Skip to content
MARCH 2027, LONDON

Connecting business with cyber security

The-C2 is an exclusive, invite-only threat intelligence conference that connects multinational business executives with the cutting edge of the cyber security industry.

The event enables frank and open discussion of the developing digital threat landscape between global security leaders.

Proudly brought to you by
threat intelligence conference
About

The-C2 is an exclusive, personally invited gathering created for senior leaders in security, risk and threat intelligence. It exists to enable open, practical conversations between those building cyber security solutions and those responsible for protecting organisations and shaping investment decisions.

Hosted each year by SE Labs at Merchant Taylors’ Hall in London, this two day conference brings together experienced cyber security experts and senior business leaders under the Chatham House Rule. That setting allows for frank discussion about where real risks sit, how the threat landscape is shifting, and what meaningful resilience looks like in practice.

SE Labs occupies a distinctive position in the industry. As an independent security testing organisation, it understands security products in depth, works closely with the teams behind them, and advises large organisations during procurement and strategic decision making. Through that vantage point, it sees a clear gap between capability and decision making. The-C2 was created to help close that gap.

There are no sales pitches and no posturing. The value lies in trusted peer to peer conversations, shared experience from across the globe, and relationships that continue long after the event has ended.

The Themes

The 2026 event focused on these three key areas

  • Resilience: Thriving Through Disruption
    How leaders prepare for, withstand, and recover from the crises that test business survival.
  • Securing the Supply Chain: Trust Beyond Your Walls
    Building confidence in the partners, suppliers, and systems that power your business.
  • Owning the Risk: Leadership, Liability and Foresight
    Helping leaders turn intelligence into foresight, meet rising accountability, and take ownership of cyber risk.
The Agenda

General overview from the 2026 event

Day one is a full programme of activity, centred around the spectacular main conference room and a selection of more intimate breakout spaces. The day features an excellent line up of speakers, while the breakout sessions allow for open discussion and deeper exploration of the topics. The evening concludes with a spectacular dinner.

Day two is also a full day, with a focus on panel discussions and breakout sessions, alongside keynote speakers in the main conference room. It offers plenty of opportunity to continue conversations and build relationships with fellow delegates. The day includes a sit down networking lunch, followed by a drinks reception in the evening.

Monday 13th April 2026

09:30 Registration Opens

There will be tea, coffee and pastries for those who would like a pick-me-up before the conference starts for the day.

10:00 Welcome Address: Simon Edwards, SE Labs

Simon Edwards, CEO and Founder of SE Labs and host of The-C2.

10:15 The-C2 Keynote: Cyber Power, Geopolitics and the New Digital Battleground

Lieutenant General Sir Tom Copinger-Symes KCB CBE, Deputy Commander, Cyber & Specialist Operations Command

Cyber capability has become a central instrument of geopolitical power. Opening The-C2 2026, Lieutenant General Sir Tom Copinger Symes KCB CBE, Deputy Commander of the UK’s Cyber and Specialist Operations Command, will explore how global tensions are reshaping the cyber threat landscape. Drawing on experience at the heart of the UK’s cyber defence capability, he will examine how sophisticated cyber operatives operate, how nations prepare for and respond to digital conflict, and what this changing environment means for organisations seeking to build resilience, secure their supply chains and take ownership of cyber risk.

11:15 Talk 1: Operating through the Geopolitical Storm: Lessons from the Field

Florian Pouchet & Roxane Pearson, Wavestone

This session explores how multinationals build resilience amid geopolitical disruption, using two client case studies: one reactive (responding to an overnight state takeover), and one proactive (assessing exposure across a complex global supply chain). The discussion focuses on decision‑making, lessons learned, and practical actions leaders can apply immediately.

12:00 Breakout Session 1: A Leadership Conversation on Geopolitical Cyber Risk

Allie Mellen, Forrester

The geopolitical cyber landscape is shifting fast, and organisations are no longer on the sidelines. From escalating nation state activity to the growing exposure of the private sector, cyber risk is now deeply entangled with global instability.

