Our 2025 Conference Programme

Loading
Cloud & Cyber Security Expo Keynote
  1. Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
  2. In this session, we will explore why the key to long-term success in cybersecurity lies in returning to the fundamentals. By reinforcing core principles, we can build a strong, sustainable foundation ...
  3. Identity Security in a Borderless Digital World: Trends, Threats, and the UK’s Regulatory Mandate
    As identity becomes the new security perimeter, businesses must rethink their approach to access control, compliance, and cyber resilience. This session explores the latest identity security trends, U ...
  4. Prof. Simon will provide an in-depth look at the current perceptions and challenges facing the cybersecurity profession, highlighting the growing need for convergence between physical and cyber securi ...
  5. As AI becomes central to modern enterprises, cybersecurity is evolving rapidly. In this session, Delinea’s VP of Identity Threat & Research will discuss how identity security is leading this transform ...
  6. Maslow’s Hierarchy of Needs can be applied to organisational security culture, with security approaches driven by the fulfillment of fundamental needs similar to human development stages. A strong sec ...
  7. Session presented by Six Degrees
  8. This presentation tackles the critical yet often overlooked challenges of supply chain security in our interconnected business world. Through analysis of recent high-profile compromises, we'll explore ...
  9. In our rapidly evolving digital landscape, traditional cybersecurity strategies have predominantly focused on prevention, aiming to erect barriers against cyber threats. However, the complexity and so ...
Cloud & Cyber Security Expo Theatre 1
  1. Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
  2. The (r)evolution: from failing patching strategies to the Risk Operations Centre
    With so many threats, vulnerabilities, patches, and alerts, it can be difficult to know where to focus. In this session, Ivan will share a practical approach to managing cyber risk that has proven to ...
  3. AI in Security and Security in AI: Balancing Innovation and Resilience
    Artificial Intelligence is transforming workflows across industries, enhancing efficiency, decision-making, and security operations. However, alongside its benefits come new risks that require vigilan ...
  4. This talk will highlight that security is not merely a technical challenge, but a cultural and human one. The session will explore how security becomes deeply ingrained in an organisation when its "se ...
  5. Session presented by Tenable
  6. The Modern Threat Actors’ Playbook: How Initial Access and Ransomware Deployment Trends are Shifting in 2025
    As threat actors’ Tactics, Techniques, and Procedures become more complex, it becomes all that more critical for security leaders to understand how they are gaining initial access and fulfilling their ...
  7. Entra Apps 101: Secure yourself against the next Midnight Blizzard attack
    Join CoreView to get a 101 on Entra Apps - how you find them, how you secure them, and why they have become a favourite attack vector for cyber criminals.   Attendees will get:   ·       An overview o ...
Cloud & Cyber Security Expo Theatre 2
  1. Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
  2. Endpoints are no longer just devices like laptops and smartphones; the lines keep moving and endpoints are suddenly everywhere and nowhere at once. AI is redefining endpoint security by predicting thr ...
  3. This session will dive into the key aspects of securing the cloud-native enterprise. We will begin by exploring the benefits and challenges of fully embracing cloud-native technologies, examining both ...
  4. Mastering unstructured data in the AI era
    Jim will talk about how, in the age of AI, corporate data has become a major company asset rather than just a cost, with the challenge to all organizations being how to leverage it to reduce costs, in ...
  5. As deepfake technology becomes more accessible, its potential for exploitation grows. Could deepfakes be the next weapon of choice for social engineers and cybercriminals? From hijacked CCTV feeds to ...
  6. AI-pocalypse Averted: Emerging Services and Proactive Cloud Security
    This session will discuss how to navigate the shifting cybersecurity landscape and secure emerging services in the cloud. Nicholas will explore machine learning and AI powered cloud security services ...
Cloud & Cyber Security Expo Keynote
