Day 1 agenda
Charlie discusses the threats and need for appropriate cyber security measures, both physical, human and digital, examining the practical and strategic nature of the precautions required now and in the future and gives operational examples of investigations dealt with in the past. Covering hackers attacking governments, banks, and retailers, organised criminals stealing our personal information, dark markets that facilitate cyber trade, from state sponsored attacks to juveniles just having fun. Charlie highlights current cyber risks, future global threats and how and why every organisation is potentially vulnerable to escalating Ransomware, Ddos and Data breaches.
An overview of cyber crime, real world operational cases investigated and prosecuted, a look at who’s doing what and how including organised crime groups attacking financial institutions, dark markets that facilitate cyber trade, internet frauds, phishing and hacktivist attacks.
The plethora of security vendors operating in today's marketplace can be overwhelming. With so many options, it's easy to be distracted with the latest, greatest, shiny tool. Join Rob Allen for a deep dive into the purpose of cybersecurity and how you can use that to your operational advantage today.

- Cyber as a weapon of mass destruction.
- Evolution of attacks on critical national infrastructure.
- Direct and indirect attacks aimed at causing harm.
- Targeted cyber assassinations.
- Astroturfing and the incitement of mob rule.
- Current state of play on what the companies are doing in attracting and retaining talent to the cyber sector
- Is the industry doing enough to diversify their workforce? What more can be done?
- How do we improve diversity, equity and inclusion in the cyber security profession?
Practical examples of how diversity is adding value to organisations and unlocking
business potential
CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
With the rise of cybercrime and the increasing amount of sensitive information being stored online, many businesses and individuals are considering whether to purchase cyber insurance.
- Assessing the benefits of having cyber insurance. Does cyber insurance worth the investment? What are the potential benefits and drawbacks of cyber insurance?
- What are the potential risks and limitations of cyber insurance, such as costly premiums and exclusions or limitations on coverage?
- The factors that businesses should consider when deciding whether to purchase cyber insurance, including the size and type of the business, the sensitivity of the data it handles, the cost of premiums, and the level of risk tolerance of the business
Day 2 agenda
The cyber security skills gap has long been addressed as an issue within the industry. In this timely talk, Holly will address what she believes is the real gap, which is not a skill gap, but a communication gap. Identified from her own research and industry experience, Holly will present how we must as an industry, be more open to supporting neurodiversity and why as an industry we are at a shortage of skills in the first place.
With the explosion of Generative AI onto the scene, with it are as many questions as there are answers. This is just the latest example that technology moves faster than the law. As organisations there is no simple set of rules to follow, we are going to have to make more and more judgement calls. How do we as cybersecurity professionals protect our organisations in this context? ? Join Natalie Cramp and Alistair Dent for an insightful and interactive session exploring data ethics, getting a sneak preview of insight from their Good Data Guide launching on 19 May and ultimately helping you work with your teams to answer the question – just because I can, does it mean I should?
CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
With mainstream media reporting on major cyber-attacks nearly every month, most company Boards have cyber-security firmly on their radar. If security functions want to be respected at this level and get the investment they need, it helps to be able to communicate in a language that Boards understand: pounds and pence.
CRQ is an incredibly useful tool to achieve this objective and allows security functions to estimate annualised financial losses from a cyber-attack, estimate the Return on Investment (ROI) from security projects and help identify suitable insurance cover. It can also, however, be incredibly dauting and difficult to implement with its use of mathematical functions, estimation of attack frequency and myriad of software available.
CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
- How to optimise the remote working experience by providing best practices for communication, collaboration, and problem-solving
- How to make remote working secure -analysis of the security measures that should be in place to keep employee data and personal information secure work remotely
- Users ‘off the office network’ presents unique challenges to IT Security. How do you ensure the integrity of the devices connecting, and verify the identity of the user logging on?
- How do we, as Business Leaders, use our IT skills, and knowledge, to help build the social networking in our businesses when users are spread far and wide?
Analysing automation and zero trust approach in cybersecurity and uncovering the main pain points, challenges and opportunities for the market participants


