RISK Conference 2026

Preliminary Agenda

0-Day

9th of June
19.00
Welcome reception for “early comers”

Day 1

10th of June
08.00
Welcome reception
10.00 – 17.00
Opening followed by keynote, learning sessions and networking activities
17.00 – 20.00
Cocktail party & BBQ dinner
21.00
Rewards, Music & Games Ceremony

Day 2

11th of June
09.30
Welcome reception
10.00 – 15.00
Learning sessions and networking activities
15.00 – 16.00
Roundtable and Closing Raffle

Learning Sessions

Presented in random order. Exact timings will be announced soon.

  • Reaction to Readiness: How Speed, Precision, and Safety Define your Cyber Resilience Strategy Trellix #CyberResilliance
  • The Myth of Cyber Terrorism: From Conceptual Confusion to Genuine Threat Intelligence Group-IB #CyberTerrorism
  • Agentic Enterprises - Are AI Business Partners The Future? Exabeam #AIBusiness
  • Cybersecurity Beyond the Perimeter - Protecting Identities and Data Against Modern Threats and AI Exposure. Netwrix #StateOfSecurity
  • How do you deal with the evolving AI powered threat landscape? The Agentic SOC is here! Extrahop #NDR
  • Meet industry's first fully integrated AI networking platform Extreme Networks #Networking
  • Intelligence-led Cyber Resilience Platform Trellix #XDR
  • Complete Visibility Into Compliance Coverage Exabeam #Compliance
  • Consortium backed initiative against organized crime groups Group-IB #AntiFraud
  • AI-Native SASE: Start Anywhere. Grow Everywhere. CATO Networks #SASE
  • Seeing What Others Miss - NDR Case Study Avola Solutions #CaseStudy
  • The Challenges of Cyber Operations and the Role of OpenXDR in Incident Response Comtrade SI #CyberOperations
  • Rethinking Data Security: The Role of DLP in an AI-Driven World Forcepoint #DataSecurity
  • Visibility Isn’t Security! Fixing the Identity–Data Gap with Netwrix Access Analyzer 26: Smarter Visibility, Faster Remediation, Stronger Governance. Netwrix #BestPractices
  • Security for AI Applications F5 #AISecurity
  • Proactive Supply Chain Defense: Leveraging Group-IB Threat Intelligence Group-IB #ThreatIntelligence
  • When identity fails, everything fails: modern attack paths through privilege escalation BeyondTrust #Privilege
  • From packets to incidents: building detection logic in a modern SOC workflow Extrahop #SOC
  • Machines and AI agents are multiplying. Your risk shouldn’t! AppViewX #CertificateManagement
  • From data to decisions: the operational value of Cyber Threat Intelligence Kontron SI #CyberThreatIntelligence
  • Trellix Insights in Action: be proactive - stay ahead of emerging threats Trellix #AI
  • Securing Humans and Agents Exabeam #BehaviorIntelligence
  • Epic Challenges Demand EPIC AI Solution(s) Radware #AIPower
  • Threat intelligence-driven security automation Group-IB & CS Computer Systems #CaseStudy
  • From USBs to Copilots: Preventing Data Loss Across Windows, macOS & Linux — and Securing AI Usage with Netwrix Endpoint Protector! Netwrix #DataLoss
  • Decrypting the unknown: hunting threats in encrypted traffic at scale. Extrahop #ThreatHunting
  • Purple Team exercise Trellix #HandsOnWorkshop
  • Merging AI and Behavioral Insights To Surface Anomalies Exabeam #IntelligentSIEM
The full agenda with exact timings will be published in a few days — stay tuned!