The Ultimate Cybersecurity Learning Experience
Get ready for an agenda focused on Agentic AI, the transition to Quantum-safe encryption, and the realities of Zero-Trust architectures. From live-fire cyber demos to the impact of shifting geopolitics on global data sovereignty, our programme bridges the gap between emerging threats and actionable, long-term resilience.
2026 conference programme coming soon.
Session Technical Ratings
We’ve introduced technical ratings to help you quickly understand how technical each session will be and decide if it’s right for you. Use them to plan your schedule, match sessions to your experience level, and get the most value out of your time at Infosec – whether you’re after big-picture insights or deep technical detail. Below you’ll find a breakdown of each level, with icons to help you spot the right sessions at a glance.
Level 1
Foundational
Focuses on business strategy, risk management, and high-level trends. No technical background required.
Level 2
Applied
Covers "how-to" at a process and operational level. Understands technical concepts but doesn't require hands-on coding knowledge.
Level 3
Intermediate
Involves technical workflows, architectural diagrams, and could include configuration of specific platforms or tools.
Level 4
Advanced
Deep dives into code, scripts, attack techniques or complex network protocols. Aimed at practitioners and engineers.
Level 5
Expert
Research-heavy, "bleeding edge" content. Includes live exploitation, hardware hacking, or complex cryptography.
Conference Theatres
Infosec has multiple theatres, each with its own focus. See below for a quick overview of what’s happening in each so you can plan your time and find the sessions that interest you most.
Keynote Stage
The centrepiece of our conference programme, the Keynote Stage, brings you actionable insights from the biggest names in the industry that will transform your understanding of cybersecurity – featuring specially curated content by our Advisory Council of leading UK CISOs.
AI & Cloud Security
We have a dedicated stage focusing on two increasingly important subject areas - AI and Cloud Security.
You’ll be able to explore the evolving threat landscape of AI driven attack vectors such as deepfakes, AI powered phishing and automated manipulation as well as the growing risk of attacks targeting our own GenAI and LLMs.
As cloud security remains a prime concern for cybersecurity professionals, we’ll also examine current novel attacks to show how criminal tactics, techniques and procedures are adapting and suggest solutions to mitigate their threat. Discover the latest thinking and advice around perennial cloud security issues such as misconfigurations, DDoS, APIs, cloud squatting and IAM.
Resilience and Cyber Risk
This theatre examines how organisations prepare for, respond to and recover from cyber incidents. Sessions look beyond prevention to consider business resilience and operational continuity. Topics include incident response, ransomware preparedness, supply chain risk and the specific resilience requirements of Operational Technology (OT) and industrial environments. This is designed for senior decision makers looking to strengthen resilience in a sustainable way.
Cyber Strategies
Cyber Strategies sessions showcase the latest cybersecurity knowledge and expertise from the cutting-edge of the industry. This stage addresses the strategic business challenges impacting the cybersecurity world and illuminates a path to their solutions. Each session has been reviewed, graded and selected by our Advisory Council, ensuring the highest level of impact and relevance.
Deep Dive Stage
At the Deep Dive Stage, you’ll have the opportunity to dive into in-depth presentations, dynamic panel discussions, and fascinating use-cases. This stage is dedicated to revealing new perspectives and approaches to use within your organisation to enhance cyber-resilience and strengthen your security posture. The Deep Dive Stage is the perfect opportunity to ask your own questions around the implementation and adoption of cybersecurity solutions.
Case Studies
Real world case studies brought together from an end user and vendor perspective. Gain insights into their triumphs and lessons learned, arming you with indispensable knowledge for your upcoming projects. Case Studies ‘how to’ sessions are designed to guide you through industry-specific challenges, moving beyond a base-level understanding of security products to give true insights into their application.
Technology Showcase
At the Technology Showcase stage, you’ll witness the latest cybersecurity technologies and tools, reviewing how they can impact your security investment and business resilience. We will showcase the latest advanced solutions live in-person and you’ll have the opportunity to address your specific requirements.
Securing the Microsoft Ecosystem
This theatre focuses on the practical security challenges of operating across Microsoft platforms. Sessions explore how to protect identities, data, devices and workloads within Microsoft 365 and Azure environments.
Cyber Start Ups
At Infosecurity, we're all about backing pioneering companies on the rise. Our Cyber Start Ups stage is exclusively for organisations operating for three years or less – giving them a platform to shine in the industry. It's a must-visit stage to catch up on the latest developments and witness how working together can help lay down strong foundations for the success of up-and-coming companies and future generations of cyber firms.
Security Workshops
The Security Workshops are 90-minute tactical training sessions taking place in the South Gallery Rooms, in a private space away from the show floor. They are in-depth practical meetings hosting expert speakers, and covering topics including understanding ransomware capabilities, simplifying your cyber assessment framework and the evolving future of API security.
The Workshops vary in format from group work, panels and presentations – in this interactive setting, you’ll be able to address your specific challenges and get advice on the optimal solutions, all while networking with like-minded peers.
Channel Zone
We have a special area dedicated to the cybersecurity channel.
This unique zone focuses on engagement, business and learning. Access to the area will be exclusively for resellers, integrators, MSSPs, distributors and other channel suppliers and vendors.
The Channel Zone Keynote Programme provides insight into buying trends, emerging threats and technologies, new channel initiatives and expertise in leveraging the modern AI and cloud dominated market. The Workshop Programme has half day sessions, giving deeper knowledge and analysis with strong networking opportunities.
Programmes
Leaders’ Programme
The Leaders’ Programme is an invitation-only VIP experience for senior cybersecurity professionals – offering access to the exclusive Leaders’ Lounge, a private space off the show floor with a barista and drinks reception. Leaders benefit from specially curated workshops and roundtables for CISOs, CTOs and security leaders – plus all the advantages of the Priority Visitor Programme, including access to peer-led, vendor-free Table Talks.
Cyber Startup Programme
The Cyber Startup Programme shines a spotlight on early-stage innovation and the next generation of cybersecurity solutions. It brings ambitious founders, live products and breakthrough tech together with investors, enablers and ecosystem leaders – offering exclusive networking opportunities, curated content and the chance to discover the ideas shaping the future of the industry.
Priority Visitor Programme
The Priority Visitor Programme is an invitation-only experience offering exclusive spaces, curated content and access to peer-led Table Talks. It gives Priority Visitor badge holders the opportunity to recharge, gain fresh perspectives, and connect with like–minded professionals helping them make the most of every moment at Infosecurity Europe.
Visit us
Join us to learn from experts, expand your professional network and discover innovative new products.
Exhibit with us
Showcase your products to an audience of eager infosec professionals, inspire customer solutions and give your company a competitive edge.
