We have put together an exciting lineup of data protection, privacy and cyber security leaders and thinkers for this conference. Don't miss your chance to meet with and hear from some of the brightest minds in the industry.
Agenda - July 20, 2017
|09:00 AM||Welcome Address
Mr. Jojo J. Uligan, President at CCAP
|09:10 AM||Guest of Honour Speech
Raymund Liboro, Commissioner at National Privacy Commission, Philippines
|09:50 AM||Keynote | Thrive or be Vanquished: Global Privacy Trends Impacting Outsourcing
Dr. Ken Baylor, President at Vendor Security Alliance
What are the global legislative and regulatory trends impacting outsourcing? Dr. Baylor will provide an overview of changes in privacy and security laws globally and how they affect vendor selection. He will also touch on the important business considerations and the benefits of compliance with data protection and privacy laws.
|10:30 AM||Coffee Break
|11:00 AM||Session 1 | PICs vs. PIPs: What the DPA Means for BPOs and Their Clients
Rose Marie M. King-Dominguez, Senior Partner at SyCip Salazar Hernandez & Gatmaitan
One of the key premises of the Data Privacy Act of 2012 is that a personal information controller (PIC) is different from a personal information processor (PIP), but what does that distinction really mean for PICs and PIPs in terms of compliance with the DPA, accountability and liability? The speaker will highlight the provisions of the law and implementing rules that set out the relationships between PICs and PIPs, discuss what controllers and processors need to be concerned about in respect of their outsourcing arrangements, and offer practical suggestions on dealing with these concerns.
|11:40 AM||Session 2 | Building an Effective Privacy Management Program
Josh Harris, Director, International Regulatory Affairs at TRUSTe
Learn about how an effective privacy management program can help you meet the myriad of data privacy requirements across different sectors and jurisdictions.
|12:20 PM||Panel Discussion 1: Data Privacy – Impact on the Future of Outsourcing
How will the trends of data localization, emphasis on stronger third party data protection controls, and the reliance on equivalent data privacy legislation as the basis of cross-border data transfers impact the growth and future of the industry? Can we future-proof ourselves as the data privacy landscape continues to evolve?
|02:00 PM||Session 3 | Building a Cyber Security Strategy to Combat against Threats
Matthias Yeo, Chief Technology Officer - APAC at Symantec Corporation
On May 12, 2017, there were multiple public reports of an ongoing large-scale cyberattack involving a variant of the ransomware named WannaCry (aka WCry). These attacks are targeting and have affected users from various countries across the globe. The weaponization of such software has ushered in a new era of cyberattacks. Organization’s today are worried about joining the ranks of other companies that have been reported breachesd. Are you one of them, concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks? With most organisations unprepared for this new wave of cyber-warfare, what does this spell for your business?
Through this session, Matthias will be share the threat analysis for the Philippines from Symantec’s recent ISTR report. He will also discuss some of the best practices organization can adopt, and framework approaches such as NIST that could help you to define guidelines and best practices for improving your cybersecurity resiliency.
|02:40 PM||Session 4 | Establishing a Fit for Purpose Security Operations Center (SOC)
Dario Forte, CEO at DFLabs
Get an implementation guide for building a SOC that is cost effective and efficient to address your most critical needs.
|03:20 PM||Session 5 | Building a Comprehensive and Robust Data Breach Response Plan
FBI Legal Attaché from American Embassy Manila
Get the law enforcement’s perspective on an effective response and investigation plan, which includes senior executives, public relations, and technology and security functions, to limit the impact of a data breach incident and the use of cyber exercises to enhance and fine tune your data breach playbook.
|04:00 PM||Coffee Break
|04:30 PM||Panel Discussion 2 | Challenges and Pitfalls of Data Breach Investigations and Reporting
Why is an effective response plan critical to limit the impact of a data breach incident? How can we implement a practical and legally sound approach to data breach investigations and reporting?
* Conference program subjected to change.