Skip to main content

UK Cyber Week 2025

Sample Image

Loading
Keynote
    • 1. Absolute Beginner
    Keynote
    What if your biggest cyber risk wasn’t a hacker—but human nature? In this provocative session, we reframe cybersecurity through the lens of Maslow’s Hierarchy of Needs to explore why so many businesse ...
    • 1. Absolute Beginner
    Keynote
    Today’s cyber threat landscape is more complex and interconnected than ever, with adversaries constantly evolving their tactics to exploit vulnerabilities across industries. To combat these threats, o ...
    • 2. I've heard of ransomware
    Keynote
    Ciaran Martin, Chair of CyberCX UK, Oxford University Professor and founding head of the UK National Cyber Security Centre, has always sought to present a realistic assessment of the cyber threat amid ...
    • 2. I've heard of ransomware
    Keynote
    We're bringing together leading security experts and CISOs to discuss the most pressing threats facing organisations this year. We'll explore the latest attack vectors, the impact of emerging technolo ...
    • 2. I've heard of ransomware
    Keynote
    Jake will delve into the darker, more controversial aspects of facial recognition technology, exposing its unsettling potential. He'll unveil cutting-edge glasses capable of real-time identification, ...
    • 3. IT savvy
    Keynote
    Abstract: Tired of AI hype? This presentation delivers a data-backed look at AI's actual impact on cybersecurity. Leveraging Mandiant's incident response experience and analysis of attacker use of Gem ...
    • 3. IT savvy
    Keynote
    Future quantum computers have the potential to undermine much of the cryptography that we rely on to build trust in our online world. Migration to post-quantum cryptography (PQC) will protect us again ...
    • 2. I've heard of ransomware
    Keynote
    This presentation tackles the critical yet often overlooked challenges of supply chain security in our interconnected business world. Through analysis of recent high-profile compromises, Andy will exp ...
Culture & Strategy
    • 4. Advanced skills
    Culture & Strategy
    AI is changing the game in cybersecurity - and not always for the better. Cybercriminals are already using AI tools to create more convincing phishing emails, deepfake videos, and social engineering a ...
    • 3. IT savvy
    Culture & Strategy
    With a global talent shortage and skills that fade rapidly without practice, it’s time to rethink cybersecurity training. Traditional training methods - classroom instruction and online courses - prov ...
  1. Culture & Strategy
    As cybercriminals refine their tactics with AI-driven personalisation, the human factor remains the greatest cybersecurity challenge. In this seminar at UK Cyber Week, Mark Hamill, VP Product at MetaC ...
    • 2. I've heard of ransomware
    Culture & Strategy
    he way we build careers has changed. It’s no longer just about who you know—it’s about who knows you. Social media has transformed how professionals position themselves, yet many in cybersecurity hesi ...
    • 2. I've heard of ransomware
    Culture & Strategy
    Cybersecurity is critical, but for many employees, it’s also perceived as boring, repetitive, and disengaging. Everyday tasks like checking for updates, reading security policies, and attending mandat ...
    • 4. Advanced skills
    Culture & Strategy
    Your employees rely heavily on iOS and Android devices for authentication, communication, and productivity from anywhere, but are those devices protected? Social engineering-based attacks on smartphon ...
    • 2. I've heard of ransomware
    Culture & Strategy
     
