-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
-
15 mins
-
40 mins
- How are emerging technologies, regulatory obligations and geopolitical volatility reshaping risk for financial services in 2026?
- How are board expectations changing as directors demand clearer links between cyber, resilience and enterprise value?
- How can security leaders position themselves as enablers of secure growth and show realvalue as priorities evolve?
-
20 mins
- This session explores how financial services can move beyond annual pentests and checklist-driven controls to an always‑on assurance model. It will show how continuous security validation - driven by autonomous, production‑safe testing - gives financial institutions a real‑time view of what’s actually exploitable across branch, cloud, and core systems. Rather than drowning in vulnerability noise, teams learn to focus on verified attack paths that put customer data, payment rails, and critical trading systems at risk.
Using real‑world examples, we’ll walk through how leading FSI organisations are:
· - Establishing a “find, fix, verify” rhythm that proves risk reduction to executives, boards, and regulators with hard evidence, not hopeful metrics.
· - Embedding attacker‑minded testing into day‑to‑day operations so security posture can be measured and improved week over week, not once a year.
Attendees will leave with a practical blueprint to evolve from reactive compliance exercises to a confident, proof‑driven security program that keeps pace with modern financial threats.
- This session explores how financial services can move beyond annual pentests and checklist-driven controls to an always‑on assurance model. It will show how continuous security validation - driven by autonomous, production‑safe testing - gives financial institutions a real‑time view of what’s actually exploitable across branch, cloud, and core systems. Rather than drowning in vulnerability noise, teams learn to focus on verified attack paths that put customer data, payment rails, and critical trading systems at risk.
-
TEA & COFFEE BREAK15 mins
-
60 mins1hr Peer-to-Peer Roundtable
-
60 mins1hr Peer-to-Peer Roundtable
-
60 mins1hr Peer-to-Peer Roundtable
-
60 mins1hr Peer-to-Peer Roundtable
-
TRANSITION TIME15 mins
-
90 mins
11:30-12:00 I 12:00-12:30 I 12:30-13:00
-
LUNCH & NETWORKING60 mins
-
40 mins
- How do leaders balance technical literacy with strategic communication in a way that lands with senior executives and boards?
- What practical skills help leaders translate fast moving risk into narratives that build trust and shape direction and investment?
- How can leaders develop the presence and confidence to influence decisions and lead through uncertainty?
-
30 mins
- How do you build a secure culture that empowers people without creating friction in high-pressure environments where security can feel inconvenient?
- How can leaders influence behaviours rather than relying on training?
- How do you give employees ownership of security so they feel confident making the right decisions without needing constant oversight?
-
TEA & COFFEE BREAK5 mins
-
90 mins
14:45 - 15:15 | 15:15 - 15:45 | 15:45 - 16:15
-
35 minsThis session will take you through the evolution of hacking, from its early days to today’s sophisticated cyber threats. Glenn will demonstrate a live hack using real hacker tools, showcasing how attackers infiltrate systems and steal sensitive information. Tailored specifically for the banking industry, the event will also provide key insights on defending against modern cyberattacks, with lessons learned from Glenn’s own experiences in the field.
-
60 mins
-
60 mins1hr Peer-to-Peer Roundtable
-
60 mins1hr Peer-to-Peer Roundtable
-
60 mins1hr Peer-to-Peer Roundtable
-
Closing Remarks & Evening Reception120 mins

