Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

INAUGURATION & OPENING REMARKS

09:15 AM – 09:30 AM

Fortifying the Philippines’ Digital Future: Defending National Interests in an Increasingly Hostile Digital World

  • Harnessing the power of the Philippines’ National Cybersecurity Plan (NCSP) 2023-2028 to safeguard critical infrastructure, public institutions, and private enterprises
  • Fostering a cybersecurity workforce through government-led capacity-building programs and industry certifications
  • Adapting the Philippines’ Cybersecurity Resilience Framework to counteract APTs and cyber espionage

09:30 AM – 09:50 AM

The Unified Cloud Security Mandate: Bridging Visibility Gaps and Automating Remediation for Enterprise-Scale Protection

  • Challenge the effectiveness of siloed cloud security solutions and identify the hidden risks they fail to address
  • Learn about essential capabilities that provide complete visibility, contextual risk analysis, and automated remediation recommendations across all cloud platforms
  • Explore how integrating unique features like blast radius visualization and AI-powered asset search can transform your security posture and deliver real business value

09:50 AM – 10:10 AM

Manila Secure 2025: Insights into the Emerging Threat Horizon

  • Key threat trends observed in 2025, including ransomware evolution, supply chain compromises, and targeted fraud campaigns
  • The business and operational impact of major cyber incidents; lessons learned and strategic takeaways for improving cyber resilience
  • How organizations can move toward a more proactive, intelligence-driven defense posture

10:10 AM – 10:30 AM

Dark AI vs. Defensive AI: A Contest of Algorithms

  • What are the implications of dark AI for an organization’s cybersecurity practices?
  • Are cybersecurity teams turning to defensive AI? Is it perfectly designed to predict and mitigate AI-driven attacks
  • The clash between dark AI & defensive AI – Pushing the boundaries of cybersecurity innovation

10:30 AM – 11:00 AM

Panel Discussion

Securing Your Organization from Within: Addressing Insider Threats, Strengthening Data Protection, and Ensuring Compliance

  • Mitigating insider threats by detecting suspicious behavior, preventing data leakage through data loss prevention systems
  • Encrypting sensitive information, securing email archiving, and defending against ransomware and phishing attacks to ensure the safety of valuable data
  • Ensuring compliance by automating reporting, securing data retention, and enforcing privacy policies to meet global data regulations

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Cloud Security in a Multi-Tenant World: Defending Against Misconfigurations, Breaches, and Insider Threats

  • Addressing cloud misconfigurations and security gaps that expose enterprises to breaches
  • Enforcing Zero Trust in cloud environments through identity-based access controls and segmentation
  • Leveraging cloud-native security tools like CWPP, CSPM, and CNAPP to enhance visibility and protection

11:40 AM – 12:00 PM

Zero Trust in a Hyperconnected World: Eliminating Implicit Trust in Enterprise Security

  • Implementing Zero Trust principles to secure hybrid cloud environments and remote workforces
  • Using micro-segmentation, continuous authentication, and AI-driven anomaly detection
  • Addressing challenges in adopting Zero Trust frameworks across global enterprises

12:00 PM – 12:20 PM

Cybercriminals in the Cloud: The Rise of Cloud-Based Attacks and Data Exfiltration Strategies

  • Investigating cybercriminal techniques for hijacking cloud infrastructure and stealing sensitive data
  • Strengthening cloud security with AI-driven anomaly detection and threat intelligence
  • Developing cloud-native security policies to prevent unauthorized access and data breaches

12:20 PM – 12:40 PM

Securing Identity Verification in the Digital Age: Protecting Users Without Compromising Experience

  • Exploring the evolution of self-sovereign identity (SSI) and decentralized identity frameworks
  • Mitigating risks of identity fraud, credential stuffing, and password-based authentication failures
  • Enhancing trust and privacy in digital identity systems through regulatory compliance and user-centric security

12:40 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:00 PM

Digital Transformation and Cybersecurity: Finding the Right Balance Between Innovation and Risk

  • Embedding security into digital transformation strategies to prevent vulnerabilities
  • Mitigating risks associated with cloud migration, remote work, and IT modernization
  • Ensuring business continuity with adaptive cybersecurity frameworks in a digital-first economy

14:00 PM – 14:30 PM

Panel Discussion

Cybersecurity for SMEs – Protecting Digital Assets on a Budget

  • Exploring affordable tools and best practices SMEs can implement to safeguard their digital assets without breaking the bank
  • Understanding the most common cyber risks faced by SMEs, such as phishing, ransomware, and data breaches, and how to mitigate them effectively
  • Learning how to prioritize cybersecurity spending, leverage free and low-cost solutions, and build a security-conscious company culture

14:30 PM – 15:00 PM

Panel Discussion

The Cyber Arms Race: AI-Driven Offensive Security vs Autonomous Cyber Defense

  • Examining how AI is enabling real-time cyberattacks and automated penetration testing
  • Deploying AI-driven defensive mechanisms that predict and neutralize threats before impact
  • Addressing the risks of AI models being manipulated or exploited by adversaries

15:00 PM – 15:15 PM

The Internet of Insecure Things: Weaponized IoT Devices and the Rise of Smart Cyber Attacks

  • Investigating large-scale botnet attacks and IoT-enabled ransomware incidents
  • Strengthening IoT security with firmware updates, network segmentation, and AI-driven anomaly detection
  • Developing global IoT security standards to protect smart homes, cities, and industries

15:15 – 17:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:00 AM – 09:00 AM

REGISTRATION & COFFEE

09:00 AM – 09:15 AM

Cyber Warfare and Digital Espionage: Understanding the Threats to National Security and Critical Infrastructure

