Securing Retail Summit

Securing a moving target: can CISOs keep up with retail innovation? 

16th June, 2026 • Online

In a hyper-connected, hyper-competitive sector, how can security teams keep the business safe without shutting it down?

 

Securing innovation, securing Al, keeping the customer 

After 2025, what do retailers face in 2026? Not just more of the same, but increasingly sophisticated, Al-driven attacks on hyper-connected supply chains and their own agentic Al systems. 

Retailers have always had to deal with one of the most difficult cybersecurity challenges: retail is at the cutting edge of innovation in everything from payments to virtual reality clothes try-ons. But in a hyper-competitive sector where customer behaviours force constant adoption of the latest tech, security teams can find it almost impossible to keep up. 

2026 will be no different. Agentic Al is redefining retail right now. Unlike traditional automation or generative Al, these autonomous systems don't wait for prompts - instead, they plan, act and learn continuously. Agentic Al monitors data, spots opportunities and executes tasks within set parameters. For consumers, this means a shift from passive browsing to proactive, personalised shopping. Platforms like Google and Microsoft now offer 

Al agents that compare prices, build baskets and even complete purchases with consent.

Behind the scenes, retailers are using the technology to optimise inventory, adjust pricing in real time and detect issues before they escalate - freeing teams to focus on strategy and boosting margins. Analysts forecast agentic commerce could generate $3-5 trillion in retail value by 2030, accounting for up to 20% of e-commerce spend. 

Social-commerce platforms go one step further, analysing behaviour to surface the right product at the right time. This has fuelled a sharp rise in channels like TikTok Shop, an in­-app e-commerce feature that lets users buy products directly within the app, which saw its sales increase 55% year-on-year in the UK in December 2025. 

For retailers, the challenge is clear: adapt fast or risk falling behind in an Al-orchestrated marketplace. 

So, how to secure this latest surge of new technology while you probably haven't finished ensuring that existing systems are as secure as they could be? And how serious is the threat to these new systems from external attackers, including those using offensive Al? And how well are security vendors incorporating Al into their products to help? 

It's clear that retailers that treat cybersecurity as a core business function, aligning security with their insurance policies and business operations, will be better positioned to navigate these intensified threats. What is not so clear is what retailers should do to make that ideal a reality. 

They need partners. They need help from their peers. And they need a trusted space to find them. That's why we are running the e-Crime & Cybersecurity Retail Summit. 


The e-Crime & Cybersecurity Retail Summit will take place online and will look at how cybersecurity teams are tackling these challenges. Join our real-life case studies and in-depth technical sessions and help make manufacturing secure. 

 

The Securing Retail Summit will cover critical topics such as...

 

Achieving visibility across ecosystems
From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape is a huge challenge. Can you help with asset tracking and endpoint visibility? And what about anomaly detection after that? 

Data integrity a critical priority
In Al-powered retail, corrupted data equals corrupted decisions. Pricing engines, demand forecasts and recommendation systems are only as trustworthy as their inputs. CISOs must prioritise data lineage tracking, tamper detection, pipeline validation and cryptographic integrity controls across analytics and Al workflows.

Defending against the latest ransomware variants 
Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes. The threat and the actors are constantly evolving and that evolution is forcing the hands of government and causing havoc in the insurance market. What can CISOs do to better defend against ransomware? 

Securing Agentic Al 
Agentic systems don't just generate content - they act. CISOs must address model manipulation, prompt injection, data poisoning, tool-chain abuse and privilege escalation within Al agents executing transactions. Governance must extend beyond ML pipelines into runtime controls, behavioural monitoring and kill-switch design.

Why zero trust, isolation and segmentation are key 
Retail ecosystems now include logistics APls, fintech integrations, marketplace sellers, social-commerce platforms and Saas pricing engines. Each connection expands attack surface. Continuous third-party risk scoring, API security testing, software bill of materials (SBOM) validation and zero-trust segmentation become foundational, not optional. 

From Analysts to Al Supervisors 
Retail security teams cannot scale headcount at the pace of digital transformation. The future SOC blends automation engineers, detection scientists and Al risk specialists. Peer collaboration, shared intelligence and trusted industry forums become force multipliers in defending fast-moving retail environments. 

Making the best use of threat intelligence 
In a pre-emptive security model, timing is everything - success depends on detecting and neutralizing threats before they become active incidents. To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs). They need external, real-time context about emerging threats - where do they get it? 

