We have put together an exciting lineup of data protection, privacy and cyber security leaders and thinkers for this conference. Don't miss your chance to meet with and hear from some of the brightest minds in the industry.


Supercharge Your Data Privacy and Cyber Security Program

Day 1 - Sep 19, 2018

08:00 AM Registration

08:45 AM Welcome Address
Jojo Uligan, President and Board of Director at Contact Center Association of the Philippines

Opening Message
Tonichi Achurra-Parekh, Board Director and Board Trustee of CCAP Security Council at Contact Center Association of the Philippines

09:00 AM Guest-of-Honor Speech
Mr. Raymund Liboro, Privacy Commissioner and Chairman at National Privacy Commission

09:30 AM Keynote | Taming the Technology Beast
Pierre Noel, Chief Security and Privacy Officer

The accelerating pace of technology evolution is raising new concerns around data privacy and creating more opportunities for cyber crime. In this session we take a look at the latest issues and trends in data privacy and cyber security practices. What do you need to watch out for? And what can you implement for your organization today?

10:15 AM Coffee Break

10:45 AM Session 1 | Beyond Compliance: Ethics, Technology and Trust
Rebecca Herold, CEO at The Privacy Professor and President at SIMBUS

A Data Protection Officer (DPO) is now mandatory under numerous jurisdictions. While this is a critical role, there are strategic data privacy challenges including data ethics, technology understanding, vendor management and customer trust that may not be fully addressed. In this session, we will share insights on closing the related operational and strategic gaps, and making your DPO work more efficient.

11:30 AM Panel Discussion 1 | Lessons and Challenges from Making the IRR a Reality
Espie J. Bulseco, Senior Director for Business Excellence at Hinduja Global Solutions
Leandro Angelo Y. Aguirre, Deputy Commissioner at National Privacy Commission
Juan Paolo F. Fajardo, Partner at Fajardo Law Offices
Reyaine Mendoza-Clavano, Corporate Legal and Data Privacy Compliance Officer at CIBI

It's been two years since the Implementing Rules and Regulations of the Data Privacy Act came into effect. In this session we discuss the key implementation challenges faced and the right solutions for companies in the Philippines based on real world experience.

12:30 PM Lunch Break

1:30 PM Session 2 | What You Need to Know with the EU GDPR in Effect
Ivana Bartoletti, Head of Privacy and Data Protection at Gemserv

With the GDPR in effect since May 2018, new rules now apply to the processing of personal data of EU individuals. In this session, we examine the key differences of the GDPR compared to other Asian laws and the implications of cross-border processing.

02:15 PM Session 3 | When Machines Fight Machines: Cyber Battles & the New Frontier of Artificial Intelligence
Kae Tiambeng, Cyber Security Account Manager at Darktrace

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

03:00 PM Coffee Break

03:30 PM Session 4 | True Blue: Global Law Enforcement needs Public-Private Partnerships
Roeland van Zeijst, Global Cyber Security Strategist

With heightened criminal threats to cyber security, global law enforcement plays a key part in addressing criminal data breaches which can take many shapes and forms. Is there such a thing as 'global' cyber law enforcement - and how do they help to ensure our global cyber security? And most importantly - can they do it alone? (spoiler alert: no, they need you!)

04:15 PM Panel Discussion 2 | What Has Worked Then Must Still Work Now … Or Not
Wei Chieh Lim, CEO at Data Privacy Asia and SWARMNETICS
Michael Goodman, Chief Security and Technology Officer at Genesis Healthcare Japan
Angel Redoble, Group CISO and CIO at ePLDT
Richard Davies, Associate Managing Director, APAC Cyber Risk Practice at Kroll

As cyber threats continues to grow in sophistication, the proven approaches to cyber security may no longer be as effective. In this panel discussion, learn about the new practices now considered industry best practices.

05:15 PM Closing Remarks for Day 1
Jojo Uligan, President and Board of Director at Contact Center Association of the Philippines

05:30 PM End of Day 1


Track 1: Data Privacy Implementation Guide

Day 2 - Sep 20, 2018

09:00 AM Session 1.1 | Using Data Mapping to Understand Your Data Flows and Risks
Rebecca Herold, CEO at The Privacy Professor and President at SIMBUS

Using a data map, you can determine how data flows into, through and out of your organization. This helps identify data protection risks, and non-compliance gaps with policies and legal requirements. In this workshop, learn an efficient and effective approach to conduct data mapping across your organization.

