Thriving Amidst Uncertainty – Navigating Europe's Compliance and Resilience Challenges
In an era defined by fractured geopolitics, AI upheaval, and relentless cyber threats, the concept of leadership in cybersecurity is evolving. This summit brings together the sharpest minds to discuss what it means to lead with clarity, resilience, and strategic vision. Topics range from managing regulatory complexity and converting data into a competitive advantage to fostering comprehensive resilience and transforming global risks into actionable strategies at the board level. This is where cyber leaders influence the future.
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Core Themes
Cyber Leadership in a Fractured Geopolitical and Regulatory Landscape
As cyber threats intersect with geopolitical instability, AI disruption, and fragmented regulation, today’s leaders must shift from technical experts to strategic influencers. Resilience now demands more than compliance, it requires real-time intelligence, cross-functional alignment, and the ability to turn global risk into board-level action. In this landscape, leadership means guiding with clarity, adapting with agility, and building confidence through uncertainty.
Beyond the Breach: Building Holistic Cyber Resilience
Ransomware is surging across Europe, exposing critical weaknesses in how organisations prepare for and recover from disruption. In a cloud-first, high-risk environment, resilience goes beyond response, it hinges on a culture of readiness, validated continuity plans, and integrated recovery. True cyber resilience is shaped by proactive design, cross-functional coordination, and built-in recovery capabilities.
Data as a Strategic Asset in the Age of AI and Cloud
As Agentic AI begins to be implemented by leading technology providers, it signals a shift in how data is generated, accessed, and secured. Though not yet widespread, its impact will be profound. Cyber leaders must proactively rethink data governance and protection, treating data with the same strategic rigour as software to ensure it remains secure, compliant, and a catalyst for innovation in a cloud-first world.
Agenda
1:10 pm - 1:30 pm
Keynote
From Chaos to Continuity: Building a Recovery-Ready Culture
Ransomware isn’t a matter of if—it’s when. Every organisation faces the risk, and having a solid recovery plan is no longer optional. In this keynote, Tony Jowett, CISO at ITV, breaks down what it takes to bounce back fast, especially in today’s cloud-first world. It’s time to ask: If everything failed tomorrow, how ready would you be?
Join this keynote to discuss:
- How the CISO job is impossible but you can how you make it easier by matching strategy to situation
- Resilience Starts with People: It’s not just about tech. Discover how mindset, behaviour, and teamwork shape your ability to recover fast
- Focus on Securing what Matters - first decide what matters and then build in Continuity by Design:
Adopt a security approach that is explainable and is in line with the appetite of the business whether cloud or on premise
1:40 pm - 2:20 pm
Panel
Agility Over Anxiety: Leading Cyber Strategy in a World of Constant Change
The world isn’t getting any simpler—geopolitical tensions are rising, regulations are shifting, and cyber threats are moving faster than ever. In this environment, cyber leaders need more than just good instincts—they need real-time intelligence to stay ahead of the curve. This panel dives into how today’s cyber execs can cut through the noise, track what really matters, and use threat intelligence to guide smart, strategic decisions. It’s about staying agile, aligning with global developments, and building resilience when the ground keeps shifting.
In this panel, we’ll discuss:
- Geopolitical Awareness: How to track global events that shape cyber and business risk
- Regulatory Agility: Staying sharp and responsive as compliance demands evolve
- Intelligence-Driven Strategy: Turning real-time threat insights into action
2:20 pm - 2:45 pm
Keynote
Simplifying Cybersecurity
As cybersecurity has grown more complex with escalating threats and consequences, revisiting the fundamentals takes extra importance. Join ThreatLocker Cristiano Guerrieri as he cuts through the noise to what matters most for practical and effective security. We'll explore simple things you can do to stop cyberattacks so you can better protect your organization today.
3:00 pm - 4:00 pm
Roundtables
Track 1: Code Security in the Age of AI
As AI code assistants become standard, leaders must capture speed gains without expanding risk. Traditional SAST and code-review stacks often create alert fatigue, miss business context, and slow delivery. This roundtable focuses on how executives can enable AI safely, reduce noise with validated signals, and build audit-ready assurance- so engineering can move faster with confidence.
Join this session to explore:
Enablement with guardrails: Where AI is permitted or restricted, how AI assistance is attributed in commits/PRs, data boundaries for tools, and when human review is required for sensitive paths (auth, crypto, payments, PII, IaC).
