Programme:

08:30
Registration and Networking
09:00
Chair's opening address

Sarah Armstrong-Smith

Reflections on the current cyber threats in the era of AI’ 

09:15
Are you ready for Cyber Recovery?"

Are you ready for cyber recovery? Do you have a cyber recovery time objective? For the last 20-30 years, we have focused time & money an attack detection and prevention tools, and subsequently neglected cyber recovery. But you can’t stop the unstoppable. Remember: defenders have to be right 100% of the time while attackers only have to be right once.

09:30
Zero Trust Framework: From Ideation to Practical Implementation

This session explores the Zero Trust security model, emphasizing the importance of protecting critical assets through continuous verification and dynamic access controls. It offers a practical, step-by-step approach to Zero Trust network implementation, including identifying sensitive data, mapping business flows, and designing a Zero Trust architecture. Learn how to establish effective security policies and leverage automation to maintain a secure, adaptive network environment. By adopting a Zero Trust approach, organizations can enhance security, reduce risk, and streamline operations in today’s increasingly complex IT landscapes.

09:45
Is your approach, approachable (The challenge of the Acronym/ Initialism!)

Emma Godfree

Should you be using that acronym/ initialism? Does everyone know what it means? Do they? Are you sure? Do you know what it means? Helping people challenge their thoughts about what clear communication looks like.

10:00
At the Crossroads of Threat Intelligence: Which Path To Tread?

Kash Valji

Threat Intelligence is at a critical juncture where traditional methods of threat analysis must evolve to address emerging threats. The challenge lies in determining the best path forward.

10:15
It’s not as if machine learning models aren’t incredibly easy to fool?

Alasdair Allan

The arrival of any new technology brings along with it new vulnerabilities and attack surfaces, so it's perhaps unsurprising that machine learning models — and especially the new generation of Large Language Models (LLMs) — are no exception. Except, of course, Artificial Intelligence (AI) isn’t new. The phrase was first coined in 1956, and my own first job out of University back in the 1990’s was training neural network models to carry out crop monitoring based on satellite data. We should, perhaps, have been more prepared than we now seem to be to cope with these new security problems. These threats only becoming more severe as we see the deployment of models to the Edge, and the Internet of Things (IoT). It’s time to talk about IoT security, with a seasoning of AI at the Edge, and the new attack surfaces introduced by the arrival of LLMs. Before that is, they cause real trouble.

10:45
Strengthening Cybersecurity with Human Risk Management Three ways

Effective human risk management is a critical component of cybersecurity for any organisation. We explore three perspectives that illustrate the contribution of human risk management to organisational cybersecurity. Central to this is human behaviour within the workforce, which helps conserve defence resources, assists in the triage of suspicious emails, strengthens processes, and promotes active defence through real-time coaching. These three strategies provide a comprehensive methodology for optimising cybersecurity and underscore the importance of an integrated approach that considers both technical and human factors.

11:00
Coffee and Networking
11:30
Choose from one of three Seminar Sessions

Click HERE to view stream options

12:00
Lunch and networking
13:00
Chairs opening address

Sarah Armstrong-Smith

13:10
Enabling Secure AI Adoption across the enterprise; without losing your edge.

Graeme Cantu-Park

Generative AI has already disrupted many industries, but enterprises are still getting to grips with enabling safe use of AI across corporate data sets. Too much governance and you lose your competitive ability, too little and you risk your core data assets. This seminar will give a high level overview of why it's important to act fast, but in a secure manner.

13:30
Strengthen cyber resilience, protect data, and prepare for future regulations.

The introduction of the Cyber Security and Resilience Bill to Parliament highlights that, despite the UK's departure from the EU, future regulations will likely follow international standards. The interconnected nature of global cyber threats makes it impractical to deviate from existing frameworks.
By aligning with NIS2, DORA, and GDPR, UK organisations can better prepare for upcoming national regulations and enhance protection against cyber risks. This isn't about rewriting the rulebook—business continuity and data resilience remain central to all cybersecurity regulations. That’s why ensuring your organisation has tamper-proof backups and effective disaster recovery capabilities is key to surviving infrastructure and data threats.
Join Kim Larsen, CISO at Keepit and seasoned cybersecurity advisor with experience in NATO, the EU, and international corporations, for insights on:
• Data governance
• Regulatory compliance
• Business continuity strategies
 

13:45
Points Make Prizes! EU Cybersecurity Certification

Richard Parlour


• Risk
• Strategy
• Certification
• Impact
 

14:15
The Future of Phishing

Janette Bonar Law

Internal phishing campaigns are, at best, seen as a necessary evil and at worst a total turn off for security engagement, and with good reason. Yet we are seeing real world phishing campaigns escalating in frequency and complexity. We need to be ready to meet this challenge. So what should we do? This seminar will set out how to leave behind the red teaming approach to phishing in favour of a diagnostic approach to phishing, which increases engagement and improves our state of readiness

14:45
Navigating the strategic cyber threat landscape

Harriet Rogers

It is impossible to geo-politics and cyber security – whatever organisation you represent it risks being impacted to some degree by ransomware, fraud, IP theft, disruptive attacks.
Increasingly leaders are turning to strategic threat intelligence to identify trends and create long-term plans.
By effectively operationalising strategic threat intelligence we are able to be pro-active rather than purely reactive and anticipate change and its impact on organisations. We are able to define our security posture in response to the threat and consider the impact cyber activities and attack trends have on business decisions and prioritise resources towards addressing the priority threats.
 

15:15
Building cyber resilience: Prioritisation in a rapidly shifting threat landscape

As the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisations. This speaking session offers invaluable insights into navigating this dynamic environment, with a focus on bolstering cyber resilience.

15:30
Coffee and Networking
16:00
Live ‘Fireside Chat’ Q&A with Deborah Meaden

Deborah Meaden

This promises to be a session not to be missed

 

17:00
Chairs Closing Remarks

Sarah Armstrong-Smith