| GMT |
Wednesday 12 November 2025 |
| 07:30 |
07:30 AM > Exhibitors Access
|
Mi
| 09:00 |
| 09:00 |
09:00 AM > Registration
|
| 9:55 |
| 10:00 |
10:00 AM > Navigating NIS2: Turning Compliance into Cyber Resilience
The EU’s NIS2 Directive represents a step change in Europe’s approach to cybersecurity governance - broadening sectoral scope, tightening reporting timelines, and introducing personal accountability for management. But as compliance deadlines approach, organisations are finding that tick-box exercises won’t cut it. The real opportunity lies in embedding NIS2 principles into a culture of proactive, risk-based resilience - one that integrates cyber governance into enterprise-wide decision-making, supply-chain risk management, and business continuity planning.
This session examines how regulated entities across sectors are interpreting NIS2, from defining “essential and important” services to managing third-party dependencies and achieving alignment with ISO 27001, DORA, and other frameworks. Panellists will discuss how to translate obligations into operational strength, turning regulatory pressure into a catalyst for better oversight, faster incident response, and stronger collaboration between compliance, IT, and the boardroom.
Moderator
- Daniel Tor, Senior Compliance & Assurance Manager (Telecoms GRC), Sky
Panelist
- Nish Imthiyaz, Global Legal Counsel – Privacy, AI, and Digital Regulations, Vodafone
- Simon Laurette, Associate Director - Cyber Regulatory Lead, Forvis Mazars
- Chloe Dellow, Strategic Risk Specialist, OneTrust
|
| 10:35 |
| 10:35 |
10:35 AM > Cyber Risk is Business Risk: Embedding Cyber into Enterprise Risk Management
Boards increasingly demand cyber fluency. Here’s how CISOs and risk leaders can align their priorities and language.
Moderator
- Eric Alter, Senior Vice President – Cyber/AI Engagement Leader, Marsh Corporate & Commercial
Panelist
|
| 11:10 |
| 11:10 |
11:10 AM > When AI Ships Fast, Can GRC Keep Up?
Reflections from Software Development on Aligning Governance, Risk Management and Compliance (GRC) with Agility and Pace
AI has transformed the speed and scale of software development — models ship faster and automation accelerates delivery. But GRC haven’t evolved at the same pace. This session takes a bottom-up view from the world of software engineering to explore how governance can become as adaptive, iterative, and data-driven as the systems it seeks to control. Drawing on lessons from agile development, DevSecOps, and AI lifecycle management, we’ll discuss practical ways to embed governance and risk management in flow, not friction — enabling organizations to manage risks, while staying competitive in an AI-driven world.
Speakers
|
| 11:40 |
| 11:50 |
11:50 AM > Navigating the RegTech Boom: What’s Working, What’s Just Buzz?
The RegTech market has exploded in recent years, promising to transform how organisations manage compliance, risk, and reporting. Yet not every solution delivers on its hype. This session brings together financial institutions, regulators, and technology innovators to separate substance from spin. Where are RegTech tools truly improving oversight, efficiency, and resilience—and where are they adding complexity or cost? Panellists will explore adoption trends, integration challenges, and lessons from real-world deployments to identify what’s genuinely driving value in the next generation of regulatory technology.
Where are RegTech tools truly improving oversight, efficiency, and resilience—and where are they adding complexity or cost? Panellists will explore adoption trends, integration challenges, and lessons from real-world deployments to identify what’s genuinely driving value in the next generation of regulatory technology.
Moderator
Panelist
|
| 12:30 |
| 12:40 |
12:40 PM > KEYNOTE: The Ethical Fork in the Road Facing Gen Z: How Can We Inspire Gen Z to Become Ethical Hackers in Modern Workplaces?
With $10.5 trillion projected to be lost to cybercrime in 2025, and 69% of European teens having committed a cybercrime/cyber misdemeanor, we’re facing a generational crisis.
The Hacking Games seeks to inspire, educate, and empower young people to become defenders rather than attackers. This session discusses the societal, technological, and law enforcement challenges surrounding youth cybercrime and what we can do to address them.
Speaker
|
| 13:25 |
| 13:30 |
13:30 PM > KEYNOTE: Ctrl+Alt+Chaos: How Teenage Hackers Hijack The Internet
M&S, Co-op, JLR and many other hacks this year are being blamed not on foreign cyber crime gangs but English-speaking teenagers. Groups like Lapsus and Scattered Spider have rewritten the rules.
The innocence is gone. Teenage hacking has rapidly evolved from youthful curiosity to a calculated, monetised threat. Whether it's the lure of easy money, the promise of digital celebrity, or targeted recruitment by organised crime, this generation of attackers is skipping the learning phase and going straight to serious criminal activity.
Join Joe Tidy as he uncovers the social and economic drivers behind this dangerous escalation, mapping the common pipeline that converts a gaming enthusiast into a sophisticated, costly cybercriminal.
Speaker
- Joe Tidy, BBC News Cyber Correspondent & Author
|
| 14:10 |
| 14:15 |
14:15 PM > Incident Response Under Scrutiny: What Regulators Expect After a Breach
What a compliant, well-governed breach response looks like in 2025, from playbooks to post-incident reviews.
Moderator
Panelist
- Maria Koslunova, Global Privacy and Data Protection Director, Turner & Townsend
- David Harvey, Director, Cyber Response, KPMG UK
- Michael Colao, Former Global Chief Underwriting Officer - Direct and Indirect Cyber Risks, AXA XL, a division of AXA
- Jack Perrin, Sales Manager, Data Breach, Relativity
|
| 14:55 |
| 15:05 |
15:05 PM > Aligning Business Strategy with Cyber Risk Management
Effective cybersecurity isn’t just about IT—it’s about business. This panel examines approaches to integrate risk management into strategic planning, ensuring that cybersecurity efforts directly support organisational goals.
Moderator
Panelist
|
| 15:45 |
| 15:55 |
15:55 PM > The Importance of Threat-Led Penetration Testing (TLPT) in an Era of High-Stakes Breaches, AI, and Regulatory Convergence
"Trust but verify" is no longer just a regulatory mantra, it’s fast becoming a baseline expectation. Compliance frameworks like ISO 27001 or NIST CSF lay the foundations for good security, but paper assurance is not proof. Only by testing your controls under realistic, threat-led conditions can you expose the weaknesses hiding in people, process, and technology. Frameworks such as CBEST, STAR-FS, TIBER (DORA), i-CRT, AASE, and iCAST are now shaping the way cyber resilience is measured – moving the focus from "protect at all costs" to testing an organisation’s ability to detect, respond, and recover. In a world where breaches move at machine speed and AI is weaponised, TLPT is not a luxury; it’s the proving ground for survival.
Speakers
- Ben Turner, SVP, UK&I Cyber Business Director and Head of Consulting & Advisory Services, LRQA
- Anthony Long, Vice President, Strategic Solutions Architect, LRQA
|
| 16:25 |
| 16:35 |
16:35 PM > Keynote: Risks and Security in the Age of AI
In Risks and Security in the Age of AI, this keynote takes a forward-looking view of cyber risk over the next 3–5 years, drawing lessons from the early days of cloud adoption to highlight how similar missteps are being repeated with AI.
Using a creative Back to the Future theme, the talk explores emerging challenges across quantum computing, artificial intelligence, and shifting regulatory frameworks — offering a thought-provoking perspective on how organizations can better prepare for the next wave of technological change.
Speaker
- Michael Colao, Former Global Chief Underwriting Officer - Direct and Indirect Cyber Risks, AXA XL, a division of AXA
|
| 17:15 |
| 17:15 |
17:00 PM > Show Close
|