Description: The session explores how organisations need to manage cyber risk and complexity. We’ll explore the current landscape, and how digital transformation, business pressures and compliance requirements are driving ever more complex networks. We’ll look at the cost and impact of that complexity, and then how organisations can consolidate their technology stack and simplify their security through unified platforms to solve those challenges, including exploring some real world customer stories.
Archives: Agenda
Cybersecurity in Financial Services: What Does the 2026 Landscape Look Like?
This forward-looking session explores how cybersecurity in financial services will evolve over the next 12–18 months. Drawing on GlobalData’s latest research, it will examine:
- The adoption and security implications of emerging technologies – including cloud, AI, 5G, IoT, and quantum computing.
- How evolving business models and ecosystems in banking and financial services are reshaping cyber risk.
- The balance between innovation, risk, and operational resilience in an increasingly complex digital environment.
Lessons on Identity – the new battleground for enterprise security
In recent years, some of the most damaging cyberattacks in Europe share a common thread – identity. As traditional defences strengthen, attackers have shifted tactics, moving away from malware and exploits toward abusing legitimate credentials, permissions, and trust relationships within enterprise environments.
This session considers how attackers use identities to navigate industry-standard defences. We’ll explore the anatomy of an identity-based attack – from initial access through to organisational-wide takeover – and highlight recurring patterns seen across European enterprises.
Today’s breaches aren’t the result of poor security but of unseen complexity. Hidden identity attack paths buried deep in Active Directory and Entra ID provide adversaries with millions of routes to critical systems.
We’ll conclude with a strategy to move from reactive defence to proactive identity risk management. By continuously mapping and removing identity attack paths, organisations can eliminate the bridges adversaries depend on.
Secure by Default: Why the Future of Open Source Demands it
- The real cost of “free” software and the security gaps it creates
- How technical debt in open-source stacks becomes a growing risk for financial institutions
- Why traditional “shift left” approaches are no longer enough
- What a secure-by-default model looks like and what organisations should expect from their tools and teams
The Future of Digital Risk Protection in Financial Services
As financial services firms continue to digitise, their exposure now stretches far beyond the traditional perimeter. From the dark web to domain impersonation and unpatched vulnerabilities, risks can emerge anywhere your brand or data appear online.
This session explores how organisations can harness diverse intelligence sources – including the dark web – to uncover hidden risks and strengthen their digital resilience. Through real-world examples, we’ll show how Digital Risk Protection (DRP) turns threat data into clear, actionable insight that helps financial institutions stay ahead of attackers
Keynote Presentation – Inside the Inbox: Real Attacks Hitting Financial Services in 2025
| Attackers are bypassing legacy tools with business email compromise (BEC), account takeover (ATO), QR code phishing, and OAuth consent scams at increasing scale. We will share anonymized, recent cases from financial services environments, including how a global firm saw advanced attacks bypass a traditional secure email gateway and what actually stopped them. Co-presented by Abnormal AI and BlueFort, attendees leave with a practical playbook: the signals to look for, the controls that work, and how to achieve time-to-value without added friction. |
The Confidence Illusion: Rethinking How We Assess Technical Risk
The financial services market has driven major security improvements through frameworks such as CBEST and TIBER, with its behaviour helping raise standards across other sectors. But does confidence still outpace reality? This session explores the blind spots that remain, including fragile supply chains, hidden attack paths, and vendor risks, while challenging what resilience and true assurance mean in complex, real-world environments
Chair’s closing remarks followed by networking drinks
PANEL DISCUSSION: Navigating the regulatory maze – global compliance for cybersecurity leaders
• Overview of key cybersecurity regulations
• Managing compliance across jurisdictions
• How to be prepared for evolving data privacy standards?