Agenda

Presentations already confirmed include:


►The risks and opportunities that AI brings to cybersecurity

Gustavo Mania, Information Security and Risk Manager (Regional CISO), HEINEKEN (AME)

  • Real-world AI-driven cyber-risks – from phishing automation to deepfakes and agentic AI threats  
  • Learn how HEINEKEN manages emerging AI risks while harnessing AI to strengthen defence  
  • Gain practical insights to help your organisation embrace AI securely and strategically

►How Neste built a business-driven cyber-risk program 

Santtu Erkkilä, Cyber Governance, Risk & Compliance Lead, Neste

  • Understand the key challenges Neste faced in managing cyber-risk across a global, complex industrial and R&D environment
  • See the step-by-step journey of transforming their cyber program into one that is business-driven and risk-informed
  • Learn the lessons from Neste’s experience that you can apply to mature your own organisation’s risk management program

►Maintaining Operations through Conflict: Emergency Planning in a Connected OT Environment

Matthew Rogers, Industrial Control Systems Cybersecurity Expert, CISA

  • Security Connectivity Principles for OT, designing OT systems to be interconnected while maintaining operator control
  • Threats impacting reliable telecommunications and internet, as well as disrupting and destroying OT
  • CI Fortify, isolation and recovery goals for preventing some impact to OT in a crisis or conflict
  • How to address connectivity requirements impact on isolation and recovery

►Fireside Chat: How Adversaries Target Manufacturing and Supply Chains

Simon Brady, Event Chairman
Rob Flanders, Head of Threat and Incident Response, BAE Systems

  • Against a backdrop of escalating attacks on manufacturing — from ransomware shutting down production lines to coordinated campaigns prompting government intervention and national security warnings — leaders are being forced to rethink the scale, intent, and impact of the threat landscape.
  • How are threat actors evolving their tactics and objectives in manufacturing environments, and what are they seeking to achieve beyond disruption?
  • What does modern adversary preparation look like in manufacturing networks, and how can organizations detect and disrupt threat activity before it becomes an operational incident?
  • How exposed is the extended manufacturing supply chain to coordinated threat campaigns, and where are adversaries most likely to exploit systemic weaknesses?

►Cyber Crisis in Manufacturing: Prioritizing Recovery When Everything Is Critical

Kinga Kertesz-Takacs, Sr. Operational Technology Governance & Compliance Manager, Haleon

  • Risk-Based Restoration Sequencing: How to determine what truly needs to come back online first during multi-site disruptions.
  • Executive Decision-Making Under Pressure: Strategies for making fast, defensible recovery choices when every system feels mission-critical.
  • Building Resilience Before the Crisis: Using governance frameworks to strengthen operational recovery and long-term stability.

►IT/OT Data Convergence and Data Value

Kate Silverman, Deputy CISO, Ardagh Group

  • Understand how IT and OT data integration creates unified, real-time operational and business insights.
  • Identify practical IT and OT data insights that drive performance, reliability, and efficiency improvements.
  • Learn how to evaluate and define measurable data value aligned to business outcomes.
  • Explore key data sharing considerations, including governance, ownership, interoperability, and cybersecurity.
  • Recognize regulatory and compliance considerations impacting IT/OT data environments.