Our agenda includes 100+ world-class speakers, hackers and disruptors.
Day 1 is perfect for business leaders who want to understand more, or those in IT Departments whose main focus isnβt cyber security.
Day 2 has been built for a more advanced audience, however there may be sessions on either day that you may find useful.
We have tagged all our content with a Technical Rating so you know if it's right for you or not. To understand the Technical Rating in more detail - Click here.
Drag across the theatres to see the full agenda.
-
KeynoteHave you ever wanted to hear how hackers infiltrate organisations, bypass security systems and compr ...
Technical Rating
π΄πππππ
-
KeynoteWith access to over 40+ million endpoints globally, CrowdStrike is in a unique position to observe, ...
Technical Rating
π΄π΄π΄π΄π΄π
-
KeynoteDuring cyber awareness month, Sarah published her first book: βEffective Crisis Management β in whic ...
Technical Rating
π΄π΄ππππ
-
KeynoteIn this live, interactive demonstration, investigative journalist Geoff White and ethical hacker Gle ...
Technical Rating
π΄πππππ
-
Keynoteβ’ What we can learn from the threat landscape in 2023 β’ Individual cyber risk and the importance of ...
-
KeynoteIn 1671, Colonel Thomas Blood broke into what should have been the safest place on Earth - the Tower ...
Technical Rating
π΄π΄π΄πππ
-
KeynoteNetflixβs most popular documentary of the 2022 tells the story of the βTinder Swindlerβ, an internat ...
Technical Rating
π΄πππππ
-
KeynoteCybersecurity is a problem that will not be solved by technology. In this session, FBI veteran Migue ...
Technical Rating
π΄πππππ
-
KeynoteDan Gericke heads technology for one of the worldβs largest consumer cybersecurity brandsβworking ev ...
Technical Rating
π΄π΄π΄π΄ππ
-
Keynote
Sponsored by:
-
CultureAs the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow ...
-
CultureIn this webinar we will cover the rapid evolution of immersive metaverse experiences during the pand ...
Technical Rating
π΄πππππ
-
CultureAre you tired of feeling like you're in the dark when it comes to managing human risk? Imagine being ...
-
Culture
-
CultureIn this session, I will outline why ingratiating cybersecurity into your culture is the best way to ...
Technical Rating
π΄π΄ππππ
-
CultureThis session will explore means of growing your teams, and how to develop your people to ultimately ...
Technical Rating
π΄πππππ
-
CultureWhen 90% of cyber-attacks start with the human user, we need to move beyond tackling the human facto ...
Technical Rating
π΄π΄ππππ
-
CultureCybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled wit ...
-
Culture
Sponsored by:
-
OT & IT Cyber SecurityRemote access and cloud-based applications bring clear benefits to the worker when it comes to incre ...
-
OT & IT Cyber SecurityCustomer experience has crept its way to the top of every agenda in the banking sector, but in an er ...
Technical Rating
π΄π΄π΄πππ
-
OT & IT Cyber SecurityThis talk will delve into the challenges and best practices for optimising security policies in hybr ...
-
OT & IT Cyber Security
-
OT & IT Cyber SecurityThe panel discussion will explore the future of equity in cybersecurity, focusing on ways to ensure ...
-
OT & IT Cyber SecurityAs distributed workforces become more prevalent and new architectures emerge, securing the network e ...
-
OT & IT Cyber SecurityThe talk will focus on issues of cybersecurity in patient care through the lens of clinical conseque ...
-
OT & IT Cyber SecuritySecurity is a shared responsibility between developers, security professionals and business. To succ ...
Technical Rating
π΄π΄ππππ
-
OT & IT Cyber Security
Sponsored by:
-
PreventionConfidential Computing uses a hardware-based Trusted Execution Environment (TEE) to protect data and ...
Technical Rating
π΄πππππ
-
PreventionIn a world where most data is processed and stored across geographical borders, often using foreign ...
-
PreventionXDR. Itβs the hottest domain in the cyber world right now and the biggest buzzword youβll see plaste ...
-
PreventionWhen tasked with the impossible, security leaders plan for the unplanned, predict the unknown, and p ...
-
PreventionArctic Wolf are the leader in Security Operations, delivering a SaaS-based cloud service to organisa ...
-
PreventionAwash with threat and vulnerability intelligence but struggling to identify what really matters to y ...
Technical Rating
π΄π΄π΄π΄π΄π
-
PreventionModern society is underpinned by digital technology and information that is, unfortunately, becoming ...
Technical Rating
π΄πππππ
-
PreventionA global pandemic heralded a massive change in the global security posture. Whilst some of the curre ...
Technical Rating
π΄πππππ
-
Prevention
-
StrategyWe just need the right technology. How could you fall for that? Social engineering will always outsm ...
-
Strategyβ’ Generative AI has fundamentally changed our relationship with email. β’ How novel social engineerin ...
-
Strategy2022 was a year of turbulence within the threat actor community as Russiaβs invasion of Ukraine disr ...
-
Strategy
-
StrategyIn this presentation weβll take a look at different methods of security testing and how we can learn ...
Technical Rating
π΄π΄π΄πππ
-
StrategyCybercrime was estimated to cost global economies $7trillion in 2022, and a great deal of this was d ...
Technical Rating
π΄πππππ
-
StrategyWith more sophisticated methods of deception being designed by cybercriminals every day, itβs more i ...
Technical Rating
π΄π΄ππππ
-
Strategy
Sponsored by:
-
Resilienceβ’ Protecting complex industrial environments against known and unknown attacks at every level of the ...
