The 2nd Regional Cybersecurity Conference was held on May 10, 2023 at the University Theater of Holy Angel University in Angeles City, Pampanga. HAU-School of Computing organized the conference. Over 500 participants from government, education, and the private sector attended.
The conference was opened by Mr. Leopoldo Jaime N. Valdes, OIC – President of Holy Angel University. In his welcome remarks, Mr. Valdes stressed the importance of cybersecurity in today’s digital age. Dr. Marlon I. Tayag, Dean of the School of Computing, provided the conference’s statement of purpose.
The 2nd Regional Cybersecurity Conference featured a number of speakers from the cybersecurity industry, who shared their insights on a variety of topics, including red teaming, cyber defense, data privacy, security operations center (SOC) management, incident response, certifications, DevSecOps, everyday cybersecurity with AI, and shielding your business.
Paul Albert Calimoso | Cyber Defense | Cyber defense is the practice of protecting computer systems and networks from cyberattacks. Cyber defense encompasses a wide range of activities, including:
- Vulnerability management: Identifying and mitigating vulnerabilities in computer systems and networks
- Incident response: Responding to cyberattacks in a timely and effective manner
- Security awareness training: Educating employees about cybersecurity risks
- Data security: Protecting sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction
Mark Barrales Legeza | Red Teaming | Red teaming is a cybersecurity practice that involves simulating an attack on a computer system or network in order to test its security. Security professionals typically form red teams. They use hacking techniques to find and exploit system vulnerabilities. Red teaming can be a valuable tool for organizations that want to improve their security posture and identify potential risks.
Tovi Meneses | Data Privacy | Data privacy is the right of individuals to control how their personal data is collected, used, and shared. Data privacy laws and regulations are designed to protect individuals from the misuse of their personal data. Organizations that collect or process personal data must comply with data privacy laws and regulations.
Angel Redoble | Security Operations Center (SOC) Management | A security operations center (SOC) is a team of security professionals who are responsible for monitoring and responding to security incidents. SOCs typically use a variety of tools and technologies to monitor for threats, investigate incidents, and respond to breaches. SOCs can be a valuable asset for organizations that want to improve their security posture and protect themselves from cyberattacks.
Renzon Cruz | Guardians of the Digital Realm: Incident Response in Today’s Cyber Landscape | Incident response is the process of responding to a cyberattack. Incident response typically involves the following steps:
- Detection: Identifying a cyberattack
- Containment: Preventing the cyberattack from spreading
- Eradication: Removing the malware or other malicious code that caused the cyberattack
- Recovery: Restoring the affected systems and data to their pre-attack state
- Lessons learned: Identifying and implementing changes to prevent future cyberattacks
Orly Seachon | Importance of Certifications in the ICT Industry | Cybersecurity certifications are a valuable way to demonstrate your skills and knowledge in the cybersecurity field. Cybersecurity certifications can help you improve your job prospects, increase your earning potential, and advance your career. There are a variety of cybersecurity certifications available, so you can choose one that is right for your skills and experience level.
Semi Yulianto | DevSecOps Research | DevSecOps is a set of practices that integrates security into the software development lifecycle. DevSecOps aims to improve the security of software by building security into the development process, rather than treating it as an afterthought. DevSecOps can help organizations to develop secure software more quickly and efficiently.
Tzar Umang | Everyday Cybersecurity with AI, Its Role on Both Defense and Offense | Artificial intelligence (AI) is increasingly being used in cybersecurity. AI detects and responds to cyberattacks. It also enhances software and system security. While AI is still in its nascent stages of development, it nevertheless has the potential to revolutionize the way we think about cybersecurity.
Bon Talampas | Shielding Your Business: Effective Strategies for Managing Cybersecurity Risk | Cybersecurity risk is the potential for a cyberattack to cause harm to an organization. Cybersecurity risk can be managed by implementing a variety of security controls, such as:
- Vulnerability management: Identifying and mitigating vulnerabilities in computer systems and networks
- Incident response: Responding to cyberattacks in a timely and effective manner
- Security awareness training: Educating employees about cybersecurity risks
- Data security: Protecting sensitive data from unauthorized access, use, disclosure, disruption, modification, or destructionBy implementing a comprehensive cybersecurity risk management program, organizations can reduce their exposure to cyberattacks and protect their critical assets.
The conference was an enormous success and it provided participants with the knowledge and skills they need to protect themselves and their organizations from cyber threats.
Here are some of the key takeaways from the conference:
• Cybersecurity is a shared responsibility. It is not just the responsibility of IT professionals. Everyone has a role to play in protecting our digital world.
• We need to be aware of the latest cybersecurity threats. Cybercriminals are constantly evolving their tactics, so it is important to stay up to date on the latest threats.
• We need to implement strong security measures. This includes things like using strong passwords, keeping our software up to date, and being careful about what information we share online.
• We must prepare for a cyberattack. This means having a plan in place for how we will respond if our systems are compromised.
Attendees deemed the 2nd Regional Cybersecurity Conference valuable. It was instrumental in providing participants with the necessary information and resources to effectively protect themselves and their organizations from the evolving landscape of cyber threats.