Agenda

08:00 - 08:50

Registration and Breakfast Networking 

08:50 - 09:00

Chairman's Welcome 

09:00 - 09:20

►Building an adaptive Cybersecurity function

Mario Beccia, Deputy CIO for cybersecurity, NATO

  • The threat picture and the challenge of constant adaptation
  • Planning your next Cybersecurity incident: infrastructure Resilience, Scalability and Simplification
  • Embracing Emerging Technologies
  • The Changing Role of the Blue Team
09:20 - 09:40

►Future-Proofing Europe: The Next Era of Cybersecurity? 

Thomas Zaatman, Director of Strategic Accounts, Tanium

  • The importance of proactive measures to protect digital assets and highlight the role of people, processes, and technology in this endeavour. 
  • Insights into the future challenges and opportunities in cybersecurity and how organisations can effectively address them.
  • The growing demand for skilled cybersecurity professionals and the necessity of continuous education and training to stay ahead of cyber threats.
  • The significance of implementing preventative and comprehensive strategies such as zero-trust security models to ensure compliance with regulations and standards. 
  • The role of AI and ML in enhancing cybersecurity through real-time threat detection, predictive analysis, and automated security operations.

 

09:40 - 10:00

►The Complexity Conundrum: Three Steps to Simplifying Security Complexity

Elliott Went, Senior Solutions Engineer, UKI, SentinelOne

  • The security complexity challenges of today.
  • Your complexity is leaving you vulnerable. A deep dive in today’s existing threat landscape.
  • Simplifying the complexity: Reducing risk across Endpoint, Identity, Cloud Surfaces and more.
  • Simplification starts with these three key actions.
     
10:00 - 10:20

►Fireside chat: Integrating Cybersecurity into Mergers, IPOs, and ESG Strategies

Ian Dalby, Global Head of GRC, A&O Shearman
Simon Ashworth, MD, Chief Analytical Officer – Insurance Ratings and Cyber Lead, S&P Global Ratings 

  • How do companies prioritise cybersecurity due diligence, and what specific metrics or risks are most critical, when planning a merger or IPO
  • What role do cybersecurity audits and due diligence play in the preparation phase for mergers and IPOs?
  • How can companies identify and mitigate cyber risks that could impact valuation or delay the IPO/merger process?
  • How does cybersecurity intersect with ESG criteria, and why is it crucial for integrating cybersecurity practices into ESG strategies?
  • How are investors and stakeholders increasingly viewing cybersecurity as a critical component of a company’s ESG performance, and are current regulations effective in deterring non-compliance?
  • How do you align and integrate cybersecurity practices post-merger
10.20 - 11:00

► Education Seminar 1

Delegates will be able to choose from the following education seminars:

  • Hackers don’t Hack in – They Log In. How to Combat the Threat of Identity Compromise, Lee Elliott, Director, Solutions Engineering, BeyondTrust
  • Securing Microsoft Copilot: Preventing Prompt-Hacking and Data Exposure, William Priestley, Sales Engineer Manager, Varonis
  • Go on the Offensive by Merging AI and Human Expertise for Email Security, Paul Clark, Head of Sales, EMEA, Ironscales 
  • How to become proactive and stay ahead of the AI threat curve, Prash Somaiya, CTO, Hadrian
  • Strengthening Security through Simplification: Micro-Segmentation with a Multi-Layered Defence, Richard Meeus, EMEA Director of Security Technology and Strategy, Akamai & Brett Ayres, VP of Product, Teneo
  • Skill Up Your Security: How Defenders Can Harness AI, Billy McDiarmid, Sr Director of Sales Engineering, Red Sift
     
11:00 - 11:30

Networking Break

11:30 - 11:50

►Resourcing priorities in Third-Party Risk Management and Supply Chain Security

Sarah Lawson, CISO &  Deputy CIO, University College London 
Clair Phelps, CISO, Wagestream
Mark Logsdon, CISO, NHS England 
Gavin Cartwright, Tech Consulting Lead (TMT), EY

  • Identifying, risk assessing and screening critical vendors – a job for who?
  • Defining contractual obligation: how do you enforce your security requirements, standards and data handling practices?
  • Approaches to continuous vendor monitoring: dealing with problem third-parties
  • Incident Response Planning and managing third-party breaches
  • What about security vendors?
     
11:50 - 12:10

►How To Create Successful Malware and Defend with Zero Trust

Seamus Lennon, Vice President of Operations for EMEA, ThreatLocker

  •  In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. 
  • Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.
     
