Cloud & Cyber Security Expo Day 1 Highlights
Ransomware 3.0, The Duality of AI, and Front-Line Lessons That Are Working for CISOs
Frank Satterwhite, Principal Cyber Security Consultant - 1600 Cyber GmbH
Ray Stanton, CISO - AI DIONIC
Stephen Khan, Chief Information Security Officer - Cognizant Technology Services
Based on front-line incident response, this session breaks down what is actually working for CISOs today, from AI-assisted threat and decision analysis to cyber vaults, clean-room recovery, identity-led containment, and pre-authorised response models. Attendees left with practical design choices for managing ransomware as a board-level risk and restoring control under legal, regulatory, and operational pressure.
Your Security Data & KPIs are Lying to You: CTEM Through the Attacker’s Lens
Keith Poyser, VP EMEA - Horizon3.ai
Most CTEM programs measure exposure. Few reveal how the business would actually be compromised. As defence and offence move to machine speed, risk decisions are still driven by simulations, control coverage, and theoretical exploitability, approaches that struggle to reflect how real attacks succeed. Credential abuse, lateral movement, and operational context remain the industry’s most persistent blind spots. In this session, Horizon3.ai VP EMEA Keith Poyser reframes CTEM through the attacker’s lens, arguing that validating risk in production, at scale, is essential to separating signal from noise and replacing probability with proof.
From Heritage to Innovation: Securing Dr. Martens' Digital Retail Journey
Theo Botha, Global CISO - Dr Martens
Christian Reilly, Field CTO - Cloudflare
With a rich heritage rooted in brick-and-mortar retail, Dr. Martens is reimagining the shopping experience. This conversation delved into the practical realities of digital transformation in retail - from the challenges of modernising legacy infrastructure to the opportunities presented by AI-powered personalisation and emerging agentic commerce. Christian Reilly, Field CTO at Cloudflare and Theo Botha, CISO at Dr Martens sat down and explored the important role that security and performance play in enabling innovation at scale, and how Cloudflare's platform underpins Dr. Martens' ambitious digital strategy.
Securing the Network-Cloud Continuum for the AI Supercycle
Nigel Abraham, Customer CTO UK&I - Nokia Europe
The AI Supercycle will see the growth of AI inferencing in multi-agent distributed systems, the optimisation of compute for AI workloads and the network evolution of deterministic, high-capacity, low-latency networks that allow AI to work everywhere, not just in the cloud. This session explored how the AI supercycle is reshaping security and connectivity requirements and what this means for the future of intelligent, high-performance networks and data centre infrastructure that is under increasing pressure to scale, perform, and adapt at speed.
Immutable Change: Context Engineering and The Future of Data-Centric Security
Ash Hunt, VP of Strategy - Cyera
For years, security teams have been able to answer nearly every question about enterprise activity - who did something, what they did, and when it happened. But one critical question has remained largely unanswered: Why? Now, as agentic orchestration permanently reshapes enterprise architecture and automation scales at unprecedented speed, understanding why activity occurs across the ecosystem is no longer optional. It’s essential. Only a data-centric architecture, built with identity at its core, can provide the context needed to finally answer that last question.
Resilient by Design: Building High-Performing Security Teams Without Burning Out
Nisha Patel, CISO - Ocorian
A practical look at how to build high‑performing security teams that can deliver consistently without burning out. Nisha Patel shared proven approaches to designing resilient team structures, fostering psychological safety, and embedding sustainable ways of working - ensuring security functions remain effective, healthy, and ready for whatever comes next.
The AI Trust Gap
Charlotte Wilson, Head of Enterprise - Check Point
How do you scale AI at full throttle when trust is the biggest barrier? This session cuts through the hype to show leaders how to accelerate AI adoption without sacrificing security, governance, or confidence. We explore the real blockers - data integrity, model transparency, organisational readiness - and reveal practical strategies to build trust into every layer of your AI programme.
Machine vs Machine: Winning the New Security Arms Race
William Mireles, Solution Engineer - Sublime Security
Drawing on recent Google Threat Intelligence findings, this session revealed how nation-state actors and cybercriminals are already weaponising AI while showcasing how defensive AI agents can create self-improving security systems. Learn how the constraints of cost, latency, and efficacy are shaping this machine-vs-machine future, and discover how autonomous agents and domain-specific languages enable a continuous feedback loop to rapidly strengthen defences.
Agentic AI in SecOps: What’s Real, What’s Noise
Chas Clawson, CTO Security - Sumologic
AI agents are entering the SOC whether we’re ready or not. Chas Clawson, VP of Security Strategy at Sumo Logic, examines what this means for analysts, how agentic AI should (and shouldn’t) be used, and practical guidance for turning this promising technology into real operational value without compromising trust, control, or security.
When Reality Lies: Deepfakes and the evolution of phishing APT
James Dyer, Threat Intelligence Lead - KnowBe4
Phishing has always been the favoured gateway for advanced persistent threats - but AI has rewritten the rules. In this session, James Dyer exposes how a recent large-scale phishing APT leveraged deepfakes, cloned voices, and generative AI to create unprecedented levels of deception and persistence.
200,00 Pentests Later: Inside the Adversary’s Mindest from the Cyber Trenches
AJ Nurcombe, Solutions Architect, EMEA - Horizon3.ai
To defeat the adversary, we must move beyond tracking their tools - we must understand their mind. The traditional approach to cybersecurity has focused relentlessly on the technical what (malware signatures, TTPs) and the macro why (geopolitical tension, economic drivers). However, the next decisive frontier in intelligence and defence requires a pivot to the who: the personality dynamics that fuel cyber threat actor groups and using autonomous tools to follow in their footsteps.
Cloud & AI Infrastructure
DevOps Live
Cloud & Cyber Security Expo
Big Data & AI World
Data Centre World