The Security Chapter
The Adolphus, Dallas, TX
A bit about our summit
What we're known for
Industry Analysis
Glean the knowledge of your peers to shape your organisation's future
Peer-Led
Workshops, Fireside Chats & Keynote Addresses
1 on 1 Meetings
Strategic BANT-qualified meetings based on project alignment
Custom Agenda
Be in control of your own agenda. Maximise your experience.
The Technology Chapter
Audience
We use Apella to understand each executive’s priorities ahead of the summit. Their current focus areas, challenges and interests. This allows us to shape thoughtful, relevant connections where both executives and partners gain value. Every 1:1 meeting is informed, purposeful and mutually beneficial, ensuring conversations feel natural, context-aware and genuinely worthwhile for everyone involved.
-
80+Senior Executives
-
15-20Solution Providers
-
5:1Executive to Solution Provider Representatives
-
48%C-Suite Executives
-
52%SVP, Directors & Heads of
Agenda
Day 1
Registration & Networking Lunch
Welcome Address & Opening Keynote
The summit officially opens with a forward-looking welcome address, setting the agenda for two days of insight, collaboration and strategic discussion. You’ll hear the vision behind this year’s programme and the themes shaping the security landscape in 2026 and beyond.
Our Opening Keynote then takes the stage. Designed to challenge thinking, spotlight emerging risks and opportunities, and provide a practical perspective from the front line of innovation. It’s an energising start to the summit, offering a shared foundation for the conversations and sessions that follow.
Strengthening Cyber Resilience in a High-Pressure Threat Landscape
By 2026, organisations will be judged not only on how well they prevent attacks, but on how effectively they can withstand and recover from them. With adversaries targeting business continuity and regulators raising expectations, resilience has become a core strategic priority.
This workshop focuses on practical approaches to building resilience across people, processes and technology. You’ll explore real incident scenarios, discuss how peers are stress-testing their environments, and compare methods for improving readiness, response coordination and communication under pressure.
Preparing for the Quantum Era Through Practical Crypto-Agility
Quantum computing may not be fully realised yet, but the risk landscape is already shifting. “Harvest-now, decrypt-later” attacks, evolving standards and the push towards post-quantum cryptography make preparation a priority for organisations with long-lived or highly sensitive data.
This workshop focuses on what executives should be doing today to build crypto-agility into their environments. You’ll explore where quantum exposure sits, how to identify systems that need priority migration and what a realistic transition plan looks like without disruption to critical services.
Strategically Matched 1:1 Meetings
These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.
Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.
Securing Autonomous AI Systems & Agentic Workflows
By 2026, AI isn’t just assisting workflows; it’s executing them. Internal agents, copilots with elevated permissions, automated decision engines and LLM-driven integrations have expanded the attack surface in ways traditional controls were never built to handle.
This workshop examines the next phase of AI security: protecting autonomous systems that read, write, decide and act across the business. Discussions will cover agent permissions, safe action boundaries, continuous monitoring, prompt-injection hardening, model integrity and preventing silent failure modes.
Executives will explore what a secure operational model looks like when AI becomes an actor rather than a tool.
From Blind Spot to Board Priority: Managing Cryptographic Risk in the Age of AI, Quantum, and Zero Trust
Cryptography secures every identity, transaction, and connection — yet most organizations can’t see all the keys, certificates, and algorithms they rely on. This hidden gap is a growing target for threat actors, especially with AI-driven attacks and post-quantum disruption on the horizon. Learn how to discover and prioritize vulnerabilities, automate cryptographic inventory, and make cryptographic risk a measurable part of your security strategy.
In this session, you'll learn how to:
- Discover and prioritize cryptographic vulnerabilities
- Automate cryptographic inventory and management
- Make cryptographic risk a measurable part of your overall security strategy
Strategically Matched 1:1 Meetings
These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.
Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.
Check-In Break
The perfect time to go grab your luggage and check-in to your rooms...
Peer-Led Problem Solving
This collaborative session brings executives together to unpack real challenges, share practical experiences and explore new approaches as a group. Rather than traditional presentations, the focus is on open dialogue, identifying what’s working, what isn’t, and how others are navigating similar issues in their own organisations.
