Agenda

08:00 – 09:00

REGISTRATION & COFFEE

09:00 – 09:30

INAUGURATION & OPENING REMARKS

09:30 – 09:50

National Defense in the Digital Era: Governing Cyber Resilience at Scale

  • Responding to state-sponsored cyber threats, disinformation, and digital sabotage shaping modern conflict
  • Establishing centralized cyber defense doctrines across defense, interior, and digital ministries
  • Enabling coordinated, rapid-response capabilities through secure networks, cloud, and data platforms

09:50 – 10:10

Zero Trust for National Security: From Policy Mandate to Field Deployment

  • Transitioning from perimeter-based security to continuous identity and access verification
  • Governing Zero Trust adoption across agencies, mobile units, and tactical environments
  • Ensuring operational continuity while preventing insider threats and lateral attacks

10:10 – 10:30

AI-Enabled Surveillance & Predictive Threat Detection: Security with Accountability

  • Using AI and analytics to enhance situational awareness and public safety outcomes
  • Establishing regulatory, judicial, and civilian oversight for AI-driven surveillance systems
  • Balancing rapid threat detection with privacy, consent, and human rights protections

10:30 – 11:00

Panel Discussion

Building a National Cyber Command: Governance, Authority & Inter-Agency Response

  • Defining clear leadership, command structures, and escalation protocols during cyber incidents
  • Coordinating armed forces, law enforcement, intelligence, and civilian agencies
  • Learning from global public sector models for agile and unified cyber defense

11:00 – 11:30

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 – 11:45

Next-Gen Policing: Digital Transformation for Safer Cities

  • Leveraging data, AI, and smart surveillance to prevent and respond to urban crime
  • Optimizing resource deployment through predictive insights and analytics
  • Strengthening public trust through transparency, accountability, and ethical use of technology

11:45 – 12:00

Cloud Adoption in Defense & Government: Sovereignty, Security & Control

  • Scaling secure access to mission-critical data across operations and agencies
  • Ensuring data residency, compliance, and national control over sensitive information
  • Strengthening cloud-native defenses with encryption, segmentation, and automated threat detection

12:00 – 12:30

Panel Discussion

Developing the Public Sector Cyber Workforce: Skills, Retention & Readiness

  • Building a mission-ready cybersecurity workforce for government and defense
  • Aligning academic curricula, certifications, and cyber ranges with real-world threats
  • Retaining talent within public institutions through structured career pathways

12:30 – 13:30

LUNCH BREAK

13:30 – 14:00

Panel Discussion

Digital Identity for Operatives & Officers: Trust, Access & Mission Integrity

  • Implementing secure, real-time identity verification for multi-agency operations
  • Preventing unauthorized access to sensitive missions and intelligence systems
  • Protecting operative identities from exposure, impersonation, and digital targeting

14:00 – 14:20

Defending National Infrastructure: When OT Security Meets IT Intelligence

  • Securing power, water, transport, and industrial systems from cyber-physical threats
  • Integrating IT and OT security for unified threat detection and response
  • Defining national authority and accountability during infrastructure cyber incidents

14:20 – 14:40

Inter-Agency Intelligence Fusion: From Data Silos to a Unified Threat Picture

  • Enabling real-time intelligence sharing across defense, police, and civilian agencies
  • Combining cyber intelligence with ground-level and operational data
  • Establishing secure, legally compliant data-sharing frameworks

14:40 – 15:10

Securing ISR, Satellite & Drone Systems: Protecting Strategic Visibility

  • Preventing interception, manipulation, and disruption of aerial and satellite data
  • Detecting and neutralizing unauthorized or weaponized drones
  • Ensuring secure, tamper-proof communications across all mission phases

15:10 – 15:40

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

15:40 – 16:00

Digital Twins & Simulation: Preparing Forces Without Real-World Risk

  • Using simulation and digital twins for mission rehearsal and tactical training
  • Enhancing decision-making under pressure through immersive environments
  • Reducing training costs while improving readiness and coordination

16:00 – 16:30

Panel Discussion

The Philippines 2030: A National Roadmap for Digital Security & Cooperation

  • Strengthening ASEAN-wide cyber defense and intelligence collaboration
  • Aligning policy, infrastructure, and talent for long-term national resilience
  • Preparing for emerging technologies including AI, quantum, and autonomous systems

16:30 – 16:45

Ethical Policing & Cyber Governance: Securing Trust in the Digital Age

  • Ensuring transparency and accountability in AI and surveillance deployments
  • Establishing clear consent, data usage, and retention frameworks
  • Training frontline personnel on responsible, rights-based use of digital tools

16:45 – 17:00

CLOSING REMARKS

17:00 – 18:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

*The above is a running agenda and is subject to change