COVID – 19: See the latest assessments and care options, plus temporary visitor restrictions

-139Days -2Hours -35Minutes -7Seconds

12 - 13 JULY
9:00 AM - 6:00 PM

08:00 - 09:00


09:00 - 09:20

Cyber Defense for Philippine’s Critical Infrastructure: Protecting Digital Assets Essential To Nation’s Economy

  • Accentuating the National Cybersecurity Plan 2022 as a vision to reach a trusted and resilient infostructure
  • Addressing the strategic initiatives of the government to deal with sophisticated attacks
  • Establishing program for National Cyber Drills & Exercises to raise awareness & adopt the right norms in cybersecurity

Mary Rose E. Magsaysay

C|CISO, Director IV - Cybercrime Planning and Policy, Monitoring and Cooperation Office In Charge & Lead ICCD, CPPD & CMCD
Cybercrime Investigation and Coordination Center (CICC)

Drexx Laggui

Highly Technical Consultant

09:20 - 09:40

Zero Trust: Two Sides of the PAM Coin

  • Password vaulting is one, privilege elevation is the other. You need both
  • Hear key considerations for a mature Privileged Access Management (PAM) solution
  • Learn best practices on Zero Trust and Zero Standing Privileges to achieve Zero Trust goals

Nigel Tan

Director - Systems Engineering, APAC

09:40 - 10:00

Secure User Authentication - Key to Growing your Digital Business

  • Understand the future of digital identity and threat landscape to protect and grow your digital business
  • Build a zero trust architecture for your workforce
  • Create an exceptional customer experience with a simplified and secure customer identity & access management solution
  • Best practices from leading enterprises – case study from AIA Insurance & SPH Media

Marcus Guan

Partner Solutions Engineer

10:00 - 10:20

My SaaSy Identity : Identity Security for Everywhere, in the Cloud

  • Learn about trends in the explosion of identities in use by organizations and the operational and security risks that come with it
  • Understand the various types and users of Identity
  • Discover what steps you can take to protect identities, regardless if they are on-prem or in the cloud, using a modern Identity Security Solution

Josiah Winston

Senior Solutions Engineer, ASEAN

10:20 - 11:00

CISO PANEL: The Current And Future Of IT Security Strategy & Improving Cyber Maturity
To Counteract CISO Burnout

  • Addressing the current and upcoming cybersecurity risk: A CISO Solution
  • Underscoring the degree of difficulty for CISOs in this era of heightened cyber threats
  • Ways to Establish your Zero Trust Readiness: CISOs’ Manifestations

Vincent Oh

Channels Director, Asia Pacific, and Japan

Angel Redoble

First Vice President, CISO
PLDT Group, ePLDT Group and Smart

Marlon Sorongon

Maybank Philippines and New York

Carlos Tengkiat

Rizal Commercial Banking Corporation

Charmaine Valmonte

Aboitiz Equity Ventures

11:00 - 11:30


11:30 - 11:50

Modern attacks, can we prevent it in real time without affecting the business?

  • How the traditional approach to modern attacks fail
  • The rise of the access brokers
  • How to achieve full visibility of accounts, prevent identity based attacks without affecting our users

Agatha Alarilla

Solutions Engineer

11:50 - 12:10

Go Phish - How Cybercriminals Use Dynamic DNS Infrastructure for Advanced Attacks

  • The infrastructure’s role in facilitating large-scale phishing campaigns in 5 stages
  • Identifying the characteristics of a phishing attack and its common targets
  • Evasion Mechanisms Techniques using Geolocation restriction, IP Blocklisting, IP Scoring, “crawlerdetect”, and Redirection
  • Ways to mitigate and manage emerging threats in real time

Tal Blaustein

BlueVoyant International

12:10 - 12:30

Analysing Threats Faster with Real-Time Threat Intelligence

  • Expedite threat research and improve reporting with unprecedented security intelligence
  • Monitor and investigate the dark web for risks to your organisation
  • Access to all known information in a single, real-time view, and via customised alerts
  • Protect your business with continuous fraud detection and brand monitoring

Glenn M Jison Jr

Senior Systems Engineer
Netpoleon Philippines

12:30 - 13:10

Panel Discussion: Adapting to the New Threat Environment: The Rise of Ransomware

  • Evolving threat landscape is using COVID -19 as an attraction to increasing ransomware in the network
  • Developing a comprehensive, defensive security posture to protect against ransomware
  • Creating safeguards to ensure delivery of critical services and business processes to limit or contain the impact of a potential cybersecurity incident or attack

Harshavardhan Lale

VP - Business Development

Francisco Ashley Acedillo

National President | Assistant Vice President - Cybersecurity Strategy
Philippine Institute of Cyber Security Professionals | Smart Communication

Dennis Crimen

ICT Head
Philippines AirAsia

Justine Clarence Co

Deputy CISO
CIS Bayad Center Inc.