From alerts to decisions: Converting SAST/SCA/secret/IaC findings into PR-native, business-aware signal—cross-tool de-duplication, enrichment by asset/data criticality, suggested fixes with rationale, and clear escalation flows.
Scaling what works: Patterns that keep speed while reducing noise—risk-tiered gates, PR-embedded triage, and expert-in-the-loop validation where appropriate. We’ll compare tooling, define a 90-day pilot, pick success metrics (merge latency, fix rate, false-positive reduction), and share how teams plan to adopt.
Track 2: The Expanding Risk Zone – Bridging the Gap Between Alert, Response and Recovery
In an era where crises are faster, more complex, and more interconnected than ever, organisations must move beyond traditional incident response. This roundtable explores how to close the critical gap between the moment an alert is triggered and the full return to operations. We’ll discuss real-world strategies for accelerating decision-making, streamlining response coordination, and driving faster recovery—while maintaining business continuity throughout.
Key Takeaways:
- How to operationalise real-time threat intelligence across global teams
- Best practices for accelerating time to resolution and minimising business impact
- The role of automation and AI in reducing response delays and errors
- Strategies for ensuring end-to-end visibility from alert to recovery
4:10 pm - 4:40 pm
Presentation
Humans: The Weakest Link or the Strongest Shield?
Across the cyber world, insider risk is emerging as the most underestimated yet most likely cause of a breach, especially as generative AI amplifies the potential for manipulation and error. This session explores how organisations can transform their people from passive vulnerabilities into active defenders through culture change, education, and smarter processes across borders. If the human factor is the tipping point, what are you doing to tip it in your favour?
Key Takeaways:
- Insider risk isn’t just a threat; it’s the most probable breach vector
- Culture change beats training: mindset matters more than modules
- Your people can be your greatest defence if you build the right environment
4:45 pm - 5:15 pm
Sponsor Workshop
The AI Promised Land: How Security Leaders Can Accelerate AI Without Losing Control
The AI era is here, and every organization is racing to harness its potential. Yet as proprietary data becomes the fuel for innovation, it also amplifies risk. Shadow AI, ungoverned data use, and emerging AI threats can derail progress before it starts. In this session, discover how leading enterprises are embedding data security and AI guardrails at the core of their strategies. Learn proven best practices to protect sensitive data, mitigate AI security and compliance risks at scale, and confidently accelerate your journey to the AI Promised Land.
5:20 pm - 5:50 pm
Interactive Session
7:20 pm - 9:30 pm
Gala Dinner
8:30 pm - 8:55 pm
Dinner Keynote
Beyond Defense: Building Cyber Resilience as a Business Advantage
In today’s hyperconnected digital world, cybersecurity is not just a technical necessity but also a key driver of customer trust and business value. Traditional defense strategies are no longer sufficient. This keynote will show how organizations can move beyond defense and embrace cyber resilience as a strategic advantage that directly benefits customers.
Attendees will learn how building cyber resilience enhances customer trust, loyalty, and confidence in products and services. They will see ways to design security and operational resilience into customer-facing processes to ensure seamless experiences even during disruptions. The session will include real-world examples of organizations that turned potential cyber threats into opportunities to deliver superior customer value. Practical strategies will also be shared to prepare for, respond to, and recover from cyber incidents while minimizing impact on customers.
This session empowers business leaders and IT executives to view cybersecurity not just as a defensive measure but as a competitive differentiator that strengthens customer relationships and drives long-term business growth. Attendees will leave understanding how resilient organizations do more than survive cyber challenges and instead turn them into opportunities to deliver greater value and confidence to their customers.
8:00 am - 8:40 am
Panel
Security Doesn’t Sell Itself: How to Win Hearts, Minds & Budgets
In many organizations, the best ideas don’t always win; the best storytellers do. Security leaders often find themselves up against shifting priorities, internal politics, and decision-makers who speak a different language. This session is about turning influence into impact. We’ll explore how to navigate complex dynamics, connect security to what the business cares about, and use smart tools and external validation to make your case stick. Whether you're presenting to the board or working the backchannels, this panel will help you move from insight to action—and get the buy-in you need.
What we’ll cover:
- Strategic Influence: Navigate internal politics while staying true to your values
- Stakeholder Alignment: Speak the language of the business—even when it’s not your native tongue
- Credibility That Counts: Use external validation, smart tooling, and data to back your case and win support
8:40 am - 9:10 am
Keynote
Trends, Risks & Opportunities In The Age Of Exponential Video Growth
Security challenges caused by an explosion in data and threats from AI are nothing new, but the proliferation of video as a medium represents unique challenges and is rapidly becoming a significant data governance and security vulnerability for the enterprise. Recent developments in video technology present new risks, but also major opportunities if they are leveraged in the right way.
