Nội dung chương trình

08:00 – 09:00

REGISTRATION & COFFEE

09:00 – 09:30

INAUGURATION & OPENING REMARKS

09:30 – 09:50

National Defense in the Digital Era: Building a Cyber-Resilient Security Force

  • Addressing threats such as state-sponsored hacking, disinformation and digital sabotage that are redefining modern conflict zones
  • Enabling rapid coordinated defense responses through secure networks, cloud-based systems, and data platforms
  • Embracing a centralized, cross-agency cybersecurity doctrine to counter evolving threats with speed and cohesion

09:50 – 10:10

Zero Trust for National Security: Reshaping Access, Control & Identity

  • Transitioning from static network boundaries to real-time identity verification for every user and device
  • Detecting, isolating and preventing internal breaches through expended access points and mobile assets
  • Adopting Zero Trust in tactical settings and field environments

10:10 – 10:40

Panel Discussion

The Future of National Cyber Command: Cross-Agency Readiness & Response

  • Navigating through effective cyber defenses that require seamless coordination across armed forces, police units and civilian agencies
  • Identifying clear hierarchies and predefined response procedures for managing cyber incidents with speed and authority
  • Examining global best practices that offer insights into building agile, threat responsive national cyber frameworks

10:40 – 11:00

Combatting Cybercrime with AI and Forensics

  • Utilizing modern systems to identify, analyze and neutralize cyber threats in real-time
  • Accelerating forensic investigations using AI tools to rapidly process vast volumes of digital evidence
  • Empowering cybercrime units with automation, analytics and threat intelligence boosts speed and precision

11:00 – 11:30

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 – 11:50

5G & Tactical Communications for Public Safety Operations

  • Enabling faster, more reliable data access for units operating in remote or high-risk zones
  • Ensuring network reliability and secure communications for mission-critical coordination across
    large, distributed teams
  • Providing real-time situational awareness using connected sensors, wearables and drones during
    emergencies and field ops

11:50 – 12:10

Cloud in Defense: Opportunities and Operational Security Risks

Enabling rapid scaling and instant access to mission-critical data across multiple operations
Ensuring data storage and processing within national borders to maintain control and compliance
Empowering cloud native systems against evolving cyber threats using built-in encryption, segmentation, and automated threat detection

12:10 – 12:30

Cybersecurity Workforce: Building the Next-Gen Digital Warriors

  • Acknowledging the need for building and sustaining a skilled, mission-ready workforce
  • Aligning technical education with real-world security demands through collaboration with academic institutions
  • Ensuring cyber-readiness through structured certifications and cyber range exercises

12:30 – 13:30

LUNCH BREAK

13:30 – 13:50

AI-Driven Surveillance & Predictive Threat Detection

  • Enhancing public safety through AI-powered surveillance tools to identify individuals and detect anomalies in real-time
  • Mitigating the ethical implications of AI-powered surveillance through strict regulations to protect privacy, consent and human rights
  • Improving response times and coordination through integrated camera systems across urban and high-risk zones

13:50 – 14:10

Critical Infrastructure Defense: OT Security Meets IT Intelligence

  • Navigating the benefits and challenges of integrating IT and OT systems
  • Securing industrial control systems to defend critical infrastructure like power, water and transport
  • Enabling immediate response to breaches across both physical and digital domains through unified threat detection platforms

14:10 – 14:40

Panel Discussion

Interagency Intelligence Fusion: Breaking Silos, Building Threat Picture

  • Utilizing unified data platforms for real-time coordination between multiple agencies
  • Combining digital signals with ground-level insights to create a more complete and actionable threat picture
  • Ensuring flexible and secure coordination across units, agencies and mission-zones through scalable cloud environments

14:40 – 15:00

Satellite, Drone & ISR Cybersecurity: Securing Eyes in the Sky

  • Securing data uplinks and sensor streams to prevent interception or manipulation by hostile actors
  • Acknowledging the need for defensive systems to detect, disable or neutralize unauthorized or weaponized drones in real-time
  • Ensuring aerial platforms transmit secure, tamper-proof data across all mission phases through
    military grade encryption