  • Analysing geopolitical cyber threats, state-sponsored attacks, and cyber terrorism trends
  • Strengthening national cyber defence through regulatory frameworks and cyber intelligence sharing
  • Enhancing public-private partnerships to protect critical infrastructure from cyber sabotage

09:15 AM – 09:30 AM

Security Culture as a Strategic Advantage: Building a Cyber-Resilient Organization

  • Moving beyond compliance checkboxes to foster a proactive cybersecurity mindset
  • Measuring cybersecurity culture and employee readiness through risk-based awareness programs
  • Encouraging leadership engagement and accountability in cybersecurity initiatives

09:30 AM – 09:50 AM

Securing Mobile Devices: Preventing Cyber Threats in an Always-On, Always-Connected World

  • Addressing mobile malware, SIM swap fraud, and malicious app threats
  • Implementing mobile threat defence (MTD) and AI-driven security solutions for real-time protection
  • Strengthening enterprise security policies for mobile device management (MDM) and Zero Trust enforcement

09:50 AM – 10:10 AM

The Digital Doppelganger Threat: Deepfake Scams, AI-Cloned Voices, and Identity Takeovers

  • Investigating real-world cases of cybercriminals using deepfake technology to manipulate trust
  • Developing AI-powered verification techniques to detect synthetic media fraud
  • Strengthening corporate and personal security measures against deepfake-based attacks

10:10 AM – 10:30 AM

Code Injection to Cloud Takeover: The Next Generation of Application-Level Cyber Attacks

  • Analysing modern attack vectors like AI-generated malware, API vulnerabilities, and serverless exploits
  • Implementing DevSecOps strategies to secure the software development lifecycle
  • Leveraging AI to detect, prevent, and mitigate application-layer threats in real time

10:30 AM – 11:00 AM

Panel Discussion

Assume-breach: The New Standard in Cyber Resilience

  • Enabling organizations to prepare, respond, and recover swiftly from cyber threats, ensuring uninterrupted business operations
  • Leveraging artificial intelligence to boost data protection, threat detection, and automated recovery
  • Securing data across hybrid and multi-cloud environments with real-world applications and hands-on learning

11:00 AM – 11:30 AM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 AM – 11:40 AM

Cyber Heists of the Future: AI-Powered Bank Fraud, Digital Money Laundering, and Cryptocurrency Attacks

  • Analysing how AI is being used to conduct large-scale financial fraud and money laundering
  • Securing digital transactions with AI-driven fraud detection and blockchain analytics
  • Strengthening banking cybersecurity policies to prevent AI-enhanced financial crime

11:40 AM – 12:00 PM

Biometric Security Under Attack: Protecting Against Spoofing, Replay, and Deepfake Fraud

  • Examining vulnerabilities in fingerprint, facial recognition, and voice-based authentication
  • Strengthening biometric security with liveness detection and multi-modal authentication
  • Ensuring regulatory compliance and privacy in biometric-based identity verification solutions

12:00 PM – 12:20 PM

Cybercrime as a Service: The Underground Economy of Ransomware, Malware, and Digital Extortion

  • Unveiling the dark web ecosystem where cybercriminals sell hacking tools and exploit kits
  • Disrupting Ransomware-as-a-Service (RaaS) and the monetization of cyber extortion
  • Strengthening international cooperation to dismantle cybercrime syndicates

12:20 PM – 12:40 PM

The Impact of Public-Private Partnerships on Cybersecurity Defense

  • How public-private partnerships can contribute to the creation of effective regulations, frameworks, and industry standards
  • Collaboration between governments and private enterprises – improving real-time threat detection and response
  • The role of joint initiatives in training and upskilling the workforce to address evolving cyber threats

12:40 PM – 13:45 PM

LUNCH BREAK

13:45 PM – 14:00 PM

The Human Factor in Cybersecurity: Turning Employees into the First Line of Defense

  • Creating a cybersecurity-aware culture through training, gamification, and phishing simulations
  • Reducing insider threats through behaviour monitoring and risk-based access controls
  • Empowering non-technical staff to recognize and respond to cyber threats effectively

14:00 PM – 14:30 PM

Panel Discussion

Navigating Compliance in the Digital Age & Complying with Data Protection Laws

  • Implementing robust security measures to protect sensitive data from breaches, cyber threats, and unauthorized access
  • Safeguarding personal and organizational data to build confidence among customers, stakeholders, and regulatory bodies.
  • Establishing a robust cybersecurity framework to detect, respond to, and mitigate data breaches in compliance with legal requirements

14:30 PM – 15:00 PM

Panel Discussion

The Shadow Supply Chain: Cyber Threats Lurking in Third-Party Vendors and Software Dependencies

  • Analysing real-world attacks where supply chain vulnerabilities were exploited
  • Implementing AI-driven risk assessment and vendor security evaluation strategies
  • Enhancing software supply chain security through continuous monitoring and zero-trust principles

15:00 PM – 15:15 PM

The Road Ahead: Cybersecurity Innovations & Future Trends

  • Exploring how AI-driven threat detection and automation are transforming cybersecurity strategies
  • Understanding the shift towards a “never trust, always verify” security model to combat evolving cyber threats
  • How evolving cybersecurity regulations will shape the future of data protection and risk management

15:15 PM – 16:00 PM

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

16:00– 16:30

Red Carpet Moment with Paparazzi Lights

16:30 – 16:40

Opening Ceremony by Karina Basrewan

16:40 – 16:50

Grand Premier Performance

16:50 – 17:00

Keynote Address from VIP Chief Guest

17:00 – 17:20

Introductory Address by the Jury Committee

17:20 – 18:00

Awards Presentation
Ceremony

18:00 – 18:10

Closing Remarks

18:10 – 18:20

Closing Performance

18:20 – 19:30

Cocktail & Gala Dinner

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #PhilSec Newsletter