- Sophisticated Cyber Threats and Attacks: As the cyber threat landscape continues to evolve with increasingly sophisticated and persistent attacks, learn how to defend against advanced threats that can bypass traditional security measures
- Supply Chain and Third-Party Risk: Brainstorm the best ways to assess and manage the security posture of vendors, partners, and suppliers to prevent potential vulnerabilities from compromised systems
- Zero Trust Implementation: How can you rethink traditional security models, establish strict access controls, and ensure seamless user experiences?
- Regulatory and Compliance Complexities: Navigate a web of regulations, from GDPR and CCPA to emerging laws, and ensure their organization’s data handling practices align with these requirements
- Talent Acquisition and Retention: The persistent shortage of skilled IT professionals continues to challenge CIOs in building and maintaining high-performing teams. What do you need to do to attract top-tier talent, upskill existing employees, and foster a culture of continuous learning to navigate talent scarcity?



WELCOME TO CYBERSEC 2025 Where Visionary Cybersecurity Leaders Unite to Fortify Tomorrow's Digital Frontier!
Discover the ultimate gathering ground for trailblazing CISOs and cybersecurity leaders at CyberSec 2025. As the technology ecosystem continues to evolve at an unprecedented pace, and every digital interaction carries unprecedented importance, the role of the CISO has never been more critical.
Join us at CyberSec 2025 and discover the insights, strategies, and connections that will empower you to safeguard the digital landscape of the future.
CyberSec 2025 is not just a conference; it's a nexus of innovation, collaboration, and forward-thinking insight.
Our high-level keynote presentations, interactive panels and round table discussions, led by industry luminaries and visionaries, will delve into the most pressing challenges and emerging trends in the cybersecurity landscape.
From AI-powered threat detection to blockchain-driven data integrity, our agenda is tailored to empower you with the tools and knowledge to stay ahead of the cyber curve.
Engage with a community of like-minded professionals who share your passion for defending against digital threats, and explore innovative solutions that will shape the future of cybersecurity.
Your seat at the CyberSec 2025 table awaits – let's shape the future together!
OUR PARTNERS...
SOME OF OUR ATTENDEES...
SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS
250
Thought Leaders on Site
30 +
Solutions on Show
57%
of IT leaders have been given extra budget to cope with the post-Covid WFH scenario
71%
of IT leaders prefer physical events to virtual events
42%
of IT leaders identify data security as a top priority
TOPICS TO BE COVERED INCLUDE
Who Should Attend?
FIELD
IT Security, 78%
Data, 12%
Governance, 10%
SENIORITY
C-Level, 60%
Directors/VP, 25%
Project Leads, 15%
- WFH & Hybrid
- Digital Transformation
- Cloud
- Collaboration
- Security
- Tooling
- Leadership
“Great discussions with other like-minded experts” – EAO
“A super opportunity to take a step back, reflect, see“A super opportunity to take a step back, reflect, see & learn things from other industries.”& learn things from other industries.” – IQVIA
“The room was truly world class. You could not imagine a better group to discuss what we discussed” – RightCrowd
EPN IT Vision at a Glance / Top 3 reasons you should attend
1: Save time & money by meeting your peers & discovering new technologies all in one place
2: Take part in dynamic discussions, tailored to you and your specific business concerns
3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks.
You have full control of your agenda.
Expert Insights
20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…
Exclusive Features
A new awards show, match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…
Like-minded Senior Peers
Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…
New Technologies
Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…
YOUR AGENDA FOR THE DAY (CLICK BELOW TO EXPAND)
08.00 Registration and Coffee
09.00 Opening Keynote Panel Discussion: Shaping the Future of IT and Cybersecurity Leadership
- The CIO-CISO Vision for 2030: Predictions for the evolution of IT and cybersecurity roles in the next five years
- Emerging technologies: how will advancements in AI, quantum computing, and 6G redefine opportunities and threats?
