- Sophisticated Cyber Threats and Attacks: As the cyber threat landscape continues to evolve with increasingly sophisticated and persistent attacks, learn how to defend against advanced threats that can bypass traditional security measures
- Supply Chain and Third-Party Risk: Brainstorm the best ways to assess and manage the security posture of vendors, partners, and suppliers to prevent potential vulnerabilities from compromised systems
- Zero Trust Implementation: How can you rethink traditional security models, establish strict access controls, and ensure seamless user experiences?
- Regulatory and Compliance Complexities: Navigate a web of regulations, from GDPR and CCPA to emerging laws, and ensure their organization’s data handling practices align with these requirements
- Talent Acquisition and Retention: The persistent shortage of skilled IT professionals continues to challenge CIOs in building and maintaining high-performing teams. What do you need to do to attract top-tier talent, upskill existing employees, and foster a culture of continuous learning to navigate talent scarcity?
WELCOME TO CYBERSEC 2025 Where Visionary Cybersecurity Leaders Unite to Fortify Tomorrow's Digital Frontier!
Discover the ultimate gathering ground for trailblazing CISOs and cybersecurity leaders at CyberSec 2025. As the technology ecosystem continues to evolve at an unprecedented pace, and every digital interaction carries unprecedented importance, the role of the CISO has never been more critical.
Join us at CyberSec 2025 and discover the insights, strategies, and connections that will empower you to safeguard the digital landscape of the future.
CyberSec 2025 is not just a conference; it's a nexus of innovation, collaboration, and forward-thinking insight.
Our high-level keynote presentations, interactive panels and round table discussions, led by industry luminaries and visionaries, will delve into the most pressing challenges and emerging trends in the cybersecurity landscape.
From AI-powered threat detection to blockchain-driven data integrity, our agenda is tailored to empower you with the tools and knowledge to stay ahead of the cyber curve.
Engage with a community of like-minded professionals who share your passion for defending against digital threats, and explore innovative solutions that will shape the future of cybersecurity.
Your seat at the CyberSec 2025 table awaits – let's shape the future together!

SOME OF OUR ATTENDEES...
JUST SOME OF OUR CONFIRMED PARTNERS...
SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS
250
Thought Leaders on Site
30 +
Solutions on Show
57%
of IT leaders have been given extra budget to cope with the post-Covid WFH scenario
71%
of IT leaders prefer physical events to virtual events
42%
of IT leaders identify data security as a top priority
TOPICS TO BE COVERED INCLUDE
Who Should Attend?
FIELD
IT Security, 78%
Data, 12%
Governance, 10%
SENIORITY
C-Level, 60%
Directors/VP, 25%
Project Leads, 15%
- WFH & Hybrid
- Digital Transformation
- Cloud
- Collaboration
- Security
- Tooling
- Leadership
“Great discussions with other like-minded experts” – EAO
“A super opportunity to take a step back, reflect, see“A super opportunity to take a step back, reflect, see & learn things from other industries.”& learn things from other industries.” – IQVIA
“The room was truly world class. You could not imagine a better group to discuss what we discussed” – RightCrowd
EPN IT Vision at a Glance / Top 3 reasons you should attend
1: Save time & money by meeting your peers & discovering new technologies all in one place
2: Take part in dynamic discussions, tailored to you and your specific business concerns
3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks.
You have full control of your agenda.
Expert Insights
20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…
Exclusive Features
A new awards show, match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…
Like-minded Senior Peers
Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…
New Technologies
Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…
YOUR AGENDA FOR THE DAY (CLICK BELOW TO EXPAND)
Opening Keynote Presentation: Towards Successful Cyber Attack Remediation
Philip Clayson, CIO and CTO, Jagex
Keynote Presentation: CISO is not a Swiss Knife: You need to build a balanced team
- The industry seems to be awash with crazy CISO jobs specs; this is no longer acceptable way to search for a CISO
- How can we expect CISOs to handle variety of hands-on responsibilities as well as manage strategy?
