Agenda

Presentations already confirmed include:


►The Challenge of Securing AI on a global scale

Yair Kler, Vice President, Security Architecture, DHL Group

  • Learn how CISOs can enable responsible AI adoption by advancing innovation without resorting to a blanket “no” while preserving strong security foundations.
  • Understand how FOMO‑driven AI adoption is pressuring enterprises into rapid, high‑risk decisions while bypassing established best practices.
  • Addressing the issue of emerging AI‑specific threat classes such as prompt injection and why they create new risks that remain difficult to mitigate.
  • Recognizing how long‑standing security challenges like secrets management and identity lifecycle governance are re‑emerging with greater complexity in AI‑driven environments.

►Secure Your Supply Chain — Secure Your Organisation

Geoffrey Taylor, Information Security Officer, Nordea Asset management

  • Understanding how rising supply chain attacks threaten organisations and how to prevent supplier compromise
  • Recognising regulatory requirements driving renewed emphasis on effective supply chain management
  • Adopting a proactive, risk-based approach beyond basic compliance to strengthen supply chain resilience

►AI and IT/OT Convergence - When Models Meet Motors: AI at the IT/OT Edge

Adeiza Yisa, Business Information Security Office, Shell

  • Understand what IT/OT convergence really means in practice and what value AI brings to the mix 
  • Learn the key architectural and security considerations for integrating AI with legacy IT/OT convergence
  • Hear about real-world use cases and measurable outcomes

►Panel Discussion: Beyond Compliance — Building Cyber Resilience That Actually Works

Jonathan Armstrong, Partner, Punter Southall Law (Moderator)
Gulnara Hein, CISO, Chintai
Sreedevi Jay, Global Cyber Security Compliance Manager, Amer Sports

  • How do we turn risk appetite statements into real decision levers instead of paperwork?
  • With NIS2 and similar rules, what does “appropriate and proportionate” really mean on the ground — and how can risk management steer the response?
  • Which cyber metrics really matter — and how do we prove our risk posture to the Board, to clients, and across the entire supply chain, right down to nth-party dependencies?
  • How does a resilience-first mindset transform culture — moving from blame and unrealistic prevention to readiness, adaptability, and fast recovery?