- Sophisticated Cyber Threats and Attacks: As the cyber threat landscape continues to evolve with increasingly sophisticated and persistent attacks, learn how to defend against advanced threats that can bypass traditional security measures
- Supply Chain and Third-Party Risk: Brainstorm the best ways to assess and manage the security posture of vendors, partners, and suppliers to prevent potential vulnerabilities from compromised systems
- Zero Trust Implementation: How can you rethink traditional security models, establish strict access controls, and ensure seamless user experiences?
- Regulatory and Compliance Complexities: Navigate a web of regulations, from GDPR and CCPA to emerging laws, and ensure their organization’s data handling practices align with these requirements
- Talent Acquisition and Retention: The persistent shortage of skilled IT professionals continues to challenge CIOs in building and maintaining high-performing teams. What do you need to do to attract top-tier talent, upskill existing employees, and foster a culture of continuous learning to navigate talent scarcity?
WELCOME TO CYBERSEC 2025 Where Visionary Cybersecurity Leaders Unite to Fortify Tomorrow's Digital Frontier!
Discover the ultimate gathering ground for trailblazing CISOs and cybersecurity leaders at CyberSec 2025. As the technology ecosystem continues to evolve at an unprecedented pace, and every digital interaction carries unprecedented importance, the role of the CISO has never been more critical.
Join us at CyberSec 2025 and discover the insights, strategies, and connections that will empower you to safeguard the digital landscape of the future.
CyberSec 2025 is not just a conference; it's a nexus of innovation, collaboration, and forward-thinking insight.
Our high-level keynote presentations, interactive panels and round table discussions, led by industry luminaries and visionaries, will delve into the most pressing challenges and emerging trends in the cybersecurity landscape.
From AI-powered threat detection to blockchain-driven data integrity, our agenda is tailored to empower you with the tools and knowledge to stay ahead of the cyber curve.
Engage with a community of like-minded professionals who share your passion for defending against digital threats, and explore innovative solutions that will shape the future of cybersecurity.
Your seat at the CyberSec 2025 table awaits – let's shape the future together!
OUR PARTNERS...
SOME OF OUR ATTENDEES...
SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS
250
Thought Leaders on Site
30 +
Solutions on Show
57%
of IT leaders have been given extra budget to cope with the post-Covid WFH scenario
71%
of IT leaders prefer physical events to virtual events
42%
of IT leaders identify data security as a top priority
TOPICS TO BE COVERED INCLUDE
Who Should Attend?
FIELD
IT Security, 78%
Data, 12%
Governance, 10%
SENIORITY
C-Level, 60%
Directors/VP, 25%
Project Leads, 15%
- WFH & Hybrid
- Digital Transformation
- Cloud
- Collaboration
- Security
- Tooling
- Leadership
“Great discussions with other like-minded experts” – EAO
“A super opportunity to take a step back, reflect, see“A super opportunity to take a step back, reflect, see & learn things from other industries.”& learn things from other industries.” – IQVIA
“The room was truly world class. You could not imagine a better group to discuss what we discussed” – RightCrowd
EPN IT Vision at a Glance / Top 3 reasons you should attend
1: Save time & money by meeting your peers & discovering new technologies all in one place
2: Take part in dynamic discussions, tailored to you and your specific business concerns
3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks.
You have full control of your agenda.
Expert Insights
20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…
Exclusive Features
A new awards show, match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…
Like-minded Senior Peers
Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…
New Technologies
Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…
YOUR AGENDA FOR THE DAY (CLICK BELOW TO EXPAND)
Registration and Coffee
Opening Keynote Panel Discussion: Beyond Transformation: Building the Secure, Adaptive Enterprise of the Future”
In an era defined by accelerated disruption — from AI and automation to evolving cyber threats and regulatory demands — CIOs and CISOs are no longer supporting roles; they are co-strategists shaping the enterprise of tomorrow. This panel convenes senior technology and security leaders to explore how organisations can architect secure, adaptive digital ecosystems that drive resilience, innovation, and long-term growth across industries.
- How CIOs and CISOs are enabling new business models and operational agility through secure, scalable platforms
- Elevating the CIO–CISO partnership to board-level strategy — ensuring that innovation and protection go hand-in-hand
- Embedding cybersecurity, data integrity, and privacy as pillars of digital trust and competitive differentiation
- Managing risk and governance across rapidly evolving technology landscapes and extended value chains
- Building adaptable digital foundations that can respond to uncertainty — geopolitical, environmental, regulatory, and technological
Bernd Wenninger, Chief Information Officer, A3M Global Monitoring
Titus Hientzsch, Group Chief Technology Officer, World Freight Company International
Robert Hellwig, Chief Information Security Officer, University of Siegen
Solution Spotlight Sessions
Spotlight #1 – Reserved for Bug Bounty
Spotlight #2 – Reserved for Hacker One
CYBERSEC Roundtable CYBER1: Reserved for Cobalt
CYBERSEC Roundtable CYBER2: Reserved for Illumio
CYBERSEC Roundtable CYBER3: Cyber Risk Management Meets Reality – Pathways to Resilience Abstract:
Only an end-to-end approach enables comprehensive cyber risk management and the development of true resilience.
