Subpage Hero


Zero Trust

Are you using a Zero Trust security model yet? The Zero Trust approach assumes that every time a device accesses your systems it could be a threat. The user must provide multi-factor authentication each time they log on.

This makes a lot of sense in theory, yet also introduces a lot of challenges. An over-zealous set of protections will slow down productivity and cause endless complaints. Too much trust opens you up to more threats in a cloud-first world.

This theme will help you frame your own Zero Trust definitions and balance the risks and rewards of the approach.  

  • Zero Trust Journey
  • Identity-led security

Security for a Multi Cloud World

How confident are you that all the cloud-based tools your employees use are fully trustworthy? Companies are using more cloud environments than ever to boost flexibility and use the best software available. But that leaves IT, teams, with less visibility, a confusing range of management tools and plenty of uncertainty about how data is being moved between environments. You’ll need a strategy and the right tools to adapt to this multi-cloud world, and so these sessions will get you up to speed on best practices.

  • Digital Risk Protection
  • The security challenges presented by multi-cloud

Cyber Resilience

When it comes to cyber-attacks, it’s no longer a question of ‘if you’ll get breached, but ‘when. Cyber resilience is a practical and realistic approach to managing risks and preparing for the high likelihood your systems will succumb to an attack at some point. It’s about having protocols in place to detect and address attacks when they happen. But it’s also about being able to continue operating and delivering for customers even if you are breached.

This theme will get you up to speed with the cyber resilience concept and help you develop an appropriate strategy.

  • Network Security
  • Threat Intelligence & Response
  • Breach and attack simulation / 3rd party audit and vulnerabilities
  • Convergence of IT and OT security

Human Factors

The leading cause of cybersecurity breaches has always been human error. And this has become even more challenging as we adapt to a world of hybrid working. Much of the training you will have previously invested in is no longer as relevant now that people are often working away from the normal office environment. Staff will need to learn new skills and be aware of the new kinds of phishing and social engineering techniques criminals are using. This theme will help you address these challenges.

  • Upskilling the workforce
  • Workforce adoption and training
  • Securing remote/hybrid working
  • Security awareness and Training
  • Cultural adoption of new tech/tools
  • Communicating and working with the board/top leadership

Emerging Tech

How do you weigh up the security risks and rewards of using emerging technologies? A new generation of IT tools can help you win more customers, enter new markets and innovate. Yet IoT, mobile, AI tools and other new technologies can also be exploited by malicious actors as a gateway into your systems. It is essential to design security considerations into your deployments of emerging tech right from the beginning. In this theme, we’ll be looking at how to do that.

  • Mobile & IoT Security
  • Manufacturing & Logistics – Digital Security
  • AI/ML
  • DevSecOps
  • Cryptography and Cryptanalysis
  • Confidential computing

Hotel & Travel


Silver Sponsor

  • Secfense
  • SSL247


Lunch & Learn Sponsor

  • Duo


Lunch & Learn Sponsor

  • Crowdstrike


Technical Workshop Sponsor

  • DarkTrace


Technical Workshop Sponsor

  • Sentinel One


Technical Workshop Sponsor

  • Manage Engine


Media Partner

  • Linux Magazine
  • ADMIN Magazine
  • Elite Business
  • Top Business Tech


Media Partner

  • Computing Security
  • CIOCoverage


Media Partner

  • Crest
  • Paybis
  • Cyber Defense Magazine
  • CIOInsights


Media Partner

  • Electronic Specifier
  • Startups Magazine
  • Enterprise Security Magazine
  • Trusted Computing Group


Newsletter Sign Up