Agenda 2026
Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share
Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.
Every day brings Q-Day - when a quantum computer will be able to crack widely used encryption - one day closer. With IBM's and Google's roadmaps predicting fault-tolerant devices by 2029 and nation states including China investing billions in quantum-related research, is now the time for all organisations to follow banks and governments in taking steps to mitigate the threat? In this research presentation we'll be covering perceptions of the quantum threat and the cost and requirements for mitigation, measures under way to quantum-proof systems in various types of business, as well as opportunities presented by the coming quantum age.
Delegates are assigned into peer groups of 8-11 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
Fuel up and network with peers over refreshments at our Morning Networking Break! Don't forget to visit all the exhibition stands!
When it comes to potential targets for cyberattacks, easier to breach means more likely to fall victim. While you might not be able to influence your perceived value, there are changes that can eliminate your organization from being seen as an easy target. We’ll explore practical tactics to reduce your surface area of attack and controls to prevent lateral movement should a breach occur

Delegates are assigned into peer groups of 8-11 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
Join us for a networking lunch, offering you the opportunity to connect with peers and continue conversations in an informal setting! Don't forget to visit all the exhibition stands!
This fireside chat features an emerging cybersecurity professional sharing their personal experiences and perspective on accessibility and support in the industry. The discussion will highlight the barriers they’ve faced, the types of guidance and opportunities that have made a real difference, and practical ways organisations can help early-career talent thrive.
Attendees will hear directly about what younger professionals need to contribute, grow, and succeed, and gain actionable insights for creating a more inclusive and supportive cybersecurity workforce.
Delegates are assigned into peer groups of 8-11 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
Fuel up and network with peers over refreshments at our Afternoon Networking Break! Don't forget to visit all the exhibition stands!
Even the best plans face unexpected challenges. In this session you will hear real-life lessons about navigating uncertainty, maintaining team wellbeing, and sustaining operational resilience. Learn why caring for yourself and your team is critical to keeping the business running.
A cyber-attack is no longer a question of if, but when. Yet many organisations rely on Business Continuity Plans that have not evolved to match today’s AI-driven and highly coordinated threat landscape. When disruption strikes, decisions must be made in minutes, not days. In this session, Gurps outlines how institutions can strengthen their Business Continuity strategies to withstand modern cyber threats. He introduces his 4D Deliver Discipline framework: Decide, Define, Do, Done, providing a practical structure for deploying cyber controls effectively and mitigating risk across the organisation.
Take 10 minutes to directly shape the future of our Security Leaders Summit. This interactive session invites attendees to share their insights, highlight what resonated, and suggest improvements. Your feedback will help refine content, enhance networking opportunities, and ensure the summit continues to deliver maximum value to security leaders like you
As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.
Please note the agenda is subject to change.



