Agenda
Presentations already confirmed include:
►The risks and opportunities that AI brings to cybersecurity
Gustavo Mania, Information Security and Risk Manager (Regional CISO), HEINEKEN (AME)
- Real-world AI-driven cyber-risks – from phishing automation to deepfakes and agentic AI threats
- Learn how HEINEKEN manages emerging AI risks while harnessing AI to strengthen defence
- Gain practical insights to help your organisation embrace AI securely and strategically
►How Neste built a business-driven cyber-risk program
Santtu Erkkilä, Cyber Governance, Risk & Compliance Lead, Neste
- Understand the key challenges Neste faced in managing cyber-risk across a global, complex industrial and R&D environment
- See the step-by-step journey of transforming their cyber program into one that is business-driven and risk-informed
- Learn the lessons from Neste’s experience that you can apply to mature your own organisation’s risk management program
►Maintaining Operations through Conflict: Emergency Planning in a Connected OT Environment
Matthew Rogers, Industrial Control Systems Cybersecurity Expert, CISA
- Security Connectivity Principles for OT, designing OT systems to be interconnected while maintaining operator control
- Threats impacting reliable telecommunications and internet, as well as disrupting and destroying OT
- CI Fortify, isolation and recovery goals for preventing some impact to OT in a crisis or conflict
- How to address connectivity requirements impact on isolation and recovery
►Fireside Chat: How Adversaries Target Manufacturing and Supply Chains
Simon Brady, Event Chairman
Rob Flanders, Head of Threat and Incident Response, BAE Systems
- Against a backdrop of escalating attacks on manufacturing — from ransomware shutting down production lines to coordinated campaigns prompting government intervention and national security warnings — leaders are being forced to rethink the scale, intent, and impact of the threat landscape.
- How are threat actors evolving their tactics and objectives in manufacturing environments, and what are they seeking to achieve beyond disruption?
- What does modern adversary preparation look like in manufacturing networks, and how can organizations detect and disrupt threat activity before it becomes an operational incident?
- How exposed is the extended manufacturing supply chain to coordinated threat campaigns, and where are adversaries most likely to exploit systemic weaknesses?
►Cyber Crisis in Manufacturing: Prioritizing Recovery When Everything Is Critical
Kinga Kertesz-Takacs, Sr. Operational Technology Governance & Compliance Manager, Haleon
- Risk-Based Restoration Sequencing: How to determine what truly needs to come back online first during multi-site disruptions.
- Executive Decision-Making Under Pressure: Strategies for making fast, defensible recovery choices when every system feels mission-critical.
- Building Resilience Before the Crisis: Using governance frameworks to strengthen operational recovery and long-term stability.
►IT/OT Data Convergence and Data Value
Kate Silverman, Deputy CISO, Ardagh Group
- Understand how IT and OT data integration creates unified, real-time operational and business insights.
- Identify practical IT and OT data insights that drive performance, reliability, and efficiency improvements.
- Learn how to evaluate and define measurable data value aligned to business outcomes.
- Explore key data sharing considerations, including governance, ownership, interoperability, and cybersecurity.
- Recognize regulatory and compliance considerations impacting IT/OT data environments.