Location

Hilton Nicosia Hotel

Language

English

Location

Hilton Nicosia Hotel

Language

English

Beyond the Breach: Lessons, Strategies, and Innovations in Cybersecurity

The digital landscape is evolving at an unprecedented pace, driving enterprises to embrace digital innovation in order to stay ahead of the competition. However, with these advancements come inherent risks and vulnerabilities that no organisation can afford to ignore. To ensure operational resilience and protect critical assets, corporate executives must stay informed about the ever-changing cybersecurity landscape.

The Cyber Security Conference will provide valuable insights into the risks and threats facing businesses across their operations and processes. It will explore strategies and cutting-edge tools to mitigate these risks, including AI-driven defence mechanisms, approaches to managing emerging threats, and best practices for safeguarding critical infrastructure. Attendees will also gain a deeper understanding of regulatory changes, their implications for businesses, and case studies demonstrating successful cybersecurity implementations.

FACTS AND FIGURES

Delegates
0 +
Sponsors & Supporters
0 +
Distinguished Speakers
0 +

THE CONFERENCE

IMH’s Cyber Security Conference is a platform for the exchange of knowledge and expert views and analyses on the trends and important developments in the realm of Cyber Security, delving into the potential strategies, methods and tools available to companies operating in all sectors of the economy to navigate the complex and ever-changing landscape of cyber threats.

Reasons to attend

  • Gain valuable insights into the latest threats, trends, and best practices in the field
  • Define your strategy for agility and resilience within a complex digital environment
  • Develop security programs to respond to emerging threats and advanced attacks
  • Implement an assessment program to identify risks, threats, and vulnerabilities
  • Prioritise risks and implement preventative measures to address the greatest threats to your business
  • Transform security into a business function enabling business growth

WHO WILL ATTEND

The Conference is relevant to executives from Cypriot companies of all sizes operating in all economic sectors, including cyber security executives, IT experts, CEOs, COO’s, CFO’s, risk managers, compliance officers and consultants.

More specifically, it is addressed to:

  • Managing Directors
  • Chief Technology Officers (CTOs)
  • Chief Security Officers (CSOs)
  • Chief Information Security Officers (CISOs)
  • Chief Compliance Officers (CCOs)
  • Security Consultants
  • Compliance Officers
  • Security Analysts
  • Programmers
  • Network & System Administrators
  • Risk Managers

Speakers

Aglaia Nicolaou

Secretary & SheLeadsTech Liaison, ISACA Cyprus Chapter

Dr. Nicodemos Damianou

Deputy Minister of Research, Innovation and Digital Policy, Republic of Cyprus

George Michaelides

Commissioner of Communications, Republic of Cyprus

Cónal Hickey

Vice President, Security & Resiliency Practice Leader SM, Kyndryl

Andreas Constantinides

Managed Services Director, Odyssey

Manos Manoli

Chief Information Security Officer, Marlow Navigation Co.Ltd

Ulrika Dellrud

Chief Privacy & Data Ethics Officer, Smarter Contracts

Brian Zarb Adami

CEO, CyberSift

Rosario Blanco

Commercial Director for Italy, Greece & Adriatics, Westcon-Comstor

Theodoros Hadjistyllis

Account Management Director for Cyprus, Mastercard

Nikitas Kladakis

General Manager, ADACOM

Christos Makedonas

Partner, Digital Risk Services, Grant Thornton Cyprus

Punit Bhatia

Partner, FIT4PRIVACY

Jessica Jbeily

Territory Manager, Barracuda

Pavlos Kleanthous

Founder & CEO, Parsectix

Iacovos Kirlappos

Manager Information Security and ICT Risk Management, Bank of Cyprus

Edward Starkie

Director, Cyber Risk, Thomas Murray

Triantafillos Prokopidis

Sales Director-Cyber Security Solutions, Cosmos Business Systems

Claudio Casini

Channel Account Executive – Southern Europe, Jamf

Agenda

08:30 - 09:15
Registrations
09:15 - 09:20
Introduction by the Chairperson of the Conference
09:30 - 9:45
Regulatory Challenges: How to Keep Up with Cyber Laws in Cyprus and the EU
09:45 - 10:00
Bridging the gap: How organizations are building a more secure & resilient future

