Agenda

-
Registration

Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share

-
Welcome & Opening Remarks from Computing

Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.

Speaker
Editor
Computing (The Channel Company)
-
Computing Research: Everyone Knows About Phishing. So How Come More of Us Are Falling For It?

All of us are trained not to click on suspicious links, yet the volume and success rates of phishing incidents continue to rise. With reference to exclusive Computing research, we look at why that might be and what can be done to reverse the trend.

Speaker
Research Editor
Computing (The Channel Company)
-
Keynote Presentation: Cybersecurity Starts at Home: Why Everyday Security Habits Shape Business Resilience

The biggest cybersecurity threats don’t start in the boardroom—they start in our homes. From weak passwords to social engineering, everyday digital habits can open the door to cybercriminals. Rebecca will share insights from the dark web on how individuals are targeted and explain why strong personal security naturally strengthens businesses

Speaker
Cybersecurity Professional
-
Boardroom Appointments

Delegates are assigned into peer groups of 12-15 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Morning Networking Break!

-
Fireside Chat: Cybersecurity Beyond Technology: A Human-Centric Approach to Digital Safety

In today’s rapidly evolving threat landscape, technology alone isn’t enough to protect businesses from cyber risks. Just as workplace safety is ingrained into corporate culture through training and best practices, cybersecurity must adopt a similar approach—empowering employees as the first line of defence. This session challenges the traditional mindset around cybersecurity, shifting the focus beyond awareness to real-world response and preparedness. Instead of relying on policies and passive training, organisations must rethink how they equip employees to handle cyber threats in practice. Explore how businesses can embed cybersecurity into workplace culture, ensuring security isn’t just understood but instinctively acted upon when it matters most.

Speakers
Associate Editor
Computing
Director
BDRowe Consulting Ltd
-
Panel Discussion: Budget Battles: Turning Cybersecurity from Afterthought to Priority
In tight economic times, how do you secure the budget you need? Learn strategies to advocate for cybersecurity funding and prioritise spending that delivers results.
Speakers
Editor
Computing (The Channel Company)
Information Security Manager
Goodlord
IT Director
The Meliore Foundation
Chief Digital & Technology Officer
Save The Children
-
Networking Lunch & Exhibit Stands

Indulge in a networking lunch while exploring latest innovations at our Exhibit Stands!

-
Presentation: Deep Fakes & Disinformation; The Darker Side of AI

Delve into the intersection of AI and futuristic technