We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
08:00
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
08:45
-
15 mins
09:00
-
40 mins
- How should cyber risk be framed so it drives decisions at board level, not just reporting?
- Where should leaders focus across critical assets, identity, and resilience to actually reduce exposure?
- What does being prepared really look like when it comes to responding to and operating through incidents?
09:40
-
35 mins
- How do generative and agentic AI actually change the security risk landscape, beyond hype and vendor claims?
- What does adopting agentic AI mean in practice for security budgets, cost structures, and operating models?
- How should security teams, skills, and accountability evolve as AI takes on more execution while humans retain judgement and oversight?
10:15
-
TEA & COFFEE BREAK15 mins
10:30
-
60 mins
-
60 mins
-
60 mins
-
60 mins
11:30
-
TEA & COFFEE BREAK10 mins
11:40
-
90 mins11:40-12:10 I 12:10-12:40 I 12:40-13:10
12:30
-
LUNCH & NETWORKING60 mins
13:45
-
35 mins
14:20
-
35 mins
- How do you build a secure culture that empowers people without creating friction in high-pressure environments where security can feel inconvenient?
- How can leaders influence behaviours rather than relying on training?
- How do you give employees ownership of security so they feel confident making the right decisions without needing constant oversight?
14:55
-
25 mins
15:20
-
TEA & COFFEE BREAK10 mins
15:30
-
60 mins15:30-16:00 I 16:00-16:30
16:35
-
60 mins
-
60 mins
-
60 mins
-
60 mins
17:35
-
Closing Remarks & Evening Reception145 mins
08:30
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
09:15
-
5 mins
09:20
-
60 mins
-
60 mins
-
60 mins
-
60 mins
-
60 mins
10:20
-
TEA & COFFEE BREAK10 mins
10:30
-
35 mins
- How much do CISOs need to understand about emerging technologies (e.g. Quantum, AI) to influence decisions?
- How do leaders evolve their skillsets to stand confidently in front of the board and play a credible role in how these technologies are deployed?
- When should security lead adoption, and when is it more effective to govern instead?
11:05
-
25 mins
11:40
-
90 mins11:40-12:10 I 12:10-12:40 I 12:40-13:10
13:00
-
LUNCH & NETWORKING30 mins
13:45
-
90 minsThis 90-minute workshop focuses on addressing burnout in cybersecurity teams through actionable insights. Part 1 gathers group perspectives on burnout drivers and validates common experiences. Part 2 ...
15:15
-
TEA & COFFEE BREAK5 mins
15:20
-
30 mins15:20-15:50
15:50
-
10 mins

