Programme:
08:30
|
Registration and Networking
|
09:10
|
Chair's opening address
Reflections on the current cyber threats in the era of AI’ |
09:30
|
Software Supply Chain Security and a Spherical Chicken in a Vacuum
Imagine a chicken in a vacuum, perfectly spherical. Physicists use this joke to describe the effects of simplifying external factors. Removing them may make a problem easier to solve, but the solution has to work in the real world. The goal for a physicist is to build a model of the real world which works to solve the problem it was designed to address.
|
09:45
|
National Cybersecurity Strategies
This session will cover the national cybersecurity strategies of a number of key countries, in order to help delegates with international operations in designing and operating their cross border cybersecurity strategy. |
10:00
|
Jen, we have a problem…
Your worst day at work, you’re the person responsible for security and you learn that your organisation has been hit by a cyber attack impacting client data. It’s all very well and good being told that you should have had policies, security controls etc but what should you do right now? • Preparing for a cyber incident |
10:15
|
Beyond the Buzzwords: How Security Automation Can Transform Your Program into a Force Multiplier
Imagine a security program where threats are neutralized in an instant, where analysts are freed from mundane tasks, and where your entire security posture takes a quantum leap forward. This isn't a futuristic dream, it's the reality promised by security automation. |
10:30
|
Cyber Security in Outer Space: The Final Frontier?
A quick introduction into cyber security in outer space before flying off to discuss what is happening within this increasingly expanding industry and why we should all look up to the stars more. |
10:45
|
Building Cyber Resilience through Automation and Intelligent Architectures
Gain Control Of Your Network And Reduce The Chance of Ransomware |
11:00
|
Coffee and Networking
|
11:30
|
Choose from one of three Seminar Sessions
|
12:00
|
Lunch and networking
|
13:00
|
Choose from one of three Seminar Sessions
|
13:30
|
Chairs opening address
|
13:35
|
Optimizing Business Resilience: Reducing Risk and Boosting Productivity with a Zero Trust Approach to Network, Data Security, and AI
Discover how implementing a well-defined zero trust approach to network and data security can swiftly diminish your organization's vulnerability and potential data breaches through the application of contemporary principles and technology. |
13:50
|
The Influence Of Neurodiversity In Cyber Security Posture
Discover how neurodiversity impacts cyber security posture in this insightful presentation. Explore the unique cognitive strengths of different neurotypes, like pattern recognition and innovative problem-solving—that can fortify organisational defences against cyber threats. Learn practical strategies for recruiting, retaining, and empowering neurodiverse talent within cybersecurity teams, fostering inclusive cultures and tailored accommodations. Debunk common misconceptions and unlock the untapped potential of neurodiversity to enhance cyber security resilience in an ever-evolving digital landscape. Join us for a concise exploration of the intersection between neurodiversity and cyber security posture, shaping a more inclusive and secure future. |
14:05
|
It's more than phishing - how to supercharge your security awareness program
Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple. |
14:20
|
In the moment nudges – What? How? Applying nudge theory to awareness
What would it be like to be “there”, just when you were needed, to offer a tap on the shoulder and steer your colleagues in the right direction when they were about to do something risky? Click a link, plug in a USB, upload a file, and give away their credentials…? This takes nudge theory to its logical conclusion – timely, in the moment and even measurable. In this talk, Lucy will touch on why we should be looking at nudge theory, what makes a good nudge and why, how to run a campaign to steer behaviours, and the potential impact this approach can have. Lucy will share her 8+ years as a practitioner offering some takeaways on how to apply nudge theory, behavioural and learning science to your awareness campaigns as you build up towards real-time nudges. |
14:35
|
Risky Business - The prejudices and pitfalls of cyber risk planning.
A talk on the psychological considerations required when assessing the likelihood and impact of cyber risk, how to avoid common fallacies associated with qualitative assessments, and using financial quantification to more effectively reduce business uncertainty and improve board communication. |
14:50
|
Cyber Threat management and mitigation in a forever moving and growing threat landscape.
Join us for an insightful exploration into the readiness of companies and cyber vendors to combat the relentless rise of automated cyber threats. We'll examine the spectrum of cyber maturity across enterprises, large and small, and evaluate whether we're operating in reactive or proactive modes, and the related risks. We’ll recommend solutions to enhance preparedness and delve into how Artificial Intelligence (AI) and Machine Learning (ML) are pivotal in fortifying our cyber defences. |
15:05
|
Risk Prioritisation and the Evolution of Pen Testing
Finding and fixing vulnerabilities can be seen as one of the basic tenants of a modern security function. While supposedly basic, given the ever-increasing frequency of data breaches, managing vulnerabilities across an organisation is far from straightforward. How organisations approach vulnerability management and penetration testing in the past simply does not work with today’s technology stack and development methodologies. |
15:20
|
Cyber Security Trends in the 2020's
Former Head of UK Cyber Security Centre and UK Chair of Cyber CX Ciaran Martin looks at the major trends in Cyber Security that have defined the first half of the 2020's and looks ahead to those that will drive tech security in the second part of this decade. |
15:35
|
Coffee and Networking
|
16:00
|
Live ‘Fireside Chat’ Q&A with Deborah Meaden
This promises to be a session not to be missed
|
17:00
|
Chairs Closing Remarks
|
17:05
|
Drinks reception
|