Skip to main content

Navigation Call to Actions

Loading
  1. Global Cyber Summit
    • Global Cyber Summit
    Small businesses are a critical component of the supply chain and a potential point of vulnerability. Making them more secure is in the interests of the larger organisations that rely on them. Why sma ...
  2. Global Cyber Summit
    • Global Cyber Summit
    In an increasingly interconnected world, cyber threats continue to evolve at a rapid pace, challenging individuals, businesses, and governments alike. This keynote will provide a comprehensive overview of the most critical cybersecurity trends affecting us today. From data breaches and ransomware attacks to the growing influence of nation-state actors, we'll explore how these threats are reshaping the digital landscape. Additionally, we'll dive into the emerging challenge of AI in both enhancing security defences and enabling new forms of cyberattacks. Attendees will gain valuable insights into how these trends are impacting global security and what steps can be taken to mitigate the risks.
  3. Global Cyber Summit
    • Global Cyber Summit
  4. Global Cyber Summit
    • Global Cyber Summit
    Sharing information to counter cyber threats should be a no-brainer and a fundamental pillar of combating cybercrime, but it is not as easy as it sounds. In a complex world of transnational regulation ...
  5. Global Cyber Summit
    • Global Cyber Summit
    A presentation from the UK Defence and Security Exports Cyber Team, providing an insight into its offer to help UK cyber companies grow their business overseas and the role of cyber exports in support ...
  6. Global Cyber Summit
    • Global Cyber Summit
    Fraud is the biggest crime in the UK; most are cyber-enabled. We examine one example and the lessons we can learn to deny the criminal and enable his prey. Whisky casks - how the fraudster benefits an ...
  7. Global Cyber Summit
    • Global Cyber Summit
    In an era of escalating cyber threats, national preparedness has become paramount for safeguarding critical infrastructure and maintaining national security. This presentation, hosted by the National ...
  8. Global Cyber Summit
    • Global Cyber Summit
    Security by design should be the base standard for software and hardware development, but too often, speed to market trumps it. How do we design a more robust ecosystem that is not susceptible to the ...
  9. Global Cyber Summit
    • Global Cyber Summit
    In 2019, the Johnson Government was elected on a promise to get Brexit done. By the time of Legal SASIG in September 2024, we will have a new Government, and nearly four years will have passed since t ...
  10. Global Cyber Summit
    • Global Cyber Summit
    The UK’s insurance, legal, and financial sectors are already world-leading – could cybersecurity join them? Explore the report’s recommendations for supporting productivity, competitiveness, innovatio ...
  11. Global Cyber Summit
    • Global Cyber Summit
    All businesses are, in effect, technology businesses where IT is the critical enabler. Governments are using regulation and the courts to encourage greater board engagement in the digital resilience o ...
  12. Global Cyber Summit
    • Global Cyber Summit
    The digital world has revolutionised crime, anonymising criminals, enabling access to multiple targets, and increasing the speed at which opportunities are exploited. This is no more apparent than in ...
  13. Global Cyber Summit
    • Global Cyber Summit
    The skills shortage in the cyber sector is well documented but less so is the targeting and ‘recruitment’ of young hackers by organised crime, some as young as 8.  How do we encourage this talent pool ...
  14. Global Cyber Summit
    • Global Cyber Summit
    Burnout is a serious issue in the cybersecurity sector, and the pressure on CISOs and their teams is growing. Chronic workplace stress is not just a health and welfare concern but can impair judgement ...
  15. Global Cyber Summit
    • Global Cyber Summit
    Sponsored by:   Advancements in cyber threats mean businesses have minutes to stop the rapid spreading of malicious activity and prevent catastrophic damage. Akin to wildfires, preparedness, detection ...
  16. Global Cyber Summit
    • Global Cyber Summit
    The current geopolitical picture is turbulent and uncertain: war in Europe and the Levant threatens to engulf the world in the broader conflict. The consequences reach beyond the physical world into t ...
  17. Global Cyber Summit
    • Global Cyber Summit
    Information ops are not new, but social media has been a boon to those who want to influence at scale. In a world where 'fake news' is, to paraphrase Samuel Johnson, the refuge of scoundrels, how easy ...
  18. Global Cyber Summit
    • Global Cyber Summit
  19. Global Cyber Summit
    • Global Cyber Summit
    Sponsored by: In today’s interconnected digital landscape, organizations increasingly rely on third-party vendors for various services and solutions. While these partnerships offer significant benefit ...
  20. Global Cyber Summit
    • Global Cyber Summit
