Skip to main content

Navigation Call to Actions

Tech Hub Stage

Be the first to witness and hear the groundbreaking product launches and revolutionary solutions. Our stage offers a dynamic platform to explore real-world applications and in-depth case studies. Engage directly with technical experts, ready to answer your questions on the spot. Don't miss this chance to dive into the cutting-edge of technology.

Loading
10:05
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Arunava Banerjee, Cyber Risk Consulting Lead at Zurich Resilience Solutions, will discuss the importance and applications of Cyber Risk Quantification in Cyber Risk Management. He will share practical ...
10:30
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Cybercriminals are not bound by politics or law. They are increasingly leveraging AI and automation to perform advanced attacks on all types of organisations. During this session we will discuss how t ...
10:55
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Cyber attacks are more sophisticated than ever, with AI-powered attacks posing greater risks. Despite technological advancements, tailored detection and proper procedures are absolutely essential in c ...
11:20
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Build workflows and automate processes with the only platform purpose-built to empower technical teams. Learn how using Tines as a no-code smart, secure workflow builder enables you to break down barr ...
11:45
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Recent research shows 89% of CISOs prioritise security culture, yet many don't know where to start. This session bridges that gap, offering insights and tips to craft a security culture, elevate atten ...
12:10
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Gaining buy-in from suppliers is a major challenge in third-party risk management, often leading infosec teams to rely on scanning software instead of obtaining crucial self-reported information. This ...
12:35
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Despite abundant guidance, "cyber resilience" still lacks a clear definition and is often described qualitatively. This session explores methods to measure, track and report cyber resilience quantitiv ...
13:00
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    A mature data loss prevention strategy has to start with an understanding of your environment's data, where it resides, how its treated and who has access to it. Join Cyro Cyber's Liam Newton and Pete ...
13:25
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Defining resilience: what do we mean? What can Cyber Security and Secure by Design learn from other fields like water supply, safety, medicine and engineering? What place do our people have in creatin ...
13:50
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    As the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisa ...
14:15
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    With the rise of attacks against Identity Providers, this talk will lift the lid on the tactics and tools used during Red Team assessments when targeting IdPs, demonstrating attack paths we've found t ...
14:40
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Large Language Models will significantly enhance the operations of frontline analysts and security services, but bringing this capability to constrained network environments presents complex engineeri ...
15:05
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    The session will cover the Significance of privileged access management (PAM) in cybersecurity, the best practices for PAM, its role in regulatory compliance, emerging trends, the most common challeng ...
15:30
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Despite the advanced technology deployed to combat business phishing attacks, data indicates that over 90% of successful cyberattacks that harm revenue and reputation begin with a good employee inadve ...
15:55
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Ready to maximize cybersecurity ROI by enabling enterprise-grade protection for small-to-medium businesses? Join as Cynet Co-Founder & COO Netanel Amar explains how Cynet unifies a full suite of secur ...
16:30
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
16:45
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
    Discover how CyGamBIT is transforming cybersecurity education with innovative training solutions. Learn how integrating psychological support with technical skills empowers non-technical staff, enhanc ...
17:00
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
    Iain will explore the evolving cyber battlefield where hackers harness AI for increasingly sophisticated attacks. Discover how AI-powered defenses, paired with human expertise, are crucial in combatin ...
17:15
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
    In this 10-minute session, we will provide an essential overview of social engineering crimes specifically targeting contact centres. With the increasing sophistication of cybercriminals, contact cent ...
10:05
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
10:30
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    This talk explores whether the focus on security testing has overshadowed, if not negated, more effective application security practices. It examines the benefits and drawbacks of security testing, hi ...
11:20
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Our experience managing hundreds of serious incidents and breaches shows many commonalities, this session will help you minimise the impact of a breach in your organisation and speed up recovery time. ...
11:45
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    The attack surface across APIs has increased to the point security teams may not even be aware of their organization's complete inventory. What if you could understand your API attack landscape to det ...
12:10
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    Join us for an engaging session exploring how a Managed Security Service Provider increased the efficiency and revenue of its penetration testing service through security automation. We'll demonstrate ...
12:35
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage

    How well do you know your Organisation’s Digital Identity? Do you know how many digital identities you have? There are billions of domains/subdomains commissioned on the internet that reveal information about their owners and the security vulnerabilities of their systems.

    Peter and Geir highlight the risks inherent in the 40 year old design of DNS, the current unknown breaches and predict what will happen and how future attacks will be orchestrated. Find out about the unknown unknowns even sophisticated Organisations don’t have a handle on. Our mission is to provide unparalleled insight and protection for your attack surface blind spots. Is your digital footprint truly secure?

13:00
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
13:25
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
13:50
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
    Moving data to cloud is complex.  You lose control and visibility.  Solutions you relied on to protect your data on premises don’t scale for Cloud. The hybrid-cloud world needs a new way of thinking: ...
14:05
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
    Why the traditional barriers to cloud capabilities, from technical skill shortages to security concerns, are a thing of the past.
14:20
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
    This talk explains why Operation Technology security is crucial in our increasingly connected world. Key takeaways include understanding emerging cyber threats, learning risk mitigation strategies, an ...
14:35
  1. Tech Hub Stage
    10 mins
    • Tech Hub Stage
    From cyber welfare to cyber warfare, drones are involved in some of the most diverse applications. But how do we address safety and security concerns regarding critical infrastructure (physical, cyber ...
14:50
  1. Tech Hub Stage
    20 mins
    • Tech Hub Stage
    There have never been so many vulnerabilities, more and more every month. Just telling people what's wrong doesn't help! 
    Attendees will gain insights into optimising vulnerability management, enhancing response times, and reducing risks. Learn actionable steps to streamline your security operations for maximum efficiency.