12:10 - 12:30

►Addressing Today’s Biggest Cybersecurity Gap: The Human Risk Factor

Glenn Smith, Principal Sales Engineer, Mimecast

  • Research shows 8% of employees are responsible for 80% of security incidents. Human risk remains the leading contributor to security breaches, with individuals facing increasingly tailored and frequent attacks. 
  • This session will cover:
    • How to transform your strategy to address human risk.
    • Approaches to mitigate human risk in the current threat landscape.
    • Adopting a human-centric approach to cybersecurity.
       
12:30 - 12:50

►Response and Responsibility – this time it’s a thriller, not a romantic comedy.

James Eason, CRA Practice Lead, Integrity360

  • James Eason, Practice Lead for Cyber Risk at Integrity360, tackles the often-overlooked gap between cybersecurity teams and corporate leadership. 
  • He highlights the need for businesses to integrate cyber risk into boardroom discussions, sharing real-world stories of extortion, insider threats, and governance failures. 
  • With a call to action for CEOs and CISOs to close the communication gap, Eason emphasises that strong cyber governance isn't just a tech issue—it's key to business survival and reputation, and an under-rated business-enabler.
     

 

12:50 - 13:30

► Education Seminar 2

Delegates will be able to choose from the following education seminars:

  • ITDR that works for you - challenges and how to manage them, Anthony Moillic, Field CISO, Netwrix Corporation
  • How Non-Human Identities Create Operational and Cyber Risk for Organisations, Peter Batchelor, UK&I Regional Director, Silverfort & Al Scott, Senior Sales Engineer EMEA, Silverfort
  • Is Data Security Sexy Again – What Does the Future Hold, Tim Ayling, VP EMEA Cyber Security Specialists, Thales
  • Browser security – the proven prevention layer for enterprise cybersecurity, Brett Raybould, Director, Solutions Engineering , Menlo Security 
  • Thinking Like a Cybercriminal, Etay Maor, Chief Security Strategist, Founding Member of Cato CTRL, Cato Networks
  • AI-Powered Cybersecurity: Combating Emerging Threats in the Era of Generative AI, Richard Orange, Regional Vice President of EMEA, Abnormal Security 
13:30 - 14:30

Lunch Networking Break

10:00 - 10:20

►Can The AI (R)evolution help security leaders to manage complexity?

Andy Giles, Executive Director, Head of Intelligence Integration, JPMorgan Chase

  • Observations of threats using AI for fraud and malware development 
  • Foundations for effective AI/LLM use, focusing on the importance of a working security data model and appropriate sources
  • Potential for AI application in the security risk management context to keep up with the threat
  • Importance of training and AI prompt competence
  • Personal reflections
14:50 - 15:10

►Security Culture Eats Human Risk for Breakfast

Noora Ahmed-Moshe, VP of Strategy and Operations, Hoxhunt

  • Learn how applying behavioural science and positive psychology fosters a thriving security culture that protects you even against today’s AI-driven threats. 
  • Transforming culture and habits requires addressing people’s knowledge, behaviour, and attitudes, and that’s hard — but measurably doable, at last. 
  • Unravelling the mysteries of human behaviour lets you unlock a level of human risk management well beyond traditional security awareness.
  • Discover how to foster engagement, turn security from a mandate into a mindset, and transform your employees from your greatest risk into your greatest resource.
15:10 - 15:30

►The Correlation Between Dark Web Exposure and Cybersecurity Risk

Dave Osler, Head of Product, Searchlight Cyber

  • The presentation of a landmark study conducted by the Marsh McLennan Cyber Risk Intelligence Center and Searchlight Cyber.
  • Research conclusively demonstrating the correlation between an organization’s dark web exposure and cybersecurity risk, based on a sample cyber insurance loss data from more than nine thousand organizations.
  • Explanation of different types of dark web exposure and their relative impact on cybersecurity risk both individually and in combination.
  • Advice on mitigating dark web exposure and cybersecurity risk.
15:30 - 16:00

Networking Break

16:00 - 16:30

►Maximising the value of threat intelligence

Parul Khedwal, Security Operations Lead, Trainline
Evie Wild, Information Security Officer, EMEA Region, LBBW Bank 
Goher Mohammad, Group Head of InfoSec, L&Q Group 
Valentina Soria, Global Head of Cyber Threat Intelligence, UBS

  • Paid versus free: where to spend on threat intel
  • Data overload or actionable insights? Threat intel and the false positives problem
  • The role of AI in extracting the most from threat intel
  • Linking enterprise threat intelligence and the business
16:30 - 16:55

►LIVE DEMONSTRATION: Weaponising AI: Voice Phishing with AI (Social Engineering 2.0)

Manit Sahib, Ethical Hacker, The Global Fund

  • Overview: How AI is being weaponised in the wild for malicious activities.
  • Use-Cases: How to weaponise AI for your own Offensive Operations.
  • Weaponising AI for Cyber Attacks: AI Vishing (AI Voice Phishing):
  • Exploring the new Social Engineering 2.0 technique, AI generated calling Agent (AVA) for Vishing. Trained with Rejection handling.
  • Live Demonstration: AI Vishing in action. Volunteers? Be ready to come on stage.
     