-
ResilienceA Risk-based Case for Zero Trust Authentication Authentication is broken, and longer, stronger passw ...
Technical Rating
π΄π΄ππππ
-
ResilienceCloud adoption boosts digital transformation for organizations embarking on a modernization program ...
Technical Rating
π΄π΄π΄π΄ππ
-
Resilience
-
ResilienceToday's attacker doesn't break in, he logs in. In more than 80% of modern attacks, attackers used va ...
Technical Rating
π΄π΄π΄π΄π΄π΄
-
ResilienceβWhy SOCs Failβ will give you an in-depth understanding into common traps which lead to SOC failure. ...
Technical Rating
π΄π΄π΄π΄π΄π
-
ResilienceCompliance is an important part of a cybersecurity program. Heavily regulated industries are often a ...
Technical Rating
π΄π΄π΄πππ
-
ResilienceAI has made significant advancements in recent years. As cybersecurity teams struggle to keep up wit ...
Technical Rating
π΄π΄ππππ
-
Resilience
-
KeynoteThe rise of generative AI is a very real cyber threat to organisations. Recent BlackBerry research f ...
-
KeynoteWhat we perceive sometimes to be happening sometimes can be the opposite of what is occurring. We ar ...
Technical Rating
π΄π΄ππππ
-
KeynoteJake discusses how the dark web operates and what the underworld offers including illicit products a ...
Technical Rating
π΄π΄ππππ
-
KeynoteIn this session we will discuss the history and evolution of threats to Operational Technology, thei ...
Technical Rating
π΄π΄π΄π΄π΄π
-
Keynote
-
KeynoteBiohackers exist and walk among us. Most security professionals would not allow users into their env ...
Technical Rating
π΄πππππ
Sponsored by:
-
CultureThe attack tactics of cyber criminals are evolving rapidly. Current social changes, crises and wars ...
Technical Rating
π΄π΄π΄πππ
-
CultureWhat would it be like to be βthereβ, just when you were needed, to offer a tap on the shoulder and s ...
Technical Rating
π΄π΄ππππ
-
CultureThis session will focus on enabling behaviour change across a workforce to create a secure culture. ...
-
Culture
-
CultureEvidence from UK studies and more widely continue to indicate a pronounced shortage of cyber securit ...
Technical Rating
π΄π΄ππππ
-
Cultureβ’ A new collaboration between the UK Cyber Security Council, The Cyber Scheme and CREST aims to prof ...
Technical Rating
π΄π΄π΄πππ
Sponsored by:
-
OT & IT Cyber SecurityImplementing a multi-layered approach that comprises with a strategy bounded with various tools, pro ...
Technical Rating
π΄π΄π΄π΄π΄π
-
OT & IT Cyber SecurityWhat can happen when ransomware threat actors meet a world full of vulnerable IoT/OT devices? Our pr ...
Technical Rating
π΄π΄π΄πππ
-
OT & IT Cyber SecurityDoes your enterprise know how resilient it really is against cyberattacks? Or even what it means to ...
-
OT & IT Cyber Security
-
OT & IT Cyber SecurityWe often hear how confusing it is for buyers to find credible, trustworthy and independently accredi ...
-
OT & IT Cyber SecurityIn this session, Jeremy will discuss the rise of APIs and API-centric cloud architectures, along wit ...
Technical Rating
π΄π΄ππππ
-
OT & IT Cyber SecurityThe pandemic accelerated the rate at which businesses are transforming and automating, especially in ...
Technical Rating
π΄π΄π΄π΄π΄π
Sponsored by:
-
PreventionIn this session, you will learn about how the challenge of a constantly changing attack surface, eve ...
Technical Rating
π΄π΄π΄π΄ππ
-
PreventionBaseline 3.0 incorporates the psychology behind hackers and defenders and is shaped by the research ...
Technical Rating
π΄πππππ
-
PreventionFrom a reactive to a proactive posture, cyber security projects and strategies must be perceived as ...
Technical Rating
π΄π΄π΄π΄π΄π
-
PreventionIf you only knew yesterday, last week, last month what you know today how would things change? With ...
-
PreventionDiscover the protocol being used for 92% of cyberattacks that more than 42% of organizations overloo ...
Technical Rating
π΄π΄π΄πππ
-
PreventionThe demand for cyber insurance is rising. But as it does, cover is becoming more expensive and more ...
-
StrategyWhat exactly happens when an adversary is active in your environment for 7 days? How about 7 years? ...
-
StrategyAs organisations accelerate their adoption of the Cloud and move to Microsoft 365 licensing, traditi ...
Technical Rating
π΄π΄ππππ
-
StrategyThe risk of cyber-attack is real and this can have devastating consequences for an organisation. No ...
Technical Rating
π΄πππππ
-
Strategy
-
StrategyCan we bypass MFA? Yes, we, can! Humans can be tricked so multi factor authentication is not a silve ...
Technical Rating
π΄πππππ
-
StrategyYouβve seen cyber-attacks on the news and ask yourself, βif big companies canβt protect data, how ca ...
Technical Rating
π΄πππππ
Sponsored by:
-
ResilienceIn this session we take a look at how Maltego can be used to bring actionable information faster to ...
Technical Rating
π΄πππππ
-
ResilienceThe 2022 Verizon Data Breach Investigations Report showed that 62% of system intrusion incidents cam ...
Technical Rating
π΄π΄π΄π΄π΄π
-
ResilienceWhat is attack path mapping and why does it matter? Iβm confident that I already know where my risks ...
Technical Rating
π΄π΄ππππ
-
Resilience
-
ResilienceIn the current economic and political climate, ensuring critical UK business infrastructures are pro ...