Skip to main content

Agenda

Sample Image

Our agenda includes 100+ world-class speakers, hackers and disruptors.

Day 1 is perfect for business leaders who want to understand more, or those in IT Departments whose main focus isn’t cyber security. 

Day 2 has been built for a more advanced audience, however there may be sessions on either day that you may find useful.

We have tagged all our content with a Technical Rating so you know if it's right for you or not. To understand the Technical Rating in more detail - Click here.

Drag across the theatres to see the full agenda.

Loading
Keynote
  1. Keynote
    Have you ever wanted to hear how hackers infiltrate organisations, bypass security systems and compr ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  2. Keynote
    With access to over 40+ million endpoints globally, CrowdStrike is in a unique position to observe, ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  3. Keynote
    During cyber awareness month, Sarah published her first book: β€˜Effective Crisis Management ’ in whic ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Keynote
    In this live, interactive demonstration, investigative journalist Geoff White and ethical hacker Gle ...

    Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. Keynote
    β€’ What we can learn from the threat landscape in 2023 β€’ Individual cyber risk and the importance of ...
  6. Keynote
    In 1671, Colonel Thomas Blood broke into what should have been the safest place on Earth - the Tower ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  7. Keynote
    Netflix’s most popular documentary of the 2022 tells the story of the β€˜Tinder Swindler’, an internat ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  8. Keynote
    Cybersecurity is a problem that will not be solved by technology. In this session, FBI veteran Migue ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  9. Keynote
    Dan Gericke heads technology for one of the world’s largest consumer cybersecurity brandsβ€”working ev ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  10. Keynote
    Cyber House Party
     
Culture

Sponsored by:

cultureai

  1. Culture
    As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow ...
  2. Culture
    In this webinar we will cover the rapid evolution of immersive metaverse experiences during the pand ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Culture
    Are you tired of feeling like you're in the dark when it comes to managing human risk? Imagine being ...
  4. Culture
     
  5. Culture
    In this session, I will outline why ingratiating cybersecurity into your culture is the best way to ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. Culture
    This session will explore means of growing your teams, and how to develop your people to ultimately ...

    Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  7. Culture
    When 90% of cyber-attacks start with the human user, we need to move beyond tackling the human facto ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  8. Culture
    Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled wit ...
  9. Culture
    Cyber House Party
     
OT & IT Cyber Security

Sponsored by:

rebellion defence

  1. OT & IT Cyber Security
    Remote access and cloud-based applications bring clear benefits to the worker when it comes to incre ...
  2. OT & IT Cyber Security
    Customer experience has crept its way to the top of every agenda in the banking sector, but in an er ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  3. OT & IT Cyber Security
    Optimising Security Policies for Hybrid Working Environments
    This talk will delve into the challenges and best practices for optimising security policies in hybr ...
  4. OT & IT Cyber Security
     
  5. OT & IT Cyber Security
    The panel discussion will explore the future of equity in cybersecurity, focusing on ways to ensure ...
  6. OT & IT Cyber Security
    As distributed workforces become more prevalent and new architectures emerge, securing the network e ...
  7. OT & IT Cyber Security
    The talk will focus on issues of cybersecurity in patient care through the lens of clinical conseque ...
  8. OT & IT Cyber Security
    Security is a shared responsibility between developers, security professionals and business. To succ ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  9. OT & IT Cyber Security
    Cyber House Party
     
Prevention

Sponsored by:

ManageEngine

  1. Prevention
    Confidential Computing uses a hardware-based Trusted Execution Environment (TEE) to protect data and ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  2. Prevention
    In a world where most data is processed and stored across geographical borders, often using foreign ...
  3. Prevention
    XDR. It’s the hottest domain in the cyber world right now and the biggest buzzword you’ll see plaste ...
  4. Prevention
    When tasked with the impossible, security leaders plan for the unplanned, predict the unknown, and p ...
  5. Prevention
    Arctic Wolf are the leader in Security Operations, delivering a SaaS-based cloud service to organisa ...
  6. Prevention
    Awash with threat and vulnerability intelligence but struggling to identify what really matters to y ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  7. Prevention
    Modern society is underpinned by digital technology and information that is, unfortunately, becoming ...

    Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  8. Prevention
    A global pandemic heralded a massive change in the global security posture. Whilst some of the curre ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  9. Prevention
    Cyber House Party
     
Strategy
  1. Strategy
    We just need the right technology. How could you fall for that? Social engineering will always outsm ...
  2. Strategy
    β€’ Generative AI has fundamentally changed our relationship with email. β€’ How novel social engineerin ...
  3. Strategy
    2022 was a year of turbulence within the threat actor community as Russia’s invasion of Ukraine disr ...
  4. Strategy
     
  5. Strategy
    In this presentation we’ll take a look at different methods of security testing and how we can learn ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  6. Strategy
    Cybercrime was estimated to cost global economies $7trillion in 2022, and a great deal of this was d ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  7. Strategy
    With more sophisticated methods of deception being designed by cybercriminals every day, it’s more i ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  8. Strategy
    Cyber House Party
     
Resilience

Sponsored by:

darktrace

  1. Resilience
    β€’ Protecting complex industrial environments against known and unknown attacks at every level of the ...
  2. Resilience
    A Risk-based Case for Zero Trust Authentication Authentication is broken, and longer, stronger passw ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Resilience
    Cloud adoption boosts digital transformation for organizations embarking on a modernization program ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  4. Resilience
     
  5. Resilience
    Today's attacker doesn't break in, he logs in. In more than 80% of modern attacks, attackers used va ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄

  6. Resilience
    β€˜Why SOCs Fail’ will give you an in-depth understanding into common traps which lead to SOC failure. ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  7. Resilience
    Compliance is an important part of a cybersecurity program. Heavily regulated industries are often a ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  8. Resilience
    AI has made significant advancements in recent years. As cybersecurity teams struggle to keep up wit ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  9. Resilience
    Cyber House Party
     
Keynote
  1. Keynote
    The rise of generative AI is a very real cyber threat to organisations. Recent BlackBerry research f ...
  2. Keynote
    What we perceive sometimes to be happening sometimes can be the opposite of what is occurring. We ar ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Keynote
    Jake discusses how the dark web operates and what the underworld offers including illicit products a ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Keynote
    In this session we will discuss the history and evolution of threats to Operational Technology, thei ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  5. Keynote
     
  6. Keynote
    Biohackers exist and walk among us. Most security professionals would not allow users into their env ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

Culture

Sponsored by:

cultureai

  1. Culture
    The attack tactics of cyber criminals are evolving rapidly. Current social changes, crises and wars ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. Culture
    What would it be like to be β€œthere”, just when you were needed, to offer a tap on the shoulder and s ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Culture
    This session will focus on enabling behaviour change across a workforce to create a secure culture. ...
  4. Culture
     
  5. Culture
    Evidence from UK studies and more widely continue to indicate a pronounced shortage of cyber securit ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. Culture
    β€’ A new collaboration between the UK Cyber Security Council, The Cyber Scheme and CREST aims to prof ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

OT & IT Cyber Security

Sponsored by:

rebellion defence

  1. OT & IT Cyber Security
    Implementing a multi-layered approach that comprises with a strategy bounded with various tools, pro ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  2. OT & IT Cyber Security
    What can happen when ransomware threat actors meet a world full of vulnerable IoT/OT devices? Our pr ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  3. OT & IT Cyber Security
    Does your enterprise know how resilient it really is against cyberattacks? Or even what it means to ...
  4. OT & IT Cyber Security
     
  5. OT & IT Cyber Security
    Procuring Assured Security Services – CREST Approved
    We often hear how confusing it is for buyers to find credible, trustworthy and independently accredi ...
  6. OT & IT Cyber Security
    In this session, Jeremy will discuss the rise of APIs and API-centric cloud architectures, along wit ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  7. OT & IT Cyber Security
    The pandemic accelerated the rate at which businesses are transforming and automating, especially in ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

Prevention

Sponsored by:

ManageEngine

  1. Prevention
    In this session, you will learn about how the challenge of a constantly changing attack surface, eve ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  2. Prevention
    Baseline 3.0 incorporates the psychology behind hackers and defenders and is shaped by the research ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Prevention
    From a reactive to a proactive posture, cyber security projects and strategies must be perceived as ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  4. Prevention
    If you only knew yesterday, last week, last month what you know today how would things change? With ...
  5. Prevention
    Discover the protocol being used for 92% of cyberattacks that more than 42% of organizations overloo ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  6. Prevention
    The demand for cyber insurance is rising. But as it does, cover is becoming more expensive and more ...
Strategy
  1. Strategy
    What exactly happens when an adversary is active in your environment for 7 days? How about 7 years? ...
  2. Strategy
    As organisations accelerate their adoption of the Cloud and move to Microsoft 365 licensing, traditi ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Strategy
    The risk of cyber-attack is real and this can have devastating consequences for an organisation. No ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Strategy
     
  5. Strategy
    Can we bypass MFA? Yes, we, can! Humans can be tricked so multi factor authentication is not a silve ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. Strategy
    You’ve seen cyber-attacks on the news and ask yourself, β€œif big companies can’t protect data, how ca ...

    Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

Resilience

Sponsored by:

darktrace

  1. Resilience
    In this session we take a look at how Maltego can be used to bring actionable information faster to ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  2. Resilience
    The 2022 Verizon Data Breach Investigations Report showed that 62% of system intrusion incidents cam ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  3. Resilience
    What is attack path mapping and why does it matter? I’m confident that I already know where my risks ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Resilience
     
  5. Resilience
    In the current economic and political climate, ensuring critical UK business infrastructures are pro ...