Cloud & Cyber Security Expo Day 2 Highlights

Hype to Hard Truths: Aligning AI Adoption with Data Security

Andy Aplin, VP of Solutions Engineering - Netskope

This session moved past the hype to address the essential preface to any AI strategy: data organisation. We will explore the four pillars of data readiness and the shift towards a unified, data-centric security posture - ensuring your foundation is secure before enabling AI everywhere.

The Evolving Role of the Cybersecurity Leader: From Technical Expert to Trusted Business Partner

Sudarshan Ratnavelu, CISO - Financial Services Compensation Scheme

This session examined the common pitfalls that have historically limited IT and security leaders' effectiveness, the critical shift towards stakeholder management and business alignment, and practical approaches to engaging with boards and executives. Through real-world examples and evidence from current market trends, you'll discover why communication, storytelling, and financial acumen have become as essential as technical expertise—and how to develop these capabilities to elevate your impact and career.

AI, Humanity & Security: Protecting Trust in an Autonomous Digital World

Asim Khwaja, Government Cyber Risk & Policy, AI - Confidential Government Entity

Fahad Burney, Head of Operational Risk - ICBC Bank

Nasser Arif, Cyber Security Manager - London North West Healthcare NHS Trust and The Hillingdon Hospitals NHS Foundation Trust

Toni-Ann Grant, Principal Security Architect - BT

Fatiha Zeghoudi, CEO - CySafe Consulting

Priyanka Chatterjee, CEO - London School of Cybersecurity

This panel examined the intersection of AI, cybersecurity, ethics and human resilience. We explore how AI shifts the balance between attackers and defenders, how algorithmic decisions impact people’s rights and lives, and how nations can build guardrails that protect human values without suppressing innovation. Topics include AI-driven cyber threats, digital identity, deepfakes, safety of autonomous systems, quantum-era risks, and the ethical dilemmas of using AI in policing, critical services, and national security.

The Emerging Challenges of Quantum Computing and Increased Data Security

Mark Balsom, Head of Sales Engineering - Securosys SA

Mark discussed how to anticipate these challenges and take full control of the proliferation of cryptographic keys and certificates across a typical company's infrastructure. Taking control in this way is also the foundation for post-quantum readiness – we will explain why this is so important and how organisations can prepare.

Copilot & Ai Agents: Permissions and Compliance

James Nganga, Partner Account Manager - Hornetsecurity by Proofpoint

In this eye-opening session, it was revealed why AI itself isn’t the Trojan horse — unmanaged access rights are. Discover how overshared SharePoint sites, forgotten links, and hidden permissions can expose sensitive data when AI tools surface everything users technically have access to.

From Discovery to Control: A Zero Trust Approach to Securing Agentic AI

Andrew Bushby, VP Sales Engineering - Delinea

This session explored the risks of agentic AI and shows how identity security must evolve to real-time, context-aware, ephemeral authorization. Using real-world examples, we’ll demonstrate how AI-powered identity security enables agent discovery, continuous analysis, and real-time monitoring to stop risky behavior as it happens.

Vendor-Neutral Endpoint Resilience in a Hyperscaler-Dominated World

Romanus Prabhu, Director of Product Support & Security Evangelist - ManageEngine

This talk presented a practical framework for sovereign and vendor-agnostic endpoint resilience, enabling organisations to retain operational command, preserve sensitive telemetry under the right jurisdiction, and avoid lock-in.

The Deepfake Interview: Breaking In From the Inside

Jake Moore, Cyber Security Specialist - ESET

Jake demonstrated how AI can clone voices, generate convincing documents and create fake identities in seconds, giving cybercriminals everything they need to scale deception like never before. Nothing is real anymore. The question is, would you spot it?

The AI Oversight Crisis: Taming the New Shadow IT

Chris Hosking, AI & Cloud Security Evangelist - SentinelOne

Shadow AI has emerged as the next evolution of shadow IT, with widespread employee adoption of tools such as ChatGPT introducing unmanaged data exposure and autonomous decision risk. This session outlined a pragmatic control model for securing AI without slowing adoption.