Agenda

Presentations already confirmed include:


► Technology as a Squid That Lost its Shell

Simon Goldsmith, Director of Information Security, OVO Energy

Discover why the traditional "fortress" model of cybersecurity failed in our cloud-native, interconnected world

Learn from Jurassic squid how to evolve beyond a rigid perimeter by developing three dynamic capabilities.

Explore a practical blueprint for this evolution, redefining what we protect (from "people" to "identities") and splitting our response into two distinct, high-velocity workflows for attacks and weaknesses.

Understand how to reset your operating model, transforming security from a reactive gatekeeper into a proactive enabler that builds "paved roads" to make the secure way the easy way.


► Enterprise Security Architecture: Huh? What’s That?

Sam Rea, Head of Enterprise Security Architecture, Bupa Group

The importance of an integrated Enterprise Security Architecture (ESA) in aligning security with business goals and strategy technology planning and delivery.

Establishing a common language and reference architecture that can be used by all technology and security professionals.

Improving your organisation's security posture while aligning with industry recognised security frameworks and governance best practices.

Driving change within your organisation by building a cross-discipline community to democratise security design knowledge, improving consistency and reducing reliance on individual security SMEs.


►From Reaction to Resilience: A New Path for Privileged Access

Rob Ainscough, Chief Identity Security Advisor, Silverfort

  • Understand why traditional Privileged Access Management (PAM) methods fall short in today’s evolving cyber threat landscape

  • Explore a modern, identity-centric approach that builds resilience at the core—moving from reactive controls to proactive defence

  • Learn about an agentless, continuous strategy for detecting and preventing privileged identity misuse in hybrid and cloud environments

  • Discover how to reduce attack surfaces, enforce adaptive access policies, and gain granular visibility—without disrupting operational workflows.


►Panel Discussion: Ransomware 360°: From First Click to Final Recovery

Simon Brady, Event Chairman (Moderator)

Joe Tidy, Reporter, Presenter & Author, BBC

Steve Davies, Head of Cyber Security, DLA Piper

What’s the smartest social engineering ploy you’ve seen lately — and why did it work?

When ransomware hits, where’s the biggest choke point?

Is paying ever OK — and when?

Where’s the bigger risk — your systems, your suppliers or teenage kids?

With limited budget, do you back prevention, detection, recovery, or training?


►Unified Human Risk Management: Connecting the Dots Between Technology, People, and Data

Khetan Gajjar, EMEA CTO, Mimecast

  • Explore how a unified Human Risk Management (HRM) strategy can bridge the gap between external threats and internal vulnerabilities

  • Discover actionable insights to strengthen your organisation’s cyber resilience by leveraging cutting-edge AI, automation, and contextual education to reduce risks and streamline security operations

  • Demonstrate how they can integrate email security with insider risk management to protect sensitive data, ensure compliance across collaboration platforms, and proactively educate employees to foster a culture of cyber awareness

  • Walk away with strategies to simplify operations, minimise incident response times, and stay ahead of emerging threats.

Education seminars


Beyond Privileged Accounts: Identity Security for Today’s Dynamic World


Lee Elliott, Senior Director of Solutions Engineering, BeyondTrust

Even with growing budgets and stricter compliance mandates, cyber risk is still on the rise. Identities are a top target, with attackers exploiting hidden Paths to Privilege™ to gain access. Managing elevated permissions across hybrid environments is complex, and traditional PAM tools—focused only on privileged accounts—often leave gaps. This session will look at how modern, identity-focused PAM secures all users, reduces risk, and simplifies access to keep your organization both protected and productive.