Programme:
08:30
|
Registration and Networking
|
09:00
|
Chair's opening address
Reflections on the current cyber threats in the era of AI’ |
09:15
|
Are you ready for Cyber Recovery?"
Are you ready for cyber recovery? Do you have a cyber recovery time objective? For the last 20-30 years, we have focused time & money an attack detection and prevention tools, and subsequently neglected cyber recovery. But you can’t stop the unstoppable. Remember: defenders have to be right 100% of the time while attackers only have to be right once. |
09:30
|
Zero Trust Framework: From Ideation to Practical Implementation
This session explores the Zero Trust security model, emphasizing the importance of protecting critical assets through continuous verification and dynamic access controls. It offers a practical, step-by-step approach to Zero Trust network implementation, including identifying sensitive data, mapping business flows, and designing a Zero Trust architecture. Learn how to establish effective security policies and leverage automation to maintain a secure, adaptive network environment. By adopting a Zero Trust approach, organizations can enhance security, reduce risk, and streamline operations in today’s increasingly complex IT landscapes. |
09:45
|
Is your approach, approachable (The challenge of the Acronym/ Initialism!)
Should you be using that acronym/ initialism? Does everyone know what it means? Do they? Are you sure? Do you know what it means? Helping people challenge their thoughts about what clear communication looks like. |
10:00
|
At the Crossroads of Threat Intelligence: Which Path To Tread?
Threat Intelligence is at a critical juncture where traditional methods of threat analysis must evolve to address emerging threats. The challenge lies in determining the best path forward. |
10:15
|
It’s not as if machine learning models aren’t incredibly easy to fool?
The arrival of any new technology brings along with it new vulnerabilities and attack surfaces, so it's perhaps unsurprising that machine learning models — and especially the new generation of Large Language Models (LLMs) — are no exception. Except, of course, Artificial Intelligence (AI) isn’t new. The phrase was first coined in 1956, and my own first job out of University back in the 1990’s was training neural network models to carry out crop monitoring based on satellite data. We should, perhaps, have been more prepared than we now seem to be to cope with these new security problems. These threats only becoming more severe as we see the deployment of models to the Edge, and the Internet of Things (IoT). It’s time to talk about IoT security, with a seasoning of AI at the Edge, and the new attack surfaces introduced by the arrival of LLMs. Before that is, they cause real trouble. |
10:45
|
Strengthening Cybersecurity with Human Risk Management Three ways
Effective human risk management is a critical component of cybersecurity for any organisation. We explore three perspectives that illustrate the contribution of human risk management to organisational cybersecurity. Central to this is human behaviour within the workforce, which helps conserve defence resources, assists in the triage of suspicious emails, strengthens processes, and promotes active defence through real-time coaching. These three strategies provide a comprehensive methodology for optimising cybersecurity and underscore the importance of an integrated approach that considers both technical and human factors. |
11:00
|
Coffee and Networking
|
11:30
|
Choose from one of three Seminar Sessions
|
12:00
|
Lunch and networking
|
13:00
|
Chairs opening address
|
13:10
|
Enabling Secure AI Adoption across the enterprise; without losing your edge.
Generative AI has already disrupted many industries, but enterprises are still getting to grips with enabling safe use of AI across corporate data sets. Too much governance and you lose your competitive ability, too little and you risk your core data assets. This seminar will give a high level overview of why it's important to act fast, but in a secure manner. |
13:30
|
Strengthen cyber resilience, protect data, and prepare for future regulations.
The introduction of the Cyber Security and Resilience Bill to Parliament highlights that, despite the UK's departure from the EU, future regulations will likely follow international standards. The interconnected nature of global cyber threats makes it impractical to deviate from existing frameworks. |
13:45
|
Points Make Prizes! EU Cybersecurity Certification
|
14:15
|
The Future of Phishing
Internal phishing campaigns are, at best, seen as a necessary evil and at worst a total turn off for security engagement, and with good reason. Yet we are seeing real world phishing campaigns escalating in frequency and complexity. We need to be ready to meet this challenge. So what should we do? This seminar will set out how to leave behind the red teaming approach to phishing in favour of a diagnostic approach to phishing, which increases engagement and improves our state of readiness |
14:45
|
Navigating the strategic cyber threat landscape
It is impossible to geo-politics and cyber security – whatever organisation you represent it risks being impacted to some degree by ransomware, fraud, IP theft, disruptive attacks. |
15:15
|
Building cyber resilience: Prioritisation in a rapidly shifting threat landscape
As the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisations. This speaking session offers invaluable insights into navigating this dynamic environment, with a focus on bolstering cyber resilience. |
15:30
|
Coffee and Networking
|
16:00
|
Live ‘Fireside Chat’ Q&A with Deborah Meaden
This promises to be a session not to be missed
|
17:00
|
Chairs Closing Remarks
|