Agenda 2026

-
Registration

Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share

-
Welcome & Opening Remarks from Computing

Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.

Speaker
Editor
Computing
-
Computing Research: Time to worry about quantum?

Every day brings Q-Day - when a quantum computer will be able to crack widely used encryption - one day closer. With IBM's and Google's roadmaps predicting fault-tolerant devices by 2029 and nation states including China investing billions in quantum-related research, is now the time for all organisations to follow banks and governments in taking steps to mitigate the threat? In this research presentation we'll be covering perceptions of the quantum threat and the cost and requirements for mitigation, measures under way to quantum-proof systems in various types of business, as well as opportunities presented by the coming quantum age.

Speaker
Research Director
Computing
-
Moving away from US tech
Europe's extreme dependency on US technology presents a critical single point of failure, security and legal risks. While non-US alternatives exist at comparable cost, the US platforms are popular for a reason. This addresses why this question is important now, and how you can start thinking about alternatives".
Speaker
Consulting CTO
-
Boardroom Appointments

Delegates are assigned into peer groups of 8-11 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Morning Networking Break & Stands

Fuel up and network with peers over refreshments at our Morning Networking Break! Don't forget to visit all the exhibition stands!

-
Make Your Business a Hard Target for Cybercriminals

When it comes to potential targets for cyberattacks, easier to breach means more likely to fall victim. While you might not be able to influence your perceived value, there are changes that can eliminate your organization from being seen as an easy target. We’ll explore practical tactics to reduce your surface area of attack and controls to prevent lateral movement should a breach occur

Speaker
Vice President of Operations
ThreatLocker

-
Boardroom Appointments

Delegates are assigned into peer groups of 8-11 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Networking Lunch & Exhibition Stands

Join us for a networking lunch, offering you the opportunity to connect with peers and continue conversations in an informal setting! Don't forget to visit all the exhibition stands!

-
Fireside Chat: Breaking Barriers: How Leaders Can Support The Next Gen Cyber Talent

This fireside chat features an emerging cybersecurity professional sharing their personal experiences and perspective on accessibility and support in the industry. The discussion will highlight the barriers they’ve faced, the types of guidance and opportunities that have made a real difference, and practical ways organisations can help early-career talent thrive. Attendees will hear directly about what younger professionals need to contribute, grow, and succeed, and gain actionable insights for creating a more inclusive and supportive cybersecurity workforce.

Speakers
Associate Editor
Computing
Business Information Security Officer
Channel 4
-
Boardroom Appointments

Delegates are assigned into peer groups of 8-11 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Afternoon Networking & Exhibition Stands

Fuel up and network with peers over refreshments at our Afternoon Networking Break! Don't forget to visit all the exhibition stands!

-
Panel Discussion: When the Playbook Breaks: Leading Teams Through Pressure

Even the best plans face unexpected challenges. In this session you will hear real-life lessons about navigating uncertainty, maintaining team wellbeing, and sustaining operational resilience. Learn why caring for yourself and your team is critical to keeping the business running.

Speakers
Editor
Computing
CISO
PPRO
Senior Security Architect
Thames Water
CIO
Zenith Bank UK
-
Business Continuity in the Age of Cyber Warfare: Building Resilience Before the Crisis Hits

A cyber-attack is no longer a question of if, but when. Yet many organisations rely on Business Continuity Plans that have not evolved to match today’s AI-driven and highly coordinated threat landscape. When disruption strikes, decisions must be made in minutes, not days. In this session, Gurps outlines how institutions can strengthen their Business Continuity strategies to withstand modern cyber threats. He introduces his 4D Deliver Discipline framework: Decide, Define, Do, Done, providing a practical structure for deploying cyber controls effectively and mitigating risk across the organisation.

Speaker
Global Cybersecurity Change Management Programme Manager
HSBC
-
Shaping the Future of the Security Leaders Summit

Take 10 minutes to directly shape the future of our Security Leaders Summit. This interactive session invites attendees to share their insights, highlight what resonated, and suggest improvements. Your feedback will help refine content, enhance networking opportunities, and ensure the summit continues to deliver maximum value to security leaders like you

-
Computing Closing Remarks

As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.

Speaker
Editor
Computing

Please note the agenda is subject to change.