    Fraud accounts for over 40% of crime in the UK, is primarily cyber-enabled and is notoriously underreported.  City of London Police will explain the new architecture for law enforcement to tackle a cr ...
  21. Global Cyber Summit
    • Global Cyber Summit
    Sponsored by: In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a defa ...
  22. Global Cyber Summit
    • Global Cyber Summit
    Although we talk about incident response, how we prepare for a cyber event is critical to how quickly we recover. A plan is a start, but ensuring it is fit for purpose is vital. • The value of exercis ...
  23. Global Cyber Summit
    • Global Cyber Summit
    All the chat is about GPT. Generative AI has profoundly impacted our attitude towards Artificial Intelligence and its implications for us as individuals and society. • AI as a force multiplier for the ...
  24. Global Cyber Summit
    • Global Cyber Summit
    The skills gap remains a stubborn challenge for most countries. Technological innovation, such as AI, might fill some of the roles, but experience has shown that it generates new jobs that require new ...
  25. Global Cyber Summit
    • Global Cyber Summit
    Ransomware remains the most devastating cyber attack UK businesses face and is considered a strategic threat by the NCSC. Organisations often face the dilemma of whether to pay, with consequences eith ...
  26. Tech Hub Stage
    • Tech Hub Stage
    Defining resilience: what do we mean? What can Cyber Security and Secure by Design learn from other fields like water supply, safety, medicine and engineering? What place do our people have in creatin ...
  27. Tech Hub Stage
    • Tech Hub Stage
    Ready to maximize cybersecurity ROI by enabling enterprise-grade protection for small-to-medium businesses? Join as Cynet Co-Founder & COO Netanel Amar explains how Cynet unifies a full suite of secur ...
  28. Tech Hub Stage
    • Tech Hub Stage
    Despite the advanced technology deployed to combat business phishing attacks, data indicates that over 90% of successful cyberattacks that harm revenue and reputation begin with a good employee inadve ...
  29. Tech Hub Stage
    • Tech Hub Stage
    The session will cover the Significance of privileged access management (PAM) in cybersecurity, the best practices for PAM, its role in regulatory compliance, emerging trends, the most common challeng ...
  30. Tech Hub Stage
    • Tech Hub Stage
    Large Language Models will significantly enhance the operations of frontline analysts and security services, but bringing this capability to constrained network environments presents complex engineeri ...
  31. Tech Hub Stage
    • Tech Hub Stage
    With the rise of attacks against Identity Providers, this talk will lift the lid on the tactics and tools used during Red Team assessments when targeting IdPs, demonstrating attack paths we've found t ...
  32. Tech Hub Stage
    • Tech Hub Stage
    As the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisa ...
  33. Tech Hub Stage
    • Tech Hub Stage
    Despite abundant guidance, "cyber resilience" still lacks a clear definition and is often described qualitatively. This session explores methods to measure, track and report cyber resilience quantitiv ...
  34. Tech Hub Stage
    • Tech Hub Stage
    Gaining buy-in from suppliers is a major challenge in third-party risk management, often leading infosec teams to rely on scanning software instead of obtaining crucial self-reported information. This ...
  35. Tech Hub Stage
    • Tech Hub Stage
    Recent research shows 89% of CISOs prioritise security culture, yet many don't know where to start. This session bridges that gap, offering insights and tips to craft a security culture, elevate atten ...
  36. Tech Hub Stage
    • Tech Hub Stage
    Build workflows and automate processes with the only platform purpose-built to empower technical teams. Learn how using Tines as a no-code smart, secure workflow builder enables you to break down barr ...
  37. Tech Hub Stage
    • Tech Hub Stage
    Cyber attacks are more sophisticated than ever, with AI-powered attacks posing greater risks. Despite technological advancements, tailored detection and proper procedures are absolutely essential in c ...
  38. Tech Hub Stage
    • Tech Hub Stage
    Cybercriminals are not bound by politics or law. They are increasingly leveraging AI and automation to perform advanced attacks on all types of organisations. During this session we will discuss how t ...
  39. Tech Hub Stage
    • Tech Hub Stage
    Arunava Banerjee, Cyber Risk Consulting Lead at Zurich Resilience Solutions, will discuss the importance and applications of Cyber Risk Quantification in Cyber Risk Management. He will share practical ...
  40. Tech Hub Stage
    • Tech Hub Stage
    A mature data loss prevention strategy has to start with an understanding of your environment's data, where it resides, how its treated and who has access to it. Join Cyro Cyber's Liam Newton and Pete ...
  41. Tech Hub Stage
    • Tech Hub Stage

    How well do you know your Organisation’s Digital Identity? Do you know how many digital identities you have? There are billions of domains/subdomains commissioned on the internet that reveal information about their owners and the security vulnerabilities of their systems.

