Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

INAUGURATION & OPENING REMARKS

David Almirol Jr.

David Almirol Jr.

Undersecretary for e-Government

Department of Information and Communications Technology

09:15 AM – 09:30 AM

Fortifying the Philippines’ Digital Future: Defending National Interests in an Increasingly Hostile Digital World

  • Harnessing the power of the Philippines’ National Cybersecurity Plan (NCSP) 2023-2028 to safeguard critical infrastructure, public institutions, and private enterprises
  • Fostering a cybersecurity workforce through government-led capacity-building programs and industry certifications
  • Adapting the Philippines’ Cybersecurity Resilience Framework to counteract APTs and cyber espionage
Atty. Jose Sutton Belarmino II

Atty. Jose Sutton Belarmino II

Deputy Privacy Commissioner

National Privacy Commission

09:30 AM – 09:50 AM

The Unified Cloud Security Mandate: Bridging Visibility Gaps and Automating Remediation for Enterprise-Scale Protection

  • Challenge the effectiveness of siloed cloud security solutions and identify the hidden risks they fail to address
  • Learn about essential capabilities that provide complete visibility, contextual risk analysis, and automated remediation recommendations across all cloud platforms
  • Explore how integrating unique features like blast radius visualization and AI-powered asset search can transform your security posture and deliver real business value
Oliver Patron

Oliver Patron

Assistant Director for Solutions Consulting and Architecture

Globe Business

09:50 AM – 10:10 AM

Manila Secure 2025: Insights into the Emerging Threat Horizon

  • Key threat trends observed in 2025, including ransomware evolution, supply chain compromises, and targeted fraud campaigns
  • The business and operational impact of major cyber incidents; lessons learned and strategic takeaways for improving cyber resilience
  • How organizations can move toward a more proactive, intelligence-driven defense posture
Eddie Zeng

Eddie Zeng

Senior Sales Engineer

Recorded Future

10:10 AM – 10:30 AM

Intelligent Escort, Resilient Growth: The New Paradigm of AI-Driven Cybersecurity Operations

  • Long-standing challenges that remain difficult to solve, such as security fragmentation, massive alert floods, high false positives, and the scarcity of cybersecurity talent
  • Simplifying customer security operations through AI integration, extensive third-party interoperability, and comprehensive visualization – empowering clients
  • Tackling complex and evolving security challenges
Grant Mappatao

Grant Mappatao

Pre Sales Manager

Sangfor

10:30 AM – 11:00 AM

Panel Discussion

Securing Your Organization from Within: Addressing Insider Threats, Strengthening Data Protection, and Ensuring Compliance

  • Mitigating insider threats by detecting suspicious behavior, preventing data leakage through data loss prevention systems
  • Encrypting sensitive information, securing email archiving, and defending against ransomware and phishing attacks to ensure the safety of valuable data
  • Ensuring compliance by automating reporting, securing data retention, and enforcing privacy policies to meet global data regulations
Moderator
Charmaine Valmonte

Charmaine Valmonte

Chief Information Security Officer

Aboitiz Equity Ventures

Barry Chen

Barry Chen

Regional Director, Asia

Mimecast

Roland Oscuro

Roland Oscuro

Chief Information Security Officer / Data Protection Office

Philippine National Bank

Dennis Mathew Opiso

Dennis Mathew Opiso

Chief Information Security Officer

JG Summit Holdings, Inc.

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Cloud Security in a Multi-Tenant World: Defending Against Misconfigurations, Breaches, and Insider Threats

  • Addressing cloud misconfigurations and security gaps that expose enterprises to breaches
  • Enforcing Zero Trust in cloud environments through identity-based access controls and segmentation
  • Leveraging cloud-native security tools like CWPP, CSPM, and CNAPP to enhance visibility and protection

11:40 AM – 12:00 PM

Securing the Edge: A Modern Approach to App & API Protection

  • Defending modern apps and APIs with Fastly’s next-gen WAF, optimized for cloud environments and built to scale with your traffic
  • Embracing Detection-as-Code
  • Securing workloads seamlessly across any environment with consistent policy enforcement and edge-native protections
Shu Teng Loh

Shu Teng Loh

Senior Solutions Engineer

Fastly

12:00 PM – 12:20 PM

Cybercriminals in the Cloud: The Rise of Cloud-Based Attacks and Data Exfiltration Strategies

  • Investigating cybercriminal techniques for hijacking cloud infrastructure and stealing sensitive data
  • Strengthening cloud security with AI-driven anomaly detection and threat intelligence
  • Developing cloud-native security policies to prevent unauthorized access and data breaches
Paul Ivan Villacrusis

