Fortifying the Philippines’ Digital Future: Defending National Interests in an Increasingly Hostile Digital World
Harnessing the power of the Philippines’ National Cybersecurity Plan (NCSP) 2023-2028 to safeguard critical infrastructure, public institutions, and private enterprises
Fostering a cybersecurity workforce through government-led capacity-building programs and industry certifications
Adapting the Philippines’ Cybersecurity Resilience Framework to counteract APTs and cyber espionage
09:30 AM – 09:50 AM
The Unified Cloud Security Mandate: Bridging Visibility Gaps and Automating Remediation for Enterprise-Scale Protection
Challenge the effectiveness of siloed cloud security solutions and identify the hidden risks they fail to address
Learn about essential capabilities that provide complete visibility, contextual risk analysis, and automated remediation recommendations across all cloud platforms
Explore how integrating unique features like blast radius visualization and AI-powered asset search can transform your security posture and deliver real business value
09:50 AM – 10:10 AM
Manila Secure 2025: Insights into the Emerging Threat Horizon
Key threat trends observed in 2025, including ransomware evolution, supply chain compromises, and targeted fraud campaigns
The business and operational impact of major cyber incidents; lessons learned and strategic takeaways for improving cyber resilience
How organizations can move toward a more proactive, intelligence-driven defense posture
10:10 AM – 10:30 AM
Dark AI vs. Defensive AI: A Contest of Algorithms
What are the implications of dark AI for an organization’s cybersecurity practices?
Are cybersecurity teams turning to defensive AI? Is it perfectly designed to predict and mitigate AI-driven attacks
The clash between dark AI & defensive AI – Pushing the boundaries of cybersecurity innovation
10:30 AM – 11:00 AM
Panel Discussion
Securing Your Organization from Within: Addressing Insider Threats, Strengthening Data Protection, and Ensuring Compliance
Mitigating insider threats by detecting suspicious behavior, preventing data leakage through data loss prevention systems
Encrypting sensitive information, securing email archiving, and defending against ransomware and phishing attacks to ensure the safety of valuable data
Ensuring compliance by automating reporting, securing data retention, and enforcing privacy policies to meet global data regulations
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 11:40 AM
Cloud Security in a Multi-Tenant World: Defending Against Misconfigurations, Breaches, and Insider Threats
Addressing cloud misconfigurations and security gaps that expose enterprises to breaches
Enforcing Zero Trust in cloud environments through identity-based access controls and segmentation
Leveraging cloud-native security tools like CWPP, CSPM, and CNAPP to enhance visibility and protection
11:40 AM – 12:00 PM
Zero Trust in a Hyperconnected World: Eliminating Implicit Trust in Enterprise Security
Implementing Zero Trust principles to secure hybrid cloud environments and remote workforces
Using micro-segmentation, continuous authentication, and AI-driven anomaly detection
Addressing challenges in adopting Zero Trust frameworks across global enterprises
12:00 PM – 12:20 PM
Cybercriminals in the Cloud: The Rise of Cloud-Based Attacks and Data Exfiltration Strategies
Investigating cybercriminal techniques for hijacking cloud infrastructure and stealing sensitive data
Strengthening cloud security with AI-driven anomaly detection and threat intelligence
Developing cloud-native security policies to prevent unauthorized access and data breaches
12:20 PM – 12:40 PM
Securing Identity Verification in the Digital Age: Protecting Users Without Compromising Experience
Exploring the evolution of self-sovereign identity (SSI) and decentralized identity frameworks
Mitigating risks of identity fraud, credential stuffing, and password-based authentication failures
Enhancing trust and privacy in digital identity systems through regulatory compliance and user-centric security
12:40 PM – 13:45 PM
LUNCH BREAK
13:45 PM – 14:00 PM
Digital Transformation and Cybersecurity: Finding the Right Balance Between Innovation and Risk
Embedding security into digital transformation strategies to prevent vulnerabilities
Mitigating risks associated with cloud migration, remote work, and IT modernization
Ensuring business continuity with adaptive cybersecurity frameworks in a digital-first economy
14:00 PM – 14:30 PM
Panel Discussion
Cybersecurity for SMEs – Protecting Digital Assets on a Budget
Exploring affordable tools and best practices SMEs can implement to safeguard their digital assets without breaking the bank
Understanding the most common cyber risks faced by SMEs, such as phishing, ransomware, and data breaches, and how to mitigate them effectively
Learning how to prioritize cybersecurity spending, leverage free and low-cost solutions, and build a security-conscious company culture
14:30 PM – 15:00 PM
Panel Discussion
The Cyber Arms Race: AI-Driven Offensive Security vs Autonomous Cyber Defense
Examining how AI is enabling real-time cyberattacks and automated penetration testing
Deploying AI-driven defensive mechanisms that predict and neutralize threats before impact
Addressing the risks of AI models being manipulated or exploited by adversaries
15:00 PM – 15:15 PM
The Internet of Insecure Things: Weaponized IoT Devices and the Rise of Smart Cyber Attacks
Investigating large-scale botnet attacks and IoT-enabled ransomware incidents
Strengthening IoT security with firmware updates, network segmentation, and AI-driven anomaly detection
Developing global IoT security standards to protect smart homes, cities, and industries
15:15 – 17:00
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
08:00 AM – 09:00 AM
REGISTRATION & COFFEE
09:00 AM – 09:15 AM
Cyber Warfare and Digital Espionage: Understanding the Threats to National Security and Critical Infrastructure
