PROSPERO HOUSE, LONDON
26TH MARCH 2025
HEADLINE SPEAKER NICK LEESON
Rise of the insider threat - what if the problem is not them, it’s you?
Are you ready for cyber recovery? Do you have a cyber recovery time objective? For the last 20-30 years, we have focused time & money an attack detection and prevention tools, and subsequently neglected cyber recovery. But you can’t stop the unstoppable. Remember: defenders have to be right 100% of the time while attackers only have to be right once.
o This presentation covers key aspects of effective project management, focusing on the different phases of the project lifecycle, from initiation to closure, including setting clear objectives, defining scope, and risk management.
o I’ll also offer practical, hands-on guidance on creating a robust project plan that clearly outlines the project status, dependencies, and risks, enabling effective stakeholder management.
o All within 15minutes!
Traditional SIEMs are failing security teams—too expensive, too complex, and too noisy. In this session, we’ll explore how AI-driven security operations can deliver SIEM-like outcomes without the burden.
Learn how agentic AI and root cause triangulation enable lean security teams to detect, investigate, and respond faster, all while enhancing existing security tools. Key Takeaways:
• Why SIEMs are outdated and ineffective for modern security teams.
• How AI-driven security can provide better outcomes without the SIEM cost and complexity.
• Real-world examples of lean security teams detecting and responding to threats in minutes.
Discover how to align your security investments with real-world threats. Amir Khan, Head of Sales at Zivver, presents exclusive insights from Zivver’s latest independent research revealing how IT leaders across industries perceive and prioritize email security. Gain a unique perspective on your peers' biggest challenges and plans for ensuring their email security strategies meets compliance and learn what’s driving their focus for 2025 and beyond. Amir shares practical steps to future-proof your organization with a holistic approach to email security.
In this presentation, ThinkCyber’s CEO Tim Ward will delve into the reasons for implementing security awareness programs within organizations. Is it purely a matter of compliance or does it serve a deeper purpose of empowering employees to protect sensitive information and themselves? Tim will explore the fundamental question: why invest in security awareness training?
He will examine how to ensure these programs work—focusing on the science behind how people learn and retain security knowledge. By applying behavioural science principles, Tim will discuss how organizations can effectively change employee behaviours, reducing operational risks and enhancing overall security posture.
The session will also address key metrics for success. Tim will explore the importance of measuring not attendance or click rate, but the effectiveness of security awareness efforts. Are you measuring performance or real impact?
He will share real-world examples from some of ThinkCyber’s clients to illustrate how to assess the effectiveness of security training and discuss the best practices for ensuring lasting behavioural change.
In a constantly evolving landscape, a diverse and empowered workforce is our greatest strength. In honour of International Women’s day (8th March), this session celebrates the vital role women are playing in shaping the next generation of cyber security. The session will explore:
How their innovation, leadership and unique perspectives are building a safer, more inclusive digital world Actionable steps for male allies and organisations to foster a supportive environment where women can thrive Empowering pathways for women to navigate challenges and build successful cyber careers.
Join us to learn how we can collectively ‘accelerate action’ and champion women in cyber to secure our digital future.
Let’s not ‘just talk’ but ‘take action’!
The cyber security industry was at the onset primarily focussed on trying to prevent all attacks from starting. It is now clear that the threat actors will find a way in. And, they only have to get it right once, which they often do, in order to spell disaster for any organisation. In this era of AI, the opportunities and also the risk and threats from this reality continues to increase. Therefore, maintaining business operations during and after an attack is now more than ever an existential endeavour. In this session, Michael Adjei, Director of Systems Engineering, Illumio, will present innovative ways of achieving a realistic resilience strategy underpinned by zero trust principles and practices.
