Zenteq CEO Ivan Jude S. Busgano Shines at the 2nd Cyber Summit 2024

The Grand Summit Hotel set the stage for the 2nd Cyber Summit 2024, gathering cybersecurity experts and industry leaders.

On October 24, 2024, the Grand Summit Hotel in General Santos City, Philippines, played host to the 2nd Cyber Summit 2024, aptly themed “Beyond the Horizon: Safeguarding Information in Cloud Environments.” The event was a key component of Cybersecurity Awareness Month, celebrating the theme “Cyber Tiwala, Cyber Handa, Cyber Tatag.” Among the esteemed speakers was Mr. Ivan Jude S. Busgano, the CEO of Zenteq and a representative of CompTIA, who delivered an impactful address on cloud security trends, challenges, and best practices.

Zenteq CEO Ivan Jude S. Busgano addressing the audience on cloud security trends and challenges.

A Growing Concern: Cloud Security Trends and Challenges

As cloud technology continues its rapid ascension, Mr. Busgano emphasized that cloud adoption has nowhere to go but up. However, this increasing reliance on cloud services comes with its own set of vulnerabilities. He underscored that cloud environments are becoming attractive targets for malicious cyber actors, thereby making cybersecurity an essential component of technological advancement.

“Wherever there is technology, there should be cybersecurity,” Busgano stated, reinforcing the necessity of robust security measures as organizations transition to cloud platforms.

The awarding ceremony recognizing outstanding contributions to cybersecurity.

Top 10 Best Practices for Cloud Security

Drawing insights from the National Security Agency (NSA), Mr. Busgano outlined the top 10 best practices for cloud security that organizations should adopt to safeguard their information:

  1. Uphold the Cloud Shared Responsibility Model: Understand the division of responsibilities between cloud service providers and customers.
  2. Use Secure Cloud Identity and Access Management Practices: Implement strong authentication mechanisms to control access.
  3. Use Secure Cloud Key Management Practices: Ensure robust management of encryption keys.
  4. Implement Network Segmentation and Encryption: Protect data integrity through effective network design and encryption.
  5. Secure Data in the Cloud: Apply encryption and security measures to sensitive data stored in the cloud.
  6. Defend Continuous Integration/Continuous Delivery (CI/CD) Environments: Secure the software development lifecycle.
  7. Enforce Secure Automated Deployment Practices through Infrastructure-as-Code: Leverage automation responsibly to enhance security.
  8. Account for Complexities Introduced by Hybrid-cloud & Multi-cloud Environments: Manage security across diverse cloud settings.
  9. Mitigate Risks from Managed Service Providers: Assess the security posture of third-party vendors.
  10. Manage Cloud Logs for Effective Threat Hunting: Utilize logging to enhance threat detection capabilities.

Mr. Busgano with the DICT folks (from left to right): Mr. Jones Hinay, Cybersecurity Focal Person for DICT Region 12; Engr. Guilbert Simene, Chief of the Technical Operations Division for DICT Region 12; and Engr. Shine Abello from the Cybersecurity Bureau at DICT National Headquarters.

slide 1
Mr. Busgano with notable leaders: Councilor Lulu Casabuena from General Santos City, Dean Fe Villamejor-Mendoza of the University of the Philippines, and Chief Marites Doral, Deputy Chief of Party for the WSP.
Mr. Busgano with notable leaders: Councilor Lulu Casabuena from General Santos City, Dean Fe Villamejor-Mendoza of the University of the Philippines, and Chief Marites Doral, Deputy Chief of Party for the WSP.
Mr. Busgano with Engr. Pierre Tito Galla, Cybersecurity Lead for USAID’s Beacon Project.
Mr. Busgano with Engr. Pierre Tito Galla, Cybersecurity Lead for USAID’s Beacon Project.
Mr. Busgano with Mr. Clint Junsay, Co-owner of IT Avenue.
Mr. Busgano with Mr. Clint Junsay, Co-owner of IT Avenue.
Mr. Busgano with Mr. Rombel Catolico, GenSan City Public Information Office (CPIO) Head.
Mr. Busgano with Mr. Rombel Catolico, GenSan City Public Information Office (CPIO) Head.
Reconnecting with former classmates: Arnold Joaquin and Edward Mario Mondejar.
Reconnecting with former classmates: Arnold Joaquin and Edward Mario Mondejar.
10
11
previous arrowprevious arrow
next arrownext arrow
Shadow

A Practical Checklist for Cloud Security Posture

In addition to best practices, Mr. Busgano provided attendees with a checklist to help organizations evaluate their cloud security posture.

Enhance Your Cloud Security!

If you’re looking to strengthen your organization’s cloud security or have questions about best practices from the 2nd Cyber Summit 2024, contact Zenteq today!

Schedule a meeting or request a copy of the shared cloud security checklist. Share this article with your network to promote the importance of cybersecurity!

Schedule a meeting

Scroll to Top