-
KeynoteUK Cyber Week is delighted to host the UK lead investigator from the recent LockBit Operation. This is a rare opportunity to hear their findings first-hand and get an update on the current operational ...
Technical Rating
π΄π΄π΄πππ
Speakers -
KeynoteIt's no secret where Finland stands after the invasion of Ukraine on February 2022. A year after, Finland became part of NATO. Did that visible declaration of alliance also change the types of threats ...
Technical Rating
π΄π΄ππππ
-
KeynoteIt was the fastest theft in history - $625m stolen in under two minutes. The target: a Vietnamese video game. The suspect: North Korean hackers. But now they faced a challenge: how on earth do you lau ...
Technical Rating
π΄πππππ
-
KeynoteThis session will explore the rapidly approaching future of AI-powered disinformation. We have awoken in the world of Generative Adversarial Networks, Large Language Models and scientific crises of co ...
Technical Rating
π΄π΄π΄πππ
-
KeynoteHear from panellists who will discuss their path into the cyber industry from a non traditional/non technical background & see how they are now thriving. Key Takeaways: You donβt have to be technical ...
Technical Rating
π΄πππππ
Chairperson -
KeynoteΒ
Technical Rating
π΄πππππ
-
KeynoteThe session, presented by Stephanie Itimi, focuses on the security risks associated with deepfakes and generative AI, emphasising their impact on individuals, businesses, and society. It covers the da ...
Technical Rating
π΄π΄π΄π΄ππ
Speakers -
KeynoteΒ
Technical Rating
π΄πππππ
Speakers -
KeynoteYou have been hit with a ransomware attack, DDoS or an unauthorised intrusion resulting in a data breach and are being extorted by a financially motivated adversary. During this session we will explor ...
Technical Rating
π΄π΄ππππ
-
KeynoteWe are delighted that Marcus Hutchins will be dialling in from Los Angeles to join us for a wide ranging chat around all things cyber.
Technical Rating
π΄π΄ππππ
-
Culture & StrategyErrors are bound to happen, but by implementing the appropriate technologies and processes, they don't always have to pose a significant risk. Weβll explore how well-executed security nudges can surfa ...
Technical Rating
π΄π΄π΄πππ
-
Culture & StrategyDue to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itsel ...
Technical Rating
π΄π΄ππππ
-
Culture & StrategyTraditional awareness assumes that the βproblemβ with insecure behaviour stems from a lack of knowledge, skills or understanding. In this talk, Tim explores why behavioural science says otherwise. He ...
Technical Rating
π΄π΄ππππ
-
Culture & StrategyΒ
Technical Rating
π΄πππππ
-
Culture & StrategyThe Application Security landscape is constantly evolving. AI has become a major disruptor, both for development and security teams. Meanwhile, software supply chains continue to grow in complexity. Q ...
Technical Rating
π΄π΄π΄πππ
-
Culture & StrategyIn this session, cybersecurity expert James Rees reveals the escalating threat of cybercrime and how intelligence can empower your defence. We will discuss the alarming ascent of organised cybercrime, ...
Technical Rating
π΄π΄π΄π΄ππ
-
Culture & StrategyJoin us for an engaging session with Tim Grieveson, a distinguished security leader renowned for his role as a "Chief Storytelling Officer", as he delves into key topics such as aligning security stra ...
Technical Rating
π΄π΄π΄π΄π΄π
-
Culture & StrategyAt present, the level of cyber risk in the UK is high. The increasing sophistication of attacks, frequency of their success and well-documented seven figure losses suffered by victims has led to many ...
Technical Rating
π΄π΄ππππ
-
Culture & StrategyYou know cybersecurity needs to be taken more seriously by your organisation, but demands on stakeholders mean it gets sidelined. So how do you bring cybersecurity into the spotlight? Thatβs exactly w ...
Technical Rating
π΄πππππ
-
Culture & StrategyThe process of threat modelling can seem an abstract art, especially regarding scoring and prioritisation. We show how a non-expert can practically validate threat modelling predictions and quantify t ...
