Agenda
Presentations already confirmed include:
►Scaling Security Engineering using AI and Automation
Steve Withey, Principal Security Engineer, ASOS
- Risk Prioritisation - Understand the current and emerging risks to your business
- The AI Threat Landscape - A high-level coverage of key risks that AI has introduced to businesses
- Scaling your teams - Identifying opportunities to innovate and use AI/Automation to scale yourselves
- Measure outcomes - What are the key metrics that demonstrate value and success?
►Retail Threat Landscape 2026: What Security Leaders Should Prepare For
Boobeshwaran Sengodagoundar Kandasamy, Staff Threat Intelligence Specialist, Deliveroo
- How retail threats are evolving to become more scalable, automated, and AI-driven—and what that means for your security strategy
- Why reactive security approaches are no longer sufficient, and how to adopt a proactive, intelligence-led defence model
- Where risks are expanding beyond technology, including brand abuse, social engineering, and supply chain vulnerabilities—and how to address them effectively
►Invisible Leaks: The Hidden Risks of Chatting with AI
Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
- AI Privacy Risks: How tools like ChatGPT, Claude, and Co-Pilot can end up knowing more about you than your best friend (and never forget a thing). The hidden dangers of casually sharing information with AI
- When Small Details Add Up: Why a few “harmless” details can combine to paint a full picture & How scattered information can reveal sensitive data without you realising
- The Myth of Security: Why AI models aren’t as secure as we might think & How attackers can trick them into spilling information
- Simple, Practical Steps: For employees: how to keep personal and company data safe & For organisations: reducing AI-related risks before they grow
►Compliance in Chaos: The IMS Model That Puts CISOs Back in Control
Adaora Ezennia, GRC Lead, THG PLC
- How to turn overlapping regulations into a coherent, control-driven operating model
- How to redesign fragmented RegTech using an Integrated Management System (IMS) that drives clarity, ownership, and efficiency
- How to build a defensible compliance posture, with clear accountability and audit-ready evidence, that stands up to regulators, auditors, and legal scrutiny