Agenda

Presentations already confirmed include:


►Scaling Security Engineering using AI and Automation

Steve Withey, Principal Security Engineer, ASOS

  • Risk Prioritisation - Understand the current and emerging risks to your business
  • The AI Threat Landscape - A high-level coverage of key risks that AI has introduced to businesses
  • Scaling your teams - Identifying opportunities to innovate and use AI/Automation to scale yourselves
  • Measure outcomes - What are the key metrics that demonstrate value and success?
     

►Retail Threat Landscape 2026: What Security Leaders Should Prepare For

Boobeshwaran Sengodagoundar Kandasamy, Staff Threat Intelligence Specialist, Deliveroo

  • How retail threats are evolving to become more scalable, automated, and AI-driven—and what that means for your security strategy
  • Why reactive security approaches are no longer sufficient, and how to adopt a proactive, intelligence-led defence model
  • Where risks are expanding beyond technology, including brand abuse, social engineering, and supply chain vulnerabilities—and how to address them effectively

►Invisible Leaks: The Hidden Risks of Chatting with AI

Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England

  • AI Privacy Risks: How tools like ChatGPT, Claude, and Co-Pilot can end up knowing more about you than your best friend (and never forget a thing). The hidden dangers of casually sharing information with AI
  • When Small Details Add Up: Why a few “harmless” details can combine to paint a full picture & How scattered information can reveal sensitive data without you realising
  • The Myth of Security: Why AI models aren’t as secure as we might think & How attackers can trick them into spilling information
  • Simple, Practical Steps: For employees: how to keep personal and company data safe & For organisations: reducing AI-related risks before they grow

►Compliance in Chaos: The IMS Model That Puts CISOs Back in Control

Adaora Ezennia, GRC Lead, THG PLC

  • How to turn overlapping regulations into a coherent, control-driven operating model
  • How to redesign fragmented RegTech using an Integrated Management System (IMS) that drives clarity, ownership, and efficiency
  • How to build a defensible compliance posture, with clear accountability and audit-ready evidence, that stands up to regulators, auditors, and legal scrutiny