14 May 2026
133 Houndsditch, London, United Kingdom
IT Security Summit
Securing an AI-Powered Business
Register now Become a partnerNavigating the new frontier of trust, compliance and innovation
The IDC European IT Security Summit is the definitive event for business, security, and tech leaders to explore how to embed trust, governance, and resilience at the core of digital transformation.
Europe is at a strategic inflection point. According to IDC’s latest research, security spending in Europe is forecast to reach nearly $60 billion by 2028, growing at a compound annual growth rate of around 9.4% from 2025 to 2029. Organizations are responding to intensifying cyber threats, expanding regulatory frameworks such as the EU AI Act, NIS2, GDPR, and DORA, and a surge in stakeholder demand for digital trust and sovereignty. IDC also reports that software and cloud-native security solutions are expected to account for a majority of global security spend by 2028, as enterprises accelerate their adoption of integrated, analytics-driven protection.
Join IDC’s analysts and industry experts to explore how to build trusted digital ecosystems that deliver both innovation and assurance. Gain insights into Europe’s most dynamic security markets and verticals, and walk away with actionable frameworks to make security a strategic differentiator, not just a reactive cost.
Agenda
The IDC IT Security Summit, is the ultimate meeting point for business, security, and technology leaders looking to embed trust, governance, and resilience at the heart of their digital transformation strategies.
Join IDC analysts and industry experts to explore how to build trusted digital ecosystems that combine innovation with assurance. Gain insights into the UK’s most dynamic sectors — including finance, energy, manufacturing, and public services — and walk away with actionable frameworks to make security a strategic differentiator, not just a reactive cost.
IDC Analysts
Ralf Helkenberg
Ralf Helkenberg is a research manager with the European security research team, responsible for leading IDC’s European Privacy and Data Security research practice. His core research coverage includes the impacts of data protection regulation, such as the GDPR on the technology sector, with key insight into market dynamics, vendor activities in privacy workflow management and data security (including data discovery, DLP, encryption), end-user trends and the future of digital trust.
Prior to IDC, he worked as a B2B marketer within a variety of industries, including IT Governance, Risk & Compliance where he built-up a product and marketing programme for GDPR compliance solutions.
Ralf holds a BA in European Business Administration from Middlesex University, London.
Mark Child
Event Sessions
Thursday, May 14 2026 3:55 pm | Location:
IDC Research Insight: Who Can You Trust? The CISO’s Identity Dilemma
As enterprises increasingly rely on digital identities, CISOs face the dual challenge of enabling secure access while managing risk across every user, device, and system. Identity breaches are no longer theoretical — they can expose sensitive data, disrupt operations, and erode customer trust.
This presentation will explore how to build and maintain trust in digital identities, implement zero-trust frameworks, enforce identity governance, and balance security with usability. This session will enable you to gain practical insights into protecting their organisation while enabling secure, seamless digital interactions in an increasingly interconnected world.
Duncan Brown
Duncan Brown is associate vice president, European Security Practice, at IDC EMEA and leads the firm’s security research program in Europe. He specializes in providing strategic advice to his clients, informing and validating their corporate, product, and marketing plans. Brown is an expert in analyzing the security market globally, and his list of security-related clients includes enterprises, central banks, government organizations, and security product suppliers and services providers. Brown’s expertise spans the gamut of security topics including incident response, threat intelligence, and global privacy issues. He established and leads IDC’s coverage of the global impact of the GDPR, the RPEC (ePrivacy Directive update) and NIS Directive on technology companies and their customers. His analysis and opinions are widely sought by industry leaders and investors, while his comments on industry trends and developments frequently appear in the leading business and trade publications.
You can find Duncan on Twitter here.
Speakers
Andrew Barber
Ellie Kearney
Jessica Figueras
Event Sessions
Thursday, May 14 2026 10:40 am | Location:
Opening Panel Discussion: Boardroom Security: How to Speak the Language of Risk & Value
Security is no longer just a technical concern, it’s a strategic business issue. CISOs must translate complex cyber risks into the language of boards and executives, demonstrating how security investments protect value, enable growth, and support enterprise objectives. IDC says that leadership and collaboration are now critical as the CISO will not always have the ability to mandate security measures but will need to work through others.
This panel brings together CISOs to explore how to effectively communicate risk, align security strategy with business priorities, and demonstrate the ROI of cybersecurity initiatives. CISOs will share practical approaches for bridging the gap between technical expertise and boardroom decision-making, building trust with executive leadership, and ensuring security is recognised as a driver of business resilience and competitive advantage.
Glen Hymers
Glen Hymers Dip CSMP®, Cert HE, CIS LI, M_o_R, GDPR-P, MInstLM
Glen has spent his working life involved in Policing and Security, he fell into Policing of a fashion joining the RAF Police in 1998 when he discovered University was expensive and as such he was running out of funds.
