Tool, Trap, or Transformation?
Will blind trust in automation create the next big security scandal?
From risk assessment to operations, identifying the weak points in technical security integration.
Whose Security Is It Anyway?
Every connection strengthens the network, but does it also widen the bullseye?
From control rooms to cloud, securing every layer.
Because not all intruders climb the wall.
Where opportunity collides with vulnerability: debating the cloud’s role in tomorrow’s security model.
Balancing interoperability with security in a world where every connection is a potential exposure.
Celtic Manor Resort
Newport
Wales
8-10 May 2026