Technical Rating
π΄π΄π΄π΄ππ
-
Prevention & ResilienceCloud applications have become the lifeblood of organisations across the UK. The average company has 254 SaaS applications β many aimed at increasing productivity. But, for IT teams, they introduce mo ...
Technical Rating
π΄π΄π΄πππ
-
Prevention & ResilienceAs the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisa ...
Technical Rating
π΄π΄π΄πππ
-
Prevention & ResilienceProviding insight into the only point of a ransomware attack chain is typically where we see the personal behaviour traits of the operators. Key Takeaways: The changing method of the ransomware negoti ...
Technical Rating
π΄π΄ππππ
-
Prevention & ResilienceWe will discuss a number of technical actions you can implement today to help reduce this risk of ransomware threat actors gaining a foothold on your network, including the most critical actions to en ...
Technical Rating
π΄π΄ππππ
-
Prevention & ResilienceIn today's interconnected digital landscape, organizations face unprecedented challenges in securing their applications and managing the complexities of their supply chains. This session delves into t ...
Technical Rating
π΄πππππ
-
Prevention & ResilienceOver the last 20 years, many tools have emerged to address new challenges β from firewalls to unified threat platforms, anti-virus software to EPPs and EDRs, and log aggregation to intelligent SIEMs + ...
Technical Rating
π΄π΄π΄π΄π΄π
-
Prevention & ResilienceMOBSTR (Mobile App Security Testing and Ratings) platform addresses GRC (Governance, Risk and Compliance) challenges at a scale. We will demonstrate the platform's capabilities in real-time and share ...
Technical Rating
π΄π΄π΄πππ
-
Prevention & ResilienceInsightful session on leveraging the Maltego CTI Package & OSINT Profiler to elevate cyber investigations. Discover how Maltego enhances efficiency by aggregating and visualizing threat data, streamli ...
Technical Rating
π΄π΄π΄π΄ππ
-
Prevention & ResilienceAzure, AWS, GCPβ¦Pick your poison. We are in the midst of a digital revolution as organisations are putting an unearthly (pardon the pun) amount of their business operations and data in the cloud. Resp ...
Technical Rating
π΄π΄π΄πππ
-
OT & Cloud SecurityRansomware gangs, criminal threat actors and nation-state espionage operators have been observed targeting βPorts to Pipelinesβ β nearly every aspect of the National Critical Infrastructure (NCI) has ...
Technical Rating
π΄π΄π΄πππ
Speakers -
OT & Cloud SecurityWhy are cyber-attacks on the rise? Why are the sophistication and effectiveness of these attacks increasing? How can organisations be prepared for future trends? How can managing suppliers help with t ...
Technical Rating
π΄π΄ππππ
-
OT & Cloud SecurityEven when cybersecurity professionals successfully defend their organizations against cyber threats, they still struggle to demonstrate the value of proactively investing in various security measures. ...
Technical Rating
π΄π΄ππππ
-
OT & Cloud SecurityThe ubiquitous nature of Bluetooth Low Energy (BLE) in automotive and consumer devices makes it a prime target for security analysis. In this study, I demonstrate a reliable Denial of Service (DoS) at ...
Technical Rating
π΄π΄π΄π΄π΄π΄
-
OT & Cloud SecurityThe worlds of IT and OT are converging, with both businesses and operators of essential services looking to establish seamless, secure flows of data between previously disconnected environments. Peter ...
Technical Rating
π΄π΄ππππ
Speakers -
OT & Cloud SecurityThe escalating pace and complexity of AI-driven threats demand a shift in industry focus towards proactive defence measures. With the rapid decrease in the time it takes for threats to infiltrate syst ...
Technical Rating
π΄π΄π΄πππ
-
OT & Cloud SecurityΒ
Technical Rating
π΄π΄ππππ
-
OT & Cloud SecurityCloud platforms play a critical role in modern business operations, offering scalable infrastructure and services. However, their widespread adoption makes them prime targets for cyber attacks. In ord ...
Technical Rating
π΄π΄π΄π΄ππ
-
OT & Cloud SecurityIn the landscape of cybersecurity, organizations face an ever-increasing threat from cyber attacks, particularly ransomware. These attacks can cripple businesses, leading to downtime and significant f ...
