2025 Edition Has Been Concluded Successfully! See You All In 2026! 2025 Edition Has Been Concluded Successfully! See You All In 2026! 2025 Edition Has Been Concluded Successfully! See You All In 2026! 2025 Edition Has Been Concluded Successfully! See You All In 2026!

Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:10 AM

INAUGURATION

09:10 AM – 09:20 AM

Reshaping Philippines' Cybersecurity for 2026 and Beyond

  • Harnessing AI-driven national defense to protect critical infrastructure and secure public and private sectors under the National Cybersecurity Plan (NCSP) 2023–2028
  • Government-led capacity building, scholarships, and industry partnerships to develop skilled professionals for a resilient cyber ecosystem
  • Strengthening legislative frameworks, public-private cooperation, and responsible digital transformation adoption to counteract evolving advanced persistent threats and cyber espionage

09:20 AM – 09:30 AM

Navigating the Intersection of National Security, Digital Transformation, and Emerging Threats

  • Addressing AI-powered cyberattacks, expanding IoT vulnerabilities, and sophisticated nation-state espionage through advanced threat intelligence and real-time monitoring
  • Deploying flexible, scalable cybersecurity architectures and zero-trust frameworks to dynamically defend critical infrastructure and digital ecosystems
  • Enhancing international and regional collaboration to share intelligence, harmonize response protocols, and strengthen collective cyber resilience

09:30 AM – 09:50 AM

Zero Trust, Full Security: Securing the Hybrid Workforce and Digital Ecosystem

  • Adopting Zero Trust to verify every user, device, and application, eliminating implicit trust
  • Use micro-segmentation and multi-factor authentication to limit lateral attacks and secure access
  • Align with the National Cybersecurity Strategy to implement scalable, AI-driven security and ensure compliance

09:50 AM – 10:10 AM

Silver Linings and Secure Clouds: Strategies for Resilience in a Rapidly Evolving Digital Economy

  • Implementing cloud security guardrails aligned with the National Cybersecurity Strategy to protect growing digital assets across sectors
  • Leveraging AI-driven threat detection and automated compliance monitoring to strengthen cloud defenses
  • Addressing data residency, privacy, and regulatory compliance challenges unique to the Philippines’ digital landscape

10:10 AM – 10:30 AM

No More Surprises: Harnessing Predictive Intelligence to Preempt Tomorrow’s Cyber Threats

  • Leveraging AI and machine learning for early detection of emerging threats and advanced persistent threats (APTs)
  • Integrating real-time threat intelligence into automated defense systems to reduce response times and impact
  • Empowering organizations with predictive analytics to shift from reactive to anticipatory cybersecurity postures

10:30 AM – 11:00 AM

Panel Discussion

The Secret Formula: A CISO’s Guide to Risk, Regulation, and Revolution

  • Aligning cybersecurity strategy with evolving regulations and national cybersecurity mandates
  • Managing risks from cloud, AI, and hybrid work environments while enabling innovation
  • Building cyber talent and fostering collaboration to strengthen organizational resilience

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 12:00 PM

Panel Discussion

Access Management in the age of Advanced Spoofing and Deepfake Threats  

  • Addressing emerging vulnerabilities in access controls including credential theft, AI-driven spoofing, and deepfake impersonation
  • Enhancing security with multi-factor authentication, adaptive access policies, and continuous monitoring
  • Navigating compliance with evolving data privacy laws and ensuring secure, user-friendly identity verification solutions

12:00 PM - 12:20 PM

When ransomware knocks: Trends, Tactics, and Breakthrough Defenses

  • The rise of AI-driven and agentic ransomware that adapts and evolves during attacks
  • Increasingly complex multi-extortion campaigns combining encryption, data theft, and deepfake blackmail
  • The critical need for resilience strategies including zero-trust, multi-factor authentication, and incident response agility

12:20 PM – 12:40 PM

AI vs AI: Redefining Defense in the Age of Autonomous Threats

  • Harnessing AI and machine learning for real-time threat detection, automated response, and behavior-based anomaly identification
  • Transitioning to Agentic SOCs where AI agents autonomously investigate, correlate, and mitigate threats, augmenting security analyst capabilities
  • Balancing AI’s power with risks such as prompt injection attacks, AI-enabled social engineering, and emerging adversarial AI techniques

12:40 PM - 12:50 PM

Staying Ahead of the Data Curve: Next- Gen Strategies for Compliance, Risk, and Innovation

  • Navigating evolving global privacy regulations and aligning data protection with business growth
  • Leveraging AI-assisted monitoring, zero-trust access, and post-quantum encryption for resilient data security
  • Embracing privacy-enhancing technologies and adaptive governance to sustain customer trust and compliance

