TRACK 1 :
POLICIES, STANDARDS & TECHNOLOGIES
DAY 1 :
101 : Cyber Defense and Counter Attacking Hacking
102 : Security beyond passwords
103 : Enterprise Risk Assessment: The Best Practices that were not divulged by the Top Caliber Practitioners
SUGGESTION : FROM MICROSOFT AND AWS
104 : ISMS: To Certify/Adopt or Not to Certify/Adopt with ISO 27001
105 : IT Security : How Technology and policy work together
DAY 2 :
106 : Cyber Defense Capability Building for Government Agencies
107 : How should the National CERT be Organized?
108 : How to become a full-proof Secure Enterprise?
109 : Digital Forensics: The common and advance tools used by Dummies
110 : Managing the Human Component Insecurities of Technology driven enterprise
111 : The Ethical Hacker : Common Risk Assessment Gadget
TRACK 2 :
THE LEGAL MATTER
DAY 1 :
201 : The Data Privacy Act: How should lawyers be trained in the world of Information Security
202 : How should a Government Agency or Private Enterprise be organized in the world of Insecurities : The Legal Perspective.
203 : The Lawyer's delimma. Why should I care to be involved in the world of technically-driven cyber security
204 : Can lawyers handle Digital Forensics?
205 : Lawyering for Companies Hacked: The 101 Ways to handle it!
DAY 2 :
206 : How to Hack an Automated Election System
LIVE HACKING OF AN ELECTION COUNTING MACHINE
AND PANEL DISCUSSION COMES RIGHT AFTER
207 : The Philippine version of Health Insurance Portability and Accountability Act
208 : The CEO’s Point of View : The Legal Consideration of Ethical Hacking
209: CHED: Incorporating the Information Security Science in HEIs
TRACK 3 :
DATA PROTECTION OFFICER
DAY 1 :
301 : Strategies of NPC in Nationwide Auditing the Government and Private Institutions
302 : The Data Privacy Act: The realities behind the efforts to comply/ Laws governing the DPOs
303 : Data Protection Officer: Professionalization thru Certification, Assessment, Continuing Education Program
304 : Privacy Fundamentals: Analyzing the potential impact of data protection requirements on your organization
305 : Privacy in Practice: How should a DPO (or any privacy professional) interact with the rest of your organization/People Management
DAY 2 :
306 : Privacy Governance: How to choose to start and start implementing a suitable privacy program methodology for your organization
307 : Privacy Compliance: Self-analysis to test compliance, the security/operational
307 : Professional Body Affiliation: Working among peers
DPO Critical Non-Technical Skills
308 : Managing Change in your IT Security Setting: A More Challenging Undertaking
309 : DPO critical non-technical skills
310 : DPO Soft Skills: Changing and you manage change
311 : DPO Soft Skills : Conflict Management & Resolution