabilities to support professionals?
  • Developing a cybersecurity culture by raising awareness, supporting training and capacity building for cybersecurity talent
  • Creating greater awareness of the global and local cybersecurity context and a better appreciation of the threat landscape in order to improve the Philippinesโ€™ cybersecurity posture

12:10 - 12:30

Securing Application Layers With Effective WAF Gateway Technology

  • Protecting the web app server, a WAF secures the apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application
  • Ensuring the security and availability of websites and application WAF provides real-time defense based on predefined protection policies
  • Offering an advantage of greater visibility into sensitive application data that is communicated using the HTTP application layer

12:30 - 12:50

Promoting Secure And Efficient Cyber Supply Chain Risk Management Framework

  • Helping organizations to manage the increasing risk of supply chain compromise related to cybersecurity, whether intentional or unintentional
  • Highlighting the best practices in managing cyber supply chain risks holistically
  • Why cyber supply chain risk management needs an enterprise approach?

12:50 - 13:10

Ensuring Data Privacy And Focusing On Encryption Techniques

  • Importance of Data Privacy and Transparency essential to safeguard organizations against data breaches.
  • Implementing robust security practices to prevent unauthorized access by attackers or malicious insiders.
  • Why should we employ sophisticated encryption methods for sensitive data?

13:10 - 14:10

๐˜“๐˜œ๐˜•๐˜Š๐˜ ๐˜‰๐˜™๐˜Œ๐˜ˆ๐˜’

14:10 - 14:50

Panel Discussion: Women Leadership In Cybersecurity โ€“ Fostering Growth & Development With Inspiring Women Cyber Professionals

  • Changing the Narrative on Cyber โ€“ Understanding the business risk
  • Embracing diversity leading to a wider range of perspectives and skills that ultimately provides more effective solutions against todayโ€™s evolving cybersecurity threats.
  • Accelerating to a cyber safe environment by top technology disruptors that support emerging business trends

14:50 - 15:10

Implementing Information Security Governance and Risk Management To Better Protect The Modern Enterprises

  • Assuring the continuous operation of Philippinesโ€™ critical infostructures, public and military networks
  • Implementing cyber resiliency measures to enhance the countryโ€™s ability to respond to threats before, during and after attacks
  • Adopting an effective coordination with law enforcement agencies while creating a cybersecurity educated society

15:10 - 16:00

๐‘ฝ๐‘ฐ๐‘บ๐‘ฐ๐‘ป ๐‘ป๐‘ถ ๐‘ต๐‘ฌ๐‘ป๐‘พ๐‘ถ๐‘น๐‘ฒ๐‘ฐ๐‘ต๐‘ฎ ๐‘ณ๐‘ถ๐‘ผ๐‘ต๐‘ฎ๐‘ฌ

MEDIA ENQUIRY

Fill out the form to enquire about PhilSec 2022.

SPONSORSHIP ENQUIRY | PHILSEC 2022

Fill out this form to know more about PhilSec 2022

GENERAL ENQUIRY

Fill in this form to receive more information about PhilSec 2022