-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
-
15 mins
-
30 mins
- What are the biggest threats and emerging risks for security leaders?
- How are new technologies and geopolitical events shaping the landscape?
- How can cyber teams find real value in automation, AI, and modern tooling?
-
30 mins
- How can Zero Trust evolve to protect scale without blocking agility?
- What architecture choices set you up for secure, scalable growth?
- How can organisations identify and overcome barriers to making security architecture a driver of business value?
-
TEA, COFFEE & NETWORKING BREAK10 mins
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
TEA, COFFEE & NETWORKING BREAK5 mins
-
90 mins
11:15 - 11:45 I 11:45- 12:15 I 12:15 - 12:45
-
LUNCH & NETWORKING30 mins
-
30 mins
-
30 mins
- One year on from NIS2 and CRA, where do compliance efforts still fall short of delivering real risk reduction?
- Practical approaches to align compliance with growth, while managing regulatory fatigue across business functions
- How can compliance support agility and move beyond checklists? *What metrics show compliance boosts security and business growth?
-
35 mins
- What defines a security-first culture, and how do you measure its impact on retention and risk reduction?
- Practical strategies for embedding security mindsets across all departments
- How do you align security culture with individual purpose and professional development to frame security as a business enabler?
-
TEA, COFFEE & NETWORKING BREAK10 mins
-
90 mins
15:00 - 15:30 I 15:30 - 16:00 I 16:00 - 16:30
-
45 minsScenario Tables
-
45 minsScenario Tables
-
45 minsScenario Tables
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET30 mins
-
5 mins
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
60 minsAttendee 1h Peer-to-Peer Breakfast Briefings
-
35 mins
- After a supply chain breach, recovery speed is a competitive advantage - what does true agility in cyber risk management look like in a rapidly changing threat environment?
- Managing hidden risks in digital supply chains through continuous monitoring and deep visibility
- How should converging IT and OT systems reshape supply chain resilience strategies?
-
30 mins
- What metrics resonate with boards to demonstrate ROI and risk reduction?
- How do you translate raw technical signals into credible, board-ready narratives that drive action and investment?
- What does “effective cyber storytelling” look like at board level?
-
TEA, COFFEE & NETWORKING BREAK5 mins
-
90 mins
11:15 - 11:45 I 11:45 - 12:15 I 12:15 - 12:45
-
LUNCH & NETWORKING30 mins
-
25 mins
- Exploring the role that AI plays in an organisation’s operation, and how security must account for an increasing need for AI.
-
40 mins
- How can CISOs protect their own resilience amid rising burnout, scapegoating, and pressure?
- Practical ways to protect personal resilience, prevent burnout, and foster a culture of mental well-being in high-pressure environments
- Strategies on how to align cyber with other departments to reduce pressure on stretched teams and frame cyber security as a business asset
-
35 mins
- The role of AI, automation, and next-gen tools in the future of risk management
- How do you prepare for emerging cyber risks that you can’t see coming?
- How close are we to realising the full promise of security technology in terms of ROI, resilience, and business alignment?
-
TEA, COFFEE & NETWORKING BREAK5 mins
-
30 mins
15:00 - 15:30
-
80 mins
DHL’S AWARD WINNING CYBERSECURITY AWARENESS GAME
- Play like an attacker: Flip the script in a fast-paced, hands-on game that turns cyber defense into a competitive, insight-packed experience.
- Think like a strategist: Spot vulnerabilities, sharpen defenses, and gain fresh perspective through cross-industry collaboration.
-
10 mins