    • 2. I've heard of ransomware
    Culture & Strategy
    Discover key findings from Oh, Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024-2025, led by Dr. Jason Nurse, and grounded in rigorous behavioral science. Uncover how employees' ps ...
Prevention & Resilience
    • 3. IT savvy
    Prevention & Resilience
    Most businesses like to think they’re secure. But are you really sitting comfortably, or just choosing what feels safe? Too often, companies stick with the ‘big brand’ or the status quo—because it’s e ...
    • 3. IT savvy
    Prevention & Resilience
    Retailers are feeling the squeeze, and their security teams must do more with tighter budgets. Wasting time on vulnerabilities that won't actually reduce risk isn’t an option—so how can teams focus on ...
    • 3. IT savvy
    Prevention & Resilience
    In today’s complex cyber security landscape, businesses of all sizes must navigate a myriad of threats while managing limited resources. Talk of sophisticated attacks will always grab the headlines, b ...
    • 3. IT savvy
    Prevention & Resilience
    As cyber threats become more sophisticated, organisations face increasing challenges in managing fragmented security tools, slow response times and operational inefficiencies. This talk explores how a ...
    • 5. Cyber Pro
    Prevention & Resilience
    Eoin shall discuss the vulnerability landscape and how it is evolving based on modelling the output of thousands of assessments and penetration tests conducted by Edgescan during 2024. Key Takeaways: ...
    • 3. IT savvy
    Prevention & Resilience
    Third-party breaches aren’t just cyber events - they’re business disruptors. Join Stuart Barnett, Director of Cyber Threat Intelligence at Orpheus Cyber, as he unpacks the growing risks of third-party ...
    • 3. IT savvy
    Prevention & Resilience
    Huntress shares insights gleaned from their constant battle with hackers on the frontiers of Endpoint and Identity. The crucial role of threat hunting will be explored by real threat examples where a ...
    • 3. IT savvy
    Prevention & Resilience
    In this technical demo, discover how to build workflows to automate investigation, remediation, escalation and communication around your most critical alerts. See how Tines, the no-code automation pla ...
    • 5. Cyber Pro
    Prevention & Resilience
    Modern supply networks face sophisticated attacks across digital and physical systems. As artificial intelligence and quantum computing rapidly advance, these threats will become more automated and co ...
    • 2. I've heard of ransomware
    Prevention & Resilience
    Attacks don’t seem to be slowing down, even though businesses are investing more in security than ever. So, where is it going wrong? In this session, we’re going to reveal exactly why attackers are th ...
    • 3. IT savvy
    Prevention & Resilience
    Quantum computing is on the horizon, and it poses a real threat to today’s cryptographic systems. This session explores how to prepare your Public Key Infrastructure (PKI) for a quantum-safe future, i ...
OT & Cloud Security
    • 3. IT savvy
    OT & Cloud Security
    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target of hackers. All it takes is a flaw in the application itsel ...
    • 1. Absolute Beginner
    OT & Cloud Security
    Unlock the power of digital transformation and accelerate IT/OT convergence without compromising security. This session dives deep into the latest OT threat research, revealing critical security matur ...
    • 4. Advanced skills
    OT & Cloud Security
    Explore the following: Balancing Security and Usability - We’ll explore how organisations can deliver robust protection without compromising user experience or overcomplicating systems. The Role of AI ...
    • 4. Advanced skills
    OT & Cloud Security
    CEO of Vysiion, with considerable experience in the design, delivery and support of mission-critical infrastructure and platforms to many of the UK’s critical industries and Operators of Essential Ser ...
    • 3. IT savvy
    OT & Cloud Security
    As cyber threats grow more sophisticated, traditional perimeter defences are no longer enough. This talk explores how organisations can leverage Zero Trust principles to secure modern, distributed dat ...
    • 6. Researcher; engineer or a hacker
    OT & Cloud Security
     
    • 4. Advanced skills
    OT & Cloud Security
    This session will detail how you can build business resilience into your organization, to ensure that when the worst happens, you're able to stay operational. With BullWall's Ransomware Containment so ...
  1. OT & Cloud Security
    With over 80% of environments now integrating AI, organisations are grappling with how to leverage this technology securely. This session dives into the most pressing challenges facing hybrid cloud en ...
The Inclusive Cyber Space
    • 0. Inclusion
    The Inclusive Cyber Space
     
    • 0. Inclusion
    The Inclusive Cyber Space
    Ian will be talking about how diversity and inclusion has evolved over the last 30 years within the Cyber Security Industry. He will be talking about: How the views of Neurodiversity have changed Phys ...
    • 0. Inclusion
    The Inclusive Cyber Space
     
    • 0. Inclusion
    The Inclusive Cyber Space
     
    • 0. Inclusion
    The Inclusive Cyber Space
    The Cyber Scheme is a training and assessment body working with technical security consultants on their individual career paths – whether that’s certification for the NCSC CHECK and Cyber Advisor sche ...
    • 0. Inclusion
    The Inclusive Cyber Space
    For too long we have seen minds that deviate from the ‘norm’ as being disorders and focused on the challenges they bring to individuals and societies. The Neurodiversity movement has been challenging ...
    • 0. Inclusion
    The Inclusive Cyber Space
    This session will explore the intersection of accessibility and cybersecurity, highlighting gaps in traditional approaches, risks for neurodivergent individuals, and barriers to secure digital experie ...
Keynote
    • 3. IT savvy
    Keynote
    Humans remain a key vulnerability in securing an organisation in cyberspace. Every organisation hopes to change the culture and awareness of cyber security at every level. This session explores what s ...
    • 3. IT savvy
    Keynote
    David Coles, an incident management expert at TikTok, will share insights from his diverse career and share what it takes to succeed in this critical industry. Pulling from his ample experience in the ...
    • 4. Advanced skills
    Keynote
    Quantum Computing is developing rapidly and has great potential to solve problems in science (battery design, new materials), financial services (risk, fraud) and logistics. Quantum Computers also pos ...
    • 3. IT savvy
    Keynote
    In a world where cyber threats evolve faster than you can say “zero-day,” and skilled professionals are scarcer than a strong password, how do you stay ahead? This talk will dive into how you can make ...
    • 1. Absolute Beginner
    Keynote
    The industry has felt the widening skills gap and how it's become more of a critical issue. We've brought together leaders within the cyber industry to discuss the cybersecurity skills gap, examining ...
    • 4. Advanced skills
    Keynote
    The article on "Hunting in Azure Subscriptions" by Microsoft outlines strategies for detecting threats in Azure environments. It covers tools, techniques, and best practices for proactively identifyin ...
    • 2. I've heard of ransomware
    Keynote
    The Knights of Old ransomware attack stands as a stark reminder of the devastating impact cybercrime can have on businesses. Once a thriving UK-based logistics company with a legacy spanning over 150 ...
Culture & Strategy
    • 3. IT savvy
    Culture & Strategy
    In a world where cyber threats evolve at lightning speed, traditional security awareness programs often fall short. Discover how artificial intelligence is revolutionising the way organisations build ...
    • 2. I've heard of ransomware
    Culture & Strategy
    Software development pipelines — like the tools and servers used for CI/CD (Continuous Integration and Delivery) — are increasingly in the crosshairs of attackers. Why? Because a single overlooked set ...
    • 3. IT savvy
    Culture & Strategy
    While without a doubt the digital age has made both our personal and working lives easier and more connected, at the same time our data has become far more vulnerable to cyber-attacks. AI, Cloud servi ...
    • 1. Absolute Beginner
    Culture & Strategy
     