- We need to build balanced cyber teams to make sure we can safeguard the business
- How to start with people, processes and only then technology
- Understanding why bad things happen in the first place and how to prevent them
- How to build and implement the right culture
Marius Poskus, Global Vice President of Cyber Security, Global Financial Services
Solution Spotlight Sessions
This focused session is your opportunity to learn more about the cutting edge technologies transforming the future of the information technology and cybersecurity markets. Each solution spotlight lasts just ten minutes.
Solution Spotlight: Cyber Resilience Shield: AI powered Ethical Hacking – Sandro Nafzger, CEO, Bug Bounty Switzerland
Solution Spotlight: The Threat Landscape – The current risks, measuring impact to the business, and why? – Philip Larbey – Associate Director, Head of VTRAC – EMEA, Verizon
Solution Spotlight: Trust no file, Trust no device… a productivity nightmare? – Stefan Liversidge – Solution Engineer, OPSWAT
Solution Spotlight: From Guardians to Champions: The Evolving Mindset in Data Resilience – Karl Fontanari, Territory Account Manager, ArcServe
Coffee Break
Are Your Defenses Keeping Up with the Pace of AI?
AI is reshaping the security landscape, but are your defenses keeping up? Many organizations with strong security controls are already 90% prepared—the challenge is addressing the final 10% of AI-specific risks across applications, infrastructure, and development pipelines.
- Practical strategies for securing LLMs and their ecosystems
- A breakdown of risks and benefits for homegrown, open-source, and LLM-as-a-Service models
- Emerging AI threats and critical edge cases security teams must prepare for
Gunter Ollmann, CTO, Cobalt
Less Busy More Impact
- Understand the truth behind our busyness habits
- Practical and behavioural experiments to implement immediately
- Protect yourself and your people from the threat of overworking and burnout
Chris Lovett, Leadership & Simplicity Coach, Author, Speaker
Laying the Foundations for a Secure Computing Environment
The fast pace of technological change, increasing oversight on data protection and the ever-present threat of bad actors are just three reasons why your information security risk profile is fluid.
In this session Sarah Stephenson will outline how Protocol Policy Systems assists organisations lay the foundations for a secure computing environment so new technologies can be readily adopted, data properly protected and bad actors kept in check.
Sarah Stephenson, Business Development Manager at Protocol Policy Systems (PPS)
Adopting a Proactive Approach to Identifying Emerging Cyber Threats
As cyber threats evolve with unprecedented speed and sophistication, organizations face increasing pressure to anticipate and mitigate risks before they materialize. The fusion of artificial intelligence (AI) with malicious intent, the rise of dark web marketplaces, and the exploitation of global supply chains are reshaping the cyber threat landscape. This exclusive roundtable discussion will delve into cutting-edge strategies to detect, analyze, and respond to these advanced threats.
Best practices to keep your organization ahead of the curve
- How is artificial intelligence being weaponized by attackers, and what can organizations do to counter AI-powered cyberattacks?
- How threat actors are leveraging the dark web for collaboration, recruitment, and innovation?
- How can organizations gain meaningful insights from these hidden networks?
- Discussing proactive steps to secure the supply chain?
- How to build a mature threat intelligence program that identifies risks before they become incidents?
Stewart Bertram, Head of Cyber Threat Intelligence, Nomura
Lunch
Cybersecurity Governance and Risk Management: A Framework for Effective Decision-Making
The cybersecurity landscape is constantly evolving, with new threats emerging on a regular basis. This session will provide an overview of emerging cybersecurity threats, including advanced persistent threats (APTs), supply chain attacks and nation-state sponsored hacking. We will discuss strategies for staying ahead of the curve, identifying emerging threats, and protecting organisations against future attacks.