Edison Dungo

Director - IT
Manila Doctors Hospital

13:10 - 13:20

The Power of Zero Trust Security in Digital Transformation

  • Remote working is now commonplace
  • Hybrid and multicloud footprints continue to rapidly expand
  • Organizations must embrace zero trust security principles, such as least privilege, continuous authentication and monitoring, segmentation, and micro segmentation to stay secure, while moving digital transformation forward

Chris Lee

Solutions Engineer

13:20 - 14:20


14:20 - 14:40

Growing Importance of Cybersecurity Skills & Developing Skilled Cybersecurity Experts

  • Why is it important in investing on skill development met by enhanced AI-driven capabilities to support professionals?
  • Developing a cybersecurity culture by raising awareness, supporting training and capacity building for cybersecurity talent
  • Creating greater awareness of the global and local cybersecurity context and a better appreciation of the threat landscape in order to improve the Philippines’ cybersecurity posture

Allan S Cabanlong

Advisor & Former Assistant Secretary - Cybersecurity & Enabling Technologies, DICT
Author, National Cybersecurity Plan 2022

14:40 - 15:00

Network Security Strategy: Protecting your Enterprise Network from Unauthorized Access and Data Theft

  • Maintaining appropriate security procedures to protect your data whether held on-premises or in the cloud
  • Producing relevant policies and establishing anti-malware defenses across organization
  • Establishing an incident response and disaster recovery capability to achieve maximum network security

Maricris Salud

Deputy Director, Cybersecurity Supervision and Oversight Group
Bangko Sentral ng Pilipinas

15:00 - 15:20

Ensuring Data Privacy and Focusing on Encryption Techniques

  • Importance of Data Privacy and Transparency essential to safeguard organizations against data breaches
  • Implementing robust security practices to prevent unauthorized access by attackers or malicious insiders
  • Why should we employ sophisticated encryption methods for sensitive data?

Robert Sanchez Paguia

Division Chief, International Cooperation on Cybercrime
Cybercrime Investigation and Coordinating Center

15:20 - 15:40

Web 3.0: Unravelling Unknown Unknowns

  • Web 3.0 Transformation, how did we arrive here?
  • New Technologies and New Threats
  • Leveraging Cyber Threat Intelligence in Web 3.0

Major Carlos Ely Tingson

Cyber Security Consultant
National Security Council

15:40 - 16:00

Examining The Rise Of Insider Threats To Avoid Confidential Data Lead And Misuse

  • Improving the Built-In-Security in an organization to ensure only a legitimate user can decrypt any important file
  • Implementing work-from-home & BYOD Policy becoming ubiquitous with the increase of insider threats
  • Approaching techniques of data security including disk encryption, controlling access to file shares plays major role in security measures

Leah Grace Del Mundo

Information Security Officer
OSM Maritime Group

16:00 - 16:30


16:30 - 17:30


  • Welcome Address by Awards’ Chairperson
  • Awards Ceremony

17:30 - 19:00

08:00 - 09:00


09:00 - 09:20

Information Warfare: The Real And Present Ever Evolving Darkhorse Of Geopolitical And Cyber Conflicts

  • Discussing on information warfare and cancel culture
  • Highlighting the Junction point of kinetic and cyber conflicts
  • Individual, corporate and state as a target

Joseph Felix Pacamarra

Co-Founder / CEO
Cyber Security Philippines CERT

09:20 - 09:40

Digital Forensics – Advancing Solutions for Philippines’ Escalating Cybercrime

  • Identifying network vulnerabilities and developing counterintelligence against virus intruding network infrastructure
  • Analysing digital assets through digital forensics as a crucial factor to combat cybercrime
  • Investigating tools and techniques to mitigate recurrence of subsequent attacks

Noel Cuestas

Chief - Audio, Video Forensic Section Digital Forensic Unit
Philippine National Police Anti Cybercrime Group

09:40 - 10:00

Owning Your Cybersecurity Mid-game Strategy

  • Conventional approach for ransomware focuses on preventing initial access and relying on backup recovery—but it hasn’t slowed the extortion menace.
  • Prevention is an uphill battle for defenders: attackers only need to succeed once. And, restoring data doesn’t negate downtime or the consequences of a data breach.
  • Defenders need a much broader window to catch and stop ransomware before the damage is done and take necessary actions that can alert your team to the intrusion – command and control communications, data staging and lateral movement

Daniel Chu

Vice President of Systems Engineering, APJ
ExtraHop Networks

10:00 - 10:20

Empowering Cyber Resiliency at the Point of Data

  • The current security landscape: why and how large organisations are being hit
  • What organisations can have in place to recover quickly, before a ransom is even contemplated
  • Best practices for constructing and managing a multi-layer security strategy

Wayne Gorton

Platform Solution Architect
Rubrik APAC

10:20 - 11:00

Panel Discussion: Securing Cyber Physical Systems & XIoT as
Critical Infrastructure Transforms Digitally

  • Securing IoT networks and devices to safeguard organization from threats and breaches
  • Understanding which aspects of the transformation have made the power sector more vulnerable to threat actors
  • Building that foundation of Visibility

Doreen Tang

Regional Director - Southeast Asia

Mel Migrino

Vice President and Group CISO

Apolonio J. Salud Jr.

