OUR PORTFOLIOS

Skip to main content

Explore Our Latest Agenda - September Benelux!

eu

 Agenda

Explore a dynamic agenda designed to tackle the most pressing challenges in cyber and information security. The Cyber Leaders' Summit, September 2025, will feature keynote sessions, expert panels, and interactive discussions covering emerging threats, regulatory shifts, board communication, and best practices in cyber risk management.

Loading
08:00
  1. REGISTRATION OPENS: BREAKFAST, MEET AND GREET
    45 mins
09:30
  1. KEYNOTE: War Stories from 170k Production Cyber Attacks: Legacy Offense Misses the Modern Threat
    30 mins

      

    • Outdated by Design: Traditional pentests provide a one-time snapshot — often stale by the time the final report is in hand.
    • Limited Scope: Static, point-in-time tests can’t keep pace with constantly shifting attack surfaces and evolving threats.
    • Reactive, Not Preventive: Too many organizations are learning about their weaknesses after a breach, rather than continuously exposing and fixing exploitable attack paths.
    • A New Approach: Autonomous Pentesting: Scalable, continuous, and grounded in real-world adversary behavior — autonomous pentesting delivers offensive security that thinks and acts like an attacker, every day.
10:00
  1. TEA, COFFEE & NETWORKING BREAK
    10 mins
10:10
  1. 60 mins
    Attendee 1h Peer-to-Peer Roundtable Discussions
  2. 60 mins
    Attendee 1h Peer-to-Peer Roundtable Discussions
  3. 60 mins
    Attendee 1h Peer-to-Peer Roundtable Discussions
  4. 60 mins
    Attendee 1h Peer-to-Peer Roundtable Discussions
  5. 60 mins
    Attendee 1h Peer-to-Peer Roundtable Discussions
  6. 60 mins
    Attendee 1h Peer-to-Peer Roundtable Discussions
11:10
  1. TEA, COFFEE & NETWORKING BREAK
    5 mins
11:15
  1. 90 mins

    11:15 - 11:45     I     11:45- 12:15     I     12:15 - 12:45

12:45
  1. LUNCH & NETWORKING
    30 mins
13:15
  1. PANEL DISCUSSION: The Secure Growth Blueprint - Balancing Agility, Access, and Assurance
    30 mins

     

    • What does it take to frame security as a core business enabler?
    • How can leaders shift mindsets to align security and growth strategies?
    • What forward-thinking choices future-proof your architecture and culture?
    • Practical strategies that drive lasting transformation across people, process, and technology.
14:55
  1. REFRESHMENT BREAK & TRANSITION TIME
    5 mins
15:00
  1. 90 mins

    15:00 - 15:30    I     15:30 - 16:00     I    16:00 - 16:30

16:30
  1. KEYNOTE: From Silos to Threat Resilience: Building CTEM Together
    20 mins
    • Why traditional patching and reactive defenses leave organisations exposed to critical risks
    • How CTEM empowers CISOs to unify siloed teams and focus on the exposures that matter most
    • The measurable impact of adopting CTEM programs to strengthen resilience and reduce successful attacks
08:30
  1. REGISTRATION OPENS: BREAKFAST, MEET AND GREET
    30 mins
09:05
  1. 60 mins
    Attendee 1h Peer-to-Peer Breakfast Briefings
  2. 60 mins
    Attendee 1h Peer-to-Peer Breakfast Briefings
  3. 60 mins
    Attendee 1h Peer-to-Peer Breakfast Briefings
  4. 60 mins
    Attendee 1h Peer-to-Peer Breakfast Briefings
10:35
  1. 5 mins
10:40
  1. 30 mins
    • What metrics resonate with boards to demonstrate ROI and risk reduction?
    • How do you translate raw technical signals into credible, board-ready narratives that drive action and investment?
    • What does “effective cyber storytelling” look like at board level?
11:10
  1. REFRESHMENT BREAK & TRANSITION TIME
    5 mins
11:15
  1. 90 mins

    11:15 - 11:45     I     11:45 - 12:15     I     12:15 - 12:45

12:45
  1. LUNCH & NETWORKING
    30 mins
13:15
  1. 25 mins
    • Exploring the role that AI plays in an organisation’s operation, and how security must account for an increasing need for AI.
13:40
  1. ASK ME ANYTHING: What’s Next in Cyber? Staying Ahead in a Shifting Threat Landscape
    35 mins
    • The role of AI, automation, and next-gen tools in the future of risk management
    • How do you prepare for emerging cyber risks that you can’t see coming?
    • How close are we to realising the full promise of security technology in terms of ROI, resilience, and business alignment?
       
14:55
  1. TEA, COFFEE & NETWORKING BREAK
    5 mins
15:00
  1. 30 mins

    15:00 - 15:30

15:30
  1. 80 mins

    DHL’S AWARD WINNING CYBERSECURITY AWARENESS GAME

    • Play like an attacker: Flip the script in a fast-paced, hands-on game that turns cyber defense into a competitive, insight-packed experience.
    • Think like a strategist: Spot vulnerabilities, sharpen defenses, and gain fresh perspective through cross-industry collaboration.

Register Your Interest - CLS EU

Attend as a VIP Delegate

Attend as a VIP Delegate

Whilst this is an invite-only event, you can register your interest in attending below. Our team will review your details and may be in touch to qualify and confirm your attendance. 

PLEASE NOTE: If you are interested in sponsoring this event, please fill out the sponsorship form rather than attendee form!

Sponsorship Opportunities

Sponsorship Opportunities

Want to become a Summit sponsor? Complete the form below.