2025 Edition Has Been Concluded Successfully! See You All In 2026!2025 Edition Has Been Concluded Successfully! See You All In 2026!2025 Edition Has Been Concluded Successfully! See You All In 2026!2025 Edition Has Been Concluded Successfully! See You All In 2026!
Reshaping Philippines' Cybersecurity for 2026 and Beyond
Harnessing AI-driven national defense to protect critical infrastructure and secure public and private sectors under the National Cybersecurity Plan (NCSP) 2023–2028
Government-led capacity building, scholarships, and industry partnerships to develop skilled professionals for a resilient cyber ecosystem
Strengthening legislative frameworks, public-private cooperation, and responsible digital transformation adoption to counteract evolving advanced persistent threats and cyber espionage
09:20 AM – 09:30 AM
Navigating the Intersection of National Security, Digital Transformation, and Emerging Threats
Addressing AI-powered cyberattacks, expanding IoT vulnerabilities, and sophisticated nation-state espionage through advanced threat intelligence and real-time monitoring
Deploying flexible, scalable cybersecurity architectures and zero-trust frameworks to dynamically defend critical infrastructure and digital ecosystems
Enhancing international and regional collaboration to share intelligence, harmonize response protocols, and strengthen collective cyber resilience
09:30 AM – 09:50 AM
Zero Trust, Full Security: Securing the Hybrid Workforce and Digital Ecosystem
Adopting Zero Trust to verify every user, device, and application, eliminating implicit trust
Use micro-segmentation and multi-factor authentication to limit lateral attacks and secure access
Align with the National Cybersecurity Strategy to implement scalable, AI-driven security and ensure compliance
09:50 AM – 10:10 AM
Silver Linings and Secure Clouds: Strategies for Resilience in a Rapidly Evolving Digital Economy
Implementing cloud security guardrails aligned with the National Cybersecurity Strategy to protect growing digital assets across sectors
Leveraging AI-driven threat detection and automated compliance monitoring to strengthen cloud defenses
Addressing data residency, privacy, and regulatory compliance challenges unique to the Philippines’ digital landscape
10:10 AM – 10:30 AM
No More Surprises: Harnessing Predictive Intelligence to Preempt Tomorrow’s Cyber Threats
Leveraging AI and machine learning for early detection of emerging threats and advanced persistent threats (APTs)
Integrating real-time threat intelligence into automated defense systems to reduce response times and impact
Empowering organizations with predictive analytics to shift from reactive to anticipatory cybersecurity postures
10:30 AM – 11:00 AM
Panel Discussion
The Secret Formula: A CISO’s Guide to Risk, Regulation, and Revolution
Aligning cybersecurity strategy with evolving regulations and national cybersecurity mandates
Managing risks from cloud, AI, and hybrid work environments while enabling innovation
Building cyber talent and fostering collaboration to strengthen organizational resilience
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 12:00 PM
Panel Discussion
Access Management in the age of Advanced Spoofing and Deepfake Threats
Addressing emerging vulnerabilities in access controls including credential theft, AI-driven spoofing, and deepfake impersonation
Enhancing security with multi-factor authentication, adaptive access policies, and continuous monitoring
Navigating compliance with evolving data privacy laws and ensuring secure, user-friendly identity verification solutions
12:00 PM - 12:20 PM
When ransomware knocks: Trends, Tactics, and Breakthrough Defenses
The rise of AI-driven and agentic ransomware that adapts and evolves during attacks
Increasingly complex multi-extortion campaigns combining encryption, data theft, and deepfake blackmail
The critical need for resilience strategies including zero-trust, multi-factor authentication, and incident response agility
12:20 PM – 12:40 PM
AI vs AI: Redefining Defense in the Age of Autonomous Threats
Harnessing AI and machine learning for real-time threat detection, automated response, and behavior-based anomaly identification
Transitioning to Agentic SOCs where AI agents autonomously investigate, correlate, and mitigate threats, augmenting security analyst capabilities
Balancing AI’s power with risks such as prompt injection attacks, AI-enabled social engineering, and emerging adversarial AI techniques
12:40 PM - 12:50 PM
Staying Ahead of the Data Curve: Next- Gen Strategies for Compliance, Risk, and Innovation
Navigating evolving global privacy regulations and aligning data protection with business growth
Leveraging AI-assisted monitoring, zero-trust access, and post-quantum encryption for resilient data security
Embracing privacy-enhancing technologies and adaptive governance to sustain customer trust and compliance
12:50 PM - 01:00 PM
No Use Crying Over Spilt Code: AI-Powered Incident Response to Clean Up Faster and Smarter
AI-driven real-time threat detection and behavior analysis significantly reduce breach detection times
Automated response playbooks enable immediate containment and remediation without human delay
AI-powered forensics and incident analysis provide precise root cause insights to prevent recurrence
01:00 PM - 01:45 PM
NETWORKING LUNCHEON
01:45 PM - 02:15 PM
Panel Discussion
Cybersecurity 2.0: Challenges and Strategies in the Era of Digital Transformation