Analysing geopolitical cyber threats, state-sponsored attacks, and cyber terrorism trends
Strengthening national cyber defence through regulatory frameworks and cyber intelligence sharing
Enhancing public-private partnerships to protect critical infrastructure from cyber sabotage
09:15 AM – 09:30 AM
Security Culture as a Strategic Advantage: Building a Cyber-Resilient Organization
Moving beyond compliance checkboxes to foster a proactive cybersecurity mindset
Measuring cybersecurity culture and employee readiness through risk-based awareness programs
Encouraging leadership engagement and accountability in cybersecurity initiatives
09:30 AM – 09:50 AM
Securing Mobile Devices: Preventing Cyber Threats in an Always-On, Always-Connected World
Addressing mobile malware, SIM swap fraud, and malicious app threats
Implementing mobile threat defence (MTD) and AI-driven security solutions for real-time protection
Strengthening enterprise security policies for mobile device management (MDM) and Zero Trust enforcement
09:50 AM – 10:10 AM
The Digital Doppelganger Threat: Deepfake Scams, AI-Cloned Voices, and Identity Takeovers
Investigating real-world cases of cybercriminals using deepfake technology to manipulate trust
Developing AI-powered verification techniques to detect synthetic media fraud
Strengthening corporate and personal security measures against deepfake-based attacks
10:10 AM – 10:30 AM
Code Injection to Cloud Takeover: The Next Generation of Application-Level Cyber Attacks
Analysing modern attack vectors like AI-generated malware, API vulnerabilities, and serverless exploits
Implementing DevSecOps strategies to secure the software development lifecycle
Leveraging AI to detect, prevent, and mitigate application-layer threats in real time
10:30 AM – 11:00 AM
Panel Discussion
Assume-breach: The New Standard in Cyber Resilience
Enabling organizations to prepare, respond, and recover swiftly from cyber threats, ensuring uninterrupted business operations
Leveraging artificial intelligence to boost data protection, threat detection, and automated recovery
Securing data across hybrid and multi-cloud environments with real-world applications and hands-on learning
11:00 AM – 11:30 AM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
11:30 AM – 11:40 AM
Cyber Heists of the Future: AI-Powered Bank Fraud, Digital Money Laundering, and Cryptocurrency Attacks
Analysing how AI is being used to conduct large-scale financial fraud and money laundering
Securing digital transactions with AI-driven fraud detection and blockchain analytics
Strengthening banking cybersecurity policies to prevent AI-enhanced financial crime
11:40 AM – 12:00 PM
Biometric Security Under Attack: Protecting Against Spoofing, Replay, and Deepfake Fraud
Examining vulnerabilities in fingerprint, facial recognition, and voice-based authentication
Strengthening biometric security with liveness detection and multi-modal authentication
Ensuring regulatory compliance and privacy in biometric-based identity verification solutions
12:00 PM – 12:20 PM
Cybercrime as a Service: The Underground Economy of Ransomware, Malware, and Digital Extortion
Unveiling the dark web ecosystem where cybercriminals sell hacking tools and exploit kits
Disrupting Ransomware-as-a-Service (RaaS) and the monetization of cyber extortion
Strengthening international cooperation to dismantle cybercrime syndicates
12:20 PM – 12:40 PM
The Impact of Public-Private Partnerships on Cybersecurity Defense
How public-private partnerships can contribute to the creation of effective regulations, frameworks, and industry standards
Collaboration between governments and private enterprises – improving real-time threat detection and response
The role of joint initiatives in training and upskilling the workforce to address evolving cyber threats
12:40 PM – 13:45 PM
LUNCH BREAK
13:45 PM – 14:00 PM
The Human Factor in Cybersecurity: Turning Employees into the First Line of Defense
Creating a cybersecurity-aware culture through training, gamification, and phishing simulations
Reducing insider threats through behaviour monitoring and risk-based access controls
Empowering non-technical staff to recognize and respond to cyber threats effectively
14:00 PM – 14:30 PM
Panel Discussion
Navigating Compliance in the Digital Age & Complying with Data Protection Laws
Implementing robust security measures to protect sensitive data from breaches, cyber threats, and unauthorized access
Safeguarding personal and organizational data to build confidence among customers, stakeholders, and regulatory bodies.
Establishing a robust cybersecurity framework to detect, respond to, and mitigate data breaches in compliance with legal requirements
14:30 PM – 15:00 PM
Panel Discussion
The Shadow Supply Chain: Cyber Threats Lurking in Third-Party Vendors and Software Dependencies
Analysing real-world attacks where supply chain vulnerabilities were exploited
Implementing AI-driven risk assessment and vendor security evaluation strategies
Enhancing software supply chain security through continuous monitoring and zero-trust principles
15:00 PM – 15:15 PM
The Road Ahead: Cybersecurity Innovations & Future Trends
Exploring how AI-driven threat detection and automation are transforming cybersecurity strategies
Understanding the shift towards a “never trust, always verify” security model to combat evolving cyber threats
How evolving cybersecurity regulations will shape the future of data protection and risk management
15:15 PM – 16:00 PM
NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE
16:00– 16:30
Red Carpet Moment with Paparazzi Lights
16:30 – 16:40
Opening Ceremony by Karina Basrewan
16:40 – 16:50
Grand Premier Performance
16:50 – 17:00
Keynote Address from VIP Chief Guest
17:00 – 17:20
Introductory Address by the Jury Committee
17:20 – 18:00
Awards Presentation Ceremony
18:00 – 18:10
Closing Remarks
18:10 – 18:20
Closing Performance
18:20 – 19:30
Cocktail & Gala Dinner
*The above is a running agenda and is subject to change