We have put together an exciting lineup of data protection, privacy and cyber security leaders and thinkers for this conference. Don't miss your chance to meet with and hear from some of the brightest minds in the industry.


Supercharge Your Data Privacy and Cyber Security Program

Day 1 - Sep 19, 2018

08:00 AM Registration

08:45 AM Welcome Address
Jojo Uligan, President and Board of Director at Contact Center Association of the Philippines

09:00 AM Guest-of-Honour Speech
Mr. Raymund Liboro, Privacy Commissioner and Chairman at National Privacy Commission

09:30 AM Keynote | Taming the Technology Beast
Pierre Noel, Chief Security and Privacy Officer

The accelerating pace of technology evolution is raising new concerns around data privacy and creating more opportunities for cyber crime. In this session we take a look at the latest issues and trends in data privacy and cyber security practices. What do you need to watch out for? And what can you implement for your organization today?

10:15 AM Coffee Break

10:45 AM Session 1 | Beyond Compliance: From DPO to CPO
Rebecca Herold, CEO at The Privacy Professor and President at SIMBUS

A Data Protection Officer (DPO) is now mandatory under numerous jurisictions. While this is a critical role, there are strategic data privacy challenges including data ethics and customer trust that may not be fully addressed. In this session, we will share insights on closing the operational and strategic gap.

11:30 AM Panel Discussion 1 | Lessons and Challenges from Making the IRR a Reality
To be confirmed

It's been two years since the Implementing Rules and Regulations of the Data Privacy Act came into effect. In this session we discuss the key implementation challenges faced and the right solutions for companies in the Philippines based on real world experience.

12:30 PM Lunch Break

1:30 PM Session 2 | What You Need to Know with the EU GDPR in Effect
To be confirmed

With the GDPR in effect since May 2018, new rules now apply to the processing of personal data of EU individuals. In this session, we examine the key differences of the GDPR compared to other Asian laws and the implications of cross-border processing.

02:15 PM Session 3 | Cyber Threats: The Bad, The Radical and The Absolutely Dangerous
To be confirmed

As cyber security professionals, it is difficult yet critical staying one step ahead or even keeping in step with the cyber criminals. In this session, we learnt about the latest and emerging cyber threats and what organizations need to do to protect themselves.

03:00 PM Coffee Break

03:30 PM Session 4 | From Information Security to Cyber Resilience
Roeland van Zeijst, Global Cyber Security Strategist

With the heightened cyber threat environment, having a strong information security practice may no longer be enough and having cyber resilience may no longer be an option. In this session, we look at the differences in perspectives and the steps required to build a cyber resilient organization.

04:15 PM Panel Discussion 2 | What Has Worked Then Must Still Work Now … Or Not
To be confirmed

As cyber threats continues to grow in sophistication, the proven approaches to cyber security may no longer be as effective. In this panel discussion, learn about the new practices now considered industry best practices.

05:00 PM Closing Remarks for Day 1
Benedict Hernandez, Chairman at Contact Center Association of the Philippines

05:15 PM End of Day 1


Track 1: Data Privacy Implementation Guide

Day 2 - Sep 20, 2018

09:00 AM Session 1.1 | Using Data Mapping to Understand Your Data Flow
Know Your Data to Know Your Privacy Risks

Using a data map, you can determine how data flows into, through and out of your organization. This helps identify data protection gaps and non-compliance with policies and regulations. In this workshop, learn the most efficient and effective approach to conduct data mapping across your organization.

10:30 AM Coffee Break

11:00 AM Session 1.2 | Conducting Privacy Impact Assessments to Manage Privacy Risks
Privacy Risk Management Starts with Effective Assessment

A Privacy Impact Assessment (PIA) is an important tool for identifying and mitigating the privacy risks of your products and services, processes and systems. In this workshop, learn the approach and techniques to achieve a repeatable and consistent process.

12:30 PM Lunch Break

1:30 PM Session 1.3 | Building Your Privacy Management Program
An Overarching Framework for Managing Privacy Obligations

In a constantly shifting compliance environment, a Privacy Management Program (PMP) is a critical tool to avoid running afoul of data protection laws. In this workshop, learn the nuts and bolts of building a PMP and the practical approach to implementing the program across your organization.

03:00 PM Coffee Break

03:30 PM Session 1.4 | Implementing Pseudonymization and Anonymization for Data De-Identification
Effectively Reduce the Burden of Regulatory Compliance

Pseudonymization and anonymization can help reduce the burden of compliance with certain provisions of most data privacy regulations. In this workshop, learn the methods that are considered acceptable for de-identification of personal data.

05:00 PM End of Day 2


Track 2: Cyber Security Implementation Guide

Day 2 - Sep 20, 2018

09:00 AM Session 2.1 | Using the NIST Cybersecurity Framework to Achieve Cyber Resilience
A Step-by-Step Assessment and Implementation Guide

The NIST Cybersecurity Framework (CSF) was released in Feb 2014 and is projected to be adopted by 50% of U.S. organizations by 2020 accordingly to Gartner. In this workshop, learn the fundamentals and a practical approach to using the CSF to help your organization achieve cyber resilience.

10:30 AM Coffee Break

11:00 AM Session 2.2 | Developing Your Data Breach Response Playbook
Essential Approach for Rapid and Effective Response

Using the playbook model to develop your data breach response plans ensures that all responsible parties can react rapidly in a crisis. In this workshop, learn the concept, structure and types of playbooks catering to different job functions, seniority levels and threat scenarios.

12:30 PM Lunch Break

1:30 PM Session 2.3 | Recovering from a Data Breach While Minimizing Damage
Damage Control Measures to Limit Harm to the Organization

Preparation is the key to rapid recovery from data breaches and can help to minimize impact to the organization. In this workshop, learn the plans and processes that must be put in place to enable the organization to get back to business-as-usual and to prevent future incidents.

03:00 PM Coffee Break

03:30 PM Session 2.4 | Conducting a Cyber Exercise for Data Breach Preparedness
Life cycle approach to cyber exercises

Cyber exercises can help organizations ensure preparedness in a data breach, from the executive level to operational staff. In this workshop, learn the ife cycle from planning and execution to assessment and reporting of cyber exercises.

05:00 PM End of Day 2


* Conference program subjected to change.