We have put together an exciting lineup of data protection, privacy and cyber security leaders and thinkers for this conference. Don't miss your chance to meet with and hear from some of the brightest minds in the industry.

 

Supercharge Your Data Privacy and Cyber Security Program

Day 1 - Sep 19, 2018

08:00 AM Registration

08:45 AM Welcome Address
Jojo Uligan, President and Board of Director at Contact Center Association of the Philippines

09:00 AM Guest-of-Honor Speech
Mr. Raymund Liboro, Privacy Commissioner and Chairman at National Privacy Commission

09:30 AM Keynote | Taming the Technology Beast
Pierre Noel, Chief Security and Privacy Officer

The accelerating pace of technology evolution is raising new concerns around data privacy and creating more opportunities for cyber crime. In this session we take a look at the latest issues and trends in data privacy and cyber security practices. What do you need to watch out for? And what can you implement for your organization today?

10:15 AM Coffee Break

10:45 AM Session 1 | Beyond Compliance: Ethics, Technology and Trust
Rebecca Herold, CEO at The Privacy Professor and President at SIMBUS

A Data Protection Officer (DPO) is now mandatory under numerous jurisdictions. While this is a critical role, there are strategic data privacy challenges including data ethics, technology understanding, vendor management and customer trust that may not be fully addressed. In this session, we will share insights on closing the related operational and strategic gaps, and making your DPO work more efficient.

11:30 AM Panel Discussion 1 | Lessons and Challenges from Making the IRR a Reality
Espie J. Bulseco, Senior Director for Business Excellence at Hinduja Global Solutions
Leandro Angelo Y. Aguirre, Deputy Commissioner at National Privacy Commission
Juan Paolo F. Fajardo, Partner at Fajardo Law Offices

It's been two years since the Implementing Rules and Regulations of the Data Privacy Act came into effect. In this session we discuss the key implementation challenges faced and the right solutions for companies in the Philippines based on real world experience.

12:30 PM Lunch Break

1:30 PM Session 2 | What You Need to Know with the EU GDPR in Effect
Ivana Bartoletti, Head of Privacy and Data Protection at Gemserv

With the GDPR in effect since May 2018, new rules now apply to the processing of personal data of EU individuals. In this session, we examine the key differences of the GDPR compared to other Asian laws and the implications of cross-border processing.

02:15 PM Session 3 | Unsupervised Machine Learning: A New Approach to Cyber Defense
Sanjay Aurora, Managing Director, Asia Pacific & Japan at Darktrace

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

03:00 PM Coffee Break

03:30 PM Session 4 | True Blue: Global Law Enforcement needs Public-Private Partnerships
Roeland van Zeijst, Global Cyber Security Strategist

With heightened criminal threats to cyber security, global law enforcement plays a key part in addressing criminal data breaches which can take many shapes and forms. Is there such a thing as 'global' cyber law enforcement - and how do they help to ensure our global cyber security? And most importantly - can they do it alone? (spoiler alert: no, they need you!)

04:15 PM Panel Discussion 2 | What Has Worked Then Must Still Work Now … Or Not
To be confirmed

As cyber threats continues to grow in sophistication, the proven approaches to cyber security may no longer be as effective. In this panel discussion, learn about the new practices now considered industry best practices.

05:15 PM Closing Remarks for Day 1
Benedict Hernandez, Chairman at Contact Center Association of the Philippines

05:30 PM End of Day 1

 

Track 1: Data Privacy Implementation Guide

Day 2 - Sep 20, 2018

09:00 AM Session 1.1 | Using Data Mapping to Understand Your Data Flows and Risks
Rebecca Herold, CEO at The Privacy Professor and President at SIMBUS

Using a data map, you can determine how data flows into, through and out of your organization. This helps identify data protection risks, and non-compliance gaps with policies and legal requirements. In this workshop, learn an efficient and effective approach to conduct data mapping across your organization.

10:30 AM Coffee Break

11:00 AM Session 1.2 | Conducting Privacy Impact Assessments to Manage Privacy Risks
Rapheepong Ghai, Privacy Consultant at OneTrust
Rob Hinson, Privacy Consultant at OneTrust


A Privacy Impact Assessment (PIA) is an important tool for identifying and mitigating the privacy risks of your products and services, processes and systems. In this workshop, learn the approach and techniques to achieve a repeatable and consistent process.

12:30 PM Lunch Break

1:30 PM Session 1.3 | Building Your Privacy Management Program
Ivana Bartoletti, Head of Privacy and Data Protection at Gemserv

In a constantly shifting compliance environment, a Privacy Management Program (PMP) is a critical tool to avoid running afoul of data protection laws. In this workshop, learn the nuts and bolts of building a PMP and the practical approach to implementing the program across your organization.

03:00 PM Coffee Break

03:30 PM Session 1.4 | Implementing Pseudonymization and Anonymization for Data De-Identification
Effectively Reduce the Burden of Regulatory Compliance

Pseudonymization and anonymization can help reduce the burden of compliance with certain provisions of most data privacy regulations. In this workshop, learn the methods that are considered acceptable for de-identification of personal data.

05:00 PM End of Day 2

 

Track 2: Cyber Security Implementation Guide

Day 2 - Sep 20, 2018

09:00 AM Session 2.1 | Using the NIST Cybersecurity Framework to Achieve Cyber Resilience
A Step-by-Step Assessment and Implementation Guide

The NIST Cybersecurity Framework (CSF) was released in Feb 2014 and is projected to be adopted by 50% of U.S. organizations by 2020 accordingly to Gartner. In this workshop, learn the fundamentals and a practical approach to using the CSF to help your organization achieve cyber resilience.

10:30 AM Coffee Break

11:00 AM Session 2.2 | Building Enterprise Security Operations with Limited Resources
Michael Goodman, Principal Director at ScorpioSense

Building enterprise security operations is not an easy task even with unlimited resources. And the harsh reality of today is that many organizations have extremely limited resources -- limited funding, a critical shortage of qualified cyber security professionals, etc.

This extremely practical session will detail the various aspects which are essential to building enterprise security operations, outline critical resource constraints, provide various strategies to overcome these constraints, and provide various case studies for success and failure.

12:30 PM Lunch Break

1:30 PM Session 2.3 | Proactive Approach in Managing Cyber Incidents
Tam Huynh, Senior Director at Kroll

It is commonly agreed these days that hackers who have enough time, resources and determination will eventually find a way to gain unauthorized access to organizations’ network. With this theory, rapid detection and effective response to cyber incidents play a crucial part in organizations’ cyber security program. However, many organizations are still not prepared or inexperienced in handling cyber incidents and deem to suffer a significant cost when the incidents happen.

In this workshop, the audience will gain insights into proactive approaches to manage cyber incidents effectively. The audience will also be equipped with valuable lessons learnt from multiple cyber incident response cases in APAC region.

03:00 PM Coffee Break

03:30 PM Session 2.4 | Conducting a Cyber Exercise for Data Breach Preparedness
Roeland Van Zeijst, Global Cyber Security Strategist

Cyber exercises can help organizations ensure preparedness in a data breach, from the executive level to operational staff. In this workshop, learn the ife cycle from planning and execution to assessment and reporting of cyber exercises.

05:00 PM End of Day 2

 

* Conference program subjected to change.