2nd Regional Cybersecurity Conference Held at Holy Angel University

The 2nd Regional Cybersecurity Conference was held on May 10, 2023 at the University Theater of Holy Angel University in Angeles City, Pampanga. The conference was organized by the HAU-School of Computing and was attended by over 500 participants from various industries, including government, education, and the private sector.

Mr. Leopoldo Jaime N. ValdesOIC – President
Mr. Leopoldo Jaime N. Valdes OIC – President HAU

The conference was opened by Mr. Leopoldo Jaime N. Valdes, OIC – President of Holy Angel University. In his welcome remarks, Mr. Valdes stressed the importance of cybersecurity in today’s digital age. Dr. Marlon I. Tayag, Dean of the School of Computing, provided the conference’s statement of purpose.

Dr. Marlon I. TayagDean, School of Computing HAU
Dr. Marlon I. Tayag Dean, School of Computing HAU

The conference featured a number of speakers from the cybersecurity industry, who shared their insights on a variety of topics, including red teaming, cyber defense, data privacy, security operations center (SOC) management, incident response, certifications, DevSecOps, everyday cybersecurity with AI, and shielding your business.

Paul Albert Calimoso | Cyber Defense | Cyber defense is the practice of protecting computer systems and networks from cyberattacks. Cyber defense encompasses a wide range of activities, including:
• Vulnerability management: Identifying and mitigating vulnerabilities in computer systems and networks
• Incident response: Responding to cyberattacks in a timely and effective manner
• Security awareness training: Educating employees about cybersecurity risks
• Data security: Protecting sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction

Junior Lead Consultant IT Advisory, KPMG
Paul Albert Calimoso Junior Lead Consultant IT Advisory, KPMG

Mark Barrales Legeza | Red Teaming | Red teaming is a cybersecurity practice that involves simulating an attack on a computer system or network in order to test its security. Red teams are typically made up of security professionals who use their knowledge of hacking techniques to identify and exploit vulnerabilities in a system. Red teaming can be a valuable tool for organizations that want to improve their security posture and identify potential risks.

Chairman,TechED Global AcademyCEO, BlackOps Cyber Security
Consortium
Mark Barrales Legeza Chairman,TechED Global Academy CEO, BlackOps Cyber Security Consortium

Tovi Meneses | Data Privacy | Data privacy is the right of individuals to control how their personal data is collected, used, and shared. Data privacy laws and regulations are designed to protect individuals from the misuse of their personal data. Organizations that collect or process personal data must comply with data privacy laws and regulations.

Tovi MenesesSenior Consultant
Technology Consulting, KPMG
Tovi Meneses Senior Consultant Technology Consulting, KPMG

Angel Redoble | Security Operations Center (SOC) Management | A security operations center (SOC) is a team of security professionals who are responsible for monitoring and responding to security incidents. SOCs typically use a variety of tools and technologies to monitor for threats, investigate incidents, and respond to breaches. SOCs can be a valuable asset for organizations that want to improve their security posture and protect themselves from cyberattacks.

Angel RedoblePLDT CSO
President PICSPRO
Angel Redoble PLDT CSO President PICSPRO

Renzon Cruz | Guardians of the Digital Realm: Incident Response in Today’s Cyber Landscape | Incident response is the process of responding to a cyberattack. Incident response typically involves the following steps:
• Detection: Identifying a cyberattack
• Containment: Preventing the cyberattack from spreading
• Eradication: Removing the malware or other malicious code that caused the cyberattack
• Recovery: Restoring the affected systems and data to their pre-attack state
• Lessons learned: Identifying and implementing changes to prevent future cyberattacks

Renzon CruzPrincipal DFIR Consultant
Unit 42 Palo Alto Networks
Renzon Cruz Principal DFIR Consultant Unit 42 Palo Alto Networks

Orly Seachon | Importance of Certifications in the ICT Industry | Cybersecurity certifications are a valuable way to demonstrate your skills and knowledge in the cybersecurity field. Cybersecurity certifications can help you improve your job prospects, increase your earning potential, and advance your career. There are a variety of cybersecurity certifications available, so you can choose one that is right for your skills and experience level.

Orly SeachonCompTIA Country Manager
Orly Seachon CompTIA Country Manager

Semi Yulianto | DevSecOps Research | DevSecOps is a set of practices that integrates security into the software development lifecycle. DevSecOps aims to improve the security of software by building security into the development process, rather than treating it as an afterthought. DevSecOps can help organizations to develop secure software more quickly and efficiently.

Semi YuliantoFounder and CEO of PT. SysTech Global
Informasi (SGI Asia)
Semi Yulianto Founder and CEO of PT. SysTech Global Informasi (SGI Asia)

Tzar Umang | Everyday Cybersecurity with AI, Its Role on Both Defense and Offense | Artificial intelligence (AI) is increasingly being used in cybersecurity. AI can be used to detect and respond to cyberattacks, as well as to improve the security of software and systems. AI is still in its initial stages of development, but it has the potential to revolutionize the way we think about cybersecurity.

Tzar UmangTech Lead, TMDC IT Solutions
Tzar Umang Tech Lead, TMDC IT Solutions

Bon Talampas | Shielding Your Business: Effective Strategies for Managing Cybersecurity Risk | Cybersecurity risk is the potential for a cyberattack to cause harm to an organization. Cybersecurity risk can be managed by implementing a variety of security controls, such as:
• Vulnerability management: Identifying and mitigating vulnerabilities in computer systems and networks
• Incident response: Responding to cyberattacks in a timely and effective manner
• Security awareness training: Educating employees about cybersecurity risks
• Data security: Protecting sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction
By implementing a comprehensive cybersecurity risk management program, organizations can reduce their exposure to cyberattacks and protect their critical assets.

Bon TalampasAVP & Head of IT Department
GM Bank of Luzon, Inc.
Bon Talampas AVP & Head of IT Department GM Bank of Luzon, Inc.

The conference was an enormous success and it provided participants with the knowledge and skills they need to protect themselves and their organizations from cyber threats.

Here are some of the key takeaways from the conference:
• Cybersecurity is a shared responsibility. It is not just the responsibility of IT professionals. Everyone has a role to play in protecting our digital world.
• We need to be aware of the latest cybersecurity threats. Cybercriminals are constantly evolving their tactics, so it is important to stay up to date on the latest threats.
• We need to implement strong security measures. This includes things like using strong passwords, keeping our software up to date, and being careful about what information we share online.
• We need to be prepared for a cyberattack. This means having a plan in place for how we will respond if our systems are compromised.

Ms. Avigail P. Magbag Conference Chair
Ms. Avigail P. Magbag Conference Chair

The 2nd Regional Cybersecurity Conference was a valuable event that provided participants with the information and resources they need to protect themselves and their organizations from cyber threats.