Following the opening sessions, this breakout creates space to move beyond the headlines and into what this actually means in practice. Under Chatham House Rule, we will bring together senior leaders for a candid, discussion led conversation on how they are interpreting geopolitical cyber risk today and, crucially, what they are changing as a result.

Together, we will explore where organisations are taking decisive action, where uncertainty still exists at leadership level, and how ownership of these risks is shifting across the business. The aim is simple: to help turn a complex and evolving threat landscape into clearer, more confident decisions about what to do next.

12:00 Breakout Session 2: Risk-Based Prioritization and the Shared Security Model Between MDRs and Enterprises

David Orr, Director Falcon Complete, CrowdStrike

The value of the MDR shared responsibility model can only be fully realised when we unite two different perspectives. MDR providers possess deep threat intelligence about adversary behaviour and emerging attacks, while enterprises hold business context about what actually matters to their organisation. This discussion examines how to close that gap across the entire security lifecycle, from detection strategy and threat hunting to vulnerability prioritisation and investment decisions. CrowdStrike’s Falcon Complete will discuss their evolution toward risk-based operations, including practical examples such as dynamic and tailored detection prioritisation. Enterprise CISOs will share the organisational challenges of articulating risk to external partners and what effective collaboration actually looks like. Together, we’ll explore actionable frameworks for merging threat intelligence with business impact: How do you communicate what matters? How should intelligence reshape your risk model? Where can partnerships break down? In an era of exploding vulnerabilities and AI-accelerated threats, this conversation addresses how to move beyond transactional MDR relationships toward genuine shared risk ownership, because neither party has the complete picture alone.

13:00 – 13:55 Lunch

Re-fuel and recharge with the amazing hospitality at Merchants Taylors.

14:00 Talk 2: Big enough to be a target, small enough to be exposed. The lived experience of cyber threat

Simon Briggs, Tekever

A talk through the journey of a scaling tech SME drawing attention from globally the largest most aggressive and sophisticated cyber actors. The lessons we have taken forward as we have grown.

14:45 Talk 3: Operationalize the intelligence you have to provide Board-actionable foresight on emerging risk

Emily Soward, Realis Solutions Group

Get the facts on how the modern threat landscape is changing risk quantification and prioritization, and how organizations can evolve their use of intelligence to set strategic priorities. Using the emergence of AI as a case, we demonstrate how to quantify and qualify emerging risk and the impact of uncertainty to organizations in practical terms. Executive Leaders will walk away with intelligence-driven risk management and cybersecurity strategies to improve their odds, gain advantage, and make the case for action at Board level.

15:30 – 16:00 Refreshment Break

16:00 Talk 4: The Age Of AI: Risk Hell, Settle For Purgatory, Or Enter Paradise

Enza Iannopollo, Forrester 

In the era of rapid AI advancement, trust is essential. As organizations deploy increasingly powerful systems, they must manage risk while enabling innovation. This session explores how a responsible and trustworthy approach to AI helps organizations balance the risks of harm with the risks of missed innovation and untapped potential.

16:45 Panel 1: The changing cyber risks in interconnected supply chains

Host: Annie Collings, techUK
Katie Barnett, Toro Solutions
Simon Edwards, SE Labs
Justin Kuruvilla, Risk Ledger
Allie Mellen, Forrester

This panel will explore the growing cyber risks that arise as supply chains become increasingly interconnected. A central focus will be the expanding reliance on third-party providers that hold critical operational and customer data, and how vulnerabilities within these vendors can trigger disruption far beyond the original target. As weaknesses in shared services ripple across multiple organisations, the consequences can be widespread and difficult to contain. The discussion will examine practical ways to mitigate these threats and strengthen oversight across complex supply chains.

17:30 Drinks Reception

Join us for the warm-up before the much-anticipated C2 Dinner!

18:50 The-C2 Dinner: Pre-dinner talk – Richard Ford, CyberCube

With the breathtaking Merchant Taylors venue as a backdrop, enjoy amazing hospitality and lively conversation at this exclusive event.

21:30 – 0000 After Dinner Drinks

Tuesday 14th April 2026

09:30 Registration Opens

There will be tea, coffee and pastries for those who would like a pick-me-up before the conference starts for the day.

