Location

17 September 2025

Language

English

Location

Hilton Nicosia Hotel

Language

English

Beyond the Breach: Lessons, Strategies, and Innovations in Cybersecurity

The digital landscape is evolving at an unprecedented pace, driving enterprises to embrace digital innovation in order to stay ahead of the competition. However, with these advancements come inherent risks and vulnerabilities that no organisation can afford to ignore. To ensure operational resilience and protect critical assets, corporate executives must stay informed about the ever-changing cybersecurity landscape.

The Cyber Security Conference will provide valuable insights into the risks and threats facing businesses across their operations and processes. It will explore strategies and cutting-edge tools to mitigate these risks, including AI-driven defence mechanisms, approaches to managing emerging threats, and best practices for safeguarding critical infrastructure. Attendees will also gain a deeper understanding of regulatory changes, their implications for businesses, and case studies demonstrating successful cybersecurity implementations.

FACTS AND FIGURES

Delegates
0 +
Supporters
0 +
Distinguished Speakers
0 +

THE CONFERENCE

IMH’s Cyber Security Conference is a platform for the exchange of knowledge and expert views and analyses on the trends and important developments in the realm of Cyber Security, delving into the potential strategies, methods and tools available to companies operating in all sectors of the economy to navigate the complex and ever-changing landscape of cyber threats.

Reasons to attend

  • Gain valuable insights into the latest threats, trends, and best practices in the field
  • Define your strategy for agility and resilience within a complex digital environment
  • Develop security programs to respond to emerging threats and advanced attacks
  • Implement an assessment program to identify risks, threats, and vulnerabilities
  • Prioritise risks and implement preventative measures to address the greatest threats to your business
  • Transform security into a business function enabling business growth

WHO WILL ATTEND

The Conference is relevant to executives from Cypriot companies of all sizes operating in all economic sectors, including cyber security executives, IT experts, CEOs, COO’s, CFO’s, risk managers, compliance officers and consultants.

More specifically, it is addressed to:

  • Managing Directors
  • Chief Technology Officers (CTOs)
  • Chief Security Officers (CSOs)
  • Chief Information Security Officers (CISOs)
  • Chief Compliance Officers (CCOs)
  • Security Consultants
  • Compliance Officers
  • Security Analysts
  • Programmers
  • Network & System Administrators
  • Risk Managers

Speakers

George Michaelides

Commissioner of Communications

Ulrika Dellrud

Chief Privacy & Data Ethics Officer, Smarter Contracts

Punit Bhatia

Partner, FIT4PRIVACY

08:30
Regulatory Challenges: How to Keep Up with Cyber Laws in Cyprus and the EU
The Future of privacy in the new AI and Quantum World

In this session, Punit Bhatia will explore the rapidly evolving privacy landscape in the context of two transformative technological forces: Artificial Intelligence (AI) and quantum computing. As organizations and regulators worldwide grapple with the unprecedented capabilities and risks introduced by these technologies, the session will provide a forward-looking view on the challenges, regulatory responses, and ideas shaping the future of privacy.

The Future of AI-Driven Security: Can We Trust Machines to Defend Us?
  • The benefits and risks of AI in cybersecurity
  • Ethical challenges: AI bias, false positives, and adversarial AI
  • Case study: When AI failed and how security teams adapted
Cloud Security: Best Practices for Securing Data in the Cloud
  • Common cloud vulnerabilities
  • Shared responsibility model in cloud security
Panel Discussion: Inside a Ransomware Attack: Real-Life Stories from the Frontlines

Security leaders share experiences of dealing with major ransomware incidents

  • How AI is making ransomware faster, stealthier, and harder to stop
  • How organizations responded and recovered
  • Lessons for businesses of all sizes
The Rise of Supply Chain Attacks: How to Defend Against Hidden Threats
  • Understanding third-party risks
  • How to build a resilient supply chain security strategy
Panel Discussion: Building a Cyber Resilient Organization – DORA application experiences & lessons learnt

9 months on from the implementation of DORA, CISOs and security leaders share real-life insights. What teething problems and implementation issues still remain to be tackled? What are some of the best practices they would recommend?

The Insider Threat: Tackling Risks from Within the Organization

How to identify and mitigate internal cybersecurity risks

Panel Discussion: Beyond Penetration Testing – Is It Enough to Stay Secure?
  • Experts discuss the limits of pentesting & alternative security approaches
  • GenAI Pen testing
The Evolution of Nation-State Cyber Tactics: From Espionage to Full-Spectrum Cyber Warfare
14:30
AI-Powered Social Engineering: The New Frontier of Cyber Threats

Sponsors

With the Support of

Organisers

Under the Auspices

Communication Sponsors

event Location