Technical Rating
π΄πππππ
-
OT & Cloud SecurityDeep Dive into Operation Triangulation new details surrounding iOS vulnerabilities and exploits that underpin this assault, providing an analysis of the campaign that has targeted both the public and ...
Technical Rating
π΄π΄π΄π΄π΄π΄
-
The Inclusive Cyber SpaceThe Zensory is a scientifically backed productivity and wellbeing solution dedicated to transforming work habits - helping to reduce burnout and achieve a healthy work-life balance.
-
The Inclusive Cyber SpaceDid you know that multitasking and distractions are some of the leading reasons people fall for phishing and social engineering attacks? Research shows that multi-tasking, cognitive overload, and dist ...
-
The Inclusive Cyber SpaceEmbracing Menopause, Inspiring balance and Driving exceptional results in the workplace!
-
The Inclusive Cyber SpaceΒ
-
KeynotePhilip INGRAM MBE will expand on his wider television commentary and explain the global geopolitical scene shaping the wider security environment and while doing so, develop some areas in the cyber or ...
Technical Rating
π΄πππππ
Speakers -
KeynoteAdversaries are flying under the radar. Protectors need to double down. Join CrowdStrikeβs Northern Europe Engineering Director, John Spencer, for an exclusive threat briefing to hear the latest adver ...
Technical Rating
π΄π΄π΄πππ
-
KeynoteWith all the hype of Artificial Intelligence affecting every single industry, Jake has been researching how AI has also been benefiting cybercriminals. From text and image creation tools to audio and ...
Technical Rating
π΄π΄ππππ
-
KeynoteΒ
Technical Rating
π΄πππππ
-
KeynoteJoin us for an insightful panel discussion on the realities and challenges of diversity in Cyber Security, debunking myths and exploring strategies for creating inclusive environments. From breaking s ...
Technical Rating
π΄π΄ππππ
Chairperson -
KeynoteIn recent years, the adoption of cloud services has significantly increased, enabling organizations to leverage the benefits of scalability, availability, and cost-efficiency. However, this shift towa ...
Technical Rating
π΄π΄π΄π΄ππ
-
KeynoteHuman nature leads to so many security problems. Or more accurately our industry's refusal to understand humans and human nature leads to so many security problems. How do we improve this? How do we m ...
Technical Rating
π΄π΄ππππ
-
KeynoteIn this session Sebastian will cover DevSecOps transformation roadmap development, planning for cultural change and how to apply academic leadership and change theories in practice. He will also discu ...
Technical Rating
π΄πππππ
-
Culture & StrategyThe Digital Security by Design Programme UKRIβs Digital Security by Design is a UK government supported initiative to help transform digital technology and create a more resilient and secure foundatio ...
Technical Rating
π΄π΄π΄πππ
-
Culture & StrategyIBM discuss the immense opportunities and challenges presented by both the AI revolution, and the rise of quantum computing, and how security teams can prepare today. Quantum research promises to hera ...
Technical Rating
π΄π΄π΄πππ
-
Culture & StrategyAs governments rapidly roll-out AI-enabled tools for public service delivery the digital-security maturity gap widens. Infrastructure resilience often is secondary to the allure of being added to glob ...
Technical Rating
π΄π΄ππππ
-
Culture & StrategyCybersecurity is an innovative industry, yet its marketing approach is surprisingly old-fashioned. Neon binary code, men in hoodies, poor production quality, complex language and acronyms in every oth ...
Technical Rating
π΄πππππ
-
Culture & StrategyCyber security remains a key priority for organisations of all sizes but can represent a particular challenge for Small and Medium-sized Enterprises (SMEs). The most recent Cyber Security Breaches Sur ...
Technical Rating
π΄π΄ππππ
-
Culture & StrategyWhat would it be like to be βthereβ, just when you were needed, to offer a tap on the shoulder and steer your colleagues in the right direction when they were about to do something risky? Click a link ...
