Skip to main content

UK Cyber Week 2024

Sample Image

Loading
OT & Cloud Security
  1. OT & Cloud Security
    Ransomware gangs, criminal threat actors and nation-state espionage operators have been observed targeting β€œPorts to Pipelines” – nearly every aspect of the National Critical Infrastructure (NCI) has ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. OT & Cloud Security
    The ubiquitous nature of Bluetooth Low Energy (BLE) in automotive and consumer devices makes it a prime target for security analysis. In this study, I demonstrate a reliable Denial of Service (DoS) at ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄

  3. OT & Cloud Security
    Β 
Keynote
  1. Keynote
    Β 
  2. Keynote
    It was the fastest theft in history - $625m stolen in under two minutes. The target: a Vietnamese video game. The suspect: North Korean hackers. But now they faced a challenge: how on earth do you lau ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Keynote
    This session will explore the rapidly approaching future of AI-powered disinformation. We have awoken in the world of Generative Adversarial Networks, Large Language Models and scientific crises of co ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  4. Keynote
    Β 

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. Keynote
    The session, presented by Stephanie Itimi, focuses on the security risks associated with deepfakes and generative AI, emphasising their impact on individuals, businesses, and society. It covers the da ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  6. Keynote
    You have been hit with a ransomware attack, DDoS or an unauthorised intrusion resulting in a data breach and are being extorted by a financially motivated adversary. During this session we will explor ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

Culture & Strategy
  1. Culture & Strategy
    Β 
  2. Culture & Strategy
    Β 
  3. Culture & Strategy
    At present, the level of cyber risk in the UK is high. The increasing sophistication of attacks, frequency of their success and well-documented seven figure losses suffered by victims has led to many ...
  4. Culture & Strategy
    You know cybersecurity needs to be taken more seriously by your organisation, but demands on stakeholders mean it gets sidelined. So how do you bring cybersecurity into the spotlight? That’s exactly w ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. Culture & Strategy
    Β 
Prevention & Resilience
  1. Prevention & Resilience
    Β 
  2. Prevention & Resilience
    As the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisa ...
  3. Prevention & Resilience
    Β 
  4. Prevention & Resilience
    Β 
  5. Prevention & Resilience
    Β 
  6. Prevention & Resilience
    Over the last 20 years, many tools have emerged to address new challenges – from firewalls to unified threat platforms, anti-virus software to EPPs and EDRs, and log aggregation to intelligent SIEMs + ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  7. Prevention & Resilience
    MOBSTR (Mobile App Security Testing and Ratings) platform addresses GRC (Governance, Risk and Compliance) challenges at a scale. We will demonstrate the platform's capabilities in real-time and share ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  8. Prevention & Resilience
    Β 
  9. Prevention & Resilience
    Azure, AWS, GCP…Pick your poison. We are in the midst of a digital revolution as organisations are putting an unearthly (pardon the pun) amount of their business operations and data in the cloud. Resp ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

OT & Cloud Security
  1. OT & Cloud Security
    When you read reports about cyber-attacks affecting operational technology (OT), it’s easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over t ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

Keynote
  1. Keynote
    With all the hype of Artificial Intelligence affecting every single industry, Jake has been researching how AI has also been benefiting cybercriminals. From text and image creation tools to audio and ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  2. Keynote
    The Digital Security by Design Programme UKRI’s Digital Security by Design is a UK government supported initiative to help transform digital technology and create a more resilient and secure foundatio ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  3. Keynote
    A Deep Dive on the use of information theory and matrix mathematics to classify and categorise arbitrary datasets, from cocktails to APT groups aimed at IT and cyber professionals (Forensics and Incid ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  4. Keynote
    In this session Sebastian will cover DevSecOps transformation roadmap development, planning for cultural change and how to apply academic leadership and change theories in practice. He will also discu ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

Culture & Strategy
  1. Culture & Strategy
    Cyber security remains a key priority for organisations of all sizes but can represent a particular challenge for Small and Medium-sized Enterprises (SMEs). The most recent Cyber Security Breaches Sur ...
  2. Culture & Strategy
    Β 
  3. Culture & Strategy
    In today's interconnected world, businesses of all sizes face a constant barrage of cyber threats. Protecting sensitive data, maintaining business continuity, and safeguarding brand reputation are par ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

Prevention & Resilience
  1. Prevention & Resilience
    Β