Paul Ivan Villacrusis

Technical Solutions Consultant

ManageEngine

12:20 PM – 12:40 PM

Securing Identity Verification in the Digital Age: Protecting Users Without Compromising Experience

  • Exploring the evolution of self-sovereign identity (SSI) and decentralized identity frameworks
  • Mitigating risks of identity fraud, credential stuffing, and password-based authentication failures
  • Enhancing trust and privacy in digital identity systems through regulatory compliance and user-centric security

12:40 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:00 PM

Digital Transformation and Cybersecurity: Finding the Right Balance Between Innovation and Risk

  • Embedding security into digital transformation strategies to prevent vulnerabilities
  • Mitigating risks associated with cloud migration, remote work, and IT modernization
  • Ensuring business continuity with adaptive cybersecurity frameworks in a digital-first economy
Wilkins Win Wong

Wilkins Win Wong

Assistant Director

Securities and Exchange Commission

14:00 PM – 14:30 PM

Panel Discussion

Cybersecurity for SMEs – Protecting Digital Assets on a Budget

  • Exploring affordable tools and best practices SMEs can implement to safeguard their digital assets without breaking the bank
  • Understanding the most common cyber risks faced by SMEs, such as phishing, ransomware, and data breaches, and how to mitigate them effectively
  • Learning how to prioritize cybersecurity spending, leverage free and low-cost solutions, and build a security-conscious company culture

14:30 PM – 15:00 PM

Panel Discussion

The Cyber Arms Race: AI-Driven Offensive Security vs Autonomous Cyber Defense

  • Examining how AI is enabling real-time cyberattacks and automated penetration testing
  • Deploying AI-driven defensive mechanisms that predict and neutralize threats before impact
  • Addressing the risks of AI models being manipulated or exploited by adversaries

15:00 PM – 15:15 PM

The Internet of Insecure Things: Weaponized IoT Devices and the Rise of Smart Cyber Attacks

  • Investigating large-scale botnet attacks and IoT-enabled ransomware incidents
  • Strengthening IoT security with firmware updates, network segmentation, and AI-driven anomaly detection
  • Developing global IoT security standards to protect smart homes, cities, and industries
Joseph Victor Generato

Joseph Victor Generato

Director II

Maritime Industry Authority (MARINA)

15:15 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

Cyber Warfare and Digital Espionage: Understanding the Threats to National Security and Critical Infrastructure

  • Analysing geopolitical cyber threats, state-sponsored attacks, and cyber terrorism trends
  • Strengthening national cyber defence through regulatory frameworks and cyber intelligence sharing
  • Enhancing public-private partnerships to protect critical infrastructure from cyber sabotage
Police Brigadier General Bernard R. Yang

Police Brigadier General Bernard R. Yang

Director, Anti-Cybercrime Group

Philippine National Police

09:15 AM – 09:30 AM

Security Culture as a Strategic Advantage: Building a Cyber-Resilient Organization

  • Moving beyond compliance checkboxes to foster a proactive cybersecurity mindset
  • Measuring cybersecurity culture and employee readiness through risk-based awareness programs
  • Encouraging leadership engagement and accountability in cybersecurity initiatives
Francel Margareth

Francel Margareth

Cybersecurity Woman Leader and Evangelist

Armed Forces of the Philippines

09:30 AM – 09:50 AM

Securing Mobile Devices: Preventing Cyber Threats in an Always-On, Always-Connected World

  • Addressing mobile malware, SIM swap fraud, and malicious app threats
  • Implementing mobile threat defence (MTD) and AI-driven security solutions for real-time protection
  • Strengthening enterprise security policies for mobile device management (MDM) and Zero Trust enforcement

09:50 AM – 10:10 AM

The Digital Doppelganger Threat: Deepfake Scams, AI-Cloned Voices, and Identity Takeovers

  • Investigating real-world cases of cybercriminals using deepfake technology to manipulate trust
  • Developing AI-powered verification techniques to detect synthetic media fraud
  • Strengthening corporate and personal security measures against deepfake-based attacks

10:10 AM – 10:30 AM

Code Injection to Cloud Takeover: The Next Generation of Application-Level Cyber Attacks

  • Analysing modern attack vectors like AI-generated malware, API vulnerabilities, and serverless exploits
  • Implementing DevSecOps strategies to secure the software development lifecycle
  • Leveraging AI to detect, prevent, and mitigate application-layer threats in real time

