Agenda

9:00-9:15 Opening Remarks

Panel Discussion: From Technical Expert to Business Strategist: Bridging the gap between cybersecurity roles and business leadership

Cybersecurity professionals are no longer confined to technical roles—they are becoming pivotal business strategists. This panel will explore how CISOs and cybersecurity leaders can bridge the gap between technical expertise and business leadership, translating cyber risks into actionable insights, navigating personal accountability, and future-proofing their careers in an AI-driven world.

  • Translating cyber risk into business impact—how CISOs communicate threats in financial and operational terms
  • Report cyber risks and incidents just like financial risks; AI risks
  • Personal liability for CISOs—should security leaders be held accountable for breaches?

Panel Discussion: Third-Party and Supply Chain Risk Management

With an increasing reliance on third-party vendors, companies must enforce stronger due diligence, continuous monitoring, and ensure suppliers meet cybersecurity standards to avoid regulatory penalties.

  • Lack of visibility: Difficulty in assessing the security posture of third-party vendors
  • Complex ecosystems: Managing risks across multi-tier supply chains
  • Emerging threats: AI, quantum computing, and IoT risks in supply chains
  • Compliance with the Cyber Resilience Act: Managing Third-Party Risks and Liabilities

Panel Discussion: Cyber Threats in the EV Ecosystem: More Than Just a Car

  • How software-defined vehicles (SDVs) create new cybersecurity risks
  • Risks of malware-infected charging stations and supply chain vulnerabilities
  • Could ransomware lock drivers out of their own cars?
  • The rise of vehicle takeover attacks—exploiting remote control capabilities

Panel Discussion: Insider Threats in the Banking Sector: Balancing Security, AI, and Compliance

Financial institutions face increasing risks from insider threats, whether through malicious intent, negligence, or compromised credentials. This panel will explore how banks can strengthen insider threat management, leverage AI-driven behavioural analytics, and meet new regulatory requirements

  • Main types of threats and challenges (malicious insiders, negligent insiders, compromised insiders)
  • Best practices for mitigating insider threats while balancing compliance, AI-driven monitoring, and employee training
  • Incident response and recovery (how banks should prepare for insider threat incidents)

Navigating the Legal and Technical Frontiers of Cybersecurity – NIS 2 and Beyond

  • Understanding of the regulatory landscape of cybersecurity, including the NIS2, and GDPR and national laws
  • Beyond Compliance – Cyber Risk Management & Criminal Liabilities
  • Criminal law aspects – when does a cybersecurity incident become a prosecutable offense?
  • Corporate liability – can executives be held responsible for non-compliance?

Key Focus Areas for Critical Industries in Cybersecurity and Resilience

Critical industries, such as energy, healthcare, finance, and manufacturing, are particularly vulnerable to cyber threats due to their foundational role in society and the economy.

This session explores how threat probability models, behavioral analytics, and deep network traffic analysis—combined with AI and integrated security platforms—can empower SoC teams to detect, prioritize, and neutralize threats before they cause harm.

Use Cases & Challenges: Practical examples of integrating security platforms and overcoming unified threat intelligence complexities.

14:00-14:30 The AI-Powered Evolution and Cybersecurity

How AI and Machine Learning are reshaping cybersecurity: Preparing for the future

  • AI and ML are transforming cybersecurity (threat and anomaly detection, predictive analysis and automated incident response)
  • Preparation involves understanding AI’s capabilities, risks, and implementation challenges

We explore how AI is reshaping the cybersecurity profession, from enhancing operational efficiency to creating entirely new responsibilities and opportunities.

  • New skills and expertise required
  • Related certifications
  • New career paths emerging at the intersection of AI and cybersecurity
  • Redefining organisational structures

This panel will explore global developments in AI regulations, including the EU AI Act and national AI strategies.

  • Understanding of the legal and regulatory requirements for AI systems
  • Strategies to ensure compliance with privacy laws and emerging AI regulations
  • The ownership of AI-generated content and inventions
  • How AI systems interact with existing copyright and intellectual property laws

AI agents detecting anomalies and preventing cyberattacks in real time. Varying degrees of autonomy and intelligence, depending on their design and purpose.

This is a preliminary program and is subject to changes in timings and content.

Get your tickets on time

Days
Hours
Minutes
Seconds
Don't miss out - Register today!

Ticket prices

Regular

In-person-ticket
380 Monthly
  • Access: Sessions and Keynote Speeches​
  • Special Activities: CSS Cyberfy Workshop​
  • Networking Opportunities​
  • Meals and Refreshments​
  • Conference Materials​
  • Exhibition Acces​s

Early Bird

In-person-ticket
260 Monthly
  • Access: Sessions and Keynote Speeches
  • Special Activities: CSS Cyberfy Workshop
  • Networking Opportunities
  • Meals and Refreshments
  • Conference Materials
  • Exhibition Access
Exp. 20/9/25

Special

Corporate-ticket
280 Monthly
  • Join us with your Team and get the best deal
  • Limited number available
  • 3+
  • Networking Opportunities
  • Refreshments and Meals