The session will cover:
Understanding the new risks of pervasive AI use in today’s world
Learn how organisations can continue viable business operations after a cyber incident
Pragmatic cyber and operational resilience insights for CISOs and security managers
Learn how to implement complete cybersecurity strategies beyond traditional approaches
The world has changed myriad ways and so has the way we secure platforms. There are many questions to try to answer... How do we know if the data we are using to make decisions is trustworthy? Does vulnerability data match our reality? How do we tackle securing AI, while not being a barrier to business? How can we build trust into business relationships? Dan Conn may not have all the answers, but hopefully he can show what he - and the Platform Security team at Trustpilot - does to tackle these.
In today's complex business environment, organisations are increasingly recognising that their greatest asset – their people – can also represent their most significant source of risk. This thought-provoking session explores the critical discipline of Human Risk Management (HRM) and its fundamental role in creating sustainable, successful organisations. Dan Hindley will delve into how Human Risk Management goes beyond traditional compliance-based approaches to address the behavioural, and cultural factors that influence decision-making and risk-taking in the workplace. Learn how implementing a comprehensive HRM framework can help organisations better understand and manage risks associated with human behaviour, from decision-making biases to workplace conduct and safety practices.
The session will cover:
• The evolution from traditional risk management to human-centred risk approaches
• Key components of an effective Human Risk Management strategy
• Practical tools for identifying and assessing human risk factors
• Strategies for building a risk-aware culture that empowers employees
• Real-world case studies and lessons learnt from successful HRM implementations
Whether you're a senior executive, risk manager, or HR professional, this session will provide valuable insights into how Human Risk Management can transform your organisation's approach to risk, enhance decision-making, and create a more resilient business culture. Join us to discover why HRM is becoming an essential component of modern business strategy and how you can begin implementing these principles in your organisation.
As identity becomes the new security perimeter, businesses must rethink their approach to access control, compliance, and cyber resilience. This session explores the latest identity security trends, UK regulatory mandates like NIS2 and DORA, and real-world case studies to help organizations strengthen their IAM strategies in an evolving threat landscape.
Picture this: You arrive at work, coffee in hand, only to find your screen frozen with a ransom note. The message is clear: “Pay up millions, or your data vanishes forever.”
It’s not a distant nightmare, it’s happening every day, and in 2025, the risks have never been higher. With growing reliance on technology, widespread cryptocurrency, and tougher economic times, ransomware is thriving.
In this session, we’ll uncover the dark history of ransomware, explore the anatomy of an attack, and look at what’s coming next in the threat landscape.
Most importantly, you’ll leave with practical tips, tricks, and tools to protect yourself, your team, and your organisation. Because when it comes to ransomware, preparation isn’t optional - it’s survival.
Did you know the average UK employee takes just 33 minutes for lunch?
What if you could use that same time to rehydrate your devices as well as yourself—rather than waiting days, weeks, or even months?
The "Blue Screen of Death" (BSOD) is a major headache for security teams, and having the right tools to prevent, respond to, and repair such issues is crucial. It's not just about defending against cyber threats—it's about minimizing downtime. In today’s fast-paced world, lost revenue, damaged reputation, and decreased productivity due to extended downtime can cost organisations millions. Time has never been more valuable.
AI and Large Language Models (LLMs) are changing the game—automating tasks, generating content, and making decisions faster than ever. But here’s the catch: without the right rules in place, even the smartest tech can make some seriously dumb mistakes. "Smart Tech, Dumb Risks: Why AI Needs Rules" is a fast-paced look at the hidden dangers of unchecked AI, from misinformation and bias to security risks and ethical headaches. We’ll break down why businesses need AI policies now—not when it’s too late. If you want to harness AI’s power without the chaos, this talk is for you! ?
• Leveraging real-time threat modelling to expose gaps in visibility, controls & detections
• Prioritize actions required to fill those coverage gaps, mis-configured controls and tool deficiencies
• Answering the questions of; what threats should I care about most? What are the gaps in my defences? What do I fix first, and more importantly, why?
• Best practices for designing and scaling a continuous threat management approach across hybrid
environments?
Join Sarah Armstrong Smith for an engaging fireside chat with infamous “rogue trader” Nick Leeson, concluding with an interactive Q&A.
This talk promises to inspire, inform, and entertain. Don’t miss it!