
Agenda
We’ve got it all.
The agenda is specially curated to bring out the most pressing topics from the industry.
8:00 AM – 9:00 AM
REGISTRATION
8:45 AM – 9:00 AM
INAGURATION
9:00 AM – 9:10 AM
Fostering Resilient Cybersecurity towards Protecting Data Privacy


9:10 AM – 9:25 AM
The CICC today and It's Cyber Economic Investment Corridor


9:25 AM – 9:40 AM
CICC Protecting the Philippine Critical Infrastructure

9:40 AM – 10:00 AM
Stopping the next breach: The Power of Consolidation and AI-Enabled Platforms
- As the use of Living Off the Land binaries and the complexity of security architectures continue to grow, adversaries are becoming more elusive and harder to detect.
- CrowdStrike has pioneered the use of artificial intelligence (AI) since we first introduced AI-powered protection to replace signature-based antivirus over 10 years ago, and we’ve continued to deeply integrate it across our platform since.
- In this engaging presentation, we will delve into the current Threat Landscape and explore why the adoption of security consolidation and AI-enabled platforms is crucial in preventing future breaches.


10:00 AM – 10:20 AM
Intelligence to Risk: How to Effectively Communicate Risk to Your Board
- Actionable insights on how true cyber resilience can be achieved with threat intelligence and automation
- How the Intelligence to Risk (I2R) pyramid is used to conceptualize the link between security investments and business goals
- Bridging the knowledge gap between cyber defense: focusing on technical solutions and executives focused on business risk reduction and fiscal outcomes


10:20 AM – 11:00 AM
The Power of PAM: Fortifying Organisational Cyber Posture Against the Prime Attack Vector
- With excessive lurking privileges, what can be done to narrow the security gap that companies need to address?
- How can organizations guard against privileged escalation attacks while boosting employee productivity?
- Understanding the implementation of Zero Trust with least privilege models







11:00 AM – 11:30 AM
Networking Break
11:30 AM – 11:50 AM
Fortifying Digital Philippines: Integrating Cyber Capacity to Ensure Secured Digital Society
- Safeguarding the nation’s digital ecosystem through innovations in cybersecurity
- Creating a robust cybersecurity policy to build a thriving digital economy
- Steering the digital nation agenda with data protection and secured networks to protect its citizens and its own sovereignty

11:50 AM – 12:10 PM
Predicting Ransomware Risk in Supply Chain: An In-Depth Analysis on Ransomware, Its Impact on Your Supply Chain and How We Can Attempt to Predict Where It Will Strike Next:
- Lessons learned from reviewing 700+ global ransomware events
- How we can use various information to better predict where ransomware will strike and how it might affect your supply chain
- How you can engage with Mastercard to help gain situational awareness of your supply chain.


12:10 PM – 12:30 PM
AI Innovations Unleashed in the changing landscape of Cyber security
- AI in Cybersecurity: Harnessing the Power of Intelligent Technologies for Enhanced Protection
- Privacy and Ethical Considerations: Ethical implications of AI-driven cybersecurity solutions.
- Future Trends and Directions: Potential impact and future prospects of AI in cybersecurity

12:30 PM – 12:50 PM
Supply Chain Security: Securing the ITC Ecosystem from Code to Cloud
- Gathering effective and practicable input into supplier risk assessments to determine risk
- Implementing lifecycle management to mitigate and assess security threats
- Enforcing encryption practices at the interface of third-party integrations


12:50 PM – 13:00 PM
Fortify Business Data Protection with Synology Hybrid Cloud Solution
- Common reasons for businesses causing incomplete backup
- How Synology offers comprehensive data protection under different scenarios
- Feature highlights and case sharing



13:00 PM – 14:00 PM
Lunch Break
14:00 PM – 14:40 PM
Intelligent Data Security: Streamline Privacy and Security Functions to Minimize Data Threats
- Enabling secure data migration to the cloud with state-of-the-art encryption and Key Management System (KMS)
- Enforcing security controls to detect, prevent and respond to data breaches
- Securing data wherever it lives with integrated discovery, classification and protection of sensitive data







14:40 PM – 15:00 PM
Cloud Security Framework: Fortifying the Dynamic Cloud Environment to Address the Evolving Challenges & Risks
- Rethinking network security in the flourishing age of cloud services
- How will security, risk control and compliance impact cloud adoption ?
- Emphasizing on the growing challenge of securing sensitive data with the rise of Data Breach


15:00 PM – 15:10 PM
CLOSING REMARK

15:10 PM – 16:30 PM
NETWORKING BREAK
8:00 AM – 9:00 AM
REGISTRATION
9:00 AM – 9:20 AM
Boosting Cyber Capacity Building to Strengthen the Regional Cyber Ecosystem
- With mounting reliance on internet and ICT services, how will security in cyber space impact good governance, human rights & economic freedom?
- Developing collective capabilities and facilitating international cooperation and partnership to effectively respond to the cyber threats in the digital age
- Emphasizing the relevance of going beyond technical issues and sharing cyber secure best practices at the international level


9:20 AM – 9:40 AM
BSP strengthening cyber resilience of the financial services industry as part of critical information infrastructure (CII) protection
- The need for constant vigilance against evolving threats
- The need to strengthen cooperation and information sharing amongst industry players
- The need to build a robust and sound cybersecurity culture for the industry, including individuals/financial consumers