- Exploring how cross-functional teams and strategic partnerships can drive value
- Legacy vs. innovation: strategies for modernizing legacy systems while embracing disruptive technologies
- Audience Q&A: an interactive dialogue to address pressing questions and actionable takeaways for the future
Shamsaldin Al-Said, Head of Cybersecurity, Brinks Global Services
Adam McGreggor, CISO, Railsbank
Marius Poskus, CISO, Glow Financial Services
Cavan Fabris, Partner – Data & Cyber, RPC
Moderated by:
Alan Jenkins, Principal, Cybersecurity Navigator
09:30 Solution Spotlight Sessions
Solution spotlight #1 –Trust Exploited: Stopping Vendor Email Compromise Before the Wire Moves by David Lomax, Senior Solutions Engineering Manager EMEA, Abnormal AI
Solution spotlight #2–Confident Phishing Defence: The Power of Controlled & Transparent Automation by James Hickey, Principal Sales Engineer, Cofense
Solution spotlight #3 – Beyond Breach Prevention: Building Adaptive Resilience Against AI-Enabled Threats by Richard Meeus, Senior Director Security Technology and Strategy, EMEA, Akamai
Solution Spotlight #4 –Building Cyber Resilience: Proven Strategies to Safeguard Your Mission-Critical Applications Both On-Prem and in Cloud by Karl Fontanari, Territory Account Manager, Arcserve
10.30 Morning Coffee and Networking
10.50 Interactive Roundtable B1: Securing the Supply Chain: A Practitioner’s Roundtable on Vendor Email Compromise
An interactive Roundtable to map the end‑to‑end VEC kill chain, pinpoint where trust is implicit in vendor and invoice workflows, and co‑build operational guardrails across AP/Finance, SecOps, and Procurement. Participants leave with a prioritised control list, measurable metrics, and optional follow‑up resources.
- A shared view of the VEC lifecycle and exact intervention points across email, identity, and payment workflows.
- A low‑friction control set aligned to finance realities: verification steps for vendor changes, approval guardrails, and anomaly detection.
- A lightweight reporting model executives trust: dollars at risk prevented, mean time to verify, and exception rates.
David Lomax, Senior Solutions Engineering Manager EMEA, Abnormal AI
10.50 Interactive Roundtable C1: How to Adjust Your PAM Strategy for Growth
The best way to adjust your Privileged Access Management (PAM) strategy for growth is to choose a modern PAM solution that scales with your organisation. You may face many challenges when adjusting your PAM strategy as your organisation grows, including more complex infrastructure, a higher number of login credentials to manage and increased security risks, so you need to have a flexible PAM solution.
Attend this round table session to learn more about the challenges your organisation may face when adjusting its PAM strategy and why you should choose a PAM strategy that grows with you. You will come away with the following learning outcomes:
- What are the challenges in adjusting your PAM strategy as you grow
- Keeping up with compliance requirements
- How to choose a PAM solution that grows with you
Nicky Boland, Account Manager, Keeper Security
11.40 Interactive Roundtable A2: Identity Under Siege: Strategies for Detecting and Responding to Evolving Identity Threats
Today’s cybersecurity landscape is dominated by identity-focused attacks. Identity-driven threats have increased by 156% between 2023 and 2025, now representing 59% of all confirmed threat cases across the eSentire customer base.
In this round table, Ryad Jawaheer at eSentire, shares new research from its Threat Response Unit that explores how the cybersecurity threat landscape has transformed significantly with identity-based attacks emerging as one of the most dominant threat vectors.
We will share how identity-based attacks have evolved from opportunistic attacks to significant Cybercrime-as-a-Service operations that allow attackers to target the foundation of an organisation’s security architecture
Ryad Jawaheer, Senior Solutions Architect, eSentire
11.40 Interactive Roundtable B2: The Hacker’s Dead End: Strategies to Block Lateral Movement
Modern networks have outgrown flat infrastructures of the past, sprawling across data centres, clouds, branch offices, and everywhere in between – a tangled web of layers, workloads, and identities. Yet many organizations are still trying to secure these shapeshifting, multi-layered digital landscapes with manual tools designed for a simpler, flatter world.
This session explores how automated, layered microsegmentation – applied across three axes – creates a defence-in-depth strategy for modern complexity:
- North-South Protection: Next-gen firewalls dissect Layer 7 traffic, blocking zero-day exploits at the perimeter
- East-West Protection: Surgical microsegmentation isolates assets and workloads – and auto-quarantines attackers
- Up-Down Protection: Dynamic identity controls adapt access based on user behaviour and device posture
By weaving these layers together, you’ll create a self-defending ecosystem where security evolves with your environment. This isn’t just defence-in-depth – it’s defence-in-motion, combining automated microsegmentation with adaptive threat detection and automated enforcement, leaving hackers stranded and penniless. Join us to build a defense as multidimensional as your network.
