Learn from the Experts

20th November, 2025

Manila

>> Home

>> Register

>> Programme Schedule

Featured Speakers

Christopher Dio Chavez

Christopher Dio Chavez

Chief Hacking and Defense Officer
Radar IT Cybersecurity

The Role of Advanced Persistent Threat (APT) Detection in Modern Cybersecurity

This topic would dive into how the evolving landscape of cyber threats, especially advanced persistent threats, has reshaped security protocols.
With APTs becoming more sophisticated, tools like “Advanced Threat Hunting and Forensic Scanner” are crucial for detecting multi-faceted threats, including malware, exploit attempts,and data exfiltration. It also emphasizes the importance of integrating PCAP (Packet Capture) analysis and real-time IOC (Indicators of Compromise) feeds.
Given the inclusion of steganography detection (JPEG, PNG, MP4, etc.), this topic could address how threat actors are increasingly using steganography for covert communication,hiding malware, and evading detection. The role of advanced scanners in identifying such hidden threats can be expanded on, especially in the context of your scanner’s ability to analyze different file formats for potential steganographic content.

Understanding APTs and Their Evolution:

        • Understanding APTs and Their Evolution
        • Importance of Advanced Threat Hunting Tools
        • Role of PCAP Analysis and IOC Feeds
        • Steganography and Covert Communication
        • Advanced Scanners for Steganography Detection
        • Actionable Strategies for Detection and Prevention
Mark Anthony Almodovar

Mark Anthony Almodovar

Technology Risk Executive Director
Isla Lipana & Co. (PwC)

Cyber Resilience by Design: Aligning your SOC with PH Regulatory Expectations

Topic Description: Help PH enterprises better understand how SOC whether internal or external can be designed to meet evolving cybersecurity threats and regulatory expectations, such as those set out by the Data Privacy Act, DICT’s National Cybersecurity Plan

Understanding APTs and Their Evolution:

          • Proactive security integration
          • Continuous adaptation
          • Minimizing impact
          • Stakeholder collaboration
Gecer Navisa-Licong

Gecer Navisa-Licong

Cyber DevSecOps Manager
JTI

Smart Code, Safe Future: Building Trust in the Age of AI Development

Artificial Intelligence is transforming how software is conceived, written, and deployed. From AI code assistants and automated testing to full CI/CD automation, development has never been faster—but speed can also amplify risk. AI can unintentionally introduce insecure code, leak sensitive data through prompts, or import unverified components that bypass review.

This talk explores how organizations can balance innovation with security in an AI-driven world. Attendees will discover how to embed trust, transparency, and governance into every phase of development—without slowing teams down. We’ll discuss real-world scenarios, practical guardrails, and cultural shifts that help developers and leaders work together to keep AI-powered software safe and compliant.

By the end of the session, participants will understand how to code smarter, not riskier—turning AI-assisted development into a secure, collaborative, and trustworthy practice for the future of software.

Understanding APTs and Their Evolution:

1. Understand the New Realities of AI Development
Grasp how AI tools are reshaping the software lifecycle—from ideation to deployment—and what new risks emerge when code is generated or modified by AI.

2. Recognize Hidden Vulnerabilities and Data Exposure Risks
Learn to identify potential weaknesses in AI-assisted code, including unsafe logic, outdated libraries, or prompt-based data leaks.

3. Embed Security into AI Workflows Without Sacrificing Speed
Discover lightweight practices—secure prompting, automated scans, and human-in-the-loop reviews—that keep AI pipelines efficient yet safe.

4. Build Governance and Trust in AI-Driven Pipelines
Explore frameworks for ethical AI use, compliance alignment, and explainability so organizations can adopt AI responsibly.

5. Empower Developers and Leaders to Champion Secure Innovation
Foster a culture where security is shared, collaboration is natural, and every developer becomes a confident guardian of safe AI-powered code.

Panel Discussion Speakers

Nieryl Musni

Nieryl Musni

Solutions Architect / Legacy Product Manager
Microsoft

Nieryl Musni

Quality focused IT Professional with over 10 years of professional experience as Systems Engineer in Linux and Unix field that follows ITIL framework and environment. Recently exposed to Systems Security and a certified/licensed Ethical Hacker, Computer Hacking Forensics Investigator, and other Cloud technology certifications.

My recent focus and certified expertise lie at the intersection of systems engineering and security, including a certification as an Ethical Hacker and a Computer Hacking Forensics Investigator (CHFI).

Served as a trusted third-party digital forensics investigator for the National Bureau of Investigation (NBI) for almost a decade, providing critical expertise in complex criminal and civil cases.

Simultaneously operate as a dedicated freelance consultant, specializing in empowering small-to-medium enterprises (SMEs). My work with SMEs involves building complete, secure, and resilient security infrastructures from the ground up. A core part of this commitment is providing pro-bono trainings and seminars to enhance the cybersecurity awareness and capabilities of their teams.

This unique combination of enterprise system stability, deep forensic investigation, and practical security architecture positions me as a versatile and indispensable asset in today’s digital landscape.

>> Home

>> Register

>> Programme Schedule