Programme

Registration and Networking
Chairs Opening Address

A look back over the first half of 2024 - how attackers are evolving their tactics and techniques

Speaker
Microsoft Chief Security Advisor, Independent Board Advisor, Best-Selling Author, Keynote Speaker and Fellow British Computer Society.
Microsoft
Are you ready for Cyber Recovery?

Are you ready for cyber recovery? Do you have a cyber recovery time objective? For the last 20-30 years, we have focused time & money an attack detection and prevention tools, and subsequently neglected cyber recovery. But you can’t stop the unstoppable. Remember: defenders have to be right 100% of the time while attackers only have to be right once.

Zero Trust Framework: From Ideation to Practical Implementation

This session explores the Zero Trust security model, emphasizing the importance of protecting critical assets through continuous verification and dynamic access controls. It offers a practical, step-by-step approach to Zero Trust network implementation, including identifying sensitive data, mapping business flows, and designing a Zero Trust architecture. Learn how to establish effective security policies and leverage automation to maintain a secure, adaptive network environment. By adopting a Zero Trust approach, organizations can enhance security, reduce risk, and streamline operations in today’s increasingly complex IT landscapes.

Is your approach, approachable (The challenge of the Acronym/ Initialism!)

Should you be using that acronym/ initialism? Does everyone know what it means? Do they? Are you sure? Do you know what it means? Helping people challenge their thoughts about what clear communication looks like.

Speaker
DPO & Skills Coach
At the Crossroads of Threat Intelligence: Which Path To Tread?

Threat Intelligence is at a critical juncture where traditional methods of threat analysis must evolve to address emerging threats. The challenge lies in determining the best path forward.

Speaker
Senior Director of Consulting Systems Engineering
It’s not as if machine learning models aren’t incredibly easy to fool?

The arrival of any new technology brings along with it new vulnerabilities and attack surfaces, so it's perhaps unsurprising that machine learning models — and especially the new generation of Large Language Models (LLMs) — are no exception. Except, of course, Artificial Intelligence (AI) isn’t new. The phrase was first coined in 1956, and my own first job out of University back in the 1990’s was training neural network models to carry out crop monitoring based on satellite data. We should, perhaps, have been more prepared than we now seem to be to cope with these new security problems. These threats only becoming more severe as we see the deployment of models to the Edge, and the Internet of Things (IoT). It’s time to talk about IoT security, with a seasoning of AI at the Edge, and the new attack surfaces introduced by the arrival of LLMs. Before that is, they cause real trouble.

Speaker
Scientist, author, hacker, and journalist
Strengthening Cybersecurity with Human Risk Management Three ways

Effective human risk management is a critical component of cybersecurity for any organisation. We explore three perspectives that illustrate the contribution of human risk management to organisational cybersecurity. Central to this is human behaviour within the workforce, which helps conserve defence resources, assists in the triage of suspicious emails, strengthens processes, and promotes active defence through real-time coaching. These three strategies provide a comprehensive methodology for optimising cybersecurity and underscore the importance of an integrated approach that considers both technical and human factors.

Coffee & Networking
Lunch and networking
Chairs opening Address
Speaker
Microsoft Chief Security Advisor, Independent Board Advisor, Best-Selling Author, Keynote Speaker and Fellow British Computer Society.
Microsoft
Enabling Secure AI Adoption across the enterprise; without losing your edge.

Generative AI has already disrupted many industries, but enterprises are still getting to grips with enabling safe use of AI across corporate data sets. Too much governance and you lose your competitive ability, too little and you risk your core data assets. This seminar will give a high level overview of why it's important to act fast, but in a secure manner.

Speaker
Chief Information Security Officer (CISO)
Strengthen cyber resilience, protect data, and prepare for future regulations.

The introduction of the Cyber Security and Resilience Bill to Parliament highlights that, despite the UK's departure from the EU, future regulations will likely follow international standards. The interconnected nature of global cyber threats makes it impractical to deviate from existing frameworks.

By aligning with NIS2, DORA, and GDPR, UK organisations can better prepare for upcoming national regulations and enhance protection against cyber risks. This isn't about rewriting the rulebook—business continuity and data resilience remain central to all cybersecurity regulations. That’s why ensuring your organisation has tamper-proof backups and effective disaster recovery capabilities is key to surviving infrastructure and data threats.

Join Kim Larsen, CISO at Keepit and seasoned cybersecurity advisor with experience in NATO, the EU, and international corporations, for insights on:

  • Data governance
  • Regulatory compliance 
  • Business continuity strategies
Points Make Prizes! EU Cybersecurity Certification
  • Risk
  • Strategy
  • Certification 
  • Impact
Speaker
CEO, Financial Markets
The Future of Phishing

Internal phishing campaigns are, at best, seen as a necessary evil and at worst a total turn off for security engagement, and with good reason. Yet we are seeing real world phishing campaigns escalating in frequency and complexity. We need to be ready to meet this challenge. So what should we do? This seminar will set out how to leave behind the red teaming approach to phishing in favour of a diagnostic approach to phishing, which increases engagement and improves our state of readiness

Speaker
Information Security Manager Culture and Awareness
Channel 4
Navigating the strategic cyber threat landscape

It is impossible to geo-politics and cyber security – whatever organisation you represent it risks being impacted to some degree by ransomware, fraud, IP theft, disruptive attacks.

Increasingly leaders are turning to strategic threat intelligence to identify trends and create long-term plans.

By effectively operationalising strategic threat intelligence we are able to be pro-active rather than purely reactive and anticipate change and its impact on organisations. We are able to define our security posture in response to the threat and consider the impact cyber activities and attack trends have on business decisions and prioritise resources towards addressing the priority threats.

Speaker
Strategic Cyber Threat Intelligence Specialist
TechWomen100 Winner
Building cyber resilience: Prioritisation in a rapidly shifting threat landscape

As the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisations. This speaking session offers invaluable insights into navigating this dynamic environment, with a focus on bolstering cyber resilience.

Coffee and networking
Live ‘Fireside Chat’ Q&A with Deborah Meaden

This promises to be a session not to be missed

Speaker
Entrepreneur and Dragons Den Investor
Chairs Closing Remarks
Speaker
Microsoft Chief Security Advisor, Independent Board Advisor, Best-Selling Author, Keynote Speaker and Fellow British Computer Society.
Microsoft