Faisal Habib, Customer Engineering, EMEA, Zero Networks
11.40 Interactive Roundtable C2: Finding order in chaos: vulnerability management in the cloud
Managing an effective vulnerability management program is hard enough but what about when you have to extend your security into a cloud environment? DevSecOps, Kubernetes, multiple daily releases and an ever expanding attack surface all add up to a chaotic environment where security professionals have to be flexible enough to stay in the game but informed enough to maintain control. Join Qualys to discuss the evolution of vulnerability management in the cloud and whats needed to stay ahead in a cloud native world.
David Greenwood, Cloud Native Security Advisor, Qualys
12.30 Interactive Roundtable B3: Evolving Risk Strategies for Shifting from Vulnerability to Exposure Management
Evolving Risk Strategies for Shifting from Vulnerability to Exposure Management
As digital attack surfaces expand, traditional vulnerability management struggles to keep pace, leaving many organisations in a reactive, resource-draining posture. This roundtable, led by Craig Roberts from Rapid7, will explore how market leaders are shifting from a reactive to a proactive security strategy by embracing Continuous Threat Exposure Management (CTEM) and Cyber Asset Attack Surface Management (CAASM). We’ll discuss how these approaches provide complete visibility, prioritise real risks, and enable continuous improvement to build a resilient security programme. This session is designed to spark a collaborative dialogue, inviting participants to share their own security challenges and insights on the journey toward a more mature, fear-free security posture.
Craig Roberts, Principal Software Engineer, Rapid 7
12.30 Interactive Roundtable C3: Building a Resilient Organisation: People, Culture, Technology, and Process
Adam McGreggor, CISO, Railsbank
13.10 Lunch and Networking
14.00 Keynote Presentation: Technical Skills Get You Hired, Emotional Intelligence Keeps the Job!
Marius Poskus, CISO, Glow Financial Services
14.30 AI with Privacy made Positive
- How to develop an effective Data Protection Framework for AI processing activities involving personal data
- Adhering to Data Protection AI principles (i.e. transparency, explainability, contestability)
- Supporting Business Use Cases with appropriate data protection guardrails in place
Ranjit Shergill, Data Protection Manager, Phoenix
15.00 End of Conference
YOUR TECHNOLOGY SHOWCASE
Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Vision 2025.
Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CIO community.
- ITSM
- Identity & Access Management
- Communications
- API
- IOT
- Remote IT
- CRM & ERP
- DevOps
- Network Infrastructure
- 3rd Party Risk
- Cloud Management
- Data Management
- AI & Automation
- Mobile & Applications
- Monitoring & Reporting
- Security
TITANIUM
- Exhibition Space in Tier 1 Area
- Product Demo
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
Co-branding on All Literature - Priority networking
- Bespoke Thought Leadership Dinner the night before
PLATINUM
- Exhibition Space in Tier 1 Area
- Product Demo/ Keynote Speech
- 5 x 121 meetings in the build up and over the course of the day
- Co-branding on All Literature
- Priority networking
- Host a Roundtable
GOLD
- Exhibition Space in Tier 1 Area
- Product Demo
- 5 x 121 Meetings in the build up and over the course of the day
- Co-Branding on All Literature
- Priority Networking
SILVER
- Exhibition space in Tier 2 Area
- 3 x 121 Meetings in the build-up and over the course of the day
- Co-Branding on Some Literature, Networking Sponsorship
BRONZE
- Exhibition space in Tier 3 Area
- Co-Branding on Some Literature
- Networking Sponsorship
ENTRY-LEVEL SPONSORS
- Branded Table in the Coffee Area
- Networking Sponsorship
Take Part in the Conference / Top 3 ways you can gain exposure
1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.
2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.
3: We know the power of face-to-face business networking. You should be part of the conversation.
Thought-Leadership
Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.
Brand Visibility
Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.
Demonstrating Value
Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them