-
8:00
Registration and Light Breakfast
-
8:45
Chair's Opening Remarks
-
8:50
OPENING PANEL: 2026 Threat Reality Check: What Actually Keeps UK CISOs Awake?
• Insights into the latest threat intelligence from National Cyber Security Centre and industry reports
• Exploring how attacker tactics are evolving with AI and automation
• What risks UK boards are underestimating today -
9:30
KEYNOTE: AI vs AI: The Cyber Arms Race Has Started
• How to deploy AI safely in detection and response
• Insights into real attacker use of generative AI and deepfakes
• Exploring governance models for AI in enterprise security -
10:00
KEYNOTE: From Security Leader to Business Risk Leader
• How to translate cyber risk into financial impact
• Insights into what UK boards actually expect from CISOs
• What makes a CISO credible at executive committee level -
10:30
PANEL DISCUSSION: The One Breach That Changes Everything
• Exploring real UK breach case studies and leadership lessons
• How to prepare executives for crisis decision-making
• What separates resilient organisations from reactive ones -
11:00am
Morning Break & Networking
-
Track A - Threat, Detection & Response
-
11:30
PRESENTATION: AI-Powered Attacks Are Already Here
• Exploring how attackers use generative AI and deepfakes
• How to adapt detection for AI-driven phishing and fraud
• What defensive AI actually delivers in real SOC environments -
12:00
PANEL DISCUSSION: From Alert Fatigue to Signal Clarity
• How to redesign SOC workflows to reduce noise
• Insights into detection engineering maturity models
• Exploring automation without blind spots -
12:30
PRESENTATION: Threat Intelligence That Drives Decisions
• How to integrate intelligence into board-level risk reporting
• Insights into collaboration with peers and law enforcement
• What actionable intelligence actually looks like -
Track B - Compliance, Cloud & Critical Controls
-
11:30
PRESENTATION: Data Sovereignty, Cloud & Cross-Border Risk
• What UK data protection evolution means for cloud strategy
• How to manage multi-region storage compliance
• Exploring encryption and key management governance -
12:00
PANEL DISCUSSION: Beyond Compliance: Proving You’re Actually Secure
• How to move from checkbox audits to control validation
• Insights into regulator expectations vs reality
• What measurable resilience really looks like -
12:30
PRESENTATION: The Architecture of Accountability
• How to document defensible security decisions
• Exploring audit trails in cloud-native environments
• What boards should demand in assurance reporting -
1:00
Lunch Break & Networking
-
2:00
EXPERT ASK ME ANYTHING: Deepfakes & Executive Fraud: The Next Social Engineering Wave
• Exploring real incidents affecting UK organisations
• How to protect finance teams and executives
• What detection controls catch impersonation attacks -
2:30
FIRESIDE CHAT: Incident Response in the Real World
• How to coordinate legal, comms and technical teams
• Insights into lessons from major breach investigations
• What to do when containment fails -
3:00
PANEL DISCUSSION: The Insider Risk Nobody Wants to Discuss
• How to detect behavioural anomalies ethically
• Insights into cultural and HR collaboration
• Exploring privacy vs monitoring trade-offs -
4:00
Afternoon Break & Networking Break
-
4:00
EXPERT ASK ME ANYTHING: If Attackers Were Your Product Team
• How adversaries innovate faster than defenders
• Insights into attacker ROI thinking
• What defensive teams can learn from them -
4:30
PANEL DISCUSSION: What the Next Five Years Will Break
• Exploring emerging risks from AI, geopolitics and technology shifts
• Insights into threat trends seen by National Cyber Security Centre and global peers
• What CISOs should invest in now -
5:00
Closing Remarks & End of Conference
-
5:00 - 6:00
Networking Reception
Not Found