Agenda

09.00 - 09.50

Breakfast Networking & Registration

09.50 - 10.00

Chair's Welcome

10:00 - 10:20

►Cyber Leadership in an era of Dis-Cooperation

William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation

  • How global trade fragmentation impacts the community
  • How the "America First" Foreign Policy is leading to cyber instability
  • Actions the Cyber C-Suite can take
10.20 - 10.40

►Identity is the new perimeter; combine prevention and recovery to ensure organisational survivability during and after an attack

Salvatore Buccoliero, SaaS & Security Technical GTM Lead EMEA, Rubrik

  • Data & Identity Focus: How to implement robust cyber-recovery and threat containment across your data and identity estate
  • Beyond prevention: Ensure rapid response and recovery to minimise downtime and business disruption
  • Stay operational under attack: How zero-trust architecture helps you maintain control and protect critical data – even during ransomware events
10.40 - 11.00

►Secure Your Supply Chain — Secure Your Organization

Geoffrey Taylor, Information Security Officer, Nordea Asset management

  • Understanding how rising supply chain attacks threaten organisations and how to prevent supplier compromise
  • Recognising regulatory requirements driving renewed emphasis on effective supply chain management
  • Adopting a proactive, risk-based approach beyond basic compliance to strengthen supply chain resilience
11.00 - 11.30

Networking break

11.30 - 12.00

►Making UK Aviation Cyber Safe - A Regulator’s Perspective 

Peter Drissell, Director Aviation Security, UK Civil Aviation Authority

  • How regulators are developing cyber security oversight in aviation

  • Achieving effective and resilient cyber security across civil aviation

  • The regulator’s evolving role – enabling rather than obstructing

  • Key challenges and opportunities that lie ahead

12.00 - 12.20

►Establishing a Quantum Strategy for Cybersecurity Resilience

Matija Matoković, Former Deputy Head Innovation & Lead Quantum Technologies Strategy, NATO

  • Quantum Race & Geopolitics — Global strategies and accelerating timelines

  • Business Impact — Why quantum risk must be in corporate resilience planning

  • Market Landscape — Vendor maturity, offerings, and funding trends

  • Action Steps — Building a concrete quantum strategy for defense and opportunity

12.20 - 13.00

►Education Seminar 1

Delegates will be able to choose from a range of topics:

  • Securing the Flow of Data in the AI Era, Lars Liljeroth, Solutions Engineer, Netskope
  • Hacking the Media: The PR Tactics of Cyber Criminals, Julius Nicklasson, Sales Engineer, Recorded Future
13.00 - 14.00

Lunch Networking Break

14.00 - 14.20

►Balancing AI security risks and rewards

Sebastian Mabillon, CISO and Global Risk Management, Bunker Holding Group 

  • AI and the risk landscape - How generative AI is reshaping the attack surface and impacting businesses that rely on digital trust

  • Standards that matter - Which frameworks and guidelines can help manage AI risks effectively

  • AI as an ally - How AI tools can strengthen our risk management capabilities

14.20 - 14.40

►Leveraging a Can-Do Culture to Mitigate the Cybersecurity Talent Shortage

Jacob Zwicki, CISO, group.one

  • Understanding how the shortage is about missing skills, not just headcount
  • How a can-do culture helps teams offset workforce gaps
  • Adopting transformational leadership to drive growth and resilience
14.40 - 15.20

►Education Seminar 2

Delegates will be able to choose from a range of topics:

  • Turn Right to Turn Left with Contrast ADR”: Block attacks in production while informing development about the underlying vulnerabilities with full context, James Fenton, Senior Regional Sales Manager UK, Contrast Security  & Taylor Mowat, Senior Solutions Engineer, Contrast Security
  • AI-Powered DAST with ASPM: Smart and Scalable Application Security, Alex Smethurst, Western Europe Channel Account Manager, Invicti Security
15.20 - 15.50

Networking break

15.50 - 16.20

►Panel Discussion: Securing Future Architectures

Simon Brady, Event Chairman (Moderator)  
Thomas Stig Jacobsen, CISO, Manager, Head of Security & Compliance Technology, Danske Commodities 
Carl Peter McCollough, Senior Cybersecurity Architect, Saxo Bank 
William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation 
Christian Leth, Head of Information Security, SOS International A/S

  • How can security teams design resilient architectures to integrate and leverage emerging technologies such as AI, quantum computing, and IoT
  • What role does AI play in developing proactive rather than reactive security strategies?
  • What are the best practices for integrating AI without disrupting legacy systems and existing workflows?
  • How can organisations implement zero-trust principles and adaptive access controls to secure ever-evolving environments driven by AI and edge computing?
16.20 - 16.25

Chair's closing remarks

Education seminars


Securing the Flow of Data in the AI Era


Lars Liljeroth, Solutions Engineer, Netskope

Sensitive data movement is often seen as a risk but restricting it outright can create operational and security challenges. In the era of AI, organisations need security frameworks that protect data while ensuring agility. This session explores how modern security strategies enable secure data flows that defend against AI risk, adapt to real-time risk signals, and turn security into an enabler for innovation with AI.

Attendees will learn:

  • How to enable data flows without introducing escalating security risks

  • Why security must be adaptive to risk, user behaviour, and AI-driven interactions

Turn Right to Turn Left with Contrast ADR”: Block attacks in production while informing development about the underlying vulnerabilities with full context


James Fenton, Senior Regional Sales Manager UK, Contrast Security 
Taylor Mowat, Senior Solutions Engineer, Contrast Security

In a world where attackers exploit production logic in real time, companies face a widening gap between risk and reality. Tier 2 and 3 apps are left exposed. The traditional AppSec playbook—scan early, scan often, drowning in results—no longer scales. In this interactive session, James Fenton & Taylor Mowat unpack how Application Detection and Response (ADR) gives a new way to think about application security—one that’s real-time, risk-aligned, and finally developer-friendly. We will share stories from the field, bust a few myths about shift-left security, and offer a practical framework for CISOs and architects to rethink where and how they apply controls in an AI-native SDLC.

Attendees will learn:

  • A view of what the WAF misses and why ADR makes the difference 
  • Practical guidance for reducing noise, closing legacy gaps, and defending Tier 2/3 apps
  • A security narrative that developers, risk officers, and regulators can finally agree on

AI-Powered DAST with ASPM: Smart and Scalable Application Security


Alex Smethurst, Western Europe Channel Account Manager, Invicti Security

In today’s fragmented application security landscape, organisations face an overwhelming array of tools. Dynamic Application Security Testing (DAST) offers a scalable approach through analysing applications via real runtime traffic. AI-driven enhancements further refine — and improve — the process through context-aware detection that bolsters accuracy and delivers actionable results. Speaking of excessive noise traffic... through the integration of Application Security Posture Management (ASPM), teams can correlate findings across various tools and environments. This level of centralisation under one platform empowers security teams to focus on the risks that truly matter.

Attendees will learn:

  • Why DAST reveals what could be hacked, not just what can
  • The value of DAST over SAST, SCA and other AppSec tools
  • How AI increases vulnerability detection rates through enhanced crawling mechanisms
  • How Invicti ASPM centralizes, prioritizes and automates your workflow

Hacking the Media: The PR Tactics of Cyber Criminals


Julius Nicklasson, Sales Engineer, Recorded Future

This presentation analyses the direct and indirect engagement strategies cyber criminals use to bolster their reputation, increase extortion pressure on victims, and demand more money for stolen data. Defenders can mitigate the impact of these publicity tactics through preparing an intelligence-led incident response plan that includes external communications strategies.