Security Posture Management 
Traditional vulnerability scanners don't handle cloud native architectures well. Today's cloud environments spin up thousands of ephemeral assets without a traditional OS, without an IP address for long. So how do you adapt to that dynamic, APl-driven reality? How can traditional tools connect the dots - not just generate tickets? 

Improving continuous attack surface discovery 
You need to know what attackers can see and what they can actually attack -and you need it on a continuous basis, not in some static inventory. Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context. Is this feasible and is it cost effective? 

The power of automation 
There's too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APls, ticketing systems threat intelligence feeds, and even email servers and coordinates actions across tools via APls and prebuilt integrations and intelligent playbooks. Well, that's the theory. How does it work in the real world? 

Adversary simulation and behavioural analysis 
Automated adversary simulation identifies telemetry blind spots. They provide prioritized remediation guidance and control effectiveness metrics. They track progress trends and validate security ROls as well as providing board and audit reporting. How well do they work in practice? 

Dealing with regulations 
CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands; they must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret differently later; they face unrealistic expectations around incident reporting; and they face personal liability. Can RegTech help? 

  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape is a huge challenge. 
    • Can you help with asset tracking and endpoint visibility? 
    • And what about anomaly detection after that? 
  • Data integrity a critical priority

    • In Al-powered retail, corrupted data equals corrupted decisions. 
    • Pricing engines, demand forecasts and recommendation systems are only as trustworthy as their inputs. 
    • CISOs must prioritise data lineage tracking, tamper detection, pipeline validation and cryptographic integrity controls across analytics and Al workflows.
  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes. 
    • The threat and the actors are constantly evolving and that evolution is forcing the hands of government and causing havoc in the insurance market. 
    • What can CISOs do to better defend against ransomware? 
  • Securing Agentic Al

    • Agentic systems don't just generate content - they act. 
    • CISOs must address model manipulation, prompt injection, data poisoning, tool-chain abuse and privilege escalation within Al agents executing transactions. 
    • Governance must extend beyond ML pipelines into runtime controls, behavioural monitoring and kill-switch design.
  • Why zero trust, isolation and segmentation are key

    • Retail ecosystems now include logistics APls, fintech integrations, marketplace sellers, social-commerce platforms and Saas pricing engines. 
    • Each connection expands attack surface. 
    • Continuous third-party risk scoring, API security testing, software bill of materials (SBOM) validation and zero-trust segmentation become foundational, not optional.
  • From Analysts to Al Supervisors

    • Retail security teams cannot scale headcount at the pace of digital transformation. 
    • The future SOC blends automation engineers, detection scientists and Al risk specialists. 
    • Peer collaboration, shared intelligence and trusted industry forums become force multipliers in defending fast-moving retail environments. 
  • Making the best use of threat intelligence

    • In a pre-emptive security model, timing is everything - success depends on detecting and neutralizing threats before they become active incidents. 
    • To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs). 
    • They need external, real-time context about emerging threats - where do they get it? 
  • Security Posture Management

    • Traditional vulnerability scanners don't handle cloud native architectures well. 
    • Today's cloud environments spin up thousands of ephemeral assets without a traditional OS, without an IP address for long. 
    • So how do you adapt to that dynamic, APl-driven reality? 
    • How can traditional tools connect the dots - not just generate tickets? 
  • Improving continuous attack surface discovery

    • You need to know what attackers can see and what they can actually attack - and you need it on a continuous basis, not in some static inventory. 
    • Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context. 
    • Is this feasible and is it cost effective? 
  • The power of automation

    • There's too much manual intervention in security. 
    • SOAR pulls data from SIEMs, EDRs, firewalls, cloud APls, ticketing systems threat intelligence feeds, and even email servers and coordinates actions across tools via APls and prebuilt integrations and intelligent playbooks. 
    • Well, that's the theory. How does it work in the real world? 
  • Adversary simulation and behavioural analysis

    • Automated adversary simulation identifies telemetry blind spots. 
    • They provide prioritized remediation guidance and control effectiveness metrics. 
    • They track progress trends and validate security ROls as well as providing board and audit reporting. 
    • How well do they work in practice? 
  • Dealing with regulations

    • CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands; they must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret differently later; they face unrealistic expectations around incident reporting; and they face personal liability. 
    • Can RegTech help? 