16:55 - 17:00

Chairman's Closing Remarks 

17:00 - 18:00

Drinks Reception

Education seminars


Strengthening Security through Simplification: Micro-Segmentation with a Multi-Layered Defence


Richard Meeus, EMEA Director of Security Technology and Strategy, Akamai

Brett Ayres, VP of Product, Teneo

Attendees will learn:

  • Introduction to Micro-Segmentation: Understanding how Akamai Guardicore's micro-segmentation technology reduces complexity by isolating and protecting critical assets within the network, minimising attack surfaces.
  • Integration with Multi-Layered Defence: Exploring the role of Guardicore Micro-Segmentation in a comprehensive, simplified cyber defence model, complementing other security layers for enhanced protection.
  • Simplifying Policy Management: Demonstrating how Guardicore's centralised policy management streamlines security operations, reducing administrative burden and minimising the risk of misconfigurations.
  • Real-World Applications: Case studies showcasing the effectiveness of Guardicore Micro-Segmentation in preventing lateral movement and mitigating the impact of breaches in diverse environments.
  • Future-Proofing Cybersecurity: Discussing the scalability and adaptability of the multi-layered defence model with pro-active micro-segmentation in addressing emerging threats, ensuring long-term security with reduced complexity.

Go on the Offensive by Merging AI and Human Expertise for Email Security


Paul Clark, Head of Sales, EMEA, Ironscales 

AI-driven technologies like GenAI and deepfakes are creating challenges that IT Security and MSP leaders can’t afford to ignore. The surge in AI-powered attacks means traditional defenses used by most organizations are no longer enough. Attackers are stepping up their game, crafting hyper-realistic, personalized attacks that are nearly indistinguishable from the real thing—and it’s only going to get more intense as these tools evolve.

So, how do we fight back? In this session, we’ll explore how to rethink your approach, using AI to combat AI and keep pace with these threats. We’ll also touch on how a "red team/blue team" strategy can help you stay one step ahead, leveraging AI to anticipate future attacks, arm your defences, and proactively mitigate them. 
 
Attendees will learn:

  • How email security has evolved in the last decade  
  • How AI is transforming traditional email security approaches 
  • Integrating human insight with AI algorithms 
  • Leveraging AI to create highly accurate and dynamic phishing simulations 
  • The benefits of a holistic approach to secure law firms 
     

Hackers don’t Hack in – They Log In. How to Combat the Threat of Identity Compromise


Lee Elliott, Director, Solutions Engineering, BeyondTrust

The world of cyber security is changing, with more dynamic highly connected systems than ever. With an explosion of apps, accounts and access, the battleground has shifted from traditional perimeter and endpoint security into the world of identity security, effectively meaning the hacker has been replaced by the credentials thief. With Identity compromise common to almost every cyber-attack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today this is effectively making identity the new security perimeter. Join the discussion with Lee as he shares what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools.

Attendees will learn:

  • How the threat landscape is evolving
  • Real world examples of identity breaches
  • How attackers are exploiting hidden paths to privilege
  • How controlling identities and privileges can be your greatest defence

How Non-Human Identities Create Operational and Cyber Risk for Organisations


Peter Batchelor, UK&I Regional Director, Silverfort
Al Scott, Senior Sales Engineer EMEA, Silverfort

Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.

Attendees will learn:

  • Understand why Non-Human Identities should be a top priority for your board
  • Learn about how to measure and detect the level of risk Non-Human Identities pose for your organisation
  • Grow your knowledge of how to mitigate the risk of Non-Human Identities, before, during and after a cyber breach

ITDR that works for you - challenges and how to manage them


Anthony Moillic, Field CISO, Netwrix Corporation

84% of organisations have suffered identity breaches in the past year.
In these attacks, threat actors assume the identity of a legitimate user to compromise systems, move laterally in networks and gain higher levels of access. But these threats are difficult to detect because traditional tools lack the ability to distinguish between a legitimate user and a malicious actor.
Therefore, to protect their sensitive data and mission-critical systems, organisations need a comprehensive Identity Threat Detection and Response (ITDR) approach.