    Peter and Geir highlight the risks inherent in the 40 year old design of DNS, the current unknown breaches and predict what will happen and how future attacks will be orchestrated. Find out about the unknown unknowns even sophisticated Organisations don’t have a handle on. Our mission is to provide unparalleled insight and protection for your attack surface blind spots. Is your digital footprint truly secure?

  42. Tech Hub Stage
    • Tech Hub Stage
    Moving data to cloud is complex.  You lose control and visibility.  Solutions you relied on to protect your data on premises don’t scale for Cloud. The hybrid-cloud world needs a new way of thinking: ...
  43. Tech Hub Stage
    • Tech Hub Stage
    Understand the tools and techniques cyber criminals use to penetrate your defences. Beat them. Using real threat intelligence can determine the severity of a vulnerability based on its ability to caus ...
  44. Tech Hub Stage
    • Tech Hub Stage

    The attack surface across APIs has increased to the point security teams may not even be aware of their organization’s complete inventory. What if you could understand your API attack landscape to detect malicious activity before it impacts your business? Join us for a closer look at shoring up your API defenses.

  45. Tech Hub Stage
    • Tech Hub Stage
    This talk explores whether the focus on security testing has overshadowed, if not negated, more effective application security practices. It examines the benefits and drawbacks of security testing, hi ...
  46. Tech Hub Stage
    • Tech Hub Stage
    Join us for an engaging session exploring how a Managed Security Service Provider increased the efficiency and revenue of its penetration testing service through security automation. We'll demonstrate ...
  47. Tech Hub Stage
    • Tech Hub Stage
    During this session you'll hear about how fast and easy it is to compromise some of the largest networks in the world – with full domain takeover – often in minutes, and sometimes, without even exploiting a CVE. Discover how autonomous pentesting helps find unknown weaknesses in your infrastructure before attackers do.
  48. Diversity & Skills Stage
    • Diversity & Skills Stage
    The cybersecurity industry, known for its high-stress environment and constant pressure, poses significant mental health challenges for professionals. While there are numerous initiatives aimed at sup ...
  49. Diversity & Skills Stage
    • Diversity & Skills Stage

    Join us for an exciting exploration of how confidence and risk-taking can propel your career forward. Our panel of experts will share their personal stories, strategies, and insights, offering you valuable lessons on managing risks to unlock new opportunities. Don't miss this chance to learn how embracing bold moves can lead to professional success!

  50. Diversity & Skills Stage
    • Diversity & Skills Stage
    Discover the importance of women and allies in the cybersecurity field. This session highlights how diverse perspectives enhance problem-solving, address skill shortages, and foster an inclusive cultu ...
  51. Diversity & Skills Stage
    • Diversity & Skills Stage
    Join us for an engaging panel session featuring seasoned leaders in technology and cybersecurity as they share the pivotal lessons learned throughout their distinguished careers. This discussion will provide invaluable advice and practical insights for the next generation of industry professionals, highlighting the challenges, successes, and key takeaways that have shaped their journeys. Whether you're just starting out or looking to advance your career, this session will offer essential guidance to help you navigate the evolving landscape of technology and cybersecurity.
  52. Diversity & Skills Stage
    • Diversity & Skills Stage

    Embarking on a new career path can be daunting, especially when transitioning into a dynamic and complex field like cybersecurity later in life. This panel discussion aims to debunk the myth that it's too late to start a career in cybersecurity, highlighting the diverse stories and backgrounds of professionals who have successfully made this pivot.

    Join us as our panellists, who come from various educational and professional backgrounds, share their journeys into cybersecurity. They will discuss the challenges they faced, the skills and knowledge they acquired, and the passion that drove them to succeed. Whether you are contemplating a career change or are already on your way, this discussion will provide valuable insights and inspiration.