10:30 AM Coffee Break

11:00 AM Session 1.2 | Conducting Privacy Impact Assessments to Manage Privacy Risks
Rapheepong Ghai, Privacy Consultant at OneTrust
Rob Hinson, Privacy Consultant at OneTrust

A Privacy Impact Assessment (PIA) is an important tool for identifying and mitigating the privacy risks of your products and services, processes and systems. In this workshop, learn the approach and techniques to achieve a repeatable and consistent process.

12:30 PM Lunch Break

1:30 PM Session 1.3 | Building Your Privacy Management Program
Ivana Bartoletti, Head of Privacy and Data Protection at Gemserv

In a constantly shifting compliance environment, a Privacy Management Program (PMP) is a critical tool to avoid running afoul of data protection laws. In this workshop, learn the nuts and bolts of building a PMP and the practical approach to implementing the program across your organization.

03:00 PM Coffee Break

03:30 PM Session 1.4 | Enterprise Cyber Espionage: Fundamentals of Data Theft and Surveillance on Employee Endpoints
Abhay Edlabadkar, Founder and CEO at RedMorph
Jebb Lewis, VP Global Business Development at RedMorph
Francis Morelos, CEO at TRC Inc.

Enterprise Cyber Espionage is one of the top concerns facing any CIO/CEO of a company. With the benefits of mobility, employees are increasing using their mobile and laptop devices from any location to access company confidential and sensitive materials, including all internal & external communications, customer information, employee records, etc. So it becomes critical to secure these endpoint devices from both cyber espionage and cyber threat activities. The purpose of this workshop is to demonstrate how device OEM's and App's can easily access all data on a device as well as carryout real-time surveillance. Data theft includes company IP, files, photos, videos, contacts, calendar, SMS, Call logs, etc. and real-time surveillance includes location, calls, SMS, mic, camera, Gyro, app usage, etc. So until a user has the ability to visualize and control who has access to their sensitive data and surveillance sensors, the enterprise cannot guarantee that endpoint devices are truly secure.

05:00 PM End of Day 2


Track 2: Cyber Security Implementation Guide

Day 2 - Sep 20, 2018

09:00 AM Session 2.1 | Achieving Cyber Resiliency in a World of Uncertainty
Angel Redoble, Group CISO and CIO at ePLDT

As cyber risks continue to escalate around the world, organizations need to operationalize effective cybersecurity frameworks that can address various scenarios before, during and after a cyber attack. What are the objectives for cyber resiliency and how can you operationalize that for your organization. In this session, participants will learn about a pragmatic cyber operations framework and how you need to reengineer the traditional people, process and technology approach.

10:30 AM Coffee Break

11:00 AM Session 2.2 | Building Enterprise Security Operations with Limited Resources
Michael Goodman, Chief Security and Technology Officer at Genesis Healthcare Japan

Building enterprise security operations is not an easy task even with unlimited resources. And the harsh reality of today is that many organizations have extremely limited resources -- limited funding, a critical shortage of qualified cyber security professionals, etc.

This extremely practical session will detail the various aspects which are essential to building enterprise security operations, outline critical resource constraints, provide various strategies to overcome these constraints, and provide various case studies for success and failure.

12:30 PM Lunch Break

1:30 PM Session 2.3 | Proactive Approach in Managing Cyber Incidents
Paul Jackson, Managing Director, APAC Cyber Risk Practice Leader at Kroll

It is commonly agreed these days that hackers who have enough time, resources and determination will eventually find a way to gain unauthorized access to organizations’ network. With this theory, rapid detection and effective response to cyber incidents play a crucial part in organizations’ cyber security program. However, many organizations are still not prepared or inexperienced in handling cyber incidents and deem to suffer a significant cost when the incidents happen.

In this workshop, the audience will gain insights into proactive approaches to manage cyber incidents effectively. The audience will also be equipped with valuable lessons learnt from multiple cyber incident response cases in APAC region.

03:00 PM Coffee Break

03:30 PM Session 2.4 | Conducting a Cyber Exercise for Data Breach Preparedness
Roeland Van Zeijst, Global Cyber Security Strategist

Cyber exercises can help organizations ensure preparedness in a data breach, from the executive level to operational staff. In this workshop, learn the ife cycle from planning and execution to assessment and reporting of cyber exercises.

05:00 PM End of Day 2


* Conference program subjected to change.