Programme

Registration and Networking
Chairs Opening Address

Rise of the insider threat - what if the problem is not them, it’s you?

Speaker
Microsoft Chief Security Advisor, Independent Board Advisor, Best-Selling Author, Keynote Speaker and Fellow British Computer Society.
Microsoft
Are you ready for Cyber Recovery?

Are you ready for cyber recovery? Do you have a cyber recovery time objective? For the last 20-30 years, we have focused time & money an attack detection and prevention tools, and subsequently neglected cyber recovery. But you can’t stop the unstoppable. Remember: defenders have to be right 100% of the time while attackers only have to be right once.

Speaker
CIO
Exponential-e
The Art of Project Management

o This presentation covers key aspects of effective project management, focusing on the different phases of the project lifecycle, from initiation to closure, including setting clear objectives, defining scope, and risk management. o I’ll also offer practical, hands-on guidance on creating a robust project plan that clearly outlines the project status, dependencies, and risks, enabling effective stakeholder management. o All within 15minutes!

Speaker
Agile Programme Manager: Global Cybersecurity Implementations
HSBC
Breaking Free from SIEM: The Future of AI-Driven Security Operations

Traditional SIEMs are failing security teams—too expensive, too complex, and too noisy. In this session, we’ll explore how AI-driven security operations can deliver SIEM-like outcomes without the burden.

Learn how agentic AI and root cause triangulation enable lean security teams to detect, investigate, and respond faster, all while enhancing existing security tools. Key Takeaways:

• Why SIEMs are outdated and ineffective for modern security teams.

• How AI-driven security can provide better outcomes without the SIEM cost and complexity.

• Real-world examples of lean security teams detecting and responding to threats in minutes.

Speaker
CEO & Founder
SenseOn
Bridging the Email Security Gap: Future-Proofing Your Organization for 2025

Discover how to align your security investments with real-world threats. Amir Khan, Head of Sales at Zivver, presents exclusive insights from Zivver’s latest independent research revealing how IT leaders across industries perceive and prioritize email security. Gain a unique perspective on your peers' biggest challenges and plans for ensuring their email security strategies meets compliance and learn what’s driving their focus for 2025 and beyond. Amir shares practical steps to future-proof your organization with a holistic approach to email security.

Speaker
Head of UK&I
Zivver
Why bother with Security Awareness? - Delivering measurable behaviour change

In this presentation, ThinkCyber’s CEO Tim Ward will delve into the reasons for implementing security awareness programs within organizations. Is it purely a matter of compliance or does it serve a deeper purpose of empowering employees to protect sensitive information and themselves? Tim will explore the fundamental question: why invest in security awareness training? He will examine how to ensure these programs work—focusing on the science behind how people learn and retain security knowledge. By applying behavioural science principles, Tim will discuss how organizations can effectively change employee behaviours, reducing operational risks and enhancing overall security posture. The session will also address key metrics for success. Tim will explore the importance of measuring not attendance or click rate, but the effectiveness of security awareness efforts. Are you measuring performance or real impact? He will share real-world examples from some of ThinkCyber’s clients to illustrate how to assess the effectiveness of security training and discuss the best practices for ensuring lasting behavioural change.

Speaker
CEO & Co-Founder
ThinkCyber
Future Proof – Women Shaping the Next Generation of Cyber

In a constantly evolving landscape, a diverse and empowered workforce is our greatest strength. In honour of International Women’s day (8th March), this session celebrates the vital role women are playing in shaping the next generation of cyber security. The session will explore:

How their innovation, leadership and unique perspectives are building a safer, more inclusive digital world Actionable steps for male allies and organisations to foster a supportive environment where women can thrive Empowering pathways for women to navigate challenges and build successful cyber careers.

Join us to learn how we can collectively ‘accelerate action’ and champion women in cyber to secure our digital future. Let’s not ‘just talk’ but ‘take action’!

Speaker
Head Of Cyber Security
BAE Systems
The Day-After Mindset – A Modern Cyber Resilience Approach

The cyber security industry was at the onset primarily focussed on trying to prevent all attacks from starting. It is now clear that the threat actors will find a way in. And, they only have to get it right once, which they often do, in order to spell disaster for any organisation. In this era of AI, the opportunities and also the risk and threats from this reality continues to increase. Therefore, maintaining business operations during and after an attack is now more than ever an existential endeavour. In this session, Michael Adjei, Director of Systems Engineering, Illumio, will present innovative ways of achieving a realistic resilience strategy underpinned by zero trust principles and practices.

The session will cover: 

Understanding the new risks of pervasive AI use in today’s world 

Learn how organisations can continue viable business operations after a cyber incident 

Pragmatic cyber and operational resilience insights for CISOs and security managers 

Learn how to implement complete cybersecurity strategies beyond traditional approaches

Speaker
Senior Director, Industry Solutions
Illumio
Acknowledging Vulnerability and Building Trust

The world has changed myriad ways and so has the way we secure platforms. There are many questions to try to answer... How do we know if the data we are using to make decisions is trustworthy? Does vulnerability data match our reality? How do we tackle securing AI, while not being a barrier to business? How can we build trust into business relationships? Dan Conn may not have all the answers, but hopefully he can show what he - and the Platform Security team at Trustpilot - does to tackle these.