- Cloud security ensures seamless protection across all systems
- Zero Trust as a dynamic, multi-layered defense strategy
- Threat Intelligence & Defense supports data-driven decision-making
Ashar Javed, Chief Information Security Officer, Hyundai AutoEver Europe GmbH
CYBERSEC Roundtable CYBER4: Quantum Risk Strategy: Shaping National and Enterprise Security in a Post-Quantum Future
- How should boards and CISOs assess and prioritize the long-term risk posed by quantum computing?
- Strategic roadmapping: aligning post-quantum cryptography (PQC) adoption with digital transformation goals.
- The geopolitical dimension: how quantum capabilities could shift cyber power balances — and what that means for Swiss and European digital sovereignty.
- Developing national frameworks and enterprise strategies for crypto-agility and long-term resilience.
- How can Switzerland become a leader in quantum-secure infrastructure, standards adoption, and innovation?
Alexandra Forsyth, Threat Intelligence Lead
Lunch and Networking
CYBERSEC KEYNOTE: AI-Powered Web Defence: Stopping 1.7M Attacks, Exposing 15 Lethal Web Patterns & 700+ Malware IPs
Facing one million daily web requests hitting our WAF—not all benign—our AI-powered regex suite separates friend from foe, ensuring only legitimate traffic reaches our 150+ live web applications. We’ve processed at least 242 million requests and counting, blocking 1.7 million attack payloads (0.70%) without disrupting business. Using ChatGPT, Grok, Gemini, and Claude, we crafted regex patterns that exposed 15 lethal web attack vectors tied to malware, coin miners, and trojans. Ongoing tuning slashed false positives from 0.9% to 0.4%, with further gains ahead. Reporting 749 malware-serving IPs to URLHaus triggered over 420+ takedowns. This talk shares our dynamic methodology, statistics, and insights, empowering attendees to strengthen defences affordably. Join us to discover how AI is revolutionising web security today—and setting the foundation for even stronger protection tomorrow.
Ashar Javed, Chief Information Security Officer, Hyundai AutoEver Europe GmbH
CYBERSEC KEYNOTE: The New Cyber-Physical Frontier: Securing the Convergence of IT, OT, and IoT
- The increasing attack surface from the integration of operational technology (OT) with IT networks.
- Critical infrastructure under pressure: why the convergence is a national security issue.
- Real-world breaches: lessons from high-profile attacks on energy, manufacturing, and smart city systems.
- Building unified security frameworks across siloed environments — and aligning with zero trust architecture.
- Governance, visibility, and incident response in hybrid IT/OT environments
End of Conference
YOUR TECHNOLOGY SHOWCASE
Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Vision 2025.
Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CIO community.
- ITSM
- Identity & Access Management
- Communications
- API
- IOT
- Remote IT
- CRM & ERP
- DevOps
- Network Infrastructure
- 3rd Party Risk
- Cloud Management
- Data Management
- AI & Automation
- Mobile & Applications
- Monitoring & Reporting
- Security
TITANIUM
- Exhibition Space in Tier 1 Area
- Product Demo
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
Co-branding on All Literature - Priority networking
- Bespoke Thought Leadership Dinner the night before
PLATINUM
- Exhibition Space in Tier 1 Area
- Product Demo/ Keynote Speech
- 5 x 121 meetings in the build up and over the course of the day
- Co-branding on All Literature
- Priority networking
- Host a Roundtable
GOLD
- Exhibition Space in Tier 1 Area
- Product Demo
- 5 x 121 Meetings in the build up and over the course of the day
- Co-Branding on All Literature
- Priority Networking
SILVER
- Exhibition space in Tier 2 Area
- 3 x 121 Meetings in the build-up and over the course of the day
- Co-Branding on Some Literature, Networking Sponsorship
BRONZE
- Exhibition space in Tier 3 Area
- Co-Branding on Some Literature
- Networking Sponsorship
ENTRY-LEVEL SPONSORS
- Branded Table in the Coffee Area
- Networking Sponsorship
Take Part in the Conference / Top 3 ways you can gain exposure
1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.
2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.
3: We know the power of face-to-face business networking. You should be part of the conversation.
Thought-Leadership
Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.
Brand Visibility
Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.
Demonstrating Value
Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them