10:00 Talk 5: When AI Becomes the Target: What Real-World Incidents Teach Us About Securing AI at Scale

Harriet Farlow, Mileva Security Labs

AI systems are increasingly being targeted by criminal groups and nation-state actors, yet most AI security incidents remain invisible to traditional threat intelligence and cyber reporting. This talk draws on a year-long research project conducted with the Australian National University analysing real-world AI security incidents, alongside the delivery of the first AI security framework and mandatory AI security training implemented within an Australian Government department. We outline the attack patterns emerging from incident data – including how adversaries exploit AI-specific weaknesses, why these attacks evade existing cyber and AI safety frameworks, and what this means for defenders. We then show how these insights were translated into a practical, government-scale AI security framework, designed to operate within real constraints: alignment with ISO and NIST guidance, bespoke government control frameworks, and the need to communicate risk effectively to technical, policy, and executive audiences. Attendees will leave with a clearer understanding of how AI is being attacked in practice, how incident-driven intelligence can inform defensible AI security strategies, and how similar lessons can be applied within their own organisations.

10:50 Panel 2: What makes CISOs buy and what turns us off?

Host: Martin Smith, SASIG
Craig Rice, Cyber Defence Alliance
Jia Fu, British Film Industry
Sapna Patel, The King’s Trust
Matt Broomhall, Lloyds

CISOs are influenced to buy by credible references, proven ROI, and solutions that mitigate their risks. They are turned off by impersonal, high-pressure sales tactics, unproven technology, and vendors who fail to show they understand the business’s specific needs and constraints. Building trust and demonstrating clear value are key drivers, while a lack of preparedness or a focus solely on product features are major deterrents. 

11:45 – 12:00 Refreshment Break

12:00 Talk 6: Cybersecurity and Geopolitics – what CISO’s and Boards need to know

Bharat Thakrar, CyberBTX

Nation-state cyber operations directly impact your security strategy, threat detection priorities, incident response plans, and resource allocation. From Chinese APT pre-positioning in critical infrastructure and Russian targeting of Ukraine supply chains to Iranian OT attacks and North Korean IT worker infiltration, CISOs and business leaders must understand which adversaries target them, why, and how to operationalize geopolitical intelligence. This interactive workshop equips CISOs with actionable tools to integrate threat intelligence into security operations, brief boards on nation-state risk, build crisis response capabilities for extended campaigns, and defend against adversaries whose objectives go far beyond financial gain.

12:45 Breakout Session 3: AI Security Can’t Be Automated (Yet)

Harriet Farlow, Mileva Security Labs

As organisations rapidly deploy AI, many assume AI security can be managed through tools, controls, or centralised teams. This breakout session challenges that assumption through three real-world case studies. The first draws on anonymised work with government and large enterprises, showing how AI security risks emerge at governance and decision-making layers where leaders and non-technical stakeholders lack shared AI security understanding. The second examines AI-enabled fraud and impersonation attacks (such as voice deepfakes targeting finance and executive teams), demonstrating how AI risk increasingly sits outside traditional security functions. The third explores developer-driven AI security failures, including prompt injection and sensitive data exposure, where existing secure-by-design practices fail to translate to AI systems. Together, these cases show why AI security remains fundamentally human-centred and why organisation-wide AI upskilling is now a critical security, resilience, and workforce strategy.

12:45 Breakout Session 4: AI Governance: From Risk to Accountability

Bharat Thakrar, CyberBTX

AI systems are rapidly deployed across organizations, but accountability and governance lag behind. CISOs and boards face critical questions: Who is accountable when AI makes a wrong decision? How do we move from identifying AI risks to establishing clear ownership and oversight? What cybersecurity risks does AI introduce? How do we build governance that is auditable and defensible? This interactive breakout session provides a practical roadmap from AI risk assessment to accountability structures, aligned with emerging regulation including the EU AI Act and ISO/IEC 42001.