12:50 PM - 01:00 PM

No Use Crying Over Spilt Code: AI-Powered Incident Response to Clean Up Faster and Smarter

  • AI-driven real-time threat detection and behavior analysis significantly reduce breach detection times
  • Automated response playbooks enable immediate containment and remediation without human delay
  • AI-powered forensics and incident analysis provide precise root cause insights to prevent recurrence

01:00 PM - 01:45 PM 

NETWORKING LUNCHEON 

01:45 PM - 02:15 PM 

Panel Discussion

Cybersecurity 2.0: Challenges and Strategies in the Era of Digital Transformation

  • Balancing innovation and security: Integrating Zero Trust and AI-driven defenses in cloud and hybrid environments
  • Managing expanded attack surfaces caused by IoT, remote work, and interconnected supply chains
  • Building organizational resilience through cybersecurity culture, workforce development, and adaptive incident response

02:15 PM - 02:35 PM 

From Compliance to Culture: Building a Cybersecurity-First Mindset Across Industries

  • Shifting focus from checkbox compliance to embedding cybersecurity in organizational culture and practices
  • Continuous training, awareness programs, and leadership engagement to drive security-conscious behavior
  • Leveraging metrics and governance frameworks to sustain resilience and accountability

02:35 PM - 03:05 PM 

Panel Discussion

Architecture That Defends: Building Resilient, Digital-Native Security Architectures

  • Apply core secure design principles like least privilege, defense in depth, zero trust boundaries, and secure defaults from the earliest design phase
  • Architect scalable, resilient environments across cloud, hybrid, and edge with clear service boundaries, encrypted channels, and fault-tolerant patterns
  • Modernize legacy systems by embedding security controls proactively and validating designs with threat modeling to prepare for evolving threats

03:05 PM - 03:35 PM 

Panel Discussion

Cyber Comeback - Rebuilding Trust After a Cyber Crisis

  • Managing internal and public confidence through transparent, timely communications with regulators, customers, employees, and board members
  • Establishing clear communication protocols and incident disclosure practices to meet regulatory requirements and build stakeholder trust
  • Leveraging the crisis as a catalyst to enhance cybersecurity posture, strengthen culture, and invest in resilient technologies and training

03:35 PM - 04:00 PM 

CLOSING REMARKS & VISIT TO EXHIBITOR LOUNGE 

04:00 PM – 04:30 PM

Ethical Hacking Workshop

08:00 AM - 09:20 AM 

REGISTRATION & COFFEE

09:00 AM - 09:15 AM 

The Philippines’ Roadmap to Cyber Resilience: Policy, Partnerships, and Practical Defense

  • Strengthening national cybersecurity through updated policies and alignment with the National Cybersecurity Plan 2023–2028
  • Building public-private partnerships to enhance threat intelligence sharing and coordinated response
  • Implementing practical defense measures including workforce development and critical infrastructure protection

09:15 AM - 09:30 AM

Critical Infrastructure Protection: Safeguarding the Backbone of the Philippines’ Digital Economy

  • Strengthening cybersecurity frameworks for critical sectors including energy, telecommunications, healthcare, and finance to ensure operational continuity and economic stability
  • Integrating advanced threat intelligence, AI-driven monitoring, and resilient architectures to detect and mitigate sophisticated cyberattacks targeting critical infrastructure
  • Enhancing public-private partnerships and compliance with national cybersecurity policies to build a unified and proactive defense posture across all critical infrastructure stakeholders

09:30 AM - 09:50 AM

PHaith in Privacy: Privacy-Enhancing Technologies and Data Sovereignty in Building Trust and Compliance

  • Advances in PETs like homomorphic encryption enable data use while preserving privacy and compliance
  • Understanding implications of Philippine data localization and sovereignty laws on technology adoption
  • Fostering national and international trust through secure data infrastructure and regulatory alignment

09:50 AM - 10:10 AM

Breaking Bad Habits? Building a Ransomware-Resilient Organization

  • Implementing multi-layered defenses including regular, immutable backups and AI-powered threat detection to prevent ransomware intrusion and spread
  • Aligning ransomware recovery plans with business continuity and disaster recovery objectives, ensuring rapid, automated system restoration
  • Promoting a cybersecurity culture with executive buy-in, employee training, access management, and coordinated incident response to minimize risk and impact

10:10 AM - 10:30 AM

Strengthening Cybercrime Suppression in the Philippines: A Multi-Stakeholder and AI-Enhanced Approach for 2026  