10:30 AM – 11:00 AM

Panel Discussion

Assume-breach: The New Standard in Cyber Resilience

  • Enabling organizations to prepare, respond, and recover swiftly from cyber threats, ensuring uninterrupted business operations
  • Leveraging artificial intelligence to boost data protection, threat detection, and automated recovery
  • Securing data across hybrid and multi-cloud environments with real-world applications and hands-on learning

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Cyber Heists of the Future: AI-Powered Bank Fraud, Digital Money Laundering, and Cryptocurrency Attacks

  • Analysing how AI is being used to conduct large-scale financial fraud and money laundering
  • Securing digital transactions with AI-driven fraud detection and blockchain analytics
  • Strengthening banking cybersecurity policies to prevent AI-enhanced financial crime
Bently Roxas

Bently Roxas

Director IV-Knowledge Management and Information Technology

Department of Health

11:40 AM – 12:00 PM

Biometric Security Under Attack: Protecting Against Spoofing, Replay, and Deepfake Fraud

  • Examining vulnerabilities in fingerprint, facial recognition, and voice-based authentication
  • Strengthening biometric security with liveness detection and multi-modal authentication
  • Ensuring regulatory compliance and privacy in biometric-based identity verification solutions

12:00 PM – 12:20 PM

Cybercrime as a Service: The Underground Economy of Ransomware, Malware, and Digital Extortion

  • Unveiling the dark web ecosystem where cybercriminals sell hacking tools and exploit kits
  • Disrupting Ransomware-as-a-Service (RaaS) and the monetization of cyber extortion
  • Strengthening international cooperation to dismantle cybercrime syndicates

12:20 PM – 12:40 PM

The Impact of Public-Private Partnerships on Cybersecurity Defense

  • How public-private partnerships can contribute to the creation of effective regulations, frameworks, and industry standards
  • Collaboration between governments and private enterprises – improving real-time threat detection and response
  • The role of joint initiatives in training and upskilling the workforce to address evolving cyber threats

12:40 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:00 PM

The Human Factor in Cybersecurity: Turning Employees into the First Line of Defense

  • Creating a cybersecurity-aware culture through training, gamification, and phishing simulations
  • Reducing insider threats through behaviour monitoring and risk-based access controls
  • Empowering non-technical staff to recognize and respond to cyber threats effectively
Judy Ulysses Lacsamana

Judy Ulysses Lacsamana

AVP - Cybersecurity

2Go Group Inc

14:00 PM – 14:30 PM

Panel Discussion

Navigating Compliance in the Digital Age & Complying with Data Protection Laws

  • Implementing robust security measures to protect sensitive data from breaches, cyber threats, and unauthorized access
  • Safeguarding personal and organizational data to build confidence among customers, stakeholders, and regulatory bodies.
  • Establishing a robust cybersecurity framework to detect, respond to, and mitigate data breaches in compliance with legal requirements

14:30 PM – 15:00 PM

Panel Discussion

The Shadow Supply Chain: Cyber Threats Lurking in Third-Party Vendors and Software Dependencies

  • Analysing real-world attacks where supply chain vulnerabilities were exploited
  • Implementing AI-driven risk assessment and vendor security evaluation strategies
  • Enhancing software supply chain security through continuous monitoring and zero-trust principles
Moderator
Algen Nazareno

Algen Nazareno

Head of Content Protection and Information Security

ABS-CBN

Steffen Minkmar

Steffen Minkmar

Head, IT Risk and IT Resilience

Asian Development Bank

Henry Macasiano

Henry Macasiano

Head of Information Security

Metro Pacific Tollways Corporation

Maria Concepcion Gloria-Rubio

Maria Concepcion Gloria-Rubio

Data Protection Officer

Philippine Amusement and Gaming Corporation

15:00 PM – 15:15 PM

The Road Ahead: Cybersecurity Innovations & Future Trends

  • Exploring how AI-driven threat detection and automation are transforming cybersecurity strategies
  • Understanding the shift towards a “never trust, always verify” security model to combat evolving cyber threats
  • How evolving cybersecurity regulations will shape the future of data protection and risk management
Arlene Romasanta

Arlene Romasanta

IT Director and CIO

Department of Environment and Natural Resources

15:15 PM – 16:00 PM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

16:30 – 16:40

Opening Ceremony

16:40 – 16:50

Grand Premier Performance

16:50 – 17:00

Keynote Address from VIP Chief Guest

17:00 – 17:20

Introductory Address by the Jury Committee

17:20 – 18:00

Awards Presentation
Ceremony

18:00 – 18:10

Closing Remarks

18:10 – 18:20

Closing Performance

18:20 – 19:30

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #PhilSec Newsletter