Who attends

Job titles

Security Architect
Business Systems Manager
Principle DevOps Engineer
Senior Information Security Engineer
Information Security Lead
Information Security Officer / Interim DPO
Information Security & Compliance Officer
Head of Detection and Response
Group IT Security and Compliance Manager
PCI DSS Compliance Manager
Incident Problem Manager
Principal Information Security Architect
Head of Information Security and IT Operations
Internal Digital Audit Manager
Partnership CISO
Digital Assurance Analyst
Security Analyst
Group Information Security Manager
Cloud Security Operations Lead
CISO
Head of IT
Physical Security & Investigations Manager
Cyber Security Manager - Incident Response
IT Director
Fraud Operations Manager
Senior Compliance officer
Data Protection Administrator
PCI Analyst
Security Architect
Security Architect
Head of Technology - Reliability Engineering and Operations
Information Security Team Lead
Cyber Security Consultant
Cyber Security Resilience Lead
Information Security Risk and Compliance Manager
Security Compliance Manager
International Director
Information Security Architect
Head of Audit
CTO
Investigation Specialist
Group Information Security Manager
Head of Information Security Risk and Governance
Compliance Consultant
Information Security Analyst
Information Security Auditor
Cyber Security Assurance Specialist
Cybersecurity Engineer
Senior Cyber Security Manager
Digital Security Manager
Compliance Security Analyst
Information Security Manager
Head of Cyber Defence
Investigation Specialist
Former Head of Security Culture & Competence
Payments and Partnerships Lead
Group Privacy & Security Director
Group Compliance Analyst
Information Security Manager
Cyber Security Manager
Information Security Analyst
CISO
Data Security & Controls Manager
IT & Information Security Manager
Information Security Auditor
CISO
Director of Cyber Security & Compliance
Head of Information & Cyber Security
IT Security Lead
Information Security & Data Privacy Leader & DPO
Group Data Protection Administrator
Vulnerability Testing Manager
Principal Security Architect
IT Risk and Compliance Analyst
Compliance Lead
Head of Security and IT Risk Management
Senior Compliance Officer
Insurance Manager
Information Security Analyst
Global Information Security, Payments & Privacy Lead
Director of Information Security
Senior Manager ISSCA Consultancy Services - ISA
Group Information Security Officer
Head of Information Security
Head of Cyber Security and Risk
Information Security Officer
Senior Information Security Analyst
Group Data Protection Officer
Senior Security Engineer
Information Security Officer and Infosec Lead
Senior InfoSec Analyst
Senior Information Security Analyst
Senior Information Security Analyst

Companies

Currys plc
Wynnstay Group plc
NEXT
River Island
Pentland
Boden
B&S World Supply
OVO Group
Theo Paphitis Retail Group
Stonegate Pub Company
ASOS plc
Sainsbury's
Kurt Geiger
Kingfisher plc
John Lewis Partnership
Kingfisher plc
WHSmith
JD Sports Fashion plc
Deliveroo
Footasylum
S & T Audio Ltd
Tesco
John Lewis Partnership
Charles Tyrwhitt
Sainsbury's
NEXT
ETEL (European Tyre Enterprise Ltd)
Sainsbury's
Clarks
Specsavers
ASOS plc
PayPoint
Wickes
Halfords
Domino's Pizza
The Co-operative Group
PCI Security Standards Council
JD Sports Fashion plc
Waterstones
The Range
Sainsbury's
Boohoo.com
Frasers Group
Maridnach
JD Sports Fashion plc
JD Sports Fashion plc
Howdens Joinery
Clarks
Currys plc
Domino's Pizza
Marie Curie Cancer Care
John Lewis Partnership
Frasers Group
Sainsbury's
H&M
OVO Group
Halfords
Odeon Cinemas
Costa Coffee
Arco
Sainsbury's
Dubai Media Incorporated (DMI)
The Co-operative Group
Waterstones
Paragon Customer Communications
LUSH
Lumanity
Card Factory
END.
IKEA Group
ETEL (European Tyre Enterprise Ltd)
Frasers Group
Halfords
The Walt Disney Company
Kingfisher plc
Clarks
JD Sports Fashion plc
Matalan
Sainsbury's
Costa Coffee
OVO Group
BT
Harvey Nichols Group Limited
All Saints Retail Ltd
N Brown Group
River Island
Dunelm Group plc
ETEL (European Tyre Enterprise Ltd)
All Saints Retail Ltd
Specsavers
Sainsbury's
All Saints Retail Ltd
John Lewis Partnership

Industries

Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail
Retail