We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
08:00
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
09:00
-
35 mins
- What are the biggest threats and emerging risks for security leaders?
- How are new technologies and geopolitical events shaping the landscape?
- What’s changing in the way we approach risk management and where do the opportunities lie?
09:35
-
35 mins
- Why does supply chain risk remain such a massive concern today?
- How can security leaders maintain visibility and control across the expanding web of third, fourth, and nth-party relationships?
- What strategies can help security leaders stay ahead of evolving supply chain threats and prevent cascading risks?
10:10
-
TEA & COFFEE BREAK10 mins
10:20
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
11:20
-
30 mins
11:50
-
TEA & COFFEE BREAK10 mins
12:00
-
90 mins
11:30-12:00 I 12:00-12:30 I 12:30-13:00
13:30
-
LUNCH & NETWORKING30 mins
14:00
-
45 mins
- How to shift from compliance-driven security to a proactive, trust-first approach
- Key frameworks and metrics to measure, communicate, and operationalize trust
- Balancing transparency, security, and innovation to build long-term stakeholder confidence
14:45
-
40 mins
- What does a security-first culture look like, and how do you measure success?
- Practical strategies for embedding security across all departments in remote locations.
- How do you foster this culture without alienating employees or becoming overly strict?
15:25
-
TEA & COFFEE BREAK5 mins
15:30
-
90 mins
15:30-16:00 I 16:00-16:30 I 16:30-17:00
17:00
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
-
60 minsAttendee 1h Peer-to-Peer Roundtable Discussions
18:00
-
Closing Remarks & Evening Reception120 mins
08:15
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
09:00
-
10 mins
09:10
-
60 mins1hr Breakfast Briefings
-
60 mins1hr Breakfast Briefings
-
60 mins1hr Breakfast Briefings
10:10
-
30 mins
- How do you engage the board to take breach preparedness seriously?
- What proactive measures strengthen enterprise-wide resilience before an attack occurs?
- What are the most common gaps in breach readiness, and how can they be addressed before they become failures?
10:40
-
40 mins
- How can cybersecurity be positioned as a driver of business success, not a cost?
- What’s are the best metrics to share with the board?
- How do you create an open, ongoing conversation with leadership so security stays a priority?
11:25
-
TEA & COFFEE BREAK5 mins
11:30
-
90 mins
11:30-12:00 I 12:00-12:30 I 12:30-13:00
13:00
-
LUNCH & NETWORKING30 mins
13:30
-
45 mins
- Identifying key burnout drivers in cybersecurity teams and validating shared experiences.
- Leadership strategies to recognize early signs, support diverse groups, and foster psychological safety.
- Practical techniques, including the iRest Protocol, to build resilience and implement sustainable support systems.
14:10
-
30 mins
- AI, deepfakes, quantum - what’s hype, what’s real, and what emerging threats aren’t getting the attention they deserve?
- As the CISO role evolves, what new skills and approaches will define tomorrow’s cyber leaders?
- When long-term plans age quickly, how do you futureproof your security strategy in a world of constant change?
14:40
-
TEA & COFFEE BREAK5 mins
14:45
-
30 mins
14:45-15:15
15:15
-
45 minsScenario Tables
-
45 minsScenario Tables
-
45 minsScenario Tables
16:00
-
Closing Remarks5 mins