Arrival, Registration & Breakfast Networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments
The Changing Role of the CISO: Challenges & Opportunities for 2026
- Collaborating with senior leaders to integrate information security into enterprise strategies
- Incorporating risk management approaches to developing information security policies
- Strengthening security cultures to increase staff capabilities in recognising and reporting security threats
Evaluating and Enhancing IT Internal Control Processes to Ensure Audit-Ready Compliance Across the Company
- Establishing continuous review cycles to align with evolving external auditor expectations and internal standards
- Implementing consistent, transparent reporting and remediation governance for control execution and non-compliance
- Strengthening organizational resilience and audit reliability through mature, scalable, and standardized IT control frameworks
Riccardo Bianchi, CISO, DHL
Developing Security Audits to Monitor Gaps in Organisational Cyber Strategies
- Tailoring audits to ensure security strategies comply with new regulations
- Establishing information gathering methods to deliver a comprehensive audit of security measures
- Utilising findings from audits to secure additional investments in security resources
Boris Ortolf, Director Cyber Security, Baker Tilly
Coffee Break & Networking
Workshop 1
Data Governance
Workshop 2
Vulnerability Management
Workshop 3
Cloud Security
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Evaluating the Cyber Resilience Act to Inform Approaches to Designing Information Security Measures
- Redesigning cyber security measures to identify and address non-compliance with the Cyber Resilience Act
- Guidance on engaging with board members to secure resources for transitioning to compliant hardware
- Training schemes to support staff adapt working processes to uphold the Cyber Resilience Act
Mario Hoffmann, Head of Cyber Resilience, Swissbit
Embedding Cyber Security Cultures to Broaden Organisation-Wide Security Capabilities
- Key advice on securing buy-in from senior leaders to support information security strategies
- Engaging with all employees to understand their role in upholding cyber security measures
- Incorporating security awareness training into professional development opportunities
Patrick Ghion, Head Regional Cyber Competence Centres for Western Switzerland, State of Geneve
Leadership Approaches to Improve Team Performances
- Using frameworks to assign IT responsibilities to staff based on their strengths and abilities
- Regular updates with teams during periods of significant change within IT departments
- Creating opportunities for staff to input into IT strategy development to claim ownership of team results
Michael Fontner, Head of Global IT Security, Herrenknecht
Implementing Vulnerability Management Policies to Build Up Information Security Measures
- Maintaining regular reviews of monitoring vulnerabilities of digital assets: best practice
- Establishing procedures for staff to appropriately report security vulnerability concerns
- Prioritising vulnerability risks to tackle gaps in security defences
Coffee Break & Networking
Workshop 4
Third Party Risk Management
Workshop 5

Hosted by Securiti
15:25 – 17:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel Discussion: Exploring Opportunities for AI to Expand Cyber Security Operations
- Incorporating behavioural analysis software to create a baseline of normal information security activity and increase efficiency in cyber threat detection
- Establishing automated processes in cyber security measures to free up staff workloads
- Creating safeguarding measures to protect security systems from AI-driven attacks
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments (moderator)
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Merwin William Godwin, Head of Cyber Security Architecture, Siemens
Vullnet Shkodra, Head of Information Risk, ING
Marco Scarito, Head of Enterprise Information Security Architecture, Cembra Money Bank
Roundtable Wrap-Up
Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.
Coffee Break & Networking
Workshop 6
A Roundtable for Security Leaders Who Are Done With Security Theatre

Alex Goller, Principal Solutions Architect, Illumio
Workshop 7
Malware Protection
Workshop 8
Application Security
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Designing Governance Frameworks to Strengthen Information Security Strategies
- Establishing organisation-wide security practices for all departments to uphold cyber strategies
- Best practice in incorporating security responsibilities into senior leadership positions
- Creating accountability frameworks to ensure senior leaders are held responsible for security decision-making
Riccardo Riccobene, CISO, State Street
Adapting Cyber Security Policies to Strengthen Security in Supply Chains
- Key advice on incorporating third party security policies into procurement processes
- Implementing risk-based approaches to sharing data with suppliers
- Collaborating with vendors to strengthen their security measures and increase cyber resilience in supply chains
Laszlo Meszaros, Executive Director – Information Security & ICT Risk, CMC Markets
Utilising Information Security Software to Support Cyber Resilience Strategies
- Key tips on working with software developers to tailor security technology to meet company needs
- Tools to support staff transition to new security software
- Adapting security software to scale up cyber security operations
Johannes Valenti, Head of IT Security, RAFI
Designing Information Security Defences to Uphold Organisation-Wide Cyber Resilience
- Tailoring information security strategies to identify and tackle gaps in cyber defences
- Incorporating encryption software to strengthen the security measures of company devices
- Adapting security defences to tackle increasingly sophisticated cyber threats
Jan Kominek, CISO, ING
Panel Discussion: Designing Emergency Response Plans to Mitigate the Impact of Cyber Attacks
- Implementing joined-up procedures to escalate and tackle cyber security incidents
- Developing post-attack responses to recover lost or stolen digital assets
- Evaluating security incident data to highlight and address gaps in cyber attack response plans
Kim-Christin Zöllkau, Head of Security Policy, German Federal Ministry of Defence
Christian Keller, CISO, Syntegon