Technical Rating
π΄π΄ππππ
-
Culture & StrategyIn today's interconnected world, businesses of all sizes face a constant barrage of cyber threats. Protecting sensitive data, maintaining business continuity, and safeguarding brand reputation are par ...
Technical Rating
π΄π΄π΄π΄π΄π
-
Culture & StrategyUK Cyber Cluster Collaboration (UKC3) understands that staying on top of the latest cyber trends can be tricky and tedious. In this session, we will explore how through a connected cyber ecosystem, cy ...
Technical Rating
π΄π΄ππππ
-
Prevention & Resilience2023 will go down as the year that AI became mainstream, sparking a generative AI arms race. Even in its infancy, the technology is already ubiquitous, and will loom large in security leadersβ conside ...
Technical Rating
π΄π΄π΄πππ
-
Prevention & ResilienceDue to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itsel ...
Technical Rating
π΄π΄ππππ
-
Prevention & ResilienceBack to basics is my theme for the day. Too many organisations get lost in layers of complexity, compounded by bolt-on solutions that add even more layers, and detract focus from the things that reall ...
Technical Rating
π΄π΄π΄πππ
Speakers -
Prevention & ResilienceIn a turbulent geopolitical landscape, where new cyber threats emerge on a near-daily basis, a new breed of proactive defence and remediation is vital. But what form will this take? Jay Gray, Head of ...
Technical Rating
π΄π΄π΄πππ
-
Prevention & ResilienceOperationalising a Cyber Defence strategy requires significant investments in time, budget, personnel and technology. Meanwhile, the cyber talent gap is wider than ever, as the industry remains short- ...
Technical Rating
π΄π΄π΄π΄ππ
-
Prevention & ResilienceA Deep Dive on the use of information theory and matrix mathematics to classify and categorise arbitrary datasets, from cocktails to APT groups aimed at IT and cyber professionals (Forensics and Incid ...
Technical Rating
π΄π΄π΄πππ
-
Prevention & ResilienceThis speech will unravel the complexities of cybersecurity in third-party supply chains. Exploring innovative intelligence lead options to assess risk and enhance the resilience of your 3rd party supp ...
Technical Rating
π΄π΄π΄π΄π΄π
-
OT & Cloud SecurityThe vISM team hear it all the time - "The board just donβt understand security enough!" Let us share some tips and techniques for getting buy in and increasing understanding across the business. Key T ...
Technical Rating
π΄π΄π΄πππ
-
OT & Cloud SecurityThis session will dissect cloud attacks, disproving the myth of sudden strikes. We'll explore their gradual progression through vulnerabilities, understand their characteristics, and identify detectio ...
Technical Rating
π΄π΄π΄πππ
-
OT & Cloud SecurityAnton's workshop, 'The Cyber Resilience Architect,' equips participants with the foresight to pro-actively disarm threats and reflect on what they need to do to improve their cyber resilience posture. ...
Technical Rating
π΄π΄ππππ
-
OT & Cloud SecurityWhen you read reports about cyber-attacks affecting operational technology (OT), itβs easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over t ...
Technical Rating
π΄π΄ππππ
-
OT & Cloud SecurityThis talk will dive into the OT landscape, bringing out the nuances within the OT space that mark it differently; also where there are common areas of issue, and hindrances to the same instances found ...
Technical Rating
π΄π΄ππππ
-
OT & Cloud SecurityIn todayβs competitive landscape, attracting and retaining top cloud security talent is crucial. Get the inside scoop, as we explore current perceptions from both sides of the table and offer up our t ...
Technical Rating
π΄πππππ
-
The Inclusive Cyber SpaceJoin Daniel for an enlightening journey through the intersections of cybersecurity, psychology, and personal wellbeing, and take the first step towards mastering your digital life.
-
The Inclusive Cyber SpaceIf you have seniority then you should help open the doors, the rewards are intrinsic.
-
The Inclusive Cyber SpaceWhilst studying I applied for a competition. The word 'cyber' was linked to a company as a job role.. I'd never heard of cyber before.' Why not?
-
The Inclusive Cyber SpaceΒSpeakers