High stakes: Travel security, red teaming and AI testing
our schedule
Securing international travel to high-risk countries
As international travel resumes, concerns are growing around border control practices in high-risk countries—particularly the risk of devices being examined or surveillance being conducted. We take a proactive approach to managing these threats, ensuring board-level control standards are upheld globally. Tools and practices such as clean laptops, virtual desktops, zero-trust access, temporary account provisioning, and strict geofencing are key to minimising the risk of sensitive information or systems being exposed. Combined with tailored threat briefings and traveller support protocols, our strategy ensures operational continuity without compromising data integrity.
Making it real: What could a capable threat actor actually do if they could access your own LLMs?
As security leaders, we recognise both the threat and the opportunity presented by the race to gain a competitive edge through AI. With growing pressure from executive teams and the rise of internal AI initiatives, including the development of proprietary LLMs, there’s a critical need to balance business enthusiasm with a secure-by-design approach.
Security leaders must navigate this tension carefully, ensuring governance, control, and ultimately security are not compromised. Our last session focused on the theory behind attack techniques such as prompt injection, data poisoning, and model inversion. Now, we move from theory to practice—demonstrating how these risks can manifest in real-world environments through practical, hands-on examples.