Speaker
Senior Platform Security Engineer
Trustpilot
Human Risk Management: Building a Resilient Culture in the Age of Human-Centered Business

In today's complex business environment, organisations are increasingly recognising that their greatest asset – their people – can also represent their most significant source of risk. This thought-provoking session explores the critical discipline of Human Risk Management (HRM) and its fundamental role in creating sustainable, successful organisations. Dan Hindley will delve into how Human Risk Management goes beyond traditional compliance-based approaches to address the behavioural, and cultural factors that influence decision-making and risk-taking in the workplace. Learn how implementing a comprehensive HRM framework can help organisations better understand and manage risks associated with human behaviour, from decision-making biases to workplace conduct and safety practices.

The session will cover:

• The evolution from traditional risk management to human-centred risk approaches

• Key components of an effective Human Risk Management strategy

• Practical tools for identifying and assessing human risk factors

• Strategies for building a risk-aware culture that empowers employees

• Real-world case studies and lessons learnt from successful HRM implementations Whether you're a senior executive, risk manager, or HR professional, this session will provide valuable insights into how Human Risk Management can transform your organisation's approach to risk, enhance decision-making, and create a more resilient business culture. Join us to discover why HRM is becoming an essential component of modern business strategy and how you can begin implementing these principles in your organisation.

Speaker
Senior Director of Sales
KnowBe4
Coffee & Networking
Lunch and networking
Chairs opening Address
Speaker
Microsoft Chief Security Advisor, Independent Board Advisor, Best-Selling Author, Keynote Speaker and Fellow British Computer Society.
Microsoft
Who’s Who? Surviving the Wild West of Identity Security!

As identity becomes the new security perimeter, businesses must rethink their approach to access control, compliance, and cyber resilience. This session explores the latest identity security trends, UK regulatory mandates like NIS2 and DORA, and real-world case studies to help organizations strengthen their IAM strategies in an evolving threat landscape.

Speaker
Business development
ManageEngine
An Ounce of Prevention, Worth 100x Needing A Cure
Lessons learned about proactive Application Development Risk management and the importance of going beyond compliance requirements. How a painful lesson from long ago turned into a competitive advantage for one financial services provider. High-level take-aways:

1. Sadly, it sometimes takes a breach to act as the wake-up call - now it’s more common for financial services organizations to get in front of the problem *before* a successful attack or breach.
2. Financial Services organizations are expected by the regulators to act as beacons - bastions of safety & security - others should follow. The bar is therefore set much higher by regulators (like the OCC) on these institutions.
3. Doing a tick-box exercise isn’t enough, there is a need to embrace the spirit of the law as well as address the letter of the law.
4. Today, it is seen as a competitive advantage for providers to adopt a proactive approach to Development Risk Management across tools and internal security champions programs. It isn’t enough to get in front of the problem but keep focused and proactive to stay in front of it.
Speaker
Head of Customer Success, EMEA
Secure Code Warrior
Ransomware: Get Ready or Get Wrecked

Picture this: You arrive at work, coffee in hand, only to find your screen frozen with a ransom note. The message is clear: “Pay up millions, or your data vanishes forever.” It’s not a distant nightmare, it’s happening every day, and in 2025, the risks have never been higher. With growing reliance on technology, widespread cryptocurrency, and tougher economic times, ransomware is thriving. In this session, we’ll uncover the dark history of ransomware, explore the anatomy of an attack, and look at what’s coming next in the threat landscape. Most importantly, you’ll leave with practical tips, tricks, and tools to protect yourself, your team, and your organisation. Because when it comes to ransomware, preparation isn’t optional - it’s survival.

Speaker
World-renowned security expert
Rehydrate Your Devices in the Time It Takes to Have Lunch!

Did you know the average UK employee takes just 33 minutes for lunch?

What if you could use that same time to rehydrate your devices as well as yourself—rather than waiting days, weeks, or even months? The "Blue Screen of Death" (BSOD) is a major headache for security teams, and having the right tools to prevent, respond to, and repair such issues is crucial. It's not just about defending against cyber threats—it's about minimizing downtime. In today’s fast-paced world, lost revenue, damaged reputation, and decreased productivity due to extended downtime can cost organisations millions. Time has never been more valuable.

Speaker
CTO
Absolute Security
Smart Tech, Dumb Risks: Why AI Needs Rules

AI and Large Language Models (LLMs) are changing the game—automating tasks, generating content, and making decisions faster than ever. But here’s the catch: without the right rules in place, even the smartest tech can make some seriously dumb mistakes. "Smart Tech, Dumb Risks: Why AI Needs Rules" is a fast-paced look at the hidden dangers of unchecked AI, from misinformation and bias to security risks and ethical headaches. We’ll break down why businesses need AI policies now—not when it’s too late. If you want to harness AI’s power without the chaos, this talk is for you! ?

Speaker
Award winning Chief Information Security Officer (CISO) | Founder | Director | Keynote Speaker | Mentor | Board Advisor
Ayvens
The attacker’s POV: How to build the right strategic threat exposure management (CTEM) program to reduce risk

• Leveraging real-time threat modelling to expose gaps in visibility, controls & detections

• Prioritize actions required to fill those coverage gaps, mis-configured controls and tool deficiencies

• Answering the questions of; what threats should I care about most? What are the gaps in my defences? What do I fix first, and more importantly, why?

• Best practices for designing and scaling a continuous threat management approach across hybrid environments?

Speaker
President
Interpres Group
Coffee and networking
Live ‘Fireside Chat’ Q&A with Nick Leeson

Join Sarah Armstrong Smith for an engaging fireside chat with infamous “rogue trader” Nick Leeson, concluding with an interactive Q&A.

This talk promises to inspire, inform, and entertain. Don’t miss it!

Speaker
Chairs Closing Remarks
Speaker
Microsoft Chief Security Advisor, Independent Board Advisor, Best-Selling Author, Keynote Speaker and Fellow British Computer Society.
Microsoft