  1. In a world where cyber threats evolve faster than ever, Big Data is the key to staying ahead. This session explores how businesses can harness the power of big data to revolutionise their Cybersecurit ...
  2. This engaging panel discussion will explore the evolving landscape of cyber security talent and how embracing diverse career paths and backgrounds can create a more adaptive and innovative workforce. ...
  3. This presentation tackles the critical yet often overlooked challenges of supply chain security in our interconnected business world. Through analysis of recent high-profile compromises, Andy will exp ...
  4. Strengthening the Weak Link: Enhancing Your Cybersecurity Posture Through Effective Employee Engagement.
  5.  This engaging panel discussion will explore the evolving landscape of cyber security talent and how embracing diverse career paths and backgrounds can create a more adaptive and innovative workforce. ...
  6. Cultivating a security-conscious culture without undermining employee morale
    In this session, KnowBe4's Javvad Malik explores the delicate balance between maintaining a robust cybersecurity posture and fostering a positive work environment. The audience can expect to learn inn ...
  7. Session presented by CrashPlan
Cloud & Cyber Security Expo Theatre 1
  1. Session presented by Rubrik
  2. In cybersecurity, technology alone cannot fully safeguard digital assets. While advanced systems are vital, the human firewall plays a crucial role in preventing and mitigating threats. This session f ...
  3. We’ll explore how Cyera is revolutionizing data security through the transformative power of artificial intelligence. Drawing from extensive experience protecting Fortune 500 companies, Yotam will dem ...
  4. As technology advances, application security faces new complexities. This presentation focuses on three critical areas:1) AI-Generated Code Risks: AI revolutionizes software development but introduces ...
  5. In the fast-paced world of cybersecurity, feelings of self-doubt and inadequacy can plague even the most accomplished professionals. In my keynote topic 'Navigating the Imposter Monster in Cybersecuri ...
  6. Tackling the PQC challenge: How to get going
  7. This session will explore how broadening the scope of threat intelligence can enhance business decision-making, particularly in relation to utility efficiency. By expanding threat intelligence, organi ...
Cloud & Cyber Security Expo Theatre 2
  1. Attack Surface Unmasked: Top Attack Vectors in 2025 and Beyond
    The attack surface is expanding exponentially, driven by rapid cloud adoption, evolving technologies, and increasingly sophisticated cyber threats. In this session, Ellis will examine the leading atta ...
  2. With governments worldwide proposing legislation to ban ransomware payments, organisations face mounting pressure to strengthen their cyber resilience and compliance strategies. This session explores ...
  3. Whilst Cybersecurity’s focus is to combat current threats, it is also important to remain forward-thinking and assess how to prevent future evolving cyber-attacks. In this session, we will delve into ...
  4. Session presented by ThreatAware
  5. Join industry experts as they delve into Deepfake technology and its impact on privacy, trust, and security. Discover how AI-generated content is used both for innovation and exploitation, raising con ...
  6. The global tech workforce is brilliantly neurodiverse, but is your organisation supporting the needs of your autistic employees so that they can thrive? In this session, Nellie will explore why it’s c ...

Attend Cloud & Cyber Security Expo on 12-13 March 2025 at Excel London

Cloud & Cyber Security Expo is designed for C-level staff, IT security leaders, managers and key decision makers. No matter the size of your business, or whether you represent the public or private sector, there will be lots of takeaways and goals to achieve at the event.

Register for free

2025 Sponsors

Theatre Sponsors


 

Platinum Sponsors


 

Gold Sponsors


 

Silver Sponsors


 

2025 Partners

Media partner

excel london

Media partner

cybersecurity jobsite

Media partner

cyber security council

Media partner

WiCyS logo

Media Partner

The Security Institute Logo

Media Partner

Entrepreneur UK Logo

Media partner

ISC2 logo

Media partner

Tech Monitor logo

Media partner

she can code

Media Partners

Computing Security Magazine

Media Partners

Unicorns in Tech

Media Partners

Diversity Atlas

Countdown