13:30 – 15:00 Lunch

One of the unique experiences at The-C2 is the opportunity to connect and spend quality time with other delegates. We host a three course lunch to provide the time and atmosphere to generate interesting and meaningful conversations.

15:00 Talk 7: The Hacking Games: Inside the mind of a teenage hacker

Fergus Hay & Conor Freeman, The Hacking Games

Join us as we explore the unconventional learning styles and motivations of digital natives who view system limits as a creative substrate to be bent rather than broken. This session delves into how peer validation and community clout often carry more weight for this cohort than formal credentials. Hear from a former ‘The Com’ cybercriminal who has now turned his life around, taking on red-teaming from the unique perspective of being a black-hat hacker.

15:45 Talk 8: Assume the zero day: Understanding and managing risks in the era of vulnerable software

Joel Spurlock, CrowdStrike

16:30 Closing Words – Simon Edwards, SE Labs

Simon Edwards, CEO and Founder of SE Labs, wraps up The-C2 conference for 2026.

17:00 – 19:00 Farewell Drinks

Join fellow delegates and speakers for an opportunity to network and chat over a drink and some canapés!

THE SPEAKERS

2026 speakers

Lieutenant General Sir Tom Copinger-Symes KCB CBE

Deputy Commander

UK Cyber & Specialist Operations Command

Simon Edwards

Founder and Chief Executive Officer (CEO)

SE Labs

Allie Mellen

Principal Analyst, Security and Risk

Forrester

Joel Spurlock

Vice President (VP), Data Science

CrowdStrike

Dr. Richard Ford

Vice President (VP), Engineering

CyberCube

Fergus Hay

CEO and Co-Founder

The Hacking Games

Bharat Thakrar

Chief Information Security Officer (CISO)

CyberBTX

Harriet Farlow

CEO/Founder

Mileva Security Labs

Martin Smith MBE

Chairman and Founder

The Security Awareness Special Interest Group (SASIG)

Florian Pouchet

Partner – Head of Security and Resilience UK

Wavestone

Emily Soward

CEO & Founder

Realis Solutions Group

Katie Barnett

Director of Cyber Security

Toro Solutions

Simon Briggs

Head of the Land Domain

Tekever

Enza Iannopollo

CIPP/EVP, Principal Analyst

Forrester

Roxane Pearson

Senior Manager

Wavestone

David Orr

Director Falcon Complete

CrowdStrike

Annie Collings

Senior Programme Manager

Cyber Resilience

Justin Kuruvilla

Chief Cyber Security Strategist

Risk Ledger

Conor Freeman

Unconventional Red-Teamer

The Hacking Games

The-C2

Gallery

A sneak pack into our previous threat intelligence conference events

The venue

The-C2 Club House

The-C2 is held annually at Merchant Taylors’ Hall, London

Our venue is key to the character of The-C2

This security conference is for security leaders. There is no better place to host such an event than at Merchant Taylors’ Hall.

For over 700 years it has hosted gatherings for key figures in our medieval and modern history.

The Merchant Taylors’ Company was formalised by royal charter in 1327 and has occupied the same site on Threadneedle Street since at least 1347. It is the only ancient Livery Company to remain on its original site. Through history many noblemen, some noblewomen and several Kings of England have entered its ranks as honorary freemen.

The Company has enjoyed royal patronage over the years; along with admitting many royals into the Company. Edward III (1327-77) and Henry VII (1485-1509) were admitted as members of the fraternity. More recently, both the late Queen Mother and the late Princess Diana were made honorary Merchant Taylors.

Through history Merchant Taylors has continued to play a prominent part in City life, within an ever-changing political and social landscape. Attendees of The-C2 join the ranks of several Kings and Queens of Britain, Mayors of London and a host of other historical figures (as well as Harry Potter).

Secure your ticket

Register now for The-C2 2027 conference!

Full access, two day conference ticket


£550

Full two day conference, access to breakout sessions, networking lunches, drinks reception and grand finale dinner.

REGISTER NOW!

* Prices not including VAT.

Interested in sponsoring The-C2 2027?

Please contact us to hear about our highly tailored options to make the very best of The-C2 conference for your company and vision.

GET IN TOUCH