    • 4. Advanced skills
    Culture & Strategy
    Drawing from 22,000+ real-world incidents across 139 countries, Verizon's 18th annual Data Breach Investigations Report delivers unparalleled insights into today's cybersecurity challenges. This exclu ...
    • 1. Absolute Beginner
    Culture & Strategy
    SMBs face the same threats as enterprises but with fewer resources. This talk provides a roadmap for SMBs to build robust cybersecurity strategies without breaking the bank. From leveraging cost-effec ...
Prevention & Resilience
    • 3. IT savvy
    Prevention & Resilience
    Cybersecurity isn’t purely about tech—it’s also about people. And for midmarket organisations, that’s where the real challenge lies. Caught between enterprise-scale threats and SME-sized budgets, midm ...
    • 3. IT savvy
    Prevention & Resilience
    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target of hackers. All it takes is a flaw in the application itsel ...
    • 5. Cyber Pro
    Prevention & Resilience
    In today's rapidly evolving world of cyber security, one of the most critical elements of protection rests in the hands of a select group of individuals – privileged users. These individuals have spec ...
    • 3. IT savvy
    Prevention & Resilience
    Security teams are increasingly asked to respond to threats that don’t involve malware or credentials—but people, reputation, and trust. In this session, Sam Watson, Senior Product Manager at Logicall ...
    • 4. Advanced skills
    Prevention & Resilience
    Let us explore the transformative rise of generative AI, particularly its widespread adoption following the introduction of chat interfaces like ChatGPT. This technological leap has sparked a surge of ...
    • 2. I've heard of ransomware
    Prevention & Resilience
    Realising that you’ve had a data breach is the start of a stressful and confusing time. Ideally you’d reach for your carefully crafted and practised incident management plan. There are three types of ...
    • 3. IT savvy
    Prevention & Resilience
    Your organisation has made significant investments in Microsoft 365—through licenses, solutions, and dedicated staff. With growing threats to the Microsoft ecosystem, it's crucial that you understand ...
OT & Cloud Security
    • 3. IT savvy
    OT & Cloud Security
    In the modern business world email is not for messages, it is a key part of every business. This session will go over the connectivity of email to other areas of digital risk and show how email touche ...
    • 3. IT savvy
    OT & Cloud Security
    As cyber threats grow more sophisticated, traditional perimeter defences are no longer enough. This talk explores how organisations can leverage Zero Trust principles to secure modern, distributed dat ...
    • 3. IT savvy
    OT & Cloud Security
    Join us to see first-hand demonstrations of how hackers can exploit cloud misconfigurations to gain access to your cloud environments and sensitive data. Our expert pen testers will show you the tools ...
    • 3. IT savvy
    OT & Cloud Security
    Ukraine has become an international case study in information security under extreme conditions. This session explores real-world investigations conducted by Molfar Intelligence Firm, including the us ...
    • 4. Advanced skills
    OT & Cloud Security
    Telecom networks are critical infrastructure, yet they face a growing wave of cyber threats. For example, APT groups now expand to specialise in Telecommunication Infrastructure for espionage activiti ...
The Inclusive Cyber Space
    • 0. Inclusion
    The Inclusive Cyber Space
    Talking about action is not taking action. An interactive session. Four points towards taking an action and making a difference from: activating a different view, learning different steps, noticing th ...
  1. The Inclusive Cyber Space
    Experts discuss challenges and innovations in accessible security education.
  2. The Inclusive Cyber Space
    Interactive labs with: Visual impairment simulation (goggles, screen reader software). #NoMouse challenge (keyboard-only navigation). Voice control and dictation testing. Accessibility testing tools f ...
    • 0. Inclusion
    The Inclusive Cyber Space
     
    • 0. Inclusion
    The Inclusive Cyber Space
     
  3. The Inclusive Cyber Space