



Amsterdam Networking Forum 2026 Aligning IT, Security and Enterprise Resilience
Amsterdam Networking Forum
The Amsterdam Networking Forum is a senior-level executive half-day conference designed exclusively for CIOs, CISOs, and enterprise technology leaders navigating the increasing convergence of IT, security, risk, and regulation.
As organisations accelerate digital transformation, the traditional separation between IT and security leadership is no longer sustainable. Cloud adoption, AI-driven operations, regulatory pressure, and rising cyber risk demand a more integrated operating model — one built on shared accountability, resilience by design, and strategic alignment at the top.
This half-day conference brings together a highly curated peer group for high-level keynote insight, focused discussion, and meaningful networking, set within one of Europe’s leading technology and business hubs.
Who Should Attend
Attendance is limited to senior, in-house leaders including:
- Chief Information Officers (CIOs)
- Chief Information Security Officers (CISOs)
- Heads of IT, Infrastructure, Cloud, Digital and Security
- Senior enterprise and technology transformation leaders
Participation is by alignment and invitation only to ensure a senior, peer-driven environment.
Why Attend
- Gain clarity on how leading enterprises are aligning IT and security strategy
- Understand how resilience, automation, and compliance are being embedded at scale
- Learn how boards are reframing technology risk and accountability
- Exchange insight with senior peers facing similar organisational and regulatory pressures
- Leave with practical frameworks, not theoretical discussion
YOUR AGENDA FOR THE DAY
Registration and Networking
Opening Keynote: From Compliance to Continuous Resilience – Redefining Cybersecurity in Europe
- Shifting cybersecurity from technical control to board-level accountability and governance
- Moving beyond audits to continuous, provable compliance across NIS2, DORA, and the AI Act
- Embedding resilience into operations to handle inevitable, persistent attacks
- Aligning cyber strategy with business risk, regulatory exposure, and enterprise value
AI, Automation, and the New Threat Paradigm
- Understanding how AI is accelerating both attacks and defence capabilities
- Leveraging autonomous security operations to detect and respond in real time
- Managing risks from deepfakes, AI-powered phishing, and adversarial AI
- Balancing human oversight with automation to maintain trust and control
Solution Spotlights
Networking Coffee
Roundtable 1: Navigating NIS2, DORA, and the AI Act – From Overlap to Operational Clarity
- Breaking down regulatory overlap into clear, actionable frameworks
- Building unified reporting, governance, and risk management models
- Reducing compliance fatigue while maintaining audit-ready evidence
- Turning regulatory pressure into competitive advantage and trust
Roundtable 2: Securing the Digital Supply Chain in an Era of Geopolitical Risk
- Addressing exposure from third-party, fourth-party, and software supply chains
- Managing dependencies on foreign technologies and “high-risk” vendors
- Embedding secure-by-design principles under the Cyber Resilience Act
- Strengthening visibility across increasingly fragmented ecosystems
Roundtable 3: Identity, Access, and the Rise of Machine Identities
- Moving beyond human identity to secure APIs, bots, and AI agents
- Implementing dynamic, context-aware access controls at scale
- Reducing insider and privilege misuse risk through automation
- Building identity strategies aligned with Zero Trust architectures
Roundtable 4: Sovereign Cloud, Data Residency, and Digital Autonomy
- Navigating Europe’s push toward data sovereignty and regional cloud models
- Balancing innovation with regulatory and geopolitical constraints
- Assessing risks of hyperscaler dependency vs sovereign alternatives
- Designing architectures that ensure data control, compliance, and resilience
Closing Keynote Panel: Operationalising Cyber Resilience – From Detection to Recovery
- Moving beyond prevention to resilience, response, and rapid recovery
- Leveraging AI-driven detection for real-time threat mitigation
- Integrating cyber, risk, and business continuity functions
- Measuring resilience through business impact, not just technical metrics
Register Your Interest
Attendance is limited and confirmed based on role, seniority, and relevance.
Register your interest to receive further details and confirmation.