Forrester’s Know-how & Innovation Summit EMEA 2025 introduced collectively over 400 of Europe’s most forward-thinking expertise leaders from 28 nations, in addition to Forrester analysts who collectively travelled for 44,750kms. At a time when innovation feels as exhilarating as it’s exhausting, in an period outlined by AI-led disruption, financial volatility, and rising regulatory stress, the temper in London was one in all cautious confidence. Whereas different international occasions dazzle with spectacle, Forrester’s T&I Summit stayed true to its pragmatism, construction, and sharply centered on accelerating the proper of progress, the place ethics, transparency, and belief allow sustainable innovation at scale. The businesses that thrive gained’t be these shifting quickest, however these shifting properly balancing experimentation with accountability.
The overarching theme, “Mastering Tech Mayhem,” resonated all through the periods. Because the summit unfolded, one factor turned clear: Yesterday’s unlikely fears, uncertainties, and doubts have morphed into right now’s chaotic actuality — geopolitical strife, tariffs, commerce wars, regulatory hurdles, and AI dominate public discourse. The safety and threat observe deconstructed and anticipated present and rising dangers, find out how to deal with digital sovereignty, AI, and different regulatory complexities head on, and act decisively to safe your group. It highlighted the significance of constructing a safety and threat tradition that unites stakeholders, who collectively can reply to challenges with a gentle hand. To really meet your want for innovation, transfer past velocity and scale to resilience, safety, threat and tech leaders realized that:
Cybersecurity threats in 2025 and past require preparation and a gentle hand. We paused and deconstructed 2025’s cybersecurity panorama. AI — predictive, generative, and agentic — is rewriting the rulebook. Societal, financial, and technological uncertainty provides to the complexity. Insider threat is rising as workforce stress results in surprising conduct. Deepfakes have surged, with a 1500% enhance in components of Europe attributable to AI breaking language boundaries for each defenders and attackers, and deepfakes are now used to bypass biometrics. Our CISO visitor audio system, Nick Jones and Simon Strickland, shared find out how to put together and reply to this panorama, from an elevated deal with human threat administration, insider threat applications, and deepfake detection and protection. We have been reminded of the criticality of human expertise: negotiation, affect and private resilience.
Innovation with out ethics is short-lived. Compliance is important for reliable AI, however it’s solely step one. Frameworks comparable to Forrester’s Enterprise Agentic Guardrails for Data Safety (AEGIS) assist safety and tech leaders design, govern, and handle AI brokers and their infrastructure. Forrester’s “Minimal Viable Sovereignty” pragmatic, risk-based strategy balances budgets, enterprise objectives, and authorized to deal with AI sovereignty. Bear in mind – even probably the most superior expertise is ineffective with out belief. A sound strategy to reliable AI considers buyer belief attitudes, formed by expectations and threat notion. Undertake accountable AI frameworks that strengthen accountability for AI initiatives, align AI methods with enterprise intent, values, and objectives and design cognitive empathy in AI methods.
Lowering your threat means you must assume like an attacker. Safety and tech leaders face a reshaped panorama of AI, automation, and regulation. They have to evolve from compliance-driven testing to adversary-driven readiness – defenses that mirror how actual attackers function, contemplating the attackers’ core objectives: to modify, destroy, or steal information. Amidst this chaos, leaders have to urgently take into account the three basic targets all menace actors have: to modify, destroy or steal information. To defend in opposition to these targets, you will to distill significant behavioral patterns from background information litter, utilizing energetic looking of your expertise ecosystem as an intelligence supply. Actively carry out structured safety assessments comparable to pink and purple teaming to cut back uncertainty via preparation and steady testing.
Digital sovereignty strikes from a information safety to a enterprise continuity difficulty. As soon as an extension to GDPR and privateness issues, digital sovereignty is now a theme with its personal dignity which is high of thoughts for CIOs, CISOs, and each tech chief in EMEA. Organizations are worrying about their digital sovereignty posture with regard to dangers just like the “kill swap” and broader dependencies on international jurisdictions via their distributors and repair suppliers. Tech leaders need to know what are the perils they haven’t even thought of, and find out how to defend their IT stack with out bleeding out their budgets. To do that efficiently, take a deep breath and not go away intestine emotions affect your sovereignty technique. And don’t attempt to boil the ocean, however slightly work in the direction of reaching the minimal viable sovereignty (MVS).
Maturity assessments should incorporate threat quantification. Maturity assessments are usually not a brand new subject in cybersecurity, with utilization by safety organizations for over twenty years. Shoppers use them to measure the maturity of their capabilities, and whereas useful, they don’t reply a basic query: “What cybersecurity investments do I prioritize to maximize my threat discount outcomes?”. The “Mature and Justify Your Safety Program” presentation outlined that maturity assessments alone are usually not sufficient, and that threat quantification can add a complete new dimension to a traditional recipe, as corporations like Netflix have discovered. For organizations approaching a outlined maturity degree, utilizing threat quantification helps with lots of the limitations of maturity assessments, by including how maturity enhancements hyperlink to monetary threat discount outcomes.
Your safety group construction have to be adaptive. The construction of your safety group defines your workforce’s agility, affect, and enterprise worth. As soon as a subset of IT, cybersecurity is now a strategic driver of progress and belief. With AI reshaping dangers and roles, construction issues greater than ever. Organizations usually observe 5 archetypes: centralized, federated, oversight-driven, enterprise or product-centric, every with distinctive strengths and trade-offs. CISOs ought to design intentionally, aligning safety with enterprise ambition. AI accelerates this evolution, introducing governance leads, automated operations, and adaptive roles. Tech leaders ought to take into account that the problem isn’t selecting a mannequin however creating one which evolves with ambition, expertise, and regulation. To achieve success, safety constructions have to be dynamic, not static supplying you with the flexibility to spin up new groups with out a full overhaul.
We stay deeply devoted to our purchasers, our analysis, and our shared mission. Along with our international Safety & Threat colleagues, we look ahead to supporting you throughout the main focus areas above. For questions regarding subjects on this weblog please join with our consultants Jinan Budge, Paul McKay, Tope Olufon, Enza Iannopollo Dario Maisto and Madelein van der Hout, via an inquiry or steering session.















