Industry experts at Radius Telecoms’ Cyber Resilience Summit weigh inIndustry experts at Radius Telecoms’ Cyber Resilience Summit weigh in

How can we ensure business continuity in the face of cyberattacks?

2025/12/05 11:32

Editor’s note: This content is sponsored by Radius Telecoms, Inc. and was produced by BrandRap, the sales and marketing arm of Rappler. No member of the news and editorial team participated in the publishing of this piece.

A multigenerational messaging platform, a technology giant, and a multinational financial services company have one thing in common, apart from their stellar contributions. They all have experienced cyber attacks. If even the most reputable organizations aren’t completely spared from this threat, is complacency even an option? 

Whether it’s a cleverly crafted phishing email or malware that steals information, recovering from headaches like this isn’t only laborious but also costly. What if, instead of constantly worrying about how to get back up when a crisis happens, you have the power to protect your company from being thrown into this situation in the first place – and even adapt to the quickly evolving digital landscape? The first-ever Cyber Resilience Summit by Radius Telecoms, Inc., together with VST ECS Phils., Inc., opened up this possibility.  

On November 18, company executives and experts across different industries, covering data management, cybersecurity, and technology, gathered for an afternoon of helpful advice on how to build cyber resilience, as well as how to perceive this concept as a member of your organization to later inspire action.

“Every connection we make, every device we deploy, every service we deliver depends on the integrity, visibility, and security of our networks. So as we begin today’s session, let’s take this opportunity to connect meaningfully to challenge perspective,” said Alfredo Solis, Jr., Vice President and COO of Radius.

Arlene Singzon, General Manager for Strategic Business at VST ECS Phils, Inc., also mentioned how cybersecurity leans more on prevention. “Cyber resilience, though, is way past prevention. We are here to adapt, to innovate, and to basically be ready,” she added.

To dig deeper into the significance of cyber resilience, we took quick notes from the invited industry experts and identified common threads among their advice.

PROTECTING ORGANIZATIONS. At the first-ever Radius Cyber Resilience Summit, guests listened to experts’ varying but unified takes on achieving cyber resilience
Lack of visibility hinders cyber resilience

“People and data – they are moving. [They] could be across different cloud platforms and across devices. And one of the big concerns, I can say, is the lack of visibility. It means the data has been collected but not classified[…]” said Cyril Villanueva, Security Consultant at Forcepoint. 

Examples of these, according to Villanueva, are data that just exist in emails, messaging applications, or abandoned servers. Sensitive information may be lying around these servers that are no longer being used. 

“We cannot protect what we cannot see. But the attackers can. Remember, the attackers – they are very good [at] exploiting [the] blind spots.”

Because of this, it’s important to know our data well, which includes being aware of how big of a risk this is in our business. Some of the questions we can ask are, “Can the wrong people, devices, or apps access our data? Can the files be shared too easily? Are there redundant copies of the data that are exposed?”

Villanueva also unpacked the steps of contextualizing data through identifying (e.g., Tax ID, address, product codes), categorizing, classifying (e.g., sensitive, secret, private), and labeling (e.g., legal, source code, intellectual property).

Cyber resilience can thrive on consolidation and simplification

Ryan Shane Dagdag, Sales Engineer of Asia-Pacific at iboss, also mentioned “lack of visibility” as a problem starter, especially with the modern work setup’s hybrid arrangement. 

“Once you move outside your network, you are no longer [bound] with your security features. So we need a security that follows the user and follows the app architecture, so location is now irrelevant,” he said.

Dagdag mentioned how some companies still deal with the challenge of implementing different solutions, instead of having a simplified system: “How [can you] interpret security features with other platforms?”

This led him to discuss the benefits of iboss’ Zero Trust SASE Platform, where the complete legacy security stack is replaced with a single unified platform. 

“Right now, since we can simplify [and] consolidate, we can also reduce the risk of exposure. Because the zero trust SASE is a security that follows the location of every user […]We can deliver the platform securely and efficiently.”

Cyber resilience means security follows you everywhere

“Kapag lumabas na ng office ’yung employee, how can [they] be protected?” (Once the employee heads out of the office, how can they be protected?)


