RISK Conference 2026
Preliminary Agenda
0-Day
9th of June
19.00
Welcome reception for “early comers”
Day 1
10th of June
08.00
Welcome reception
10.00 – 17.00
Opening followed by keynote, learning sessions and networking activities
17.00 – 20.00
Cocktail party & BBQ dinner
21.00
Rewards, Music & Games Ceremony
Day 2
11th of June
09.30
Welcome reception
10.00 – 15.00
Learning sessions and networking activities
15.00 – 16.00
Roundtable and Closing Raffle
Learning Sessions
Presented in random order. Exact timings will be announced soon.
- Reaction to Readiness: How Speed, Precision, and Safety Define your Cyber Resilience Strategy Trellix #CyberResilliance
- The Myth of Cyber Terrorism: From Conceptual Confusion to Genuine Threat Intelligence Group-IB #CyberTerrorism
- Agentic Enterprises - Are AI Business Partners The Future? Exabeam #AIBusiness
- Cybersecurity Beyond the Perimeter - Protecting Identities and Data Against Modern Threats and AI Exposure. Netwrix #StateOfSecurity
- How do you deal with the evolving AI powered threat landscape? The Agentic SOC is here! Extrahop #NDR
- Meet industry's first fully integrated AI networking platform Extreme Networks #Networking
- Intelligence-led Cyber Resilience Platform Trellix #XDR
- Complete Visibility Into Compliance Coverage Exabeam #Compliance
- Consortium backed initiative against organized crime groups Group-IB #AntiFraud
- AI-Native SASE: Start Anywhere. Grow Everywhere. CATO Networks #SASE
- Seeing What Others Miss - NDR Case Study Avola Solutions #CaseStudy
- The Challenges of Cyber Operations and the Role of OpenXDR in Incident Response Comtrade SI #CyberOperations
- Rethinking Data Security: The Role of DLP in an AI-Driven World Forcepoint #DataSecurity
- Visibility Isn’t Security! Fixing the Identity–Data Gap with Netwrix Access Analyzer 26: Smarter Visibility, Faster Remediation, Stronger Governance. Netwrix #BestPractices
- Security for AI Applications F5 #AISecurity
- Proactive Supply Chain Defense: Leveraging Group-IB Threat Intelligence Group-IB #ThreatIntelligence
- When identity fails, everything fails: modern attack paths through privilege escalation BeyondTrust #Privilege
- From packets to incidents: building detection logic in a modern SOC workflow Extrahop #SOC
- Machines and AI agents are multiplying. Your risk shouldn’t! AppViewX #CertificateManagement
- From data to decisions: the operational value of Cyber Threat Intelligence Kontron SI #CyberThreatIntelligence
- Trellix Insights in Action: be proactive - stay ahead of emerging threats Trellix #AI
- Securing Humans and Agents Exabeam #BehaviorIntelligence
- Epic Challenges Demand EPIC AI Solution(s) Radware #AIPower
- Threat intelligence-driven security automation Group-IB & CS Computer Systems #CaseStudy
- From USBs to Copilots: Preventing Data Loss Across Windows, macOS & Linux — and Securing AI Usage with Netwrix Endpoint Protector! Netwrix #DataLoss
- Decrypting the unknown: hunting threats in encrypted traffic at scale. Extrahop #ThreatHunting
- Purple Team exercise Trellix #HandsOnWorkshop
- Merging AI and Behavioral Insights To Surface Anomalies Exabeam #IntelligentSIEM
The full agenda with exact timings will be published in a few days — stay tuned!