Vice President for Cyber Resilience at Amihan Global Strategies
Edison's background includes being a consultant for Cybersecurity and Data Privacy related matters. He was the Vice President for Information and Communications Technology (ICT) of Makati Medical Center. He has 25 years work experience in Information Technology, Information Systems Audit and Internal Audit gained from PNOC, Petron Corporation and MakatiMed. His strengths are in the areas of Information Systems Audit, Applications Development and Business Systems Support, Multi-site roll-out of SAP and Office Automation. He played a major role in the successful implementation of MakatiMed's SAP, the Admissions Dashboard, roll out of its Computers At Bedside (CAB), and most recently, lead the complex/comprehensive migration of MakatiMed to its new hospital information system, iHIMS, which brought MMC to an integrated in-patient/out-patient front-end patient registration and billing system fully interfaced to its Radiology and Laboratory information systems.
Edison was also the IT consultant of Metro Pacific Hospital Holdings Inc. (MPHHI) where he assisted in formulating and executing MPHHI group IT plans which included the creation of a comprehensive roadmap and installation of IT-solutions in support of synergy projects across the MPIC hospital group.
Prior to MMC, Edison worked with Petron Corporation, the biggest oil refining company in the Philippines for 18 years. Half of his stint with Petron was with Internal Audit (i.e. Corporate, Operations and Refinery Audit) while the rest was with the IT Department doing SAP support, primarily on IS-Oil and Authorization modules and implementing various non-SAP applications such as Point of Sale (POS) System at the gasoline stations, SharePoint platform as the intranet, etc.
Edison earned a BSC Business Management degree from De La Salle University, Manila. He is a Certified Information Systems Auditor (CISA) by ISACA, Manila Chapter.
|04:35 PM||Panel Discussion 2 | Challenges and Pitfalls of Data Breach Investigations and Reporting
Why is an effective response plan critical to limit the impact of a data breach incident? How can we implement a practical and legally sound approach to data breach investigations and reporting?