Agenda

08.55 - 09.00

Chairman's welcome

09.00 - 09.20

►The Perfect Storm - Navigating AI, Cyber-resilience and Product Security across retail supply chains

Adaora Ezennia, GRC Lead, THG PLC

  • The regulatory convergence crisis: CRA, DORA, and EU AI Act are colliding to create overlapping compliance obligations that require integrated strategies, not isolated responses

  • The AI supply chain blindspot: Retailers scrutinise vendor cybersecurity but ignore embedded AI systems in supplier operations, creating hidden EU AI Act liabilities and operational risks

  • From fragmented audits to unified assurance: A practical framework for third-party monitoring that simultaneously addresses CRA product security, DORA resilience, and EU AI Act transparency

  • Action plan: Immediate GRC actions—revise vendor questionnaires, mandate AI disclosures, launch cross-functional risk committees etc

09.20 - 09.40

►Threats in Aisle 7: What Rapid7 Labs Sees in Retail Attacks

Christiaan Beek, Senior Director of Threat Intelligence & Analytics, Rapid7

  • The retail industry has become one of the most targeted sectors for modern cybercriminals — from sophisticated social engineering by Scattered Spider to coordinated intrusion campaigns by Crimson Collective
  • Rapid7 Labs unveils fresh insights from its global intelligence capabilities, spotlighting how attackers are exploiting retail ecosystems, supply chains, and identity systems for maximum disruption and financial gain
  • Learn how Labs’ data-driven threat intelligence powers early detection, guides proactive defence, and helps organisations stay one step ahead in the ever-evolving retail threat landscape
09.40 - 10.00

Rubrik's presentation to be announced

10.00 - 10.20

►Fireside Chat: Beyond the Store: Securing Third-Party Risk

Simon Brady, Event Chairman, (Moderator) 
Angus Alderman, Information Security Officer, Boden

  • How is the evolving threat landscape—ransomware, credential theft, supply chain attacks—shaping your security priorities in retail?

  • With so much moving to SaaS, cloud, and outsourced IT, how is the off-prem shift changing your security priorities?

  • Retail runs on partners — payments, loyalty apps, delivery, logistics. How do you keep the customer experience smooth without skimping on fraud or identity checks?

  • Third parties are often the weakest link. How do you actually monitor them — contracts, frameworks, continuous monitoring, or something else?

  • Compliance doesn’t stop at your systems. How do you handle PCI, GDPR, and other regulations when data is constantly moving through third parties?

  • How are you preparing for the future of retail cybersecurity with AI, IoT, and emerging technologies like quantum-safe cryptography?

10.20 - 10.25

Comfort break

10.25 - 10.45

►Human Factors in Cybersecurity — Debunking the Common Myths

Dr Lee Hadlington, Chartered Psychologist

  • Understanding the Human Role in Cybersecurity

  • Common Myths and Misconceptions

  • Psychological Factors Behind Security Behaviors

  • Strategies for Building a Human-Centric Cybersecurity Culture

10.45 - 11.05

Saviynt presentation to be announced

11.05 - 11.25

►Hidden in Plain Sight: Detecting Threats Behind the Checkout

Laurent Strauss, Cyber Security Strategist, OpenText Cybersecurity

  • Retail networks are under constant pressure from credential theft, rogue insiders, and lateral movement through POS and supply chain systems
  • We will reveal how AI-driven behavioral analytics can uncover subtle anomalies from data exfiltration to privilege abuse before they escalate into breaches
  • Adaptive threat detection, context-aware alerts, and automated investigation workflows enable retailers to reduce dwell time, protect sensitive customer data, and keep operations running smoothly
11.25 - 11.45

►Fortify Your Future: Mastering Business Resilience in the Digital Age

Muhammad Emal Khan, Senior Information Security Consultant, Lidl

  • Beyond the Firewall: How attacks can shut down operations and new threats can bypass traditional security checks, no longer just about network perimeter defence
  • Shared Responsibility is Non-Negotiable: Attendees will learn the critical lesson that "moving to the cloud" doesn't absolve of responsibility for security
  • From Paper to Practical: You will discover the necessity of moving beyond theoretical planning, lack of practice, results in inadequate preparedness
  • The Resilience Imperative: To strengthen our position, integrating Business Continuity, Crisis Management, IT Service Continuity, and Cyber Resilience to ensure operational continuity
11.45 - 11.50

Comfort break

11.50 - 12.10

►And now the Weather Forecast – Threat Intelligence and SIEMs in the age of Cloud Computing

Klaus Klingner, Information Security Officer, Asambeauty

  • SIEM as radar: Centralise and normalise multi-cloud/SaaS/identity logs; create “watchlists” for weak signals so small anomalies don’t get lost

  • Threat intel as forecast: Map sector-specific actor TTPs to MITRE, define watch-conditions (IOCs + behaviors), and pre-stage responses before storms arrive

  • ATP as severe-weather alerting: Use automated containment (isolate host, revoke tokens, block IPs) to shrink MTTD/MTTR and close the gap from detection to action

  • Cloud = mountain weather: Instrument ephemeral resources (containers, serverless), track config drift, and treat identity and CI/CD as first-class telemetry sources

  • Preparedness kit & ritual: Maintain a 3-day “threat forecast” dashboard, run regular storm-drill tabletops, set clear trigger thresholds, and communicate in plain language to stakeholders
12.10 - 12.30

►Aggresive defence moving from detect & respond to prevent & investigate with identity-centric security operations

Rory Shannon, Global VP Engineering, Cyderes

  • As adversary behaviour changes, we must re-orient detection & response into a more pre-emptive function
  • Bringing identity & access management technologies into the threat detection & response process introduces additional
    friction to the attacker
  • Considering the SecOps technology stack holistically allows us to shift SecOps into a prevent first mindset
12.30 - 12.50

►The Modern Attack Chain in Retail 

Steve Whiter – Director of Modern Worker projects, Appurity
Michael Simpson – Senior Engineer, Lookout

  • Why and how are attackers pivoting to unsecured mobile devices to breach organisations of all types?
  • Explanation of mobile focused Tactics, Techniques, and Procedures (TTPs)  recently detailed in the NCSC and CISA advisory
  • How can you identify any infrastructure gaps that attackers could take advantage of?
  • What can be done to remediate the threats exposed to the Modern Frontline Worker?
12.50 - 13.10

►Hacking Retail: Real-World Attacks and How to Stop Them

Glenn Wilkinson, Ethical hacker and Ambassador for the Hacking Games

  • How attackers target retailers, from ransomware to insider threats
  • A live demo of ransomware detonation and its impact on retail systems
  • Lessons from high-profile retail breaches (including the M&S Parliamentary Inquiry)
  • Practical steps retailers can take to reduce their exposure and respond quickly
13.10 - 13.15

Chairman's close