OUR PORTFOLIOS

Skip to main content

CLS 25 EU Agenda

Loading
  1. 23-Sep-2025
    • Is recovery speed the new benchmark for cyber agility?
    • Monitoring risks supply chains through continuous monitoring and deep visibility
    • How should IT/OT convergence redefine resilience?
  2. 22-Sep-2025
    Scenario Tables
  3. 22-Sep-2025
  4. 23-Sep-2025
  5. 23-Sep-2025
    Attendee 1h Peer-to-Peer Breakfast Briefings
  6. 23-Sep-2025
    Attendee 1h Peer-to-Peer Breakfast Briefings
  7. 22-Sep-2025
    Evening Reception commences at 17:30
  8. 23-Sep-2025
    Attendee 1h Peer-to-Peer Breakfast Briefings
  9. REFRESHMENT BREAK & TRANSITION TIME
    23-Sep-2025
  10. 23-Sep-2025

    11:15 - 11:45     I     11:45 - 12:15     I     12:15 - 12:45

  11. LUNCH & NETWORKING
    23-Sep-2025
  12. 23-Sep-2025
    • What metrics resonate with boards to demonstrate ROI and risk reduction?
    • How do you translate raw technical signals into credible, board-ready narratives that drive action and investment?
    • What does “effective cyber storytelling” look like at board level?
  13. 23-Sep-2025
    Attendee 1h Peer-to-Peer Breakfast Briefings
  14. 23-Sep-2025
    • Exploring the role that AI plays in an organisation’s operation, and how security must account for an increasing need for AI.
  15. 23-Sep-2025
    • How do CISOs stay resilient under pressure, blame, and burnout?
    • What does leadership look like in high-stress cyber roles?
    • Practical tactics to prevent burnout and protect mental health
  16. ASK ME ANYTHING: What’s Next in Cyber? Staying Ahead in a Shifting Threat Landscape
    23-Sep-2025
    • The role of AI, automation, and next-gen tools in the future of risk management
    • How do you prepare for emerging cyber risks that you can’t see coming?
    • How close are we to realising the full promise of security technology in terms of ROI, resilience, and business alignment?
       
  17. 23-Sep-2025

    15:00 - 15:30

    Drop In Sessions:

    • CTRL+ALT+INCLUDE: Cybersecurity Redefined - hosted by Cybersecurity Redefined
    • Nurturing the Next Gen: Leaders Growing Leaders - hosted by SECURE | CYBER CONNECT
  18. TEA, COFFEE & NETWORKING BREAK
    23-Sep-2025
  19. 23-Sep-2025

    DHL’S AWARD WINNING CYBERSECURITY AWARENESS GAME

    • Play like an attacker: Flip the script in a fast-paced, hands-on game that turns cyber defense into a competitive, insight-packed experience.
    • Think like a strategist: Spot vulnerabilities, sharpen defenses, and gain fresh perspective through cross-industry collaboration.
  20. 23-Sep-2025
    Evening Reception 
  21. 22-Sep-2025
    Scenario Tables
  22. OPENING PANEL: The Current State of Play - Trends, Challenges, and Opportunities in 2025
    22-Sep-2025

     

    • Key emerging threats and risks for security leaders
    • How are new technologies and geopolitical events shaping the landscape?
    • Finding the real value in automation, AI, and modern tooling
  23. PANEL DISCUSSION: The Secure Growth Blueprint - Balancing Agility, Access, and Assurance
    22-Sep-2025

     

    • What does it take to frame security as a core business enabler?
    • How can leaders shift mindsets to align security and growth strategies?
    • What forward-thinking choices future-proof your architecture and culture?
    • Practical strategies that drive lasting transformation across people, process, and technology.
  24. TEA, COFFEE & NETWORKING BREAK
    22-Sep-2025
  25. 22-Sep-2025
    Attendee 1h Peer-to-Peer Roundtable Discussions
  26. 22-Sep-2025
    Attendee 1h Peer-to-Peer Roundtable Discussions
  27. 22-Sep-2025
    Attendee 1h Peer-to-Peer Roundtable Discussions
  28. 22-Sep-2025
    Attendee 1h Peer-to-Peer Roundtable Discussions
  29. 22-Sep-2025
    Attendee 1h Peer-to-Peer Roundtable Discussions
  30. 22-Sep-2025
    Attendee 1h Peer-to-Peer Roundtable Discussions
  31. 22-Sep-2025

    11:15 - 11:45     I     11:45- 12:15     I     12:15 - 12:45

  32. LUNCH & NETWORKING
    22-Sep-2025
  33. KEYNOTE: War Stories from 170k Production Cyber Attacks: Legacy Offense Misses the Modern Threat
    22-Sep-2025

      

    • Outdated by Design: Traditional pentests provide a one-time snapshot — often stale by the time the final report is in hand.
    • Limited Scope: Static, point-in-time tests can’t keep pace with constantly shifting attack surfaces and evolving threats.
    • Reactive, Not Preventive: Too many organizations are learning about their weaknesses after a breach, rather than continuously exposing and fixing exploitable attack paths.
    • A New Approach: Autonomous Pentesting: Scalable, continuous, and grounded in real-world adversary behavior — autonomous pentesting delivers offensive security that thinks and acts like an attacker, every day.
  34. PANEL DISCUSSION: The Compliancy Balancing Act - Making Compliance a Business Asset
    22-Sep-2025

     

     

    • Where does compliance still fall short in delivering meaningful, measurable risk reduction?
    • Aligning compliance with business growth, without regulatory burnout
    • How can compliance evolve to support agility and business value?
  35. 22-Sep-2025
    • What defines a security-first culture, and how can its impact be measured?
    • Practical strategies for embedding security mindsets across departments
    • Aligning security culture with purpose and growth
  36. REFRESHMENT BREAK & TRANSITION TIME
    22-Sep-2025
  37. 22-Sep-2025

    15:00 - 15:30    I     15:30 - 16:00     I    16:00 - 16:30

    Drop In Sessions:

    • CTRL+ALT+INCLUDE: Cybersecurity Redefined - hosted by Cybersecurity Redefined
    • Nurturing the Next Gen: Leaders Growing Leaders - hosted by SECURE | CYBER CONNECT
  38. 22-Sep-2025
    Scenario Tables
  39. REGISTRATION OPENS: BREAKFAST, MEET AND GREET
    23-Sep-2025
  40. REGISTRATION OPENS: BREAKFAST, MEET AND GREET
    22-Sep-2025
  41. TEA, COFFEE & NETWORKING BREAK
    22-Sep-2025
  42. KEYNOTE: From Silos to Threat Resilience: Building CTEM Together
    22-Sep-2025
    • Why traditional patching and reactive defenses leave organisations exposed to critical risks
    • How CTEM empowers CISOs to unify siloed teams and focus on the exposures that matter most
    • The measurable impact of adopting CTEM programs to strengthen resilience and reduce successful attacks
  43. 23-Sep-2025