CTRL + ALT + DEFEND: Strengthening Cyber Defenses in the Digital Era



CTRL + ALT + DEFEND: Strengthening Cyber Defenses in the Digital Era

In today’s hyperconnected world, cybersecurity has evolved from being a niche technical concern into a global necessity. On October 10, 2025, the West Visayas State University – College of Information and Communications Technology (WVSU-CICT) hosted an insightful webinar titled “CTRL + ALT + DEFEND: Defending Critical Infrastructure from Cyber Threats.” The session was part of the university’s Seminar and Field Studies Webinar Series 2025 and featured Mr. Jon Arellano, an accomplished IT Team Lead at Navigatr, Toronto, Canada.

The event gathered a diverse audience of students, educators, and IT professionals eager to learn about the growing threats to critical infrastructure systems and the measures needed to safeguard them. Conducted via Google Meet from 9:00 AM to 11:00 AM, the webinar provided a comprehensive look into how cyberattacks are carried out, how they evolve, and what can be done to prevent or mitigate their impact.


A Deep Dive into Cyber Threats and Real-World Incidents

Mr. Arellano began by outlining the alarming increase in cyber threats targeting essential systems — from financial institutions and energy grids to hospitals and logistics networks. He discussed the different types of cyber threats, including insider threats, state-sponsored attacks, and vulnerabilities that arise due to outdated systems or lack of security awareness.

The speaker explained that insider threats—those that originate from within an organization—are often overlooked but highly dangerous. These can come from malicious insiders who intentionally cause harm, negligent employees who accidentally expose data, or compromised insiders whose accounts are exploited by external attackers. To illustrate, he cited real incidents such as the Finwise Bank Data Breach (2024) and Jollibee’s 2024 breach, showing how insider actions can result in massive data loss and reputational damage.

He also shed light on state-sponsored attacks, which are cyber operations backed by government entities with goals such as espionage, sabotage, or data theft. Examples like Stuxnet (2010), Not Petya (2017), and SolarWinds (2020) highlighted how nations use cyber capabilities to disrupt or manipulate the critical infrastructures of their targets. These cases demonstrated that such attacks are typically sophisticated, well-funded, and highly targeted, affecting not only organizations but also millions of ordinary citizens who rely on digital services.


Understanding the Cyberattack Lifecycle

One of the most eye-opening portions of the webinar was Mr. Arellano’s explanation of the seven stages of a cyberattack lifecycle. He described how attackers move methodically through each stage—starting from reconnaissance, where they gather information about their targets, to weaponization and delivery, where malicious tools are prepared and transmitted through phishing emails, USBs, or compromised websites.

Once the malware is delivered, attackers proceed with exploitation and installation, embedding the malicious code into systems to gain persistent access. Through command and control, they can remotely manipulate affected systems, and finally, in the action on objectives stage, they execute their intended goals—such as data theft, service disruption, or sabotage.

By breaking down each stage, Mr. Arellano helped participants visualize how an attack unfolds in real life. Understanding this process is vital, as it allows defenders to identify and stop attacks at multiple stages before they can escalate.


Case Studies: Lessons from Global Cyber Incidents

To ground the discussion in reality, Mr. Arellano presented several case studies of major cyber incidents that had worldwide implications. Among them was the Ukraine Power Grid Attack (2015)—one of the first known instances where hackers successfully shut down an entire power system. This attack demonstrated how cyber threats can have real-world physical consequences.

Another case was the Maersk Ransomware Attack (2017), which crippled one of the world’s largest shipping companies. The attack, attributed to the NotPetya malware, caused an estimated $250–300 million in direct losses and billions more in trade disruptions, as Maersk handles around 20% of global container shipping. Through this example, Mr. Arellano emphasized how a single cyber incident can cascade into massive operational and economic damage.

The NHS Hospitals Cyberattack (2017) also underscored the human cost of cyber threats. During this incident, hospitals across the United Kingdom were forced to cancel medical procedures, illustrating how vulnerable even life-critical systems can be when digital defenses fail.


Best Practices and Defense Strategies

Moving from theory to application, Mr. Arellano concluded his talk by sharing best practices and protection strategies that organizations can adopt to strengthen their cybersecurity posture. He categorized these into technical and governance-based measures, which include:

  • Conducting regular risk assessments to identify vulnerabilities in systems and processes.

  • Establishing a cybersecurity governance framework with clear policies, roles, and responsibilities.

  • Implementing firewalls and intrusion detection systems (IDS/IPS) to monitor and filter network traffic.

  • Keeping systems updated with security patches and firmware updates.

  • Deploying endpoint detection and response (EDR) tools and enforcing data encryption across devices.

  • Ensuring regulatory compliance with standards like ISO 27001, NIST CSF, and GDPR, along with local cybersecurity laws.

These strategies, according to the speaker, are not just technical solutions—they reflect a mindset of accountability and foresight. Every organization, no matter its size, must take cybersecurity seriously and integrate it into its daily operations.


Building a Culture of Cyber Awareness

Beyond tools and technologies, Mr. Arellano emphasized the human element of cybersecurity. He explained that the lack of cybersecurity education remains one of the most common vulnerabilities across sectors. Even with advanced systems in place, untrained employees can unintentionally expose sensitive information or fall victim to phishing attacks.

He encouraged institutions, especially schools and universities, to promote cyber hygiene—simple habits like creating strong passwords, avoiding suspicious links, and being mindful of what information is shared online. For students aspiring to enter the tech field, he underscored the importance of developing both technical expertise and ethical responsibility.


A Lasting Impact

The CTRL + ALT + DEFEND webinar left a lasting impression on attendees. It not only deepened participants’ understanding of cyber threats but also inspired them to take an active role in protecting the digital world. As one of the participants, I found the session both enlightening and motivating. It reinforced my passion for technology and reminded me that cybersecurity is a shared responsibility—one that demands awareness, discipline, and collaboration.

The event was well-organized, visually engaging, and highly informative. The speaker’s real-world insights and approachable delivery made even the most complex topics understandable and relevant. It served as a strong reminder that defending digital systems is no longer optional—it’s essential for personal, professional, and national security.


Conclusion

In a world where every click, transaction, and connection carries potential risks, the CTRL + ALT + DEFEND webinar served as both a wake-up call and a roadmap. It empowered participants to rethink how they interact with technology and to become part of a growing community of digital defenders.

Cybersecurity is no longer the sole responsibility of IT departments—it’s a collective mission that begins with awareness and ends with action. Thanks to WVSU-CICT and Mr. Jon Arellano, this event reminded us that while cyber threats continue to evolve, so too can our defenses—one informed, vigilant individual at a time.


Comments

Popular posts from this blog

Youth and Cybercrime: Awareness and Prevention

Malikhaing Pinoy Creative Expo: Celebrating Filipino Innovation and Identity