- Setting up a local trial in Sweden: considerations and actions
- Communicating with multiple stakeholders
- Considering logistical requirements for personalized cell therapy: manufacturing, sites and patients
- Providing a small company perspective on cell therapy trial execution
Archives: Agenda
Fireside Chat: Discussing insights on use of Real World Evidence within clinical trials
- Integrating RWE into clinical trial design
- Using RWE to enhance or compliment traditional evidence generation
- Sharing successes and lessons learned
Strong safety, lean teams: Practical pharmacovigilance strategies for biotech and pharma (Stream A room onsite)
- Understand how pharmacovigilance roles and responsibilities align across sponsors, CROs, vendors, and investigators, and why clear roles prevent inefficiencies and issues
- Learn how biotech and specialty pharma can develop scalable pharmacovigilance strategies that adapt to dynamic pipelines
- Discover how hybrid outsourcing balances in-house oversight with external expertise for global coverage
- Explore methods to enhance partnerships so pharmacovigilance can support both compliance and operational delivery
- Recognize how a well-designed pharmacovigilance model can accelerate progress from early development to marketing approval
1,000 Trials: A decade later – what’s worked, what’s new, and what’s next in RTSM?
From IVRS to RTSM: a decade of evolution, innovation, and lessons learned
- Insights from 1,000 studies: what we have consistently seen, what has worked (and hasn’t)
- Emerging trends and innovations shaping the next generation of RTSM
- What sponsors are asking for: future expectations from RTSM providers
Fireside Chat: Integrating both clinical supply and clinical team perspectives for end to end supply chain efficiency
- Optimising supply chain demand forecasting to minimise waste
- Considering AI, tools and technologies to assist in end to end supply chain planning, management and visibility
- Creating a more joined up approach through communication with clinical teams
Registration and refreshments
CTS sourcing and procurement trends and challenges – external manufacturing as the “procurement´s operational arm”
Accelerate, cultivate, innovate!
- Managing relationships with the modern supplier
- How Bayer’s external relationship governance model adds value to the business ensuring a reliable partnership and complements the sourcing & procurement functions within CTS scope
- Trends on procurement roles and the necessity to have an operational perspective
- Different approaches from different business necessities
- Trends on how to best manage CMOs, 3PLs and clinical trials partners
Chairperson’s Opening Remarks
Gamification in clinical trials: A proven path to better engagement, retention, and data integrity (Stream A room onsite)
Consistent patient engagement is vital to clinical trial success, yet dropout and non-compliance remain persistent challenges. This session introduces gamification as a scientifically grounded strategy to boost retention, enhance adherence, and streamline trial execution.
- Understand the Science: Explore the behavioral and psychological foundations that make gamification a powerful tool for sustaining patient motivation
- See Real Results: Review real-world case studies where gamification significantly improved retention, compliance, and trial timelines
- Apply Proven Methods: Learn practical strategies and best practices for integrating gamified elements into clinical trial protocols
Lessons on Identity – the new battleground for enterprise security
In recent years, some of the most damaging cyberattacks in Europe share a common thread – identity. As traditional defences strengthen, attackers have shifted tactics, moving away from malware and exploits toward abusing legitimate credentials, permissions, and trust relationships within enterprise environments.
This session considers how attackers use identities to navigate industry-standard defences. We’ll explore the anatomy of an identity-based attack – from initial access through to organisational-wide takeover – and highlight recurring patterns seen across European enterprises.
Today’s breaches aren’t the result of poor security but of unseen complexity. Hidden identity attack paths buried deep in Active Directory and Entra ID provide adversaries with millions of routes to critical systems.
We’ll conclude with a strategy to move from reactive defence to proactive identity risk management. By continuously mapping and removing identity attack paths, organisations can eliminate the bridges adversaries depend on.