-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
-
15 mins
-
25 mins
- What are the biggest threats and emerging risks for security leaders?
- How are new technologies and geopolitical events shaping the landscape?
- What’s changing the way we approach compliance management and where do the opportunities lie?
-
25 mins
- How can Zero Trust be implemented to enhance security without disrupting user experience or slowing business operations?
- Practical strategies that enable adaptive security architecture to support business growth
- How can organisations identify and overcome barriers to making security architecture a driver of business value?
-
TEA, COFFEE & NETWORKING BREAK10 mins
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
90 mins
11:00 - 11:30 I 11:30- 12:00 I 12:00 - 12:30
-
LUNCH & NETWORKING30 mins
-
30 mins
-
25 mins
- One year on from NIS2 and CRA, where do compliance efforts still fall short of delivering real risk reduction?
- Practical approaches to align compliance with growth, while managing regulatory fatigue across business functions
- How can compliance support agility and move beyond checklists? *What metrics show compliance boosts security and business growth?
-
25 mins
- What defines a security-first culture, and how do you measure its impact on retention and risk reduction?
- Practical strategies for embedding security mindsets across all departments
- How do you align security culture with individual purpose and professional development to frame security as a business enabler?
-
TEA, COFFEE & NETWORKING BREAK10 mins
-
90 mins
14:30 - 15:00 I 15:00 - 15:30 I 16:00 - 16:30
-
60 minsScenario Tables
-
60 minsScenario Tables
-
60 minsScenario Tables
-
120 mins
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET30 mins
-
5 mins
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
25 mins
- After a supply chain breach, recovery speed is a competitive advantage - what does true agility in cyber risk management look like in a rapidly changing threat environment?
- Managing hidden risks in digital supply chains through continuous monitoring and deep visibility
- How should converging IT and OT systems reshape supply chain resilience strategies?
-
25 mins
- What is the future of Cyber Threat Intelligence, and how can this be incorporated into strategic resilience plans?
- If you could only invest in one area of CTI - more feeds, deeper analysis, or tighter business alignment - which would deliver the greatest return?
- Practical strategies to embed threat intelligence into daily decision-making across detection, response, and executive risk functions.
-
TEA, COFFEE & NETWORKING BREAK5 mins
-
90 mins
11:00 - 11:30 I 11:30 - 12:00 I 12:00 - 12:30
-
LUNCH & NETWORKING30 mins
-
25 mins
- Exploring the role that AI plays in an organisation’s operation, and how security must account for an increasing need for AI.
-
30 mins
- How can CISOs protect their own resilience amid rising burnout, scapegoating, and pressure?
- Practical ways to protect personal resilience, prevent burnout, and foster a culture of mental well-being in high-pressure environments
- Strategies on how to align cyber with other departments to reduce pressure on stretched teams and frame cyber security as a business asset
-
30 mins
- The role of AI, automation, and next-gen tools in the future of risk management
- How do you prepare for emerging cyber risks that you can’t see coming?
- How close are we to realising the full promise of security technology in terms of ROI, resilience, and business alignment?
-
TEA, COFFEE & NETWORKING BREAK5 mins
-
30 mins
14:30 - 15:00
-
75 mins
DHL’S AWARD WINNING CYBERSECURITY AWARENESS GAME
- Play like an attacker: Flip the script in a fast-paced, hands-on game that turns cyber defense into a competitive, insight-packed experience.
- Think like a strategist: Spot vulnerabilities, sharpen defenses, and gain fresh perspective through cross-industry collaboration.
-
5 mins