During his time in the RAFP Glen was employed all aspects of policing finally settling into the role of Counter Intelligence, responsible for carrying out Counter Espionage and Counter Terrorism duties for the RAF at home and abroad in some notable locations some you’d want to go on holiday to but most you wouldn’t. Glen parted ways with the RAF as a regular in 2012 as part of the Strategic Defence Review of that year and began his journey into the private sector with stops at Fujitsu Defence and National Security as their Head of Operational Security & Risk Management, before moving to Sopra Steria as Head of Operational Security for Government accounts.
In 2016 he moved to the Prince’s Trust taking up the role of Chief Security and Risk Officer as well as being appointed as the DPO in 2017. After a successful tenure at The Prince’s Trust during which he introduced both GDPR and Cyber Essentials Plus at the organisation he moved to Save The Children International where he is currently employed as the Global Chief Information Security Officer and Head of Data Protection. In his spare time Glen is still an active member of the RAF Reserve having completed two operational tours abroad one in 2014 to Afghanistan as part of Op HERRICK and again in 2018 to Cyprus as part of Op SHADER and most lately within the UK where he was employed on Op RESCRIPT the UK Government response to COVID-19 during which he was a Mobile Testing Unit Commander running testing sites in the East of England.
When he is not doing this he is an advocate for all things Cyber Security and especially getting the basics right, as from the basics comes good security so to that end he has now joined the South East Cyber Resilience Centre as one of its founding board members in September 2020.
Stephen Burrows-Davies
Steve is the Cyber Security Manager for Everywhen, one of the UKs largest insurance broker networks, managing the Security Operations. Before this Steve was in the British army for 10 years, serving in the Royal Signals where he did tours of Iraq & Syria.
Esther Hitch
Esther Hitch was recently a Director at a cyber security consultancy and previously at Deloitte, bringing a rich background spanning law, military service, and senior cyber leadership. After qualifying in law, she served 14 years as a British Army officer in the Royal Signals, leading complex technical and operational teams. Esther advises boards and executives across public and private sectors on cyber risk, governance, and resilience. Alongside this, Esther is currently pursuing multiple passion projects full time, including her own early stages tech startup-up, Esther is known for translating complex cyber issues into clear strategic insight, and is a trusted voice on leadership, decision-making, and the human and organisational factors that shape effective cyber security.
Gary Osborn
Gary Osborn is the Head of Information Security at the world’s largest Human Rights organisation (150 countries and territories, movement of 10 million people), where he spends his time solving the kinds of security challenges that don’t fit neatly into textbooks. His role blends strategy, risk, resilience and recovery across a very unusual operating landscape — one where protecting people is even more important than protecting systems.
Gary has become a trusted voice within leadership circles, helping executives navigate technology risk, geopolitical uncertainty, and the realities of operating across different jurisdictions. He is known for bringing clarity to complex security challenges and for championing proportionate and pragmatic, human‑centred approaches to risk. His work spans risk modelling, third‑party assurance, incident preparedness, secure device management, digital sovereignty, and the integration of velocity and proximity into modern risk reporting. His focus is consistently on safeguarding staff, activists, and vulnerable communities working in high‑risk contexts.
He also mentors emerging leaders in the security community, championing proportionate, people‑centred approaches and encouraging a culture where security is understood as an enabler rather than an obstacle.
Event Sessions
Thursday, May 14 2026 10:40 am | Location:
Opening Panel Discussion: Boardroom Security: How to Speak the Language of Risk & Value
Security is no longer just a technical concern, it’s a strategic business issue. CISOs must translate complex cyber risks into the language of boards and executives, demonstrating how security investments protect value, enable growth, and support enterprise objectives. IDC says that leadership and collaboration are now critical as the CISO will not always have the ability to mandate security measures but will need to work through others.
This panel brings together CISOs to explore how to effectively communicate risk, align security strategy with business priorities, and demonstrate the ROI of cybersecurity initiatives. CISOs will share practical approaches for bridging the gap between technical expertise and boardroom decision-making, building trust with executive leadership, and ensuring security is recognised as a driver of business resilience and competitive advantage.
Tom O’Driscoll
Naomi Garratt
Faith Ruto MBA
Mit Saru
Gill Cooke
Nikki Webb
At Custodian360, we have built something I’m genuinely proud of: a human-led, UK-based SOC-as-a-Service that delivers 24/7 detection and response without the jargon or the enterprise price tag. We protect SMEs with clarity and care , combining the speed of automation with the instinct and experience of real analysts who act fast, contain threats, and keep businesses running.
Our services have evolved far beyond endpoint protection, from Managed Detection & Response (MDR) and Vulnerability Management to C360RED, our ethical hacking and red-team service. Whatever the size of the organisation, our goal is the same: to make cybersecurity simple, affordable, and human.
Outside of Custodian360, I am deeply rooted in the cybersecurity community. I am part of the team at Cyber House Party, a volunteer-run not-for-profit that raises funds and awareness for the NSPCC and other incredible UK charities, while creating safe, inclusive spaces for everyone in cyber. I am also involved in grassroots meetups like CSIDES, Berks Cyber, and OxCyber, helping people find their tribe, build connections, and have the real conversations that keep our industry moving forward.