Guided by a facilitator, you’ll work through emerging pain points, compare strategies and exchange insight with peers facing the same pressures. It’s an opportunity to gain clarity, discover alternative viewpoints and walk away with ideas you can apply immediately.
Designed to be energetic, conversational and outcome-driven, this is where collective expertise turns into practical solutions.
Hands-On Technology Insights
The demo sessions give you the chance to explore emerging capabilities directly with our partners, seeing how their technology performs in real scenarios rather than on slides. These are practical, interactive demonstrations designed to help you understand what each solution actually does, how it integrates, and where it can support your priorities.
You’ll be able to ask focused questions, dive deeper into specific use-cases and get a clear sense of the value behind each offering. It’s a straightforward, no-pressure way to compare approaches, discover what’s possible, and uncover ideas you can take straight back into your own environment.
A meaningful opportunity to experience innovation first-hand and engage with the people building it.
Strategically Matched 1:1 Meetings
These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.
Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.
Wellness Time & Sponsored Activities
This dedicated break in the programme is designed to help you reset, recharge and prepare for the evening ahead. Take the time to pause, step away from the pace of the day and choose whatever helps you feel at your best — whether that’s a moment of quiet, a walk, or connecting informally with peers.
Our partners may also host optional activities during this window, offering relaxed opportunities to explore new ideas, continue conversations or experience something a little different. Full details will be shared closer to the summit, giving you the freedom to engage in a way that suits your energy and interests.
Pre-Dinner Happy Hour
Gala Dinner
The Gala Dinner is the centrepiece of the summit’s first day, an evening designed to bring the entire community together in a refined, welcoming setting. Enjoy a relaxed three-course dinner while connecting with peers, partners and industry leaders in an environment that encourages open conversation and meaningful interaction.
During the evening, you’ll hear from a distinguished CISO delivering an insightful keynote woven into the dinner experience. Expect a thought-provoking perspective on the evolving security landscape, offering strategic clarity and ideas that resonate long after the final course.
Post-Dinner Drinks
Day 2
Breakfast
Keynote
Day 2 opens with a Keynote, offering a sharp, forward-looking perspective on the trends reshaping security and technology in 2026. Expect a session grounded in real-world insight — highlighting emerging risks, new opportunities and the strategic shifts leaders need to prepare for.
Securing App Delivery: How Desktop-as-a-Service and Secure Enterprise Browsers Transform IT
Simplifying and securing the delivery of Windows and web applications has become a strategic priority in an era where hybrid work, security, and user experience define IT success. This workshop explores how Desktop-as-a-Service (DaaS) and Secure Enterprise Browser (SEB) solutions can enable you to securely deliver any application to any device, anywhere. Learn how leading organizations are leveraging these cloud-based strategies to accelerate digital transformation, reduce complexity, and strengthen compliance and security—all while delivering a seamless experience that empowers both IT teams and end users.
Key Takeaways
- How modern cloud-based DaaS and SEB solutions simplify app and desktop delivery
- Strategies to improve security and user experience while reducing IT complexity
- Real-world lessons from organizations using DaaS and SEB to transform IT
Governing Data, Privacy & AI Risk in a World of Digital Sovereignty
With the EU AI Act, evolving privacy rules, data localisation requirements and the rise of internal AI systems, 2026 is the year when data governance becomes deeply entangled with security. Sensitive data now moves through vector stores, RAG pipelines, SaaS chains and analytics platforms, often without full visibility.
This workshop examines how executives are navigating the new realities of privacy and digital sovereignty. Expect discussion on governing AI training data, enforcing data residency, managing cross-border risk, embedding privacy by design and aligning security, legal and AI teams around a shared operating model.
Strategically Matched 1:1 Meetings
These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.
Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.
Peer-Led Problem Solving
This collaborative session brings executives together to unpack real challenges, share practical experiences and explore new approaches as a group. Rather than traditional presentations, the focus is on open dialogue, identifying what’s working, what isn’t, and how others are navigating similar issues in their own organisations.
Guided by a facilitator, you’ll work through emerging pain points, compare strategies and exchange insight with peers facing the same pressures. It’s an opportunity to gain clarity, discover alternative viewpoints and walk away with ideas you can apply immediately.
