Friday, May 15, 2026
Today's Print

Confronting the digital siege

“Expanding the early warning radar recognizes a practical truth: cybersecurity is a shared responsibility”

As geopolitical tensions spill beyond territorial waters and into the digital domain, cybersecurity has become central to national defense.

It is no longer a technical issue confined to IT systems or back-office operations.

- Advertisement -

It now sits at the core of how we protect our institutions, our economy, and the integrity of our democracy.

At the recent Stratbase Institute two-day conference, held in partnership with the Embassy of Canada in the Philippines, policymakers and experts confronted a reality that is becoming harder to ignore: our digital defenses are now the frontline in safeguarding national stability.

The conference, themed, “Navigating Digital Crossroads: Advancing Cybersecurity and Democratic Resilience in the Indo-Pacific,” brought together officials from government, the diplomatic community, the military, civil society, academia, and media.

The range of participation reflected a clear recognition that cyber resilience demands a whole-of-society approach to address real and evolving risks.

Professor Victor Andres “Dindo” Manhit framed the stakes frankly.

We are facing a creeping battle of influence unfolding in the information space, shaping public perception long before policies are debated or votes are cast.

Campaigns, he reminded participants, begin in the cyber domain, where narratives are seeded and amplified.

What we face today, he emphasized, is no longer accidental or isolated. It operates under what is now widely understood as foreign interference and malign influence — deliberate, organized, and externally driven efforts to exploit political vulnerabilities and shape public perception in ways that serve foreign strategic interests.

But beyond the strategic warning, the conference focused on operational realities.

Usec. Alexander “Aboy” Paraiso, Executive Director of the Cybercrime Investigation and Coordinating Center, described how artificial intelligence is reshaping the threat environment.

AI, he stressed, is both a defensive asset and an offensive weapon. On one hand, it strengthens detection, monitoring, and analysis, enabling authorities to identify patterns and respond more efficiently.

On the other, it is being used to profile victims and execute scams with alarming precision.

Many of today’s scams are no longer generic.

They are targeted. By analyzing personal data shared online, malicious actors can craft messages that feel credible and familiar.

AI automates this process, allowing deception to scale rapidly. The threat is not technology itself, but how it is governed and understood.

Weak oversight and low digital literacy create openings that criminals are quick to exploit.

Usec. Julius Gorospe, DICT Undersecretary for Cybersecurity, placed these developments within a broader regional context.

The Indo-Pacific cybersecurity landscape, he explained, has evolved into a blended threat environment. Ransomware, fraud, and data breaches persist, but they now intersect with geopolitical tensions, supply chain vulnerabilities, cloud systems, AI-enabled tools, and an expanding network of connected devices.

In response, DICT is moving to institutionalize a national cybersecurity baseline and a clear incident reporting framework across government and critical infrastructure.

A baseline is not about achieving perfect security. It establishes minimum auditable protections everywhere: strong identity controls, disciplined patch management, segmentation of critical systems, proper logging, tested backups, and incident readiness.

These are measurable standards designed to reduce systemic risk.

Incident reporting is equally critical. Clear thresholds and mandatory disclosure provide national visibility.

As Gorospe emphasized, effective defense requires both sight and coordination. A breach hidden from scrutiny can quickly become a wider vulnerability.

To support this shift, DICT is operationalizing enabling mechanisms. The DICT Trusted Assessment Provider program will ensure agencies have access to competent and accountable security testing.

The Cybersecurity Posture Assessment Laboratory will strengthen assurance for products and systems deployed nationwide, including those in industrial and operational environments.

Vulnerabilities must be identified before they become national exposures.

Complementing these measures is a Bug Bounty and Safe Harbor Program, which encourages ethical security researchers to report weaknesses responsibly.

Expanding the early warning radar recognizes a practical truth: cybersecurity is a shared responsibility.

The information dimension remains just as urgent. Research presented at the conference showed how narratives originating on one platform are amplified across others, gaining scale and legitimacy through repetition. Social media surges around key political events are not random spikes.

They reflect coordinated amplification that deepens polarization and redirects public attention. Foreign interference moves at digital speed, while democratic institutions respond at procedural slow motion. That gap is where manipulation thrives.

The discussion, as Professor Manhit noted, ultimately centers on defending democratic integrity. Building a secure and resilient digital archipelago requires integration, collaboration, and sustained capability enhancement.

Cybersecurity cannot remain reactive.

It must be institutionalized, measurable, and coordinated. It is a behavioral transformation that we must all adapt to thrive in the global digital ecosystem. Digital warfare is upon us.

Our response must be unified, disciplined, and sustained.

- Advertisement -

Leave a review

RECENT STORIES

Wag the dog, Philippine Style?

Uneasy

Surprises

spot_imgspot_imgspot_imgspot_img
spot_img
spot_imgspot_imgspot_img
Popular Categories
- Advertisement -spot_img