CONFERENCE PROGRAMME
Your search returned no results
Loading
Keynote Theatre
-
Keynote Theatre
-
Keynote Theatre
-
Keynote TheatreBusinesses must learn to operate in an environment of change - to remain agile and achieve a competitive edge. For businesses to succeed, future proofing is now more important than ever. How do we giv ...
-
Keynote Theatre
-
Keynote TheatreIn today's climate, the need for the next generation of cyber professionals to come through as a new wave of talent is as imperative as ever. In this session, you will hear from Amanda Finch, CEO of t ...
-
Keynote Theatre
-
Keynote TheatreAs organizations in the critical infrastructure are undergoing digital transformation enabled by AI use cases that powers the Industrial Internet of Things (IIoT), many are having challenges in scalin ...
-
Keynote TheatreImagine a malicious actor has found a vulnerable entry point into your systems. They’re not yet ready to mount a full-scale attack, but they’re watching and waiting for an opportunity to exploit the w ...
-
Keynote Theatre
-
Keynote Theatre
Theatre 1
-
Theatre 1
-
Theatre 1
-
Theatre 1
-
Theatre 1-
-
Theatre 1
-
Theatre 1This session will provide insight into the challenges and hurdles of awareness campaigns: - Why does the human factor still rank so high? - How does a didactic thread succeed? - How are high partici ...
-
Theatre 1
-
Theatre 1This session will discuss: o Difference between proactive and reactive cybersecurity o Why your organisation should be proactive (benefits) in your security measures and examples of proactive measures ...
-
Theatre 1In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats wi ...
-
Theatre 1For years we’ve heard there’s a ‘shortage’ of security and cloud skills in the workforce. But is this really true, or is it just a lack of imagination among recruiters? There’s no doubt that many IT p ...
Theatre 2
-
Theatre 2
-
Theatre 2
-
Theatre 2
-
Theatre 2• How today’s cyber criminals are exploiting weaknesses • How AI and smart systems can scan your systems to find suspicious activity in network traffic • The importance of zero trust and MFA to restri ...
-
Theatre 2
-
Theatre 2This fireside discussion will explore - whether or not legacy systems are essential to an organisation - the challenges of changing a legacy system for a new one (i.e. costs, data protection, etc) - u ...
-
Theatre 2
-
Theatre 2
-
Theatre 2
-
Theatre 2Third-party risk management is a team exercise – you can’t just leave it to an IT employee to check for threats, or rely on technology to monitor it for you. Instead, monitoring for third party risks ...
Keynote Theatre
-
Keynote Theatre
-
Keynote Theatre
-
Keynote Theatre
-
Keynote Theatre
-
Keynote Theatre
-
Keynote TheatreWho is really responsible for security in the cloud, and what does this mean for their work? What part of security rests with cloud providers, customers, individual users, or even governments? How muc ...
-
Keynote Theatre
Theatre 1
-
Theatre 1A human factors discussion that will cover: - Discussing the different areas that have gone wrong as CISO - Lessons you have learned from these events and what approach to take - Approach to adopt to ...
-
Theatre 1
-
Theatre 1From attacks on government agency websites, to breaches of critical infrastructure through to digital espionage, Russia’s cyberwarfare against Ukraine has been unrelenting since the beginning of its f ...
-
Theatre 1
-
Theatre 1
-
Theatre 1
-
Theatre 1
-
Theatre 1
-
Theatre 1
Theatre 2
-
Theatre 2The expanse of our company information systems is widening in the wake of post-pandemic remote and hybrid work cultures. Digital transformation is also in full force to ensure businesses stay competit ...
-
Theatre 2Cloud security rests on the notion of ‘shared responsibility’. The cloud provider offers watertight infrastructure, but it’s down to you to follow security best practices and configuration. But this e ...
-
Theatre 2There are nearly 200 undergraduate and postgraduate cyber security courses in the UK. These courses aim to produce graduates capable of handling cyber security problems in industry across a wide range ...
-
Theatre 2
-
Theatre 2