08:30 - 09:15
Registrations
09:15 - 09:20
Introduction by the Chairperson of the Conference
09:20 - 09:35
Regulatory Challenges: How to Keep Up with Cyber Laws in Cyprus and the EU
09:35 - 09:50
Bridging the gap: How organizations are building a more secure & resilient future

The presentation gives a clear summary of the 2025 cyber risk landscape, focusing on the expansion of cybercrime, the worldwide adoption of cybersecurity practices, and the increased instability caused by geopolitical events and new technologies. Notable trends include the emergence of generative AI, the essential role of identity and access management (IAM), and the growing significance of continuous threat monitoring and organizational resilience. It also addresses evolving regulations such as the European Union’s Digital Operational Resilience Act (DORA) and the Network and Information Security Directive (NIS2), which aim to reinforce cybersecurity standards for a range of sectors. Achieving cyber resilience requires strong governance, accountability at the senior management level, and strategies to reduce recovery times for essential business functions. Ultimately, this provides practical guidance to help organizations improve their security and resilience.

09:50- 10:05
Taming the AI Act: Build Smart, Not From Scratch

The EU AI Act is here — compliance isn’t optional, but the path forward doesn’t have to be overwhelming. This session cuts through the legal noise to deliver a practical, risk-based roadmap for putting the Act into action. Instead of reinventing the wheel, we show how your existing Privacy and Security programs can become the launchpad for AI governance. You’ll learn how to mobilize cross-functional teams, align with suppliers and data owners, and scale without chaos. We also tackle the gaps: what the AI Act misses — and how forward-thinking organizations can get ahead of what’s coming next.

10:05 - 10:45
Panel Discussion: Inside a Ransomware Attack: Real-Life Stories from the Frontlines

Security leaders share experiences of dealing with major ransomware incidents

  • How AI is making ransomware faster, stealthier, and harder to stop
  • How organizations responded and recovered
  • Lessons for businesses of all sizes
10:45 - 11:00
The Insider Threat: Tackling Risks from Within the Organization

Insider threats are no longer just internal or external. Attackers now impersonate staff using AI, deepfakes, and stolen credentials. This session explores how organizations can address this evolving risk through behavior analytics, regulatory alignment (NIS2, DORA, GDPR), and a security-first culture. Learn why the board must lead and how every employee plays a critical role in defending the organization from within.

11:00 - 11:20
Networking Coffee Break
11:20 - 11:35
The Future of privacy in the new AI and Quantum World

In this session, Punit Bhatia will explore the rapidly evolving privacy landscape in the context of two transformative technological forces: Artificial Intelligence (AI) and quantum computing. As organizations and regulators worldwide grapple with the unprecedented capabilities and risks introduced by these technologies, the session will provide a forward-looking view on the challenges, regulatory responses, and ideas shaping the future of privacy.

11:35 - 11:55
Panel Discussion: Building a Cyber Resilient Organization – DORA application experiences & lessons learnt

9 months on from the implementation of DORA, CISOs and security leaders share real-life insights. What teething problems and implementation issues still remain to be tackled? What are some of the best practices they would recommend?

11:55 - 12:10
Fireside Chat: Beyond Penetration Testing – Is It Enough to Stay Secure?
  • Experts discuss the limits of pentesting & alternative security approaches
  • GenAI Pen testing
12:10 - 12:25
The Rise of Supply Chain Attacks: How to Defend Against Hidden Threats
  • Understanding third-party risks
  • How to build a resilient supply chain security strategy
12:25 - 12:40
The Future of AI-Driven Security: Can We Trust Machines to Defend Us?
  • The benefits and risks of AI in cybersecurity
  • Ethical challenges: AI bias, false positives, and adversarial AI
  • Case study: When AI failed and how security teams adapted
12:40 - 12:55
Cloud Security: Best Practices for Securing Data in the Cloud
  • Common cloud vulnerabilities
  • Shared responsibility model in cloud security
12:55 - 13:10
The Evolution of Nation-State Cyber Tactics: From Espionage to Full-Spectrum Cyber Warfare
13:10 - 13:25
AI-Powered Social Engineering: The New Frontier of Cyber Threats
13:30 - 14:00
End of the Conference – Networking Cocktail