Designed to be energetic, conversational and outcome-driven, this is where collective expertise turns into practical solutions.
AgileSec Analytics: Cryptographic Posture Intelligence and PQCReady Risk Management
This demo explains how Keyfactor’s AgileSec Analytics provides real-time visibility into an organization’s cryptographic posture across applications, certificates, code, hosts, and other endpoints. The session walks through discovered cryptographic assets, identifies the algorithms in use, flags weak or non-compliant implementations, and maps the cryptographic dependencies that support business-critical workflows.
Key Takeaways:
- Full Cryptographic Discovery: See how AgileSec maps all certificates, keys, algorithms, and encryption patterns across hybrid environments—no agents required.
- Real-Time Posture Assessment: Learn how the platform evaluates algorithm strength, expiration risk, compliance status, and crypto hygiene across all systems.
- PQC Migration Readiness: Understand how AgileSec identifies quantum-vulnerable assets and guides phased migration planning.
- Dependency Intelligence: Explore how AgileSec builds a cryptographic bill of material (CBOM) across applications, services, and certificates to surface hidden upgrade blockers.
- Risk-Based Prioritization: Experience how analytics elevate the most impactful cryptographic risks based on business context, exposure, and operational criticality.
- Remediation-Ready Insights: Learn how AgileSec surfaces detailed cryptographic posture data—including certificate status, algorithm usage, and PQC-vulnerable assets—so it can be consumed by orchestration tools for renewal, upgrade, and migration workflows.
Strategically Matched 1:1 Meetings
These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.
Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.
Networking Break
Panel Discussion
"What Keeps Boards Awake in 2026 - And What Security Leaders Should Do About It"
In 2026, boards are more engaged in security than ever, not because they want to be, but because AI, regulation and escalating threats have pushed cyber into the centre of organisational risk. This panel brings together senior security leaders to unpack the issues that are shaping boardroom conversations right now: AI-driven attacks, regulatory pressure, operational resilience, data exposure, and the widening gap between perceived and actual risk.
The discussion will explore how security leaders can translate complex technical challenges into clear, strategic narratives that boards understand and act on. Expect honest perspectives on navigating expectation vs. reality, setting priorities, communicating in the language of value and risk, and driving alignment at the highest level.
In the Cyber Trenches: War Stories from 180,000 pentests
Hosted by Horizon3.ai, In the Cyber Trenches: War Stories from 180,000 Pentests provides an in-depth exploration of real-world cybersecurity incidents derived from a vast dataset of penetration testing engagements.
Designed for cybersecurity professionals, this workshop bridges the gap between theoretical security concepts and real-world application, equipping attendees with knowledge that can be immediately applied within their own environments.
Zero Trust in a Borderless Estate – Identity, APIs & Machine Identities
Hybrid ecosystems in 2026 are dominated by SaaS chains, API-to-API communication, machine identities, service accounts and ephemeral workloads that appear and disappear within seconds. With attackers exploiting identity systems and API connections at scale, Zero Trust has become less of a framework and more of a live operational discipline.
This workshop dives into how mature organisations are reshaping Zero Trust for a borderless estate, tightening identity governance, securing API interconnectivity, managing fast-proliferating machine identities and enforcing “least privilege” in environments where nothing is static.
Strategically Matched 1:1 Meetings
These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.
Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.
Keynote & Closing Remarks
The summit concludes with an inspiring keynote from a respected CISO within our community, offering an honest, forward-looking perspective on the security landscape and the leadership challenges shaping the years ahead. Expect a grounded, experience-led talk that ties together the themes explored across the summit, bringing clarity, perspective and momentum for what comes next.
Following the keynote, the final remarks bring the programme to a close, reflecting on the key insights, shared moments and connections made over the two days. It’s a chance to gather final takeaways, acknowledge the community that makes the Security Chapter so powerful, and leave with renewed focus for the year ahead.
Lunch
Join Us
Register Interest
Meet with fellow industry leaders and solve today’s greatest business
challenges.
Join Our Partner Network
Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.
Join the Executive Community
Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.