Agenda
09.00 - 09.50 |
Breakfast Networking & Registration |
09.50 - 10.00 |
Chair's Welcome |
10:00 - 10:20 |
►Cyber Leadership in an era of Dis-Cooperation William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation
|
10.20 - 10.40 |
►Identity is the new perimeter; combine prevention and recovery to ensure organisational survivability during and after an attack Salvatore Buccoliero, SaaS & Security Technical GTM Lead EMEA, Rubrik
|
10.40 - 11.00 |
►Secure Your Supply Chain — Secure Your Organization Geoffrey Taylor, Information Security Officer, Nordea Asset management
|
11.00 - 11.30 |
Networking break |
11.30 - 12.00 |
►Making UK Aviation Cyber Safe - A Regulator’s Perspective Peter Drissell, Director Aviation Security, UK Civil Aviation Authority
|
12.00 - 12.20 |
►Establishing a Quantum Strategy for Cybersecurity Resilience Matija Matoković, Former Deputy Head Innovation & Lead Quantum Technologies Strategy, NATO
|
12.20 - 13.00 |
►Education Seminar 1 Delegates will be able to choose from a range of topics:
|
13.00 - 14.00 |
Lunch Networking Break |
14.00 - 14.20 |
►Balancing AI security risks and rewards Sebastian Mabillon, CISO and Global Risk Management, Bunker Holding Group
|
14.20 - 14.40 |
►Leveraging a Can-Do Culture to Mitigate the Cybersecurity Talent Shortage Jacob Zwicki, CISO, group.one
|
14.40 - 15.20 |
►Education Seminar 2 Delegates will be able to choose from a range of topics:
|
15.20 - 15.50 |
Networking break |
15.50 - 16.20 |
►Panel Discussion: Securing Future Architectures Simon Brady, Event Chairman (Moderator)
|
16.20 - 16.25 |
Chair's closing remarks |
Education seminars
Securing the Flow of Data in the AI Era
Lars Liljeroth, Solutions Engineer, Netskope
Sensitive data movement is often seen as a risk but restricting it outright can create operational and security challenges. In the era of AI, organisations need security frameworks that protect data while ensuring agility. This session explores how modern security strategies enable secure data flows that defend against AI risk, adapt to real-time risk signals, and turn security into an enabler for innovation with AI.
Attendees will learn:
How to enable data flows without introducing escalating security risks
- Why security must be adaptive to risk, user behaviour, and AI-driven interactions
Turn Right to Turn Left with Contrast ADR”: Block attacks in production while informing development about the underlying vulnerabilities with full context
James Fenton, Senior Regional Sales Manager UK, Contrast Security
Taylor Mowat, Senior Solutions Engineer, Contrast Security
In a world where attackers exploit production logic in real time, companies face a widening gap between risk and reality. Tier 2 and 3 apps are left exposed. The traditional AppSec playbook—scan early, scan often, drowning in results—no longer scales. In this interactive session, James Fenton & Taylor Mowat unpack how Application Detection and Response (ADR) gives a new way to think about application security—one that’s real-time, risk-aligned, and finally developer-friendly. We will share stories from the field, bust a few myths about shift-left security, and offer a practical framework for CISOs and architects to rethink where and how they apply controls in an AI-native SDLC.
Attendees will learn:
- A view of what the WAF misses and why ADR makes the difference
- Practical guidance for reducing noise, closing legacy gaps, and defending Tier 2/3 apps
- A security narrative that developers, risk officers, and regulators can finally agree on
AI-Powered DAST with ASPM: Smart and Scalable Application Security
Alex Smethurst, Western Europe Channel Account Manager, Invicti Security
In today’s fragmented application security landscape, organisations face an overwhelming array of tools. Dynamic Application Security Testing (DAST) offers a scalable approach through analysing applications via real runtime traffic. AI-driven enhancements further refine — and improve — the process through context-aware detection that bolsters accuracy and delivers actionable results. Speaking of excessive noise traffic... through the integration of Application Security Posture Management (ASPM), teams can correlate findings across various tools and environments. This level of centralisation under one platform empowers security teams to focus on the risks that truly matter.
Attendees will learn:
- Why DAST reveals what could be hacked, not just what can
- The value of DAST over SAST, SCA and other AppSec tools
- How AI increases vulnerability detection rates through enhanced crawling mechanisms
- How Invicti ASPM centralizes, prioritizes and automates your workflow
Hacking the Media: The PR Tactics of Cyber Criminals
Julius Nicklasson, Sales Engineer, Recorded Future
This presentation analyses the direct and indirect engagement strategies cyber criminals use to bolster their reputation, increase extortion pressure on victims, and demand more money for stolen data. Defenders can mitigate the impact of these publicity tactics through preparing an intelligence-led incident response plan that includes external communications strategies.