Agenda
| 08:30 - 09:30 |
Breakfast Networking Break |
| 09:30 - 09:40 |
Chair's Opening Remarks |
| 9:40 - 10:00 |
►Secure Your Supply Chain — A NIS2 Imperative for Resilience Geoffrey Taylor, Information Security Officer, Nordea Asset Management
|
| 10:00 - 10:20 |
►Balancing Innovation, Stability, and Security in Modern IT Landscapes Stefan Schweizer,Senior Vice President Sales Europe, OpenSystems
|
| 10:20 - 10:40 |
►Resilience for Everything: How to Ensure Business Continuity Across Cloud, Identity, and AI Gary Adams, Sales Engineering Manager, Rubrik
|
| 10:40 - 11:00 |
►One Security Vision: Uniting E.ON’s Subsidiaries Through Standardization Julian Dube, Information Security Officer, E.ON Digital Technology
|
| 11:00 - 11:30 |
Networking Break |
| 11:30 - 12:00 |
►Fireside Chat: Securing Systems We can't Switch Off Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
|
| 12:00 - 12:20 |
►AI Safety First: Securing the AI Explosion with Cloudflare SASE Sebastian Scherl, SASE GTM Lead DACH, Cloudflare • Why AI is redefining modern network architecture • Secure AI access — without compromising data or control • Take control of MCP servers: Stop Shadow AI before it starts
|
| 12:20 - 12:40 |
►Knowledge is the best defense: What do you know about identities? Andreas Mueller, Regional Sales Director CEUR, Delinea
|
| 12:40 - 13:40 |
Lunch Networking Break |
| 13:40 - 14:00 |
►Third-Party & Outsourcing Risk Management – Focus on Cybersecurity and Operational Resilience Daniele Sangion, CISO & CSO, UniCredit Bank Austria
|
| 14:00 - 14:05 |
►Zero Trust Controls at the Endpoint John McNamee, Sales Team Lead,ThreatLocker
|
| 14:05 - 15:25 |
►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
|
| 14:25 - 15:05 |
►Education Seminars Delegates will be able to choose from the following topics:
|
| 15:05 - 15:30 |
Networking break |
| 15:30 - 16:00 |
►Panel Discussion: Third Party (and beyond) — Where Modern Breaches Begin Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England (Moderator)
|
| 16:00 - 16:10 |
Chairs Closing Remarks |
Education seminars
Visibility, Governance, and Control: Protecting Enterprise Content Across Files, M365, and AI
Mert Topaloglu, Presales Manager, FileOrbis
As enterprise content becomes increasingly distributed across file servers, Microsoft 365, cloud platforms, and different storages, organizations face growing challenges around visibility, governance, and control. Sensitive information is often scattered across multiple repositories, shared beyond intended audiences, or fed into AI systems without sufficient oversight.
Attendees will learn:
- Why securing enterprise content requires more than traditional file storage or access management.
- How organisations can gain visibility into where content resides, understand what types of sensitive data they have, and apply consistent governance policies across files, Microsoft 365, and AI environments.
- The importance of content-aware controls, secure sharing, automated remediation, compliance, and centralized management in reducing risk while supporting productivity.
- From unstructured data on file servers to collaboration in Microsoft 365 and emerging AI use cases, this discussion will provide practical insights into how enterprises can better protect, govern, and control their content everywhere.
Balancing Innovation, Stability, and Security in Practice
Stefan Schweizer, Senior Vice President Sales Europe, OpenSystems
In an increasingly complex and regulated IT landscape, organizations face the challenge of balancing innovation speed, operational stability, and security. Rising cyber threats, hybrid infrastructures, and growing compliance pressure demand new approaches—where cybersecurity is no longer just a protective function, but an integral part of business strategy.
Attendees Will Learn:
- How to strategically balance innovation, stability, and security
- Why cybersecurity must be treated as a business enabler—not just a protective measure
- The role of governance, transparency, and automation in building an effective security strategy
- How modern platform approaches unify security, compliance, and performance across hybrid environments
