-
Headline Keynote brought to you by Ping Identity
From Chaos to Confidence: Establishing Trust in Every Cloud Interaction
2pm BST/9am EDT
Speaker: Rob Otto - EMEA Field CTO, Ping Identity
In today’s complex, data-driven cloud environments, the greatest risk isn’t just a data breach—it’s a breach of trust. As organisations shift more applications and sensitive data to the cloud, identity has emerged as the new control plane for securing access.
Yet many still face challenges: siloed identity systems, inconsistent access policies, and a growing landscape of threats—from misconfigurations to AI-driven fraud.
Join Rob Otto, EMEA CTO at Ping Identity, to learn how global enterprises are using identity-first security strategies to re-establish control, simplify cloud access, and protect critical data—without compromising user experience. This session will explore how adaptive identity can underpin a resilient cloud posture, empower zero trust initiatives, and build confidence in every digital interaction.
Key learnings from this session include:
- Turning Multi-Cloud Environments from a Security Risk to an Advantage
2.45pm BST/8.45am EDT
Over 78% of organizations use two or more cloud providers, according to Fortinet’s 2025 State of Cloud Security Report. Many others are adopting hybrid cloud models by combining on-premises and public cloud infrastructure.
This approach to cloud technology offers flexibility. However, these complex setups expand the potential attack surface and make maintaining consistent security policies and managing identities and access across diverse platforms difficult.
Despite this, they also present an opportunity for organizations to build more resilient and adaptable security frameworks.
Join this session to understand how to:
- Collaborate with engineering teams to enforce safety guardrails at the implementation state
- Develop a consistent security policy across multi-cloud environments
- Adopt a zero-trust security model to enhance access control
- Centralize visibility and management tools to give your security team a clear view of security across your environment
- Cloud Security from the Inside with Jukka Seppänen, CIO and CISO, UpCloud
4pm BST/11am EDT
In this fireside chat, Jukka Seppänen, CIO and CISO at UpCloud, shares insights from over 25 years in tech leadership, guiding secure growth in cloud-native environments.
We’ll explore how cloud service providers approach vulnerability management, including the strategic use of bug bounty programs. Jukka will also unpack how evolving regulations like the Cyber Resilience Act are reshaping expectations around transparency and end-user protection.
If you're a cybersecurity professional navigating cloud environments, this session offers an insight into how a cloud service provider (CSP) actually thinks about security, from the inside out.
- Managing Software-as-a-Service Applications Securely in the Cloud Age
4.45pm BST/11.45am EDT
In today's cloud-first world, Software-as-a-Service (SaaS) applications have become indispensable for organizations, driving efficiency and collaboration.
However, the rapid adoption of SaaS can introduce significant cybersecurity challenges that can leave your organization vulnerable if not managed proactively.
Just this year, JPMorganChase’s CISO sounded the alarm that the current SaaS delivery model is “quietly enabling cyber attackers.”
Cybersecurity threats specifically target SaaS environments through sophisticated phishing campaigns, account takeovers and supply chain vulnerabilities.
Join this session to:
- Understand the concentration risk and the impact of vendors’ competitive pressures on your security posture
- Examine how the growth of AI services and agents in SaaS amplifies and rapidly distributes these risks
- Learn how to work beyond traditional security measures to deploy sophisticated authorization methods, advanced detection capabilities and proactive cybersecurity measures
- Mastering Identity and Access for Non-Human Cloud Entities
6pm BST/1pm EDT
Deploying and maintaining identity and access management in the cloud presents unique challenges, especially when considering non-human identities and service accounts.
These are vulnerable to issues such as account hijacking, lack of visibility, improper provisioning and inadequate access controls that can lead to data breaches and compliance failures.
This session covers why these accounts are prime targets for attackers, the risks inherent in their misuse and how they differ from regular user accounts.
Join the session to:
- Identify the pitfalls of current practices in managing these identities
- Understand principles of least privilege and comprehensive permission auditing tailored for service accounts
- Learn how to implement robust, automated and comprehensive security measures to mitigate potential risks