Elevate logo

November 10-13, 2020

Decode Logo

ABOUT THE CONFERENCE

DECODE is the premier cyber security conference in the Philippines hosted by Trend Micro. It aims to decode to local technology professionals the up-to-date information about the threat landscape, industry trends, and new technologies in order to empower them to secure the digital infrastructures of their organizations, as well as to inspire them to embark on a continuous learning journey.

This year, DECODE goes virtual! Elevate and soar high with us as we take this journey through the virtual space. Happening on NOVEMBER 10-12, 2020 -- REGISTER EARLY to secure your slot! THIS EVENT IS FREE!

ELEVATE

Transform rapidly, seamlessly, securely

With the understanding of the new threats comes acceptance that all organizations need to transform. What does transformation entail? What are the security precautions we need to take? IT professionals must always be equipped not only with the right tools, but with the right skills and knowledge. In the fight to keep the connected world safe and secure, these cyber defenders must elevate beyond the ordinary and transform rapidly, seamlessly, securely.

Decode Logo

AGENDA

Tuesday

11/10/2020

Wednesday

11/11/2020

Friday

11/13/2020

EVENT PROPER

10:45 AM - 11:00 AM (15 mins)

Opening

11:00 AM - 11:30 AM (30 mins)

The Game Changer - How the Pandemic is Changing Your World

Martin Roesler


11:30 AM - 12:00 PM (30 mins)

Exposed: Attack Surfaces Widen as the World Increasingly Relies on Digital Infrastructures

Melissa Hathaway


12:00 PM - 01:00 PM (60 mins)

Break


01:00 PM - 01:30 PM (30 mins)

BUSINESS UNUSUAL

Pitfalls of OSS in IoT

Ricky Lawshae

DIGITAL FRONTIER

Kubernetes Security 101: Best Practices for Securing Your Cluster

Magno Logan

SECURING THE SECURITY LANDSCAPE

Building and Running a Realistic Factory Honeypot

Lord Remorin


01:30 PM - 01:45 PM (15 mins)

Networking Break at the Network Lounge


01:45 PM - 02:15 PM (30 mins)

BUSINESS UNUSUAL

Edge Computing

Philippe Z Lin and Roel Reyes

DIGITAL FRONTIER

Asking the Right Business Question - The Most Important Phase of the Data Science Process

Isaac Reyes

SECURING THE SECURITY LANDSCAPE

On the Radar: Exploring the Current Threat Hunting Process

Monte De Jesus


02:15 PM - 02:30 PM (15 mins)

Networking Break at the Network Lounge


02:30 PM - 03:00 PM (30 mins)

BUSINESS UNUSUAL

Insider Threat - The Enemy from Within

Joseph Pacamarra

DIGITAL FRONTIER

A Look at USBee Malware

Shin Li and Ta-Lun Yen

SECURING THE SECURITY LANDSCAPE

The Hidden Risks of Industrial Automation Programming and their Repercussions for Smart Factories

Federico Maggi


03:00 PM - 03:15 PM (15 mins)

Networking Break at the Network Lounge


03:15 PM - 03:45 PM (30 mins)

BUSINESS UNUSUAL

Cyberespionage: Targeted Attacks Abusing Third-Party Cloud Services

Jaromir Horejsi

DIGITAL FRONTIER

Cyberattack Trends in the Cloud

Joey Costoya

SECURING THE SECURITY LANDSCAPE

Honeypots, Honeyports, and 'Trollports': An Ecosystem Wide Solution to the 'Firewall Spotlight Problem'

JV Roig


03:45 PM - 04:00 PM (15 mins)

Networking Break at the Network Lounge


04:00 PM - 04:30 PM (30 mins)

How Threat Actors Move: The Crux of Incident Response

Jay Yaneza


04:30 PM - 04:45 PM (15 mins)

Recap and Closing

2019 Highlights

;