Balancing innovation and security: Integrating Zero Trust and AI-driven defenses in cloud and hybrid environments
Managing expanded attack surfaces caused by IoT, remote work, and interconnected supply chains
Building organizational resilience through cybersecurity culture, workforce development, and adaptive incident response
02:15 PM - 02:35 PM
From Compliance to Culture: Building a Cybersecurity-First Mindset Across Industries
Shifting focus from checkbox compliance to embedding cybersecurity in organizational culture and practices
Continuous training, awareness programs, and leadership engagement to drive security-conscious behavior
Leveraging metrics and governance frameworks to sustain resilience and accountability
02:35 PM - 03:05 PM
Panel Discussion
Architecture That Defends: Building Resilient, Digital-Native Security Architectures
Apply core secure design principles like least privilege, defense in depth, zero trust boundaries, and secure defaults from the earliest design phase
Architect scalable, resilient environments across cloud, hybrid, and edge with clear service boundaries, encrypted channels, and fault-tolerant patterns
Modernize legacy systems by embedding security controls proactively and validating designs with threat modeling to prepare for evolving threats
03:05 PM - 03:35 PM
Panel Discussion
Cyber Comeback - Rebuilding Trust After a Cyber Crisis
Managing internal and public confidence through transparent, timely communications with regulators, customers, employees, and board members
Establishing clear communication protocols and incident disclosure practices to meet regulatory requirements and build stakeholder trust
Leveraging the crisis as a catalyst to enhance cybersecurity posture, strengthen culture, and invest in resilient technologies and training
03:35 PM - 04:00 PM
CLOSING REMARKS & VISIT TO EXHIBITOR LOUNGE
04:00 PM – 04:30 PM
Ethical Hacking Workshop
08:00 AM - 09:20 AM
REGISTRATION & COFFEE
09:00 AM - 09:15 AM
The Philippines’ Roadmap to Cyber Resilience: Policy, Partnerships, and Practical Defense
Strengthening national cybersecurity through updated policies and alignment with the National Cybersecurity Plan 2023–2028
Building public-private partnerships to enhance threat intelligence sharing and coordinated response
Implementing practical defense measures including workforce development and critical infrastructure protection
09:15 AM - 09:30 AM
Critical Infrastructure Protection: Safeguarding the Backbone of the Philippines’ Digital Economy
Strengthening cybersecurity frameworks for critical sectors including energy, telecommunications, healthcare, and finance to ensure operational continuity and economic stability
Integrating advanced threat intelligence, AI-driven monitoring, and resilient architectures to detect and mitigate sophisticated cyberattacks targeting critical infrastructure
Enhancing public-private partnerships and compliance with national cybersecurity policies to build a unified and proactive defense posture across all critical infrastructure stakeholders
09:30 AM - 09:50 AM
PHaith in Privacy: Privacy-Enhancing Technologies and Data Sovereignty in Building Trust and Compliance
Advances in PETs like homomorphic encryption enable data use while preserving privacy and compliance
Understanding implications of Philippine data localization and sovereignty laws on technology adoption
Fostering national and international trust through secure data infrastructure and regulatory alignment
09:50 AM - 10:10 AM
Breaking Bad Habits? Building a Ransomware-Resilient Organization
Implementing multi-layered defenses including regular, immutable backups and AI-powered threat detection to prevent ransomware intrusion and spread
Aligning ransomware recovery plans with business continuity and disaster recovery objectives, ensuring rapid, automated system restoration
Promoting a cybersecurity culture with executive buy-in, employee training, access management, and coordinated incident response to minimize risk and impact
10:10 AM - 10:30 AM
Strengthening Cybercrime Suppression in the Philippines: A Multi-Stakeholder and AI-Enhanced Approach for 2026
Enhancing national cyber intelligence with real-time AI-powered information sharing and coordinated inter-agency response involving CICC, PNP, NBI, and private sector partners
Updating legislation to address emerging cybercrime methods including AI-driven frauds, with stronger digital evidence protocols and specialized training for prosecutors and judges
Empowering communities and LGUs through sustained cyber awareness campaigns, accessible reporting tools, and inclusive public engagement as frontline defenders
10:30 AM - 11:00 AM
Panel Discussion
Cloud Security Essentials: Building Trust in Digital Transformation
Securing cloud workloads with zero-trust and identity-centric models
Navigating shared responsibility and vendor management in cloud security
Leveraging AI and automation for proactive cloud threat prevention
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 12:00 AM
Generative AI in Cyber Defense: Harnessing Innovation While Mitigating Emerging Risks
Exploring how generative AI improves threat detection, automated response, and anomaly analysis in cybersecurity
Balancing opportunities of AI-powered defense with threats from AI-enhanced attacks such as deepfakes and polymorphic malware
Strategies for governance, ethical use, and collaboration to build resilient AI-driven cyber defense ecosystems
12:00 AM – 12:20 AM
Frameworks, mitigation strategies and do you really know if your Cyber Framework works?