Deputy CISO
Radius Telecom

Rod Jaucian

Assistant Vice President, Operational Technology
Aboitiz Power

11:00 - 11:30


11:30 - 11:50

Digital Identity and Privacy: Stories from the Frontline

  • As the pace of digitalization gathers momentum, organizations are witnessing a dramatic increase in the number of digital identities. These identities interact with systems and applications relentlessly to perform day-to-day IT tasks
  • Maintaining the privacy of this data is a daunting task. Enterprise data is hosted in multi-tenant cloud, managed service providers and distributed data center environments
  • How an organization can maintain data privacy in this evolving IT access control use-cases depends on the level of preparedness to protect and monitor those digital identities?
  • An identity and access management solution provides adequate safeguards to enforce IT practices necessary to maintain data privacy

Anil Bhandari

Chief Mentor

11:50 - 12:10

Assessing Cybersecurity Risk in the Midst of IT/OT convergence

  • Building convergence between IT and OT to achieve a streamlined process in organizations resulting in greater efficiencies
  • Addressing the importance of application of AI in Strengthening IT and OT Convergence
  • Enhancing security orchestration thereby bridging the gap between cybersecurity and physical security for organizations with centralized monitoring systems and tools

Mel Migrino

Vice President and Group CISO

12:10 - 12:30

Spotlight on Israel’s Cybersecurity Ecosystem

  • Israel as a global powerhouse in cybersecurity
  • The unique cybersecurity ecosystem of Israel
  • Partnering with Israel cybersecurity as a key to strengthening cyber resilience

Tomer Heyvi

Economic Counselor and Head of Mission
Israel Economic Mission to the Philippines

12:30 - 12:50

Social Engineering Attacks Getting Smarter: Discussing the Types of Phishing

  • How is social engineering practice manipulating people into giving up sensitive information?
  • Demonstrating the stages of a social engineering attack: Investigation, Hook, Play, Exit
  • Comprehending the outlook of organizations today in adapting highly localized, and geo-targeted threats

LCol Francel Margareth Taborlupa

Battalion Commander, Philippine Army
Armed Forces of the Philippines

12:50 - 13:10

Implementing Information Security Governance and Risk Management to Better Protect the Modern Enterprises

  • Activating and integrating Information Security Governance in the functions and processes of enterprises
  • Understanding and selecting Information Security frameworks appropriate to organizational goals
  • Balancing protection vis-a-vis productivity in information security risk management

Elson Manahan

Vice President and CISO Head of Legal and Compliance | Asst. Professor of Technology Management and Law
St. Luke's Medical Center | University of the Philippines Diliman

13:10 - 14:10


14:10 - 14:50

Panel Discussion: Women Leadership In Cybersecurity – Fostering Growth & Development With Inspiring Women Cyber Professionals

  • Changing the Narrative on Cyber – Understanding the business risk
  • Embracing diversity leading to a wider range of perspectives and skills that ultimately provides more effective solutions against today’s evolving cybersecurity threats
  • Accelerating to a cyber safe environment by top technology disruptors that support emerging business trends

LCol Francel Margareth Taborlup

Battalion Commander, Philippine Army
Armed Forces of the Philippines

Genalyn Macalinao

Policy Lead Cybersecurity Bureau
Department of Information and Communications Technology (DICT)

Carrine Teoh

Chief Strategy Officer | Vice President
Bond Holdings | ASEAN CIO Association

Gem Dublan

Cyber Security Philippines CERT

Portia Alfonso

Board of Trustee
Women in Security Alliance Philippines (WiSAP)

14:50 - 15:10

Media Under Cyber Attack: A Threat to Press Freedom?

  • Understanding the threats of DDoS-as-a-Service
  • How Organized cybercrime, Hacktivists and state sponsored actors poses a real threat on Media
  • How to utilize simple measures to help safeguard systems against DDoS Attacks

Christian Niel Angel

Data Security Officer
Manila Bulletin Publishing Corporation

15:10 - 16:00





Fill out the form to enquire about PhilSec 2022.


Fill out this form to know more about PhilSec 2022


Fill in this form to receive more information about PhilSec 2022