Crucial to cyber security for individuals, organisations and wider society, attend our Cyber Solutions Theatre for case studies and expert seminars from cyber game-changers and industry-leading solution providers. With a comprehensive focus on cyber essentials, security network fortification, and maintaining resilience, attendees will gain skills, knowledge, and actionable insights on utilising technology to maximise security.
Join James Dyer, Threat Intelligence Lead at KnowBe4, for an in-depth exploration of the emerging role of artificial intelligence in advanced phishing techniques. In this compelling presentation, Dyer will provide a comprehensive analysis of how cybercriminals are leveraging AI to elevate the sophistication, delivery, and concealment of phishing attacks.
Key points to be covered:
• The evolution of AI-driven phishing methodologies
• Impact on email security and traditional defense mechanisms
• Strategies for detecting and mitigating AI-enhanced phishing threats
As we enter an era of unprecedented digital deception, understanding these advanced tactics is crucial for cybersecurity professionals, business leaders, and IT decision-makers. Dyer will offer valuable insights to help organizations stay ahead of this rapidly evolving threat landscape.
This session promises to deliver actionable intelligence for enhancing your organization's phishing defense strategies in the age of AI.
Manual certificate management can be an issue, and this is without the new changes on the horizon. Google’s cutting certificate lifespans to 90 days, Apple’s slashing them to 47, and post-quantum cryptography is looming. If your cert estate isn’t airtight, you could be more prone to outages, security gaps, and endless firefighting.
Join AppViewX CSO Murali Palanisamy and Stuart McCann from cyber security consultancy FullProxy to find out how to stop certificate chaos before it stops you; strengthen your PQC strategy and stay ahead of the curve before the these changes come into effect.
As cyber threats become more sophisticated, organisations face increasing challenges in managing fragmented security tools, slow response times and operational inefficiencies. This keynote explores how a platform approach to cybersecurity enhances resilience by improving visibility, streamlining detection and enabling faster responses. We will examine the limitations of traditional security architectures, the role of AI-driven automation, and how a fully integrated platform solution with in-built tools such as NDR, UEBA, automated response and next-generation SIEM can strengthen defence strategies.
Eaton were the first to become a registered CySPAG manufacturer, and continue to support the CySPAG scheme. With the launch of the CySPAG essential installer scheme, Glenn explains how Eaton’s approach to cyber security can support installers on their journey to become CySPAG essentials installers.
Join us for an immersive experience in the battle of AI vs. AI. In this exciting challenge, the AI Attacker goes head-to-head with the AI Defender – but who will come out on top?
The cyber battlefield is evolving, and defenders are now unleashing AI as a game-changing force multiplier. With its cutting-edge capabilities, AI gives defenders the upper hand—detecting, analysing, and neutralising threats faster than ever before. By harnessing AI-driven intelligence and proactive strategies, we can out manoeuvre cybercriminals, fortify digital assets, and stay one step ahead in the fight against evolving threats.
Cybercrime is accelerating at an unprecedented pace, with global costs projected to surge from $10 trillion in 2025 to $13.82 trillion by 2028. AI, once the domain of science fiction, now redefines how both attackers and defenders operate in the digital world. As science fiction author Frank Schätzing states, "AI is no longer controlled by a small group. With the rise of generative AI, every individual has become a potential player – and that changes everything."
Drawing from recent insights, we have identified six critical trends shaping the cybersecurity landscape: the rapid evolution of AI-driven threats, the rise in multichannel attack strategies, and the growing reliance on third-party providers, among others. Highlights include:
• 91% of organisations anticipate an increase in AI-based cyberattacks within three years.
• 94% of organisations report a surge in multichannel attacks, combining email, social media, and other vectors to target vulnerabilities.
• 83% of firms have already experienced breaches stemming from personal devices or accounts.
This session offers a glimpse into these trends and their implications, revealing how organisations can prepare for emerging threats and ensure resilience against an increasingly sophisticated cybercrime ecosystem. Join us to explore actionable strategies and prepare for the future of cybersecurity.