This session aims to enlighten leaders on the unique risks of this "video sprawl" and outline a clear path to transforming this liability into a controlled, compliant, and competitive asset.
9:20 am - 12:10 pm
1:1 Meetings
9:20 am - 10:20 am
Roundtables
Track 1: Crafting a Modern Data Strategy in the Age of Agentic AI
The rise of Agentic AI is revolutionising data creation and consumption, presenting new challenges and opportunities for security teams. As AI agents proliferate, they bring complexities in data governance, identity management, and risk mitigation. How can organisations develop a robust data strategy that leverages AI while safeguarding critical assets?
Join this session to explore:
- Navigating AI-Driven Data Creation: Effective practices for ongoing monitoring to identify risks associated with shadow AI and dark data
- Rapid Response Techniques: Strategies for quick investigation and response to insider threats and AI-related vulnerabilities
- Evolving Data Protection: Adopting a risk-based approach to protect mission-critical data and support innovation in the AI era
Track 2: The Expanding Risk Zone – Bridging the Gap Between Alert, Response and Recovery
In an era where crises are faster, more complex, and more interconnected than ever, organisations must move beyond traditional incident response. This roundtable explores how to close the critical gap between the moment an alert is triggered and the full return to operations. We’ll discuss real-world strategies for accelerating decision-making, streamlining response coordination, and driving faster recovery—while maintaining business continuity throughout.
Key Takeaways:
- How to operationalise real-time threat intelligence across global teams
- Best practices for accelerating time to resolution and minimising business impact
- The role of automation and AI in reducing response delays and errors
- Strategies for ensuring end-to-end visibility from alert to recovery
Track 3: AI vs AI: Defending the Digital Frontier
In today’s cyber battlefield, artificial intelligence is both the weapon and the shield. As attackers deploy AI to launch faster, more adaptive threats, CISOs must harness equally advanced AI-driven defences to detect, respond, and outmanoeuvre them. This session explores how security leaders can stay ahead in this escalating arms race, where speed, automation, and intelligence are everything.
Join this session to discover:
- The evolution of AI-powered attacks and the strategies to counter them
- How automated detection is transforming threat visibility
- Enhancing behavioural analysis and threat context through intelligent systems
10:30 am - 11:00 am
Future Focus Speakers
Cyber Crisis Mastery: Leading with a Holistic Approach
As cyber threats grow in complexity and speed, traditional crisis response models—often hindered by siloed roles and fragmented communication—are no longer sufficient. A holistic approach to crisis management is essential, requiring cross-functional collaboration, shared situational awareness, and a strong security culture. CISOs must lead the charge in transforming legacy practices, embedding security into business continuity, and equipping the workforce to respond decisively under pressure.
Key Takeaways
- Lead Holistically: Break down silos and foster integrated, cross-functional crisis response strategies
- Build a Cyber-Ready Culture: Empower your workforce with the mindset, skills, and awareness to act swiftly and confidently
- Drive Change with Trust: Overcome resistance by building trust, promoting transparency, and aligning stakeholders around shared goals
11:05 am - 11:35 am
Sponsor Workshop
“See It. Rank It. Control It. Where Confidence Begins.”
Security programs keep getting more sophisticated, but many still skip the basics. This session goes back to the fundamentals that everything else depends on seeing every asset, user, and application in your environment; knowing which ones actually matter; and being confident that your controls are doing what they’re supposed to.
We will break down how visibility, prioritization, and control assurance work together, and where the biggest gaps usually sit. You will see how Lansweeper helps close those gaps today, where we’re taking it next, and have a chance to share what’s missing from your own perspective.
12:35 pm - 1:00 pm
Closing Keynote
Aligning innovation with trust and regulation
1:05 pm - 2:10 pm
1:1 Meetings
2:15 pm - 2:30 pm
Beyond the Challenges
Grand Hotel Huister Duin - Noordwijk, Netherlands
Located on the highest dune of Noordwijk, Grand Hotel Huis ter Duin is the ultimate getaway at the beach; Get a breath of fresh air on the beach, enjoy culinary delights and relax in the spa. Hospitality, perfection and superior service make this hotel a unique location
Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.