15:00 – 16:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

08:30 – 09:30

REGISTRATION & COFFEE

09:30 – 09:50

Next-Gen Policing: Building Safer Cities Through Digital Transformation

  • Integrating technologies such as smart surveillance, AI tools, and analytics into urban crime prevention
  • Enabling efficient resource allocation through predictive insights
  • Trust-building through transparency and accountability

09:50 – 10:10

Blockchain for Evidence Integrity and Secure Transactions

  • Ensuring chain-of-custody remains tamper-proof and verifiable from collection to courtroom
  • Automating contracts to reduce delays, prevent fraud, and enforce compliance in defense and police
    supply chains
  • Improving transparency and coordination across multiple departments and jurisdictions using shared
    blockchain systems

10:10 – 10:40

Panel Discussion

Predictive Policing and AI: Navigating Promise and Pitfalls

  • Analyzing trends to identify high-risk areas and prevent crimes before they escalate using artificial
    intelligence
  • Auditing algorithms to avoid reinforcing social inequalities or targeting vulnerable groups
  • Building public trust in predictive policing systems with open standards and explainable artificial
    intelligence

10:40 – 11:00

Smart Policing with IoT and Wearable Tech

  • Real-time tracking and monitoring of field units using connected devices that provide live updates on location, status and movement
  • Ensuring accountability during law enforcement interactions using wearable tech such as bodycams,
    audio sensors, biometric data
  • Protecting collected data from misuse or breaches through strong encryption, access controls and
    cloud compliance

11:00 – 11:30

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

11:30 – 11:50

Drone Tech for Coastal and Border Defense

  • Deploying terrain-specific surveillance mechanisms across remote and archipelagic regions
  • Supporting covert missions, target tracking and coordinated multi-drone operations
  • Securing real-time imagery and sensor feeds to prevent intelligence leaks during aerial reconnaissance

11:50 – 12:10

Digital Twin & Simulation in Police and Military Training

  • Recreating realistic operational environments for training and mission planning made possible by
    digital twin technology
  • Building instinctive responses to complex high-pressure situations empowering immersive decisionmaking for tactical operations
  • Reducing logistical costs and enabling continuous skill development with the advent of virtual
    training

12:10 – 12:30

Digital Identity for Operatives: Securing Access and Field Credibility

  • Real-time credentialing and mobile biometrics that allow instant verification of personnel
  • Securing ID systems to ensure only authorized agents access sensitive missions during multi-agency deployments
  • Protecting agent identities from digital exposure and preventing adversaries from targeting
    operatives online

12:30 – 13:30

LUNCH BREAK

13:30 – 13:50

Smart Command Centers: Data-Driven Crisis Response & Urban Management

  • Integrating live feeds, AI dashboards, and predictive modeling to guide rapid decision-making
  • Enabling seamless interagency collaboration in emergencies
  • Ensuring modern command systems are modular, cloud-based and capable of handling real-time data under pressure

13:50 – 14:10

Digital Procurement for National Security: Fast, Fair & Fraud-Resistant

  • Streamlining procurement via digital portals to reduce delays and paperwork thereby accelerating access to mission-critical technologies
  • Auditing tools such as built-in analytics and tracking features to help compliance, prevent fraud and ensure procurement integrity
  • Evaluating vendors for cybersecurity posture to protect agencies from supply chain vulnerabilities and third-party threats

14:10 – 14:40

Panel Discussion

The Philippines in 2030: Digital Defense, AI-Policing & Regional Cooperation

  • Strengthening collective cybersecurity, intelligence sharing and joint threat response through ASEAN
    tech-defense partnerships
  • Aligning policy, infrastructure and talent to build a secure and digitally capable defense sector
  • Redefining the future of national defense using emerging technologies like artificial intelligence,
    quantum, and autonomous systems

14:40 – 15:00

Ethical Policing in the Digital Age: Balancing Innovation with Public Trust

  • Ensuring public accountability through transparency in AI deployment and surveillance
  • Safeguarding citizen privacy by setting strong consent frameworks with clear limits on data collection, use and retention
  • Training frontline personnel on responsible, rights-based use of digital tools in everyday operations

15:00 – 16:00

NETWORKING BREAK & VISIT TO EXHIBITOR LOUNGE

*The above is a running agenda and is subject to change