Evaluating the real-world effectiveness of cybersecurity frameworks through continuous monitoring, risk assessments, and incident metrics
Implementing adaptive mitigation strategies that evolve with emerging threats, including automation, AI, and threat intelligence integration
Bridging gaps between compliance and actual security posture to ensure frameworks deliver measurable protection and resilience
12:20 PM - 12:40 PM
Cybersecurity Procurement in a Rapidly Evolving Threat Landscape: Best Practices for Strategic Investment
Embedding cybersecurity criteria into procurement processes to ensure vendor resilience and technology alignment with evolving threats
Prioritizing risk-based investment focusing on critical assets, supply chain security, and compliance with emerging regulations
Leveraging continuous vendor risk assessment, contractual safeguards, and collaborative governance to maintain robust cybersecurity posture
12:40 PM - 12:50 PM
Cyber Stronghold or Digital Mirage? Building Resilience in the Cyber Age
Core principles and foundational strategies for establishing robust cyber defenses in organizations of all sizes
Industry best practices and lessons learned from recent high-profile breaches to strengthen security posture
Practical implementation approaches and actionable cybersecurity strategies tailored for effective organizational resilience
12:50 PM - 01:00 PM
Chain Reaction: Supply Chain Cybersecurity Risks and Mitigation Strategies
Increasing attack surface due to extended supply chains and third-party vendors
Best practices in supply chain risk management, vendor assessments, and contractual safeguards
Case studies of recent supply chain cyberattacks and key lessons
01:00 PM - 01:45 PM
NETWORKING LUNCHEON
01:45 PM - 02:15 PM
Panel Discussion
Click, Think, Defend: People-Powered Cyber Resilience in the Philippines
Building a cyber-aware workforce through contextual training, gamified exercises, and localized phishing simulations tailored to Philippine threat patterns
Reducing insider and human-driven risks with behavior analytics, risk-based access, and clear accountability across hybrid public–private environments
Empowering non-technical staff, LGUs, and frontline teams to recognize, report, and respond to cyber threats as part of the country’s national cyber resilience goals
02:15 PM - 02:35 PM
Real-World Resilience: A Case Study on Responding to a Cyber Breach
Step-by-step walkthrough of a recent cyber breach incident faced by a leading organization
Practical incident response measures, communication strategies, and remediation actions taken
Key lessons learned and actionable insights to enhance organizational readiness and resilience against future attacks
02:35 PM - 03:05 PM
Panel Discussion
Ctrl, Alt, Defend: Integrating Mobile, Cyber, and Data Protection for Comprehensive Risk Management
Leveraging unified security frameworks to protect mobile devices, networks, and sensitive data from evolving cyber threats
Implementing mobile device management, encryption, and AI-driven monitoring to ensure continuous protection and compliance
Balancing user accessibility with strict cybersecurity controls for effective risk mitigation across mobile and digital environments
03:05 PM - 04:00 PM
CLOSING REMARKS & VISIT TO EXHIBITOR LOUNGE
16:00– 16:30
Red Carpet Moment with Paparazzi Lights
16:30 – 16:40
Opening Ceremony
16:40 – 16:50
Grand Premier Performance
16:50 – 17:00
Keynote Address from VIP Chief Guest
17:00 – 17:20
Introductory Address by the Jury Committee
17:20 – 18:00
Awards Presentation Ceremony
18:00 – 18:10
Closing Performance
18:10 – 18:20
Closing Remarks
18:20 – 19:30
Cocktail & Gala Dinner
*The above is a running agenda and is subject to change