Being constantly connected to security wherever you go is also a point raised by Jon Louis Fernandez, Systems Engineer at Fortinet. “May instances kasi na, ‘Ah, dito naman sa firewall ko, naba-block ko. Pero dito with this other newly adopted solution, hind ko na siya ma-block.” (Because there are instances where someone notices, “Ah, when using this firewall, I’m able to block it. But with this solution we bought, I’m not able to.)

During his conversation with the audience, he highlighted the value of the Fortinet SASE solution and FortiGate, which isn’t just a firewall, but an all-encompassing security fabric. “There is a standardization of security policies,” he said. 

Fernandez also explained how, thanks to Fortinet, users can witness the principle of least privilege, or being given only the necessary security access depending on their function in the organization, reducing potential breaches.

The presence of backups doesn’t always guarantee cyber resilience

In our usual day-to-day, we’re often told to have multiple backups. But is it the end-all be-all of safety? Chee Wai Yeong, Area Vice President of Rubrik, argued that we should go beyond this thinking.

“In a normal disaster, the best copy is always the latest copy. If it’s a backup, it’s last night’s backup. If it’s a snapshot, it’s the latest snapshot. If it’s a replication, it’s the last replica. But in a cyber attack, the latest copy is almost always the wrong copy,” he explained.

The first crucial step to achieving cyber recovery, according to him, is determining the scope of the attack. “Without knowing the scope, you can’t recover because you don’t know what has been touched,” he reminded the attendees.

Afterwards, you should find and quarantine the malware, assess any data breach, and calculate the recovery point.

“Which file has been encrypted? Which system has been infected? All this discovery is then integrated into the recovery, so that within a few clicks, you start a mass recovery,” he stressed.

“Rubrik is responsible – and we see ourselves as a leader – to the last line of defense, which is the recovery part.”

In cyber resilience, don’t underestimate the power of AI

Brian Cotaz, a cybersecurity specialist from Cisco, showed the audience another case of artificial intelligence being a double-edged sword. 

“The threat actors – how are they using AI? Actually, they are not using AI to develop new attacks. No, they are not. They are using AI to enhance their current attack,” Cotaz said.

“[How?] First is that phishing email; second is that the code; and at the end of the day, a [piece of] malware is a code, right? [There] are malware that are working. They are malware that are not working. So now, they are now using AI to enhance their code. Next, hackers are human beings. There are hackers that are very advanced, there are hackers that are not so advanced. Now, you put in AI, [then] the not-so-advanced hackers become very advanced.”

But at the same time, AI can be used for incident analysis and threat handling through Cisco’s Splunk solution.

Cyber resilience is a multilayered process with rewarding benefits

This year, Exercise SG Ready discovered that 17 percent of 4,500 employees clicked on phishing email links, consequently failing the cybersecurity test. This is a story recalled by Ginnwann Teo, Senior Technical Director at Menlo Security, reminding people about how more work needs to be done in building resilient organizations. In his turn at the microphone, he spotlighted how cyber resilience is characterized by very intentional steps, which can be made easier through the help of Menlo Security’s browser protection and file sanitization functions.

Through Menlo Security’s Positive Selection Technology, businesses are shielded from malware infection right from when the files arrive in the system. They are later dissected for any important elements and privacy restrictions, among others. 

He mentioned a case we know all too well: receiving deceitful concert tickets through email.

“We create the ticket, we copy onto our clean template, you get your free QR code[…] This is exactly what we do for every single file you download, when it goes through our CDR (content disarm and reconstruction) solution.”

The prerequisite to cyber resilience is acceptance of rapid change

Of course, toughening up against cyber risks means fully embracing the quickly evolving world. Meralco vice president and chief information security officer Marilene Tayag, who moderated the panel discussion, set up this atmosphere by prompting a conversation about the most overlooked risks of the new hybrid multicloud reality, to which Fernandez mentioned are costs and a new environment.

Meanwhile, Radius president and CEO Exequiel Delgado tried jogging people’s memory by sharing how, in the 1980s when he worked as an accounts manager, all communications were centered in the communication room.

