About DiCyFor Security Summit
With the current Cybersecurity landscape constantly evolving, security and risk leaders must become the interceptors, to secure their organisations digital systems. No longer focused solely on defence, the security organization must effectively, anticipate and manage security risks in pursuit of enterprise sustainability.
The DiCyFor Security Summit helps security practitioners and risk management leaders to continuously improve the responsiveness of security risk management & technology to achieve mission-critical objectives.
Join the summit to learn best practices and insights to bring back to your respective teams.
2025 SPEAKERS

EVENT HIGHLIGHTS
20+
SPEAKERS
250+
DELEGATES
10+
EXHIBITORS
∞
BUSINESS OPPORTUNITIES
Topics at a Glance
Have access to industry leaders providing key takeaways, specifically designed to help your security and risk management.
Each session has a particular area of focus to help you deliver on what matters most to you and your infosec teams.
Cybersecurity Leadership
With the current Cybersecurity climate as aggressive as ever, leaders must navigate economic uncertainty, important technology decisions, staff shortages and an exponentially expanding attack surface. Learn how Cybersecurity leaders can succeed in their roles in the face of these mission-critical challenges.
Cyber and IT Risk Management
This session covers risks relevant to privacy, supply chains and Cybersecurity. Learn how to communicate value and correlate risk data to automate control monitoring and to enable decision making for the right outcomes.
Infrastructure Security
Explore concepts such as practical zero trust projects, vendor and product consolidation, cybersecurity mesh and security infrastructure configuration management
Application and Data Security
As always, new technologies mean new threats and an increasing attack surface, not all of which are visible by the responsible teams. This session explores the latest developments, future roadmaps and new approaches to traditional application and data security problems.
Infosec Operations
This session helps security and risk management leaders increase business resilience through effective threat and exposure visibility, response planning and risk prioritization for your organization.
Technical Insights for Security Practitioners
This session will share experience highlighting the hacker methods and security learnings and the elements necessary to respond. Learn from first-hand experience how to improve protection, detection, and response capabilities against these attacks.
SPONSORS

Abnormal Security provides the leading behavioral AI-based email security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks that evade traditional solutions. The anomaly detection engine leverages identity and context to analyze the risk of every cloud email event, preventing inbound email attacks, detecting compromised accounts, and remediating emails and messages—all while providing visibility into configuration drifts across your environment. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly, with additional protection available for Slack, Teams, and Zoom. More information is available at www.abnormalsecurity.com

Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action. Cited as one of the fastest-growing cybersecurity companies in history, with accolades from Deloitte, CNBC, Forbes, and Fortune, the Axonius Platform covers millions of assets for customers around the world. To book a demo or start a free trial visit Axonius.com.

Hewlett Packard Enterprise (NYSE: HPE) is the global edge-to-cloud company that helps organizations accelerate outcomes by unlocking value from all of their data, everywhere. Built on decades of reimagining the future and innovating to advance the way people live and work, HPE delivers unique, open, and intelligent technology solutions as a service. With offerings spanning Cloud Services, Compute, High Performance Computing & AI, Intelligent Edge, Software, and Storage, HPE provides a consistent experience across all clouds and edges, helping customers develop new business models, engage in new ways, and increase operational performance. For more information, visit: www.hpe.com.

Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business. Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe. Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest Internet trends and insights at radar.cloudflare.com.

BigID is the leader in Data Security Posture Management (DSPM), recognized by CB Insights for its groundbreaking approach to data security. It pioneers cloud-native security for multi-cloud and hybrid cloud environments, offering a comprehensive data-first solution for data visibility and control. As a leader in data security, privacy, compliance, and governance BigID enables organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data landscape: including multi cloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources. BigID has been recognized by CNBC as one of the top 25 startups for the enterprise, has been named to the Inc 5000 and Deloitte 500 for two years in a row, and is the leading modern data security vendor in the market today.

ManageEngine is the enterprise IT management division of Zoho Corporation, catering to a wide range of organizations, MSPs and MSSPs. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has offices worldwide, including in the United States, the United Arab Emirates, the Netherlands, India, Colombia, Mexico, Brazil, Singapore, Japan, China, Australia and the United Kingdom as well as 200+ global partners to help organizations tightly align their business and IT. For more information, please visit manageengine.com.

Athena Dynamics' (ADPL) specializes in disruptive, game-changing and operationally effective cyber protection technologies in a bid to address the common gaps in mainstream protection paradigms. Some examples include IT infra security, application security, operational security and cloud security. On Infra security, today’s advanced threats are not entirely detectable in the first place. Whether it is AV, multI-AV, Sandboxing, Machine Learning, Threat Intelligence platforms, mainstream protection technologies operate based on detecting the malicious contents. ADPL's detection-less sanitization assisted enterprises to defence against the undetectable via detection-less technologies. On Appsec, most practices today utilize code scanning tool that review the source codes. Unfortunately, the compiled runtime binaries comprise plug-ins and external libraries which do not come with source codes. ADPL’s binary SAST technology de-compiles the full runtime binary just before the point of production deployment for vulnerability scan of the complete source code. On Operational Security, a new approach to Digital Forensic and Incident Response (DFIR) is applied to reduce the effort of DFIR from an average of 3 weeks per incident to just around 10 minutes. On Cloud Security, a remote browser isolation platform allows enterprises to achieve immediate isolation of browsing risk from the user via a proxy browser in a remote cloud container with all downloaded files sanitized files.
