We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
08:00
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
09:00
-
35 mins
- What are the biggest threats and emerging risks for security leaders?
- How are new technologies and geopolitical events shaping the landscape?
- What’s changing in the way we approach risk management and where do the opportunities lie?
09:35
-
35 mins
- Why does supply chain risk remain such a massive concern today?
- How do you secure your vendors without getting lost in complexity of fourth, fifth, and nth-party risks?
- What strategies can security leaders use fortify themselves against evolving supply chain threats?
10:10
-
TEA & COFFEE BREAK10 mins
10:20
-
60 mins
-
60 mins
-
60 mins
-
60 mins
-
60 mins
-
60 mins
11:20
-
TEA & COFFEE BREAK10 mins
11:30
-
90 mins11:30-12:00 I 12:00-12:30 I 12:30-13:00
13:00
-
LUNCH & NETWORKING45 mins
13:45
-
60 mins
- How to shift from compliance-driven security to a proactive, trust-first approach
- Key frameworks and metrics to measure, communicate, and operationalize trust
- Balancing transparency, security, and innovation to build long-term stakeholder confidence
14:45
-
Panel Discussion: Culture is king - tips for building a security-first culture across your workforce40 mins
- What does a security-first culture look like, and how to measure success?
- Practical strategies for embedding security across all departments
- How do you foster this culture without alienating employees or becoming overly strict?
15:25
-
TEA & COFFEE BREAK5 mins
15:30
-
90 mins15:30-16:00 I 16:00-16:30 I 16:30-17:00
17:00
-
1hr Peer-to-Peer Roundtable: How can you successfully innovate with automation to reduce cyber risk?60 mins
-
60 mins
-
60 mins
-
60 mins
-
60 mins
-
60 mins
18:00
-
Closing Remarks & Evening Reception120 mins
08:15
-
REGISTRATION OPENS: BREAKFAST, MEET AND GREET45 mins
09:00
-
10 mins
09:10
-
60 mins
-
60 mins
-
60 mins
10:10
-
40 mins
- How do you engage the board to take breach preparedness seriously?
- What proactive measures strengthen enterprise-wide resilience before an attack occurs?
- What are the most common gaps in breach readiness, and how can they be addressed before they become failures?
10:50
-
35 mins
- How can cybersecurity be positioned as a driver of business success, not a cost?
- What’s are the best metrics to share with the board?
- How do you create an open, ongoing conversation with leadership so security stays a priority?
11:25
-
TEA & COFFEE BREAK5 mins
11:30
-
90 mins11:30-12:00 I 12:00-12:30 I 12:30-13:00
13:00
-
LUNCH & NETWORKING30 mins
13:30
-
35 mins
- Identifying key burnout drivers in cybersecurity teams and validating shared experiences.
- Leadership strategies to recognize early signs, support diverse groups, and foster psychological safety.
- Practical techniques, including the iRest Protocol, to build resilience and implement sustainable support systems.
14:05
-
35 mins
- What emerging threats and technological shifts will redefine cybersecurity in the next five years?
- Which risks are keeping senior security leaders up at night - and what’s being overlooked?
- In this interactive session, our expert panel will take on your biggest questions, tackling the unknowns that will shape the future of cyber.
14:40
-
TEA & COFFEE BREAK5 mins
14:45
-
30 mins14:45-15:15
15:15
-
45 mins
-
45 mins
-
45 mins
16:00
-
Closing Remarks5 mins