- An overview of advanced persistent threats – what, where, when and how
- Examples of supply chain attacks: targeting vulnerabilities in third-party vendors or suppliers to gain unauthorized access to systems and data
- Preparing strategies to mitigate the risk of nation-state sponsored hacking
- Staying ahead of the curve: Proactive measures to stay informed about emerging threats, conduct regular assessments, train employees, and collaborate with others to enhance security.
Keynote: Implementing Business Continuity as part of Corporate Risk Management
Discover how Diabetes UK seamlessly embedded Business Continuity into its Corporate Risk Management framework, overcoming challenges with minimal effort while maximising impact. Learn how aligning BC with organisational objectives and leveraging existing resources can drive resilience and sustainability across your organisation.
- Understanding the critical role of Business Continuity (BC) in managing corporate risk.
- Aligning BC with organisational objectives to ensure resilience and long-term sustainability
- Overview of Diabetes UK’s organizational structure and operational challenges.
- Leveraging existing processes and resources to avoid extensive efforts.
Ali Jaffri, Head of IT Infrastructure and Cybersecurity, Diabetes UK
Closing Panel: Strategic Leadership in a Digital World: Navigating Innovation, Security, and Growth
As digital transformation accelerates, CIOs and senior leaders face the complex challenge of balancing technological innovation with robust security measures while driving sustainable growth. This evolving landscape demands a forward-thinking approach to strategy, one that not only leverages emerging technologies but also addresses the risks and opportunities of a hyper-connected world. To remain competitive, organizations must prioritize agility, resilience, and cross-functional collaboration.
- Aligning digital transformation with long-term business objectives, ESG considerations, and market dynamics
- Developing adaptive leadership capabilities to navigate disruption, manage change, and inspire teams in times of volatility
- Attracting and retaining top cybersecurity talent through competitive compensation packages, professional development opportunities and a people-centric work culture
- Developing a robust training and education programme to equip employees with the necessary skills to protect against emerging threats
- Creating a culture where security is a top priority, encouraging employees to report suspicious activity and participate in security awareness training
Victor Murineanu, CISO, Chelsea Football Club
Ali Jaffri, Head of IT Infrastructure and Cybersecurity, Diabetes UK
Stewart Bertram, Head of Cyber Threat Intelligence, Nomura
Adrian Smith, Chief Information Officer, Adsatis
Philip Clayson, CIO and CTO, Jagex
Moderated by:
Sheetal Thakar, CIO – For Change Management
End of Conference
YOUR TECHNOLOGY SHOWCASE
Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Vision 2025.
Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CIO community.
- ITSM
- Identity & Access Management
- Communications
- API
- IOT
- Remote IT
- CRM & ERP
- DevOps
- Network Infrastructure
- 3rd Party Risk
- Cloud Management
- Data Management
- AI & Automation
- Mobile & Applications
- Monitoring & Reporting
- Security
TITANIUM
- Exhibition Space in Tier 1 Area
- Product Demo
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
Co-branding on All Literature - Priority networking
- Bespoke Thought Leadership Dinner the night before
PLATINUM
- Exhibition Space in Tier 1 Area
- Product Demo/ Keynote Speech
- 5 x 121 meetings in the build up and over the course of the day
- Co-branding on All Literature
- Priority networking
- Host a Roundtable
GOLD
- Exhibition Space in Tier 1 Area
- Product Demo
- 5 x 121 Meetings in the build up and over the course of the day
- Co-Branding on All Literature
- Priority Networking
SILVER
- Exhibition space in Tier 2 Area
- 3 x 121 Meetings in the build-up and over the course of the day
- Co-Branding on Some Literature, Networking Sponsorship
BRONZE
- Exhibition space in Tier 3 Area
- Co-Branding on Some Literature
- Networking Sponsorship
ENTRY-LEVEL SPONSORS
- Branded Table in the Coffee Area
- Networking Sponsorship
Take Part in the Conference / Top 3 ways you can gain exposure
1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.
2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.
3: We know the power of face-to-face business networking. You should be part of the conversation.
Thought-Leadership
Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.
Brand Visibility
Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.
Demonstrating Value
Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them