Who Is this summit for

Built for Decision-Makers and Builders of Resilience

LEADERS

(C-Suites and Founders)

This summit is for leaders who are accountable when things go wrong—and want to be prepared before they do. Because cyber risk is now a leadership issue—not just an IT problem.

SPONSORS & SOLUTION PROVIDERS

Decision-makers don’t want more noise—they want trusted partners. This summit is for serious vendors who wants to meet serious buyers—in context, not at random.

SPEAKERS & THOUGHT LEADERS

Influence senior leaders and policymakers shaping cybersecurity and digital trust

Program Highlights

The threats are escalating—here is how we fight back. Our agenda brings together the brightest minds in cybersecurity to tackle human error, strengthen governance, and build the "highly resilient" organizations of tomorrow.

Day 2: Afternoon

Operational Excellence and Future Readiness

1:50 PM Panel: From Chaos to Control: Operationalizing Your Cyber Resilience Framework

RB Bañez, Regional Information Security Officer, DSWD

JC Principe, Chief Information and Technology Officer, Sumifru Philippines Corporation

Lianne Edera, Head of Security & Compliance, Medva

Mark Jerome Espinosa, Business Information Security Officer (BISO), Strada Global

Moderator: Mr. Carlos "Titus" C. Manuel, President of Philippine Computer Society (PCS)

Many security teams operate in a state of "chaos"—reacting to the latest vulnerability, chasing compliance checkboxes, and struggling to measure progress. This panel brings together experienced CISOs and GRC leaders to share how they have moved from reactive chaos to proactive control by operationalizing their cyber resilience frameworks.

* A Practical Roadmap for Framework Selection and Tailoring

* Five Metrics That Translate Resilience to the Boardroom

* How to Build a Culture of Continuous Improvement (Without Burning Out Your Team)

2:35 PM The Mobile Attack Surface: Why Your Apps Are the New Perimeter

Isaac Su, Solution Architect, SecIron

With the rise of bring-your-own-device (BYOD), mobile banking, e-wallets, and remote work, mobile apps have become the primary interface between your business and your customers. Yet, they remain the most under-protected asset in most security programs. Attackers know this. They are exploiting insecure APIs, reverse-engineering client-side code, and leveraging compromised devices to bypass traditional controls.

This session exposes the growing mobile attack surface, walks through real-world attack vectors targeting financial and e-commerce apps, and provides a practical framework for embedding security into the mobile development lifecycle.

* How Mobile Apps Have Become the Primary Attack Vector

* Real-World Attack Vectors: From Reverse Engineering to Credential Theft

* Securing the Mobile Development Lifecycle: A Practical Framework

2:55 PM Cyber Resilience in Action — Lessons from Securing 130+ Sites Across APAC

Jon David Frilles, Regional IT and Infrastructure Security Leader - APAC,Kenvue (Johnson & Johnson Consumer Health)

A practitioner-led discussion on building resilience during large-scale transformation, covering incident response in production environments, risk prioritization, and maintaining business continuity across distributed operations.

* Real-world lessons on containing and mitigating cyber threats across 130+ geographically distributed sites without disrupting critical manufacturing, supply chain, or hybrid cloud operations.

* A practical framework for identifying, ranking, and addressing the most critical vulnerabilities across a large, diverse enterprise footprint

* Strategies for Maintaining Business Continuity During Transformation

3: 10 PM Afternoon Networking Coffee Break & Visit Booths

3:30 PM - 3:50 PM The Cyber Insurance Claims War Room

A practical session dissecting a real (anonymized) insurance policy and claims process. Participants work through a breach scenario to understand: what evidence is required, how to avoid claim denial, the role of forensics vendors approved by the insurer, and how to negotiate with adjusters.

* Treat Insurance as a Strategic Financial Tool

* Navigate the Claims Process for Success

* Optimize Your Security-Return on Investment (S-ROI)

3:50 PM The Sovereign Shield: Redefining Resilience in an Interconnected World

Sharvind Appiah, Managing Partner, Shawne Applebee

In an era of fragmenting global networks, true cyber resilience is no longer just about software patches; it’s about strategic ownership.

* Explore how digital sovereignty, meaning the ability to control your own data, infrastructure, and supply chains; acts as a critical fail-safe against systemic global shock

* Examine how reducing external dependencies minimizes attack surfaces and empowers organizations to maintain operational continuity during geopolitical or technical crises.

* Learn how to leverage sovereign technologies to build a more robust, self-healing security posture.

4: 10 PM Closing Panel: The Resilient Organization: A Synthesis of Vision, Operations, and Leadership

Ervin Mark Santos, PGDSu, Head of Risk and Sustainability, Global Dominion Financing, Inc

Sherryl Cando, Chief Risk Officer, Petnet, Inc.

Ruth Mary Calamba, Head of Operational and Resilience Risk, UnionBank of the Philippines

This panel synthesizes the entire summit. Panelists will reflect on how the themes of Day 1 (Foundation, Strategy) and Day 2 (Operations, Future) combine to create an organization that can not only withstand shocks but thrive amidst them

* A holistic mental model for cyber resilience integrating culture, technology, and proces

* Final, prioritized recommendations for the first 90 days post-summit

* An inspirational vision of leadership in the next era of digital risk

4:50 PM Raffle Prize, Summit Closing & Feedback

FOLLOW US

COMPANY

CUSTOMER CARE

CUSTOMER CARE

Copyright Customized Training Solutions Pte. Ltd. All Rights Reserved.