Ai security

Ai security

Summit Q4

Summit Q4

Ready to be A part of it?

Ready to be A part of it?

Don't miss out on the world's #1 AI Cyber Security Summit.

Don't miss out on the world's #1 AI Cyber Security Summit.

Don't miss out on the world's #1 AI Cyber Security Summit.

Online | 4:30 PM - 6:00 PM GMT

Online | 4:30 PM - 6:00 PM GMT

Online | 4:30 PM - 6:00 PM GMT

December 18, 2025

December 18, 2025

December 18, 2025

Meet Our Speakers

Gain insights from world-class leaders, innovators, and experts who are shaping the future of AI Security. Each speaker brings unique perspectives, real-world experience, and actionable knowledge you can apply right away.

Meet Our Speakers

Gain insights from world-class leaders, innovators, and experts who are shaping the future of AI Security. Each speaker brings unique perspectives, real-world experience, and actionable knowledge you can apply right away.

Meet Our Speakers

Gain insights from world-class leaders, innovators, and experts who are shaping the future of AI Security. Each speaker brings unique perspectives, real-world experience, and actionable knowledge you can apply right away.

The numbers speak for themselves

The numbers speak for themselves

The numbers speak for themselves

0

0

+

Research-driven AI frameworks released

0

0

+

Research-driven AI frameworks released

0

0

+

Research-driven AI frameworks released

0

0

+

Tech leaders in attendance

0

0

+

Tech leaders in attendance

0

0

+

Tech leaders in attendance

0

0

+

On average visitors

0

0

+

On average visitors

0

0

+

On average visitors

Your journey through the event

Your journey through the event

Your journey through the event

Ready to push the boundaries of AI and ML? Join us for an evening of exclusive insights, strategic networking, and breakthrough AI concepts.

Ready to push the boundaries of AI and ML? Join us for an evening of exclusive insights, strategic networking, and breakthrough AI concepts.

Ready to push the boundaries of AI and ML? Join us for an evening of exclusive insights, strategic networking, and breakthrough AI concepts.

1

4:00 PM

Introduction

Speaker: Charlie Banyard (CISO) - How AI actually lands in a modern organisation, from idea to production. Mapping the AI Development Lifecycle (AI-DLC) and where security must plug in.

1

4:00 PM

Introduction

Speaker: Charlie Banyard (CISO) - How AI actually lands in a modern organisation, from idea to production. Mapping the AI Development Lifecycle (AI-DLC) and where security must plug in.

1

4:00 PM

Introduction

Speaker: Charlie Banyard (CISO) - How AI actually lands in a modern organisation, from idea to production. Mapping the AI Development Lifecycle (AI-DLC) and where security must plug in.

2

4:30 PM

Emerging AI Attacks & Tactics

Speaker: Steve - DevSecAI Team - Live walk-through of the most common attack patterns against LLMs, agents and copilots—and what “good” defence looks like.

2

4:30 PM

Emerging AI Attacks & Tactics

Speaker: Steve - DevSecAI Team - Live walk-through of the most common attack patterns against LLMs, agents and copilots—and what “good” defence looks like.

2

4:30 PM

Emerging AI Attacks & Tactics

Speaker: Steve - DevSecAI Team - Live walk-through of the most common attack patterns against LLMs, agents and copilots—and what “good” defence looks like.

3

5:00 PM

Secure Coding with AI

Speakers: Rezaan - DevSecAI Team - Practical session on using AI to improve software security, covering code generation, secure patterns, and risk pitfalls.

3

5:00 PM

Secure Coding with AI

Speakers: Rezaan - DevSecAI Team - Practical session on using AI to improve software security, covering code generation, secure patterns, and risk pitfalls.

3

5:00 PM

Secure Coding with AI

Speakers: Rezaan - DevSecAI Team - Practical session on using AI to improve software security, covering code generation, secure patterns, and risk pitfalls.

4

5:30 PM

DevSecAI Team – Live Demo & App Waiting List

Speaker: DevSecAI - Demonstration of the DevSecAI app in action and an opportunity for participants to join the early-access waiting list.

4

5:30 PM

DevSecAI Team – Live Demo & App Waiting List

Speaker: DevSecAI - Demonstration of the DevSecAI app in action and an opportunity for participants to join the early-access waiting list.

4

5:30 PM

DevSecAI Team – Live Demo & App Waiting List

Speaker: DevSecAI - Demonstration of the DevSecAI app in action and an opportunity for participants to join the early-access waiting list.

Event at a Glance

Event at a Glance

Tech's brightest minds merge AI, quantum, and neuroscience to future-proof your strategy

Tech's brightest minds merge AI, quantum, and neuroscience to future-proof your strategy

LIVE ATTACK LAB

Real prompt-injection, RAG data-leak and model-poisoning attacks run live – and then fixed in minutes.

LIVE ATTACK LAB

Real prompt-injection, RAG data-leak and model-poisoning attacks run live – and then fixed in minutes.

LIVE ATTACK LAB

Real prompt-injection, RAG data-leak and model-poisoning attacks run live – and then fixed in minutes.

SECURE AI SDLC BLUEPRINT

A lift-and-shift framework to plug security into every stage of your AI Development Lifecycle.

SECURE AI SDLC BLUEPRINT

A lift-and-shift framework to plug security into every stage of your AI Development Lifecycle.

SECURE AI SDLC BLUEPRINT

A lift-and-shift framework to plug security into every stage of your AI Development Lifecycle.

AI CHAMPIONS TOOLKIT

Templates, roles and rituals to stand up an internal AI Security Champions program in weeks, not years.

AI CHAMPIONS TOOLKIT

Templates, roles and rituals to stand up an internal AI Security Champions program in weeks, not years.

AI CHAMPIONS TOOLKIT

Templates, roles and rituals to stand up an internal AI Security Champions program in weeks, not years.

PROMPT ATTACKS, DEFENDED

Watch AI copilots and agents get compromised – then hardened with concrete controls you can reuse.

PROMPT ATTACKS, DEFENDED

Watch AI copilots and agents get compromised – then hardened with concrete controls you can reuse.

PROMPT ATTACKS, DEFENDED

Watch AI copilots and agents get compromised – then hardened with concrete controls you can reuse.

Ready to upgrade your AI tech stack?

Ready to upgrade your AI tech stack?

Ready to upgrade your AI tech stack?