The presentation gives a clear summary of the 2025 cyber risk landscape, focusing on the expansion of cybercrime, the worldwide adoption of cybersecurity practices, and the increased instability caused by geopolitical events and new technologies. Notable trends include the emergence of generative AI, the essential role of identity and access management (IAM), and the growing significance of continuous threat monitoring and organizational resilience. It also addresses evolving regulations such as the European Union’s Digital Operational Resilience Act (DORA) and the Network and Information Security Directive (NIS2), which aim to reinforce cybersecurity standards for a range of sectors. Achieving cyber resilience requires strong governance, accountability at the senior management level, and strategies to reduce recovery times for essential business functions. Ultimately, this provides practical guidance to help organizations improve their security and resilience.

10:00 - 10:15
Fireside Chat: AI vs AI – Beyond Human Limits

In today’s rapidly shifting cyber landscape, the scale, speed, and complexity of threats have surpassed human capacity to respond alone. This session explores how organizations can move beyond human limits by combining AI-driven defense tools with the right expertise and strategy. It’s not just about deploying artificial intelligence-it’s about understanding how to integrate it intelligently, with skilled professionals and purpose-built solutions. Discover how advanced technologies, guided by human insight, can give your organization the edge in a world where only AI can match AI.

10:15 - 10:30
Taming the AI Act: Build Smart, Not From Scratch

The EU AI Act is here — compliance isn’t optional, but the path forward doesn’t have to be overwhelming. This session cuts through the legal noise to deliver a practical, risk-based roadmap for putting the Act into action. Instead of reinventing the wheel, we show how your existing Privacy and Security programs can become the launchpad for AI governance. You’ll learn how to mobilize cross-functional teams, align with suppliers and data owners, and scale without chaos. We also tackle the gaps: what the AI Act misses — and how forward-thinking organizations can get ahead of what’s coming next.

10:30 - 11:10
Panel Discussion: Inside a Ransomware Attack: Real-Life Stories from the Frontlines

Security leaders share experiences of dealing with major ransomware incidents

  • How AI is making ransomware faster, stealthier, and harder to stop
  • How organizations responded and recovered
  • Lessons for businesses of all sizes
11:10 - 11:25
The Insider Threat: Tackling Risks from Within the Organization

Insider threats are no longer just internal or external. Attackers now impersonate staff using AI, deepfakes, and stolen credentials. This session explores how organizations can address this evolving risk through behavior analytics, regulatory alignment (NIS2, DORA, GDPR), and a security-first culture. Learn why the board must lead and how every employee plays a critical role in defending the organization from within.

11:25 - 12:05
Networking Brunch
12:05 - 12:20
The Future of privacy in the new AI and Quantum World

In this session, Punit Bhatia will explore the rapidly evolving privacy landscape in the context of two transformative technological forces: Artificial Intelligence (AI) and quantum computing. As organizations and regulators worldwide grapple with the unprecedented capabilities and risks introduced by these technologies, the session will provide a forward-looking view on the challenges, regulatory responses, and ideas shaping the future of privacy.

12:20 - 12:40
Panel Discussion: Cloud Security – Best Practices for Securing Data in the Cloud
  • Common cloud vulnerabilities
  • Shared responsibility model in cloud security
12:40 - 12:50
State-of-the-Art Protection & Compliance

The continuous operation of a Security Operations Center (SOC) (24x7x365) is the cornerstone of organizational resilience and regulatory compliance. By combining cutting-edge technologies, automation, and artificial intelligence, the SOC detects, analyzes, and responds to threats in real time. In an environment where cyberattacks are constantly evolving, the SOC emerges as a key factor of protection and strategic value for every organization.

12:50 - 13:05
Fireside Chat: Beyond Penetration Testing – Is It Enough to Stay Secure?
  • Experts discuss the limits of pentesting & alternative security approaches
  • GenAI Pen testing
13:05 - 13:25
Panel Discussion: Building a Cyber Resilient Organization – DORA application experiences & lessons learnt

9 months on from the implementation of DORA, security leaders share real-life insights. What teething problems and implementation issues still remain to be tackled? What are some of the best practices they would recommend?

13:30
End of the Conference

Strategic Partner

Sponsors

Supporters

Innovation Partner

With the Support of

Coffee Sponsor

Organisers

Under the Auspices

Communication Sponsors

event Location