09.25 - 09.30
|
Chair's welcome
|
09.30 - 10.00
|
►Fireside Chat: Making UK Aviation Cyber Safe - A Regulator’s Perspective Peter Drissell, Director Aviation Security, UK Civil Aviation Authority - How the CAA has developed Cyber Security oversight of UK aviation
- Achieving effective cyber security for UK civil aviation
- How the Regulator can become more oil than glue.
- What's challenges lie ahead?
|
10.00 - 10.20
|
►It's Not The Breach. It's the Spread: Improving Cyber Resilience in Your Organisation Richard Meeus, Senior Director Security Technology and Strategy, EMEA, Akamai - This session will explore the critical role of cyber resiliency in helping organisations withstand and recover from today's evolving threats
- We will dive into strategies for reducing attack surfaces, visualising networks, and securing critical IT assets-while also examining how compliance regulations can enhance security and safeguard sensitive data
- Attendees will come away with actionable insights for strengthening their security posture, minimising vulnerabilities, and preparing their organisations to face future challenges in an increasingly complex threat landscape.
|
10.20 - 10.40
|
►Defending Critical Infrastructure from Rising Cyber Threats Nick Palmer, Technical Lead, EMEA, Censys - The digital attack surface is growing at an unprecedented pace — and essential systems are under mounting threat.
- Censys has examined thousands of real-world cyber exposures, from vulnerable third-party services and unpatched systems to insecure IoT devices and recurring data breach patterns across the region.
- The verdict is clear: critical sectors — finance, energy, healthcare, transport, and government — face escalating cyber risk.
- In this session, we break down the latest threat landscape, highlight the hidden risks most organisations miss, and share practical approaches for safeguarding both enterprise and national infrastructure.
|
10.40 - 11.05
|
►Ransomware in Healthcare: The Growing Threat to Patient Safety Manit Sahib, Ethical Hacker, The Global Fund - Why healthcare is the #1 ransomware target – why attacks are increasing and how ransomware gangs break in more easily than expected
- Real-world hacking insights – firsthand stories from ethical hacking operations and the biggest security gaps in healthcare, including legacy tech, access control, and the lack of real-world testing
- Why traditional security fails – the limitations of compliance checklists and why conventional security tools don’t stop ransomware
- Building real ransomware resilience – What healthcare CISOs and IT leaders must do NOW to avoid becoming the next headline
|
11.05 - 11.10
|
Comfort break
|
11.10 - 11.25
|
► Mind the gap: Uncovering decision bias in cybersecurity Bec McKeown, CPsychol, Mind Science Understanding the role of cognitive biases in security decisions Identifying key biases impacting security outcomes Mitigation strategies for reducing bias in security practices Mitigating concentration risks in an interconnected business
|
11.25 - 11.45
|
►Strengthening CNI Through Future-Ready Supply-Chain Security Emran Ali, Associate Director – Cyber Security, Bridewell Why Supply-Chain Security Matters for CNI Heightened Reporting & Oversight Building a Holistic Supply-Chain Security Program
|
11.45 - 12.05
|
►OT Cloud Architecture, Security and Resilience by Design Peter Kaela, Lead Cybersecurity Architect, Scottish Power Energy Networks The journey to Cloud Native, asset-centric security Platforms and cloud zoning – a Defense in Depth approach Unified Security Strategy, across Cloud, OT and CNI considerations.
|
12.05 - 12.25
|
►Beyond Detection: Prioritising Risk in OT for National Infrastructure Protection Elliot Gidley, EMEA Field CTO, Claroty Understand why exposure management is essential to safeguard critical OT systems Learn the core principles that build an effective exposure management program Discover proven strategies to prioritise and reduce risk in CNI
|
12.25 - 12.45
|
►Prioritizing CNI Security Investments for Long-Term Resilience Matthew Rogers, Industrial Control Systems Cybersecurity Expert, CISA - What long-term security investments to prioritize
- Targeted security controls which can improve resilience during the transition
- How a CNI entity can take advantage of the increasing number of vendor and supplier regulatory requirements
|
12.45 - 12.50
|
Chair's closing remarks
|