“But that’s not the case today. Communication is spread out. If the circuits that you’re providing to the telco provider goes down, everyone is affected. The productivity of all the employees are affected. That’s why the enterprise network of the future should be highly available.” 

According to him, two additional characteristics of an enterprise network are low latency—“even if your service is up, if it slows down, it means nothing”—and strong security—“as enterprises undergo digital transformation, they expose their assets to cyber actors and criminals.”

“Friends, we’re living at a time of great opportunity, great possibilities, fueled by data, innovation, connectivity. But with great connectivity comes greater responsibility,” he nudged the audience.

“Cyber resilience to me is not all about defense. Cyber security is all about empowerment – arming our employees to make sure they become productive wherever they are, but keeping our network safe in the process. It’s all about protecting businesses as they attempt to become more relevant, more progressive.” – Rappler.com

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Grayscale debuts first US spot crypto ETPs with staking

Grayscale debuts first US spot crypto ETPs with staking

The post Grayscale debuts first US spot crypto ETPs with staking appeared on BitcoinEthereumNews.com. Grayscale Investments has just launched the first US-listed spot crypto exchange-traded products (ETPs) offering staking. The Grayscale Ethereum Trust ETF (ETHE) and Grayscale Ethereum Mini Trust ETF (ETH) now enable Ether staking, while the Grayscale Solana Trust (GSOL) has activated staking capabilities ahead of its proposed uplisting as a spot Solana ETP. The move provides traditional brokerage investors with access to staking rewards — previously confined to native crypto platforms — through regulated vehicles. The products are not registered under the Investment Company Act of 1940, meaning they operate outside the framework governing traditional mutual funds and ETFs. Staking, the process of locking up tokens to secure proof-of-stake blockchains like Ethereum and Solana in exchange for rewards, introduces yield potential but also adds operational and network risks.  Grayscale said staking will be managed through institutional custodians and diversified validator networks to reduce single-party risk. This marks the first time US investors can access staking yield through exchange-traded exposure to Ethereum and Solana, expanding upon regulatory acceptance that began with spot Bitcoin ETFs in January 2024 and spot Ether ETFs in July 2024.  Grayscale CEO Peter Mintzberg called the initiative “first mover innovation,” underscoring the firm’s role in shaping institutional crypto access. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/grayscale-us-spot-crypto-etps-staking
Share
BitcoinEthereumNews2025/10/06 21:29
Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues

Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues

The post Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues appeared on BitcoinEthereumNews.com. The U.S. Spot XRP ETFs is now near the $1 billion mark of assets under management in less than a month since their launch. This follows from the product maintaining consistent inflows with no single outflow recorded yet. XRP ETFs See Continuous Inflows Since Launch Since its first launch on November 14, spot XRP funds have seen continued inflows. According to data from SoSoValue, the total inflows into these funds have now risen to $881.25 million. The funds attracted $12.84 million of new money yesterday. The daily trading volumes remained stable at $26.74 million. Source: SoSoValue Reaching nearly $1 billion in less than 30 days makes the product among the fastest growing crypto investment products in the United States. Notably, Spot Solana ETFs also accumulated over $600 million since their launch. On the other hand, Bitcoin and Ethereum ETFs are holding about $58 billion and about $13 billion in assets under management respectively. Much of the early growth traces back to the first Canary Capital’s XRP ETF. Its opening on November 13 brought one of the strongest crypto ETF openings to date. It saw more than $59 million in first-day trading volume and $245 million in net inflows. Shortly after Canary’s launch, firms like Grayscale, Bitwise, and Franklin Templeton introduced their own XRP products. Bitwise’s fund also did well on its launch, recording over $105 million in early inflows. Meanwhile, the market is getting ready for yet another addition. 21Shares’ U.S. spot XRP fund also got the green light from the SEC. It will trade under the ticker TOXR on the Cboe BZX Exchange. XRP Products Keep Gaining Momentum in the Market The token’s funds continued to expand this week. REX Shares and Tuttle Capital have launched the T-REX 2X Long XRP Daily Target ETF. This new ETF allows traders…
Share
BitcoinEthereumNews2025/12/05 14:11
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27