9:40 AM – 10:00 AM
Effective Use of Information Security Paradigms and Frameworks
- Distinguishing the use of infosec paradigms and frameworks
- Addressing overlaps and shortcomings of framework types
- Choosing the best information security framework

10:00 AM – 10:20 AM
Insider Threat, the fringe battlespace of CyberSecurity
- Explore the current landscape of insider threats, including recent trends, incidents, and their impact on organizations
- Strategies to Mitigate Insider Threats: Plan Your Actions in Advance
- Adressing the demographics and motivations for Insider Threats

10:20 AM - 10:30 AM
Build your Zero Trust Security plan with Senhasegura PAM (Privileged Access Management)
- Streamline your Zero Trust Security journey
- Ensure your users, devices, data are regularly authenticated, authorised and monitored
- Ensure Regulatory compliance standards to maintain IT governance


10:30 AM – 11:00 AM
Upgrading the Cybersecurity Stack and Collaboration to be Ahead in the Quest for Reliable & Resilient Security
- Creating a simple and agile 360-degree security strategy to ensure comprehensive security
- In a constantly shifting technological environment, leveraging the CISO leadership in enabling scalable, low-risk business frameworks to maximise enterprise protection
- Accelerating collaboration and succinctly communicating top priorities for efficient and effective workplace order





11:00 AM – 11:30 AM
NETWORKING BREAK
11:30 AM – 11:50 AM
Making Sense of the rapidly changing landscape in Cybersecurity
- Addressing the evolving cybersecurity landscape, in terms of threats, technology, compliance as well as opportunities
- Security professionals could easily get lost with multiple standards (COBIT, ISO 27001, NIST, PDI CSS, DPA, GRC, etc), vendor products (EDR, XDR, SOC, etc) and trends (AI, ChatGPT, IoT, hybrid work, etc). How to make sense of it all?
- How does one convince the board the need to invest in cybersecurity and yet ensure readiness for the risks inherent with enterprise digitalization?

11:50 AM – 12:10 PM
Shifting Right - The Role of the C-Suite in Building Cyber Resilience
- Establishing a Culture of Cybersecurity from the Top: Collaborative Approach to Cyber Resilience
- Ensuring Board-Level Cybersecurity Oversight
- How can the C-Suite engage the board in cybersecurity discussions and ensure a comprehensive understanding of cyber risks?

12:10 PM – 12:30 PM
Secure Global BPO: Managing Risk & Strengthening Security Posture In Multitenant Environments
- Identifying and managing inherent security and privacy risks within multitenant ecosystems.
- Know Your Customer and delivery tailored customer-centric security solutions.
- Implications and opportunities of AI while ensuring secure and ethical implementation.

12:30 PM – 12:50 PM
Digital Forensics: Leveraging the Power of Threat Intelligence in Recovery and Cyber Investigation
- With anti-forensics growing powerful, can digital forensics framework ensure user privacy?
- Focus on cloud forensics with digital transformation pacing up
- Addressing the factors affecting the integrity and credibility of the digital forensics process – easy implementation, low cost, and the availability of encryption tools


12:50PM – 14:00 PM
LUNCH BREAK
14:00 PM – 14:20 PM
The Evolving CISO: Navigating Business Enablement, Collaboration, and Technological Landscape
- How to be a CISO business enabler : Explore strategies and approaches to effectively align cybersecurity with business objectives.
- Boardroom to basement collaboration : foster effective communication and collaboration between the CISO and other key stakeholders.
- Adopting to the ever changing technology landscape

14:20 PM – 15:00 PM
Implementing Information Security Governance and Risk Management to Protect the Digital Enterprises
- Assuring the continuous operation of Philippines critical infostructures, public and military networks
- Implementing cyber resiliency measures to enhance the country’s ability to respond to threats before, during and after the attacks
- Adopting an effective coordination with law enforcement agencies while creating a cybersecurity educated society



15:00 PM – 16:30 PM
CLOSING REMARKS AND NETWORKING
4:00PM – 5:30PM
Registration & Champagne
5:30PM – 6:00PM
Paparazzi Lights & Pictures
Step into the limelight and experience the glitz and glamour of the red carpet like never before with Paparazzi Lights & Pictures. Creating unforgettable moments while capturing them in stunning photographs, giving all the attendees a VIP treatment at PhilSec Awards 2023.
6:00PM – 6:15PM
Opening Performance by Urban Crew
Get ready to be captivated by the electrifying opening performance by Urban Crew, the sensational dance group that rose to fame at Asia’s Got Talent! Prepare to be amazed as they bring their unique blend of aerial flipping, stunts, creativity, and high-energy moves to the stage.
6:15PM – 6:20PM
Opening by the Master of Ceremonies
6:20PM – 6:30PM
Welcome Speech by the Jury Committee
6:30PM – 7:00PM
Awards Presentation
- Digital Leader of the Year
- GRC Leader of the Year
- Security Practitioner of the Year – Public Sector
- Security Practitioner of the Year – Private Sector
- Cyber Woman of the Year
- CISO of the Year
Closing Speech
7:00PM – 7:20PM
Stand-Up Comedy by Alex Calleja
Get ready to laugh your hearts out as the stage lights up with the hilarious and charismatic presence of the stand-up comedian, Alex Calleja! Known for his quick wit, relatable observations, and impeccable comedic timing, Alex will light up the evening with his unique brand of comedy.
7:20PM – 9:30PM