09.00 - 09.05
|
Chair's Welcome
|
09.05 - 09.25
|
►Driving a Culture of InfoSec Excellence - How a Thriving Fintech Built Security into Its DNA Jo Vane, InfoSec Compliance Director, Checkout.com - The Pitfall of Compliance Alone
- Compliance ≠ Security: going beyond the basics
- Raising the Bar: InfoSec Excellence Defined
- Core Principles for Sustainable Security
- Leadership’s Role in Building Security DNA
- Achieving InfoSec excellence reduces risk, enhances brand trust, and strengthens market positioning
|
09.25 - 09.45
|
►Isolating Ransomware Attacks to Block Lateral Movement and Protect Critical Assets Laurent Jacquemin, Field CISO, Akamai - Prevent ransomware spreading across POS, inventory, and payment systems with Akamai Guardicore Segmentation
- Spot early signs of attack targeting retail infrastructure using behavioural analytics
- Uncover stealthy threats in-store and online with proactive threat hunting
- Strengthen defences across retail IT and cloud environments with Zero Trust controls
- Learn how leading UK retailers are building resilience after recent ransomware attacks
|
09.45 - 10.05
|
►Transforming Retail Personas into Microsoft Conditional Access: The Secret Weapon for Zero Trust Security Louis Sherman, Cybersecurity Lead, C&J Clarks - Leverage retail personas to fine-tune Conditional Access policies
- The Conditional Access gaps hiding in plain sight, and how to plug them
- Bring clarity and precision to policy creation with persona-driven access controls
|
10.05 - 10.25
|
►Rethinking Ecommerce Fraud Prevention: Stop Fraudsters Before the Buy Button Maya Ogranovitch Scott, Retail Solution Manager, Ping Identity - Top fraud risks in retail and ecommerce
- The link between identity fraud and fraudulent transactions
- Common tactics fraudsters use to attack online retailers
- How to spot and stop fraud throughout the user session
- Tips to crack down on fraud without sacrificing checkout convenience
|
10.25 - 10.30
|
Comfort Break
|
10.30 - 10.45
|
►Protecting retail networks from cyber threats effectively Luke Fardell, Lead cyber Analyst, Tokio Marine Kiln - Network segmentation
- Third party network access
- DNS record manipulation and email take over
|
10.45 - 11.05
|
►Unlock the Potential of Agentic AI Alex Gardner, Product Marketing Director, Human Security - LLM vs AI agents - what is the difference?
- The opportunities and risks of Agentic AI
- Preparing for Agentic commerce
|
11.05 - 11.25
|
►Resilience in Retail Stuart Golding, Independent Cybersecurity Consultant - Why is retail such a prime target?
- Common attack vectors and vulnerabilities and lessons learned
- Actionable strategies: zero-trust architecture; audit and protocols
- Weaponising threat intelligence
- Getting culture right
|
11.25 - 11.45
|
►Proactive Retail Cyber Resilience through Exposure Management Bernard Montel, EMEA Technical Director and Security Strategist, Tenable - Understanding the Expanded Attack Surface: From on-premise POS and IoT/OT devices to cloud e-commerce, user identities, and third-party supply chains – grasp every potential entry point
- Lessons from Recent UK Retail Attacks: Dissect real attack paths (e.g., social engineering, identity compromise, supply chain breaches) from incidents affecting M&S and Co-op by groups like Scattered Spider/DragonForce
- Mitigating Risk & Fraud with Exposure Management: Leverage an exposure-centric view to proactively identify, prioritise, and remediate exploitable exposures before they become devastating breaches
|
11.45 - 11.50
|
Comfort Break
|
11:50 - 12:10
|
►Securing Payment Pages: Navigating PCI DSS v4 Requirements for Browser-Loaded Scripts Graham Dawson, Cyber Security Architect, Naked Wines - Understanding the Invisible Risk: How scripts and tags on your payment pages impact security and compliance.
- Building Robust Controls: Implementing practical controls to mitigate risks and meet PCI DSS v4 standards effectively.
- Managing Scripts with Reflectiz: Exploring a cutting-edge tool to monitor, control, and secure browser-loaded scripts in real time.
- The Road Ahead: What does the future holds for compliance and innovation.
|
12.10 - 12.30
|
►From the Frontlines: Disrupting Hybrid Ransomware Attacks in the Age of SCATTERED SPIDER David Holin, Professional Services Principal Consultant, Crowdstrike Jack Humphries, Professional Services Senior Consultant, Crowdstrike - Threat actors like SCATTERED SPIDER are exploiting the blurred lines between cloud and on-premise environments to launch sophisticated ransomware attacks
- In this session, CrowdStrike’s Incident Response team shares real-world insights into how these hybrid intrusions unfold — and how defenders can stay ahead
- Understand how SCATTERED SPIDER pivots between identity, cloud, and on-premise infrastructure during an attack
- Explore real-life examples from recent IR engagements in hybrid environments
- Learn key detection strategies and behavioural indicators of hybrid ransomware activity
- Get practical advice on hardening your cloud and on-premise assets to disrupt adversary operations
|
12.30 - 12.50
|
►Ransomware in Retail: How AI-Driven Ransomware Will Trigger the Next Major Breach Manit Sahib, Ethical Hacker, The Global Fund & Former Head of Red Teaming, Bank of England - LIVE DEMO - Inside the first AI-powered ransomware attack — See how my custom Agentic Ransomware Gang can take down a network in under 8 minutes
- Why retail is the perfect target — and how attackers are breaking in more easily than most think.
- Firsthand insights from real-world red team ops — from legacy tech and broken access controls to the critical lack of real-world security testing
- Why traditional security fails — compliance checklists and conventional tools don’t stop modern ransomware
- What CISOs and security leaders must do now — real-world, field-tested steps to prove your controls work before attackers do it for you
|
12.50 - 13.10
|
►Super Pets – The hero you didn’t know you had in the house Gary Cox, Technology Director, Infoblox - The most under leveraged security capability
- How NIST and NCSC are guiding us
- How to start to become truly proactive against evolving and current threats
|
13.10 - 13.30
|
►Cyber Essentials: Simple Steps, Stronger Security Dr Emma Philpott, Director and CEO, IASME - What's it all about?
- Effectiveness and Impact
- Overcoming challenges for large organisations meeting such a prescriptive standard
- Using Cyber Essentials as a Supply Chain Tool
|
13.30 - 13.35
|
Chair's closing remarks
|