Jake will delve into the darker aspects of facial recognition technology, exposing its unsettling potential. He'll unveil glasses capable of real-time identification, allowing you to discover someone's identity with a glance. Jake will also demonstrate how AI can outsmart these systems, revealing how he bypassed a bank’s secure facial recognition using freely available software. For the grand finale, Jake will add himself to a high-security watchlist of known suspects and walk past the system undetected, proving how vulnerable this technology is.
In this session, we’ll confront the hard truth: it's not a matter of "if" your organisation will be breached, but "when." We’ll examine the true impact and timelines of a breach, from detection to recovery, and challenge assumptions about AI’s role in threat response. It’s not about technology stacks; it’s about refining strategies and ensuring you are prepared to recover swiftly and confidently. Remember, AI can assist, but it can’t do the heavy lifting for you.
Partnering with a specialist detection and response provider allows organisations to elevate their cyber security posture without the complexity and financial strain of building a Security Operations Centre.
Attend this session to discover key strategies for building a successful and lasting client-provider relationship. Whether you're new to outsourcing or looking to enhance your current partnership with an MDR provider or MSSP, explore what excellence looks like and ways you can improve collaboration for better security outcomes.
Supply chain disruptions can cripple critical operations, yet many private sector organisations lack full visibility into their extended supply chains. In this session, Justin Kuruvilla, Chief Cyber Security Strategist at Risk Ledger, explores real-world cyber incidents that expose the vulnerabilities of traditional third-party risk management (TPRM) practices. We will examine how blind spots in supply chains—especially in fourth, fifth, and nth-party dependencies—can lead to systemic failures.
Drawing on lessons from financial services, fintech, healthtech, and insurance, we will uncover why outdated, static assessments and siloed risk management approaches leave businesses exposed. The session will highlight how companies can transition to a collaborative, data-driven model that provides real-time risk intelligence, enhances supplier engagement, and strengthens resilience. Attendees will gain actionable insights on automating supply chain security, identifying concentration risks, and leveraging a defence-in-depth approach to mitigate evolving cyber threats.
Every day, your brand faces risks you might not even see—fake websites using your logo, leaked data showing up on the dark web, or social media impersonators tricking your customers. These threats can start small but quickly spiral into serious damage if they’re not caught early. In this talk, you’ll learn how to identify the early warning signs, monitor external threats that slip past traditional security tools, and focus on the issues that truly matter—before they escalate. With practical examples and actionable insights, it’s all about staying one step ahead to protect your brand and your customers.
The talk explores how red teaming simulates real-world adversarial tactics to improve detection and response capabilities and build resilience. Using case studies, learn how red teaming drives measurable improvements, fosters collaboration with security teams, and enhances organisational security culture. This session aims to highlight why red teaming is a critical part of a proactive defence process, delivering value and insights far beyond pure compliance. The talk is aimed at security leaders and teams seeking ways to use Red Teaming to enhance their current testing approaches, or anyone who wants to better understand Red Teaming.
In today's threat landscape, cyber security teams are under immense pressure to defend against increasingly sophisticated attacks—while keeping costs under control. How do you strike the right balance between robust security and financial sustainability?
Join us for an eye-opening session where we’ll explore how to maximise cyber security investments, prioritise threats effectively, and leverage cost-efficient strategies to strengthen your security posture.
Whether you're a CTO, CISO, or IT leader, this session will provide actionable insights to help you make smarter security investments—without breaking the bank.
In today’s evolving threat landscape, cyber resilience is more critical than ever. This presentation explores how organisations and their employees can proactively begin to identify threats, understand vulnerabilities, and strengthen defences against cyberattacks.
By analysing real-world attack methodologies and the cyber kill chain, we’ll uncover how adversaries operate, and the steps businesses can take to mitigate risks. From technical controls to strategic defence mechanisms, this session provides actionable insights to enhance security posture and reduce the likelihood of compromise.
Whether you're a security professional or business leader, this talk will equip you with the knowledge to build a more resilient organisation.