  53. Diversity & Skills Stage
    • Diversity & Skills Stage
    To inspire and recruit the next generation of ethical hackers to transform the perception of hacking from a criminal act to a positive, constructive force. The Hacking Games seeks to unite innovators, educators, and practitioners dedicated to advancing the field of ethical hacking. Our mission is to inspire and educate the next generation of ethical hackers, transforming them from potential attackers into defenders. 
  54. Diversity & Skills Stage
    • Diversity & Skills Stage
    Let’s Cut the Bull: Can (Cyber) Women Really Have it All?  The question, ‘Can women have it all?’ is controversial. But rather than getting into the politics of that specific question, Grab the Mic wi ...
  55. Diversity & Skills Stage
    • Diversity & Skills Stage
    Cyber security culture should be one of the many security controls to support a business reach its objectives. A security culture can be defined by the shared values, beliefs, attitudes, and behaviours of the employee's towards cyber security. It should also extend to engagements with vendors and stakeholders of the business. The cyber security culture is all about people, but are you letting everyone in? This talk will discuss how diversity and inclusion should be included in developing cyber security awareness right through to the management of personnel during an incident. How do you engage and support your employee's to join the cyber culture club to understand more about business resilience and less karma chameleon. 
  56. Diversity & Skills Stage
    • Diversity & Skills Stage
    Mark Johnson talks about his personal experience of coming from a very diverse family background, and working initially in drug trafficking interdiction, then cyber security, for almost five decades. ...
  57. Diversity & Skills Stage
    • Diversity & Skills Stage
    In alignment with ISACA's SheLeadsTech movement, this panel brings together inspiring women leaders from the technology and cybersecurity sectors to discuss the journey thus far for women in tech, and where it needs to go next. Join us as our distinguished panellists share their personal stories, strategies for success, and actionable advice on fostering diversity, inclusion, and leadership in the industry. This session is designed to empower and support the next generation of women in tech, providing insights on breaking barriers and driving change in a rapidly evolving digital world.
  58. Diversity & Skills Stage
    • Diversity & Skills Stage
    Organizations have everything that cyber attackers are looking for – sensitive & valuable data, PII & intellectual property, and cloud-based services that must not fail. The strain of protecting your ...
  59. Tech Hub Stage
    • Tech Hub Stage
    This talk explains why Operation Technology security is crucial in our increasingly connected world. Key takeaways include understanding emerging cyber threats, learning risk mitigation strategies, an ...
  60. Tech Hub Stage
    • Tech Hub Stage
    From cyber welfare to cyber warfare, drones are involved in some of the most diverse applications. But how do we address safety and security concerns regarding critical infrastructure (physical, cyber ...
  61. Tech Hub Stage
    • Tech Hub Stage

    Discover how Sitehop's SAFE Series is redefining encryption with groundbreaking quantum-resistant cryptography. This talk will explore how Sitehop's innovative solution sets new standards in security, offering unparalleled protection against emerging threats and reshaping the future of digital security in the quantum era.

  62. Tech Hub Stage
    • Tech Hub Stage
    Discover how CyGamBIT is transforming cybersecurity education with innovative training solutions. Learn how integrating psychological support with technical skills empowers non-technical staff, enhanc ...
  63. Tech Hub Stage
    • Tech Hub Stage
    Iain will explore the evolving cyber battlefield where hackers harness AI for increasingly sophisticated attacks. Discover how AI-powered defenses, paired with human expertise, are crucial in combatin ...
  64. Tech Hub Stage
    • Tech Hub Stage
    In this 10-minute session, we will provide an essential overview of social engineering crimes specifically targeting contact centres. With the increasing sophistication of cybercriminals, contact cent ...
  65. Diversity & Skills Stage
    • Diversity & Skills Stage

    Sebastian Madden, Capacity Building and MEA lead at CREST will discuss how in today's increasingly interconnected digital world, governments are collaborating through initiatives to develop cyber security skills and service providers to Combat Cyber Crime and protect Critical National Infrastructure. 

    In terms of national cyber security, a country is only as strong as its weakest link and in the age of interconnected global markets and an increasingly sophisticated threat landscape, the weakest link can come from anywhere in the world. It is important that when looking at initiatives to grow cyber skills, governments, academia and industry also consider how they can support those nations with less advanced cyber skills capability. 

  66. Tech Hub Stage
    • Tech Hub Stage
    There have never been so many vulnerabilities, more and more every month. Just telling people what's wrong doesn't help! 
    Attendees will gain insights into optimising vulnerability management, enhancing response times, and reducing risks. Learn actionable steps to streamline your security operations for maximum efficiency.
    • Diversity & Skills Stage
    The future of the cybersecurity profession is top-of-mind for professionals, leaders, and their organisations. According to ISC2’s 2024 Cybersecurity Workforce Study, the profession faces a workforce ...