Cybersecurity is not just my career, it is very my community.
Because when we come together, we make the industry stronger, safer, and a little more human.
Drew Munn
Event Sessions
Thursday, May 14 2026 4:15 pm | Location:
Closing Panel: The Psychology of Trust: Human Behaviour and Security Decision-Making
Trust is at the heart of effective cybersecurity…….but it’s not just about technology. Human behavior drives decisions, influences risk, and shapes security culture across the enterprise. CISOs must understand the psychology behind how employees, executives, and partners perceive and act on security guidance.
This panel brings together CISOs to explore how insights into human behavior can inform security strategy, improve compliance, and reduce risk. During this panel we will discuss practical approaches to building a culture of trust, how to design policies that people actually follow all the while balancing technical controls with human-centric security practices to protect the organisation in an increasingly complex threat landscape.
Giles Lindsay
Alan Jenkins
Event Sessions
Thursday, May 14 2026 4:15 pm | Location:
Closing Panel: The Psychology of Trust: Human Behaviour and Security Decision-Making
Trust is at the heart of effective cybersecurity…….but it’s not just about technology. Human behavior drives decisions, influences risk, and shapes security culture across the enterprise. CISOs must understand the psychology behind how employees, executives, and partners perceive and act on security guidance.
This panel brings together CISOs to explore how insights into human behavior can inform security strategy, improve compliance, and reduce risk. During this panel we will discuss practical approaches to building a culture of trust, how to design policies that people actually follow all the while balancing technical controls with human-centric security practices to protect the organisation in an increasingly complex threat landscape.
2026 Prediction
By 2028, 40% of enterprises will use autonomous agent–powered cyber-risk quantification platforms to turn security metrics into financial exposure, guiding budgets, controls, and M&A risk assessments.
Main Themes
Regulation, Resilience and Value Creation
Regulatory compliance is no longer a back-office burden, it’s a strategic enabler. We will explore how organizations can embed regulatory mandates (data privacy, cybersecurity laws, emerging AI/tech rules) into core operations, turning requirements into levers for resilience, stakeholder trust, and business value. Keytopics include cyber-by-design, auditability, vendor accountability, and continuity in the face of disruption.
AI, Automation and Responsible Innovation
AI and intelligent agents are transforming how security is delivered, but with great power comes risk. We will explore pragmatically deploying AI: governance models, guardrails for misuse, prioritization of high-impact use cases, and aligning AI systems with trust, transparency, and accountability.
Operations, Analytics and Resilience Engineering
Detection, response, and recovery are now continuous cycles rather than discrete events. We’ll delve into advanced analytics, managed detection & response, orchestration, external threat visibility (supply chain, third parties), and resilience metrics to operationalize security effectiveness.
The Human Factor: Leadership and Culture
Technology alone doesn’t guarantee security. Leadership, culture, and skill development must align. We will focus on transforming teams, embedding security ownership across functions, and equipping leaders to speak the language of risk and trust to the board, CEOs, and business lines.
Incident and Trust Recovery
Breaches will happen, but what matters is how an organization responds. We will cover crisis communication, forensic response, regulatory handling, insurance, stakeholder trust restoration, and turning adversity into credibility.
Sector and Domain Security Challenges
Different industries and environments pose unique security demands. We will focus on securing critical infrastructure (energy, utilities), connected devices and IoT, healthcare, finance, and emerging environments like smart cities or industrial systems.
2026 Prediction
By 2028, AI agents will be triaging 80% of SOC alerts in the majority of SOCs worldwide.
Venue
133 Houndsditch
Located just minutes from Liverpool Street Station, Convene 133 Houndsditch is one of London’s most modern and versatile event venues—purpose-built to elevate conferences, exhibitions, training sessions, and large-scale meetings. Designed with the delegate experience at its core, the venue combines cutting-edge technology, sophisticated style, and exceptional hospitality to deliver seamless, impactful events.
Knowledge Hub
The NIS 2 directive – where are we now?
The deadline for the transposition of the EU’s second Network and Information Systems Security directive (NIS 2) came and went in October 2024 with only a handful of member states having completed the task.
European ICT spending implications of NATO’s 5% GDP spending target
At the 2025 NATO Summit in The Hague a few weeks ago, member states pledged to allocate 5% of their annual GDP to core defense requirements and defense- and security-related expenditures by 2035.
IAM 2025: The Rise of the Machines
Identity and access management (IAM), and by extension, identity security, is one of the most pervasive and impactful challenges facing all European organizations today, from an operational and risk management perspective.
Not the right event for you?
Don’t worry! We organize a variety of events designed to inspire original ideas, share the latest industry insights, and connect professionals like you. Simply sign up for event invitations, and we’ll notify you whenever a new event matches your interests.
Sign up