Attendees will learn:

  • About the challenges of trying to counter modern attacks and the solutions to help you do so, including Netwrix recent acquisition, PingCastle

Securing Microsoft Copilot: Preventing Prompt-Hacking and Data Exposure


William Priestley, Sales Engineer Manager, Varonis

Microsoft Copilot has been called one of the most powerful productivity tools on the planet, taking drudgery out of daily work. But Copilot is a different beast than ChatGPT and other AI tools because it has access to everything you’ve ever worked on in Microsoft 365, and therein lies the hidden risks for information security teams.

Attendees will learn:

  • We’ll show you just how easily your company’s sensitive data can be exposed using Microsoft Copilot with simple prompts. 
  • Our team will then share practical steps and strategies to ensure a secure Microsoft Copilot rollout and prevent prompt-hacking data exposure.

Is Data Security Sexy Again – What Does the Future Hold


Tim Ayling, VP EMEA Cyber Security Specialists, Thales

  • What is powering the drive for better data security?
  • Where does this leave current data security?
  • How do we address these challenges?
  • How does the future look?
     

Skill Up Your Security: How Defenders Can Harness AI


Billy McDiarmid, Sr Director of Sales Engineering, Red Sift

  • Learn how to enhance LLMs for threat detection and faster security issue resolution.
  • Discover how Red Sift Radar integrates intelligence and automation into workflows.
  • Gain insights on closing security gaps with real-time, actionable data.
  • Explore practical ways to automate security processes with LLMs.
  • See how Radar empowers teams to tackle security issues 10x faster.

How to become proactive and stay ahead of the AI threat curve


Prash Somaiya, CTO, Hadrian

Organizations’ attack surfaces, IT complexity, and reliance on third parties have increased exponentially, making effective security governance and operations a significant challenge. Meanwhile, the frequency and damage of attacks are increasing, making reactive security strategies are no longer economically viable. 

Attendees will learn:

  • AI is being used to accelerate the development of exploits leading to faster development.
  • An analysis of vulnerabilities and exploits that challenge the scale and speed of traditional security operations.
  • Security strategies need to transform and focus on proactive and pre-emptive measures.
  • Recommendations for modernizing your vulnerability management program with offensive security.

AI-Powered Cybersecurity: Combating Emerging Threats in the Era of Generative AI


Richard Orange, Regional Vice President of EMEA, Abnormal Security

Richard Orange, Regional Vice President of EMEA at Abnormal Security, will explore how the rise of generative AI is transforming both the business and threat landscapes. As AI continues to drive innovation, cybercriminals are using these advancements to launch more sophisticated, high-volume attacks. This session will uncover the real-world threats organizations face today and demonstrate how AI can be leveraged to effectively counter these evolving cyber risks.

Attendees will learn:

  • The role of generative AI in advancing both innovation and cybersecurity threats.
  • Real-world examples of AI-driven attacks and their impact on organizations.
  • How AI can be harnessed to detect and neutralize sophisticated cyber threats.
  • Best practices for securing your organization in a rapidly changing threat landscape.

Thinking Like a Cybercriminal


Etay Maor, Chief Security Strategist, Founding Member of Cato CTRL, Cato Networks

We hear them in many cyber security presentations. They are so integrated into marketing campaigns, websites, interviews and product pitches that they have effectively become a universally agreed upon "truth". Cyber security myths. Not only are they incorrect but they can be downright dangerous.

In this session we will take several of these extremely popular "truths", explain their origin and how they got to where they are today and then, more importantly, bust these myths using examples from security incidents and recent security research. “Attackers need to be right just once and the defenders need to be right all the time”? “More security products mean better security”? “Sophisticated threat actors use sophisticated tools”? I don’t think so…
See how threat actors evade security controls, processes, and tools

Attendees will learn:

  • How threat actors evade security controls
  • The state of adversarial AI - using, targeting and abusing AI systems
  • Learn how to implement a multi-chokepoint approach to the attack killchain
  • Understand how to gain visibility into suspicious network activity
  • Busting cybersecurity myths

Browser security – the proven prevention layer for enterprise cybersecurity


Brett Raybould, Director, Solutions Engineering , Menlo Security

According to Google, 98% of attacks originate from internet usage and 80% of those target end user browsers – sadly all too successfully. Combine this stark reality, with users’ relentless demand for new SaaS and private applications, often collaborating with external stakeholders, and security pros are always running to stand still.

Attendees will learn:

  • Security – The proven value of robust browser security across managed and unmanaged devices – automating browser configuration and establishing enhanced browser forensics.
  • Connectivity – Your users and third parties need access to SaaS applications, private web apps and data, including the use of GenAI. We share how organisations are enhancing user protection and productivity while reducing the cost and complexity of solutions such as VDI.
  • Compliance – How browser security supports organisations striving to comply with key NIS 2 requirements for incident management and prevention 
  • We will provide real world examples and case studies of how to increase cyber prevention through improved browser security.