Strong safety, lean teams: Practical pharmacovigilance strategies for biotech and pharma (Stream A room onsite)

  • Understand how pharmacovigilance roles and responsibilities align across sponsors, CROs, vendors, and investigators, and why clear roles prevent inefficiencies and issues
  • Learn how biotech and specialty pharma can develop scalable pharmacovigilance strategies that adapt to dynamic pipelines
  • Discover how hybrid outsourcing balances in-house oversight with external expertise for global coverage
  • Explore methods to enhance partnerships so pharmacovigilance can support both compliance and operational delivery
  • Recognize how a well-designed pharmacovigilance model can accelerate progress from early development to marketing approval

CTS sourcing and procurement trends and challenges – external manufacturing as the “procurement´s operational arm”

Accelerate, cultivate, innovate!

  • Managing relationships with the modern supplier
  • How Bayer’s external relationship governance model adds value to the business ensuring a reliable partnership and complements the sourcing & procurement functions within CTS scope
  • Trends on procurement roles and the necessity to have an operational perspective
  • Different approaches from different business necessities
  • Trends on how to best manage CMOs, 3PLs and clinical trials partners

Gamification in clinical trials: A proven path to better engagement, retention, and data integrity (Stream A room onsite)

Consistent patient engagement is vital to clinical trial success, yet dropout and non-compliance remain persistent challenges. This session introduces gamification as a scientifically grounded strategy to boost retention, enhance adherence, and streamline trial execution.

  • Understand the Science: Explore the behavioral and psychological foundations that make gamification a powerful tool for sustaining patient motivation
  • See Real Results: Review real-world case studies where gamification significantly improved retention, compliance, and trial timelines
  • Apply Proven Methods: Learn practical strategies and best practices for integrating gamified elements into clinical trial protocols

Lessons on Identity – the new battleground for enterprise security

In recent years, some of the most damaging cyberattacks in Europe share a common thread – identity. As traditional defences strengthen, attackers have shifted tactics, moving away from malware and exploits toward abusing legitimate credentials, permissions, and trust relationships within enterprise environments.

This session considers how attackers use identities to navigate industry-standard defences. We’ll explore the anatomy of an identity-based attack – from initial access through to organisational-wide takeover – and highlight recurring patterns seen across European enterprises.

Today’s breaches aren’t the result of poor security but of unseen complexity. Hidden identity attack paths buried deep in Active Directory and Entra ID provide adversaries with millions of routes to critical systems.

We’ll conclude with a strategy to move from reactive defence to proactive identity risk management. By continuously mapping and removing identity attack paths, organisations can eliminate the bridges adversaries depend on.