-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
-
15 mins
-
30 mins
- Key emerging threats and risks for security leaders
- How are new technologies and geopolitical events shaping the landscape?
- Finding the real value in automation, AI, and modern tooling
-
30 mins
- Outdated by Design: Traditional pentests provide a one-time snapshot — often stale by the time the final report is in hand.
- Limited Scope: Static, point-in-time tests can’t keep pace with constantly shifting attack surfaces and evolving threats.
- Reactive, Not Preventive: Too many organizations are learning about their weaknesses after a breach, rather than continuously exposing and fixing exploitable attack paths.
- A New Approach: Autonomous Pentesting: Scalable, continuous, and grounded in real-world adversary behavior — autonomous pentesting delivers offensive security that thinks and acts like an attacker, every day.
-
TEA, COFFEE & NETWORKING BREAK10 mins
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
TEA, COFFEE & NETWORKING BREAK5 mins
-
90 mins
11:15 - 11:45 I 11:45- 12:15 I 12:15 - 12:45
-
LUNCH & NETWORKING30 mins
-
30 mins
- What does it take to frame security as a core business enabler?
- How can leaders shift mindsets to align security and growth strategies?
- What forward-thinking choices future-proof your architecture and culture?
- Practical strategies that drive lasting transformation across people, process, and technology.
-
30 mins
- Where does compliance still fall short in delivering meaningful, measurable risk reduction?
- Aligning compliance with business growth, without regulatory burnout
- How can compliance evolve to support agility and business value?
-
40 mins
- What defines a security-first culture, and how can its impact be measured?
- Practical strategies for embedding security mindsets across departments
- Aligning security culture with purpose and growth
-
REFRESHMENT BREAK & TRANSITION TIME5 mins
-
90 mins
15:00 - 15:30 I 15:30 - 16:00 I 16:00 - 16:30
-
20 mins
- Why traditional patching and reactive defenses leave organisations exposed to critical risks
- How CTEM empowers CISOs to unify siloed teams and focus on the exposures that matter most
- The measurable impact of adopting CTEM programs to strengthen resilience and reduce successful attacks
-
35 minsScenario Tables
-
35 minsScenario Tables
-
35 minsScenario Tables
-
95 minsEvening Reception commences at 17:30
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET30 mins
-
5 mins
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
30 mins
- Is recovery speed the new benchmark for cyber agility?
- Monitoring risks supply chains through continuous monitoring and deep visibility
- How should IT/OT convergence redefine resilience?
-
5 mins
-
30 mins
- What metrics resonate with boards to demonstrate ROI and risk reduction?
- How do you translate raw technical signals into credible, board-ready narratives that drive action and investment?
- What does “effective cyber storytelling” look like at board level?
-
REFRESHMENT BREAK & TRANSITION TIME5 mins
-
90 mins
11:15 - 11:45 I 11:45 - 12:15 I 12:15 - 12:45
-
LUNCH & NETWORKING30 mins
-
25 mins
- Exploring the role that AI plays in an organisation’s operation, and how security must account for an increasing need for AI.
-
35 mins
- The role of AI, automation, and next-gen tools in the future of risk management
- How do you prepare for emerging cyber risks that you can’t see coming?
- How close are we to realising the full promise of security technology in terms of ROI, resilience, and business alignment?
-
35 mins
- How do CISOs stay resilient under pressure, blame, and burnout?
- What does leadership look like in high-stress cyber roles?
- Practical tactics to prevent burnout and protect mental health
-
TEA, COFFEE & NETWORKING BREAK5 mins
-
30 mins
15:00 - 15:30
-
80 mins
DHL’S AWARD WINNING CYBERSECURITY AWARENESS GAME
- Play like an attacker: Flip the script in a fast-paced, hands-on game that turns cyber defense into a competitive, insight-packed experience.
- Think like a strategist: Spot vulnerabilities, sharpen defenses, and gain fresh perspective through cross-industry collaboration.
-
10 minsEvening Reception