  • Enhancing national cyber intelligence with real-time AI-powered information sharing and coordinated inter-agency response involving CICC, PNP, NBI, and private sector partners
  • Updating legislation to address emerging cybercrime methods including AI-driven frauds, with stronger digital evidence protocols and specialized training for prosecutors and judges
  • Empowering communities and LGUs through sustained cyber awareness campaigns, accessible reporting tools, and inclusive public engagement as frontline defenders

10:30 AM - 11:00 AM

Panel Discussion

Cloud Security Essentials: Building Trust in Digital Transformation

  • Securing cloud workloads with zero-trust and identity-centric models
  • Navigating shared responsibility and vendor management in cloud security
  • Leveraging AI and automation for proactive cloud threat prevention

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 12:00 AM

Generative AI in Cyber Defense: Harnessing Innovation While Mitigating Emerging Risks

  • Exploring how generative AI improves threat detection, automated response, and anomaly analysis in cybersecurity
  • Balancing opportunities of AI-powered defense with threats from AI-enhanced attacks such as deepfakes and polymorphic malware
  • Strategies for governance, ethical use, and collaboration to build resilient AI-driven cyber defense ecosystems

12:00 AM – 12:20 AM

Frameworks, mitigation strategies and do you really know if your Cyber Framework works?

  • Evaluating the real-world effectiveness of cybersecurity frameworks through continuous monitoring, risk assessments, and incident metrics
  • Implementing adaptive mitigation strategies that evolve with emerging threats, including automation, AI, and threat intelligence integration
  • Bridging gaps between compliance and actual security posture to ensure frameworks deliver measurable protection and resilience

12:20 PM - 12:40 PM 

Cybersecurity Procurement in a Rapidly Evolving Threat Landscape: Best Practices for Strategic Investment

  • Embedding cybersecurity criteria into procurement processes to ensure vendor resilience and technology alignment with evolving threats
  • Prioritizing risk-based investment focusing on critical assets, supply chain security, and compliance with emerging regulations
  • Leveraging continuous vendor risk assessment, contractual safeguards, and collaborative governance to maintain robust cybersecurity posture

12:40 PM - 12:50 PM

Cyber Stronghold or Digital Mirage? Building Resilience in the Cyber Age

  • Core principles and foundational strategies for establishing robust cyber defenses in organizations of all sizes
  • Industry best practices and lessons learned from recent high-profile breaches to strengthen security posture
  • Practical implementation approaches and actionable cybersecurity strategies tailored for effective organizational resilience

12:50 PM - 01:00 PM

Chain Reaction: Supply Chain Cybersecurity Risks and Mitigation Strategies

  • Increasing attack surface due to extended supply chains and third-party vendors
  • Best practices in supply chain risk management, vendor assessments, and contractual safeguards
  • Case studies of recent supply chain cyberattacks and key lessons

01:00 PM - 01:45 PM

NETWORKING LUNCHEON 

01:45 PM - 02:15 PM

Panel Discussion

Click, Think, Defend: People-Powered Cyber Resilience in the Philippines  

  • Building a cyber-aware workforce through contextual training, gamified exercises, and localized phishing simulations tailored to Philippine threat patterns
  • Reducing insider and human-driven risks with behavior analytics, risk-based access, and clear accountability across hybrid public–private environments
  • Empowering non-technical staff, LGUs, and frontline teams to recognize, report, and respond to cyber threats as part of the country’s national cyber resilience goals

02:15 PM - 02:35 PM

Real-World Resilience: A Case Study on Responding to a Cyber Breach

  • Step-by-step walkthrough of a recent cyber breach incident faced by a leading organization
  • Practical incident response measures, communication strategies, and remediation actions taken
  • Key lessons learned and actionable insights to enhance organizational readiness and resilience against future attacks

02:35 PM - 03:05 PM

Panel Discussion

Ctrl, Alt, Defend: Integrating Mobile, Cyber, and Data Protection for Comprehensive Risk Management

  • Leveraging unified security frameworks to protect mobile devices, networks, and sensitive data from evolving cyber threats
  • Implementing mobile device management, encryption, and AI-driven monitoring to ensure continuous protection and compliance
  • Balancing user accessibility with strict cybersecurity controls for effective risk mitigation across mobile and digital environments

03:05 PM - 04:00 PM 

CLOSING REMARKS & VISIT TO EXHIBITOR LOUNGE 

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

16:30 – 16:40

Opening Ceremony

16:40 – 16:50

Grand Premier Performance

16:50 – 17:00

Keynote Address from VIP Chief Guest

17:00 – 17:20

Introductory Address by the Jury Committee

17:20 – 18:00

Awards Presentation
Ceremony

18:00 – 18:10

Closing Performance

18:10 – 18:20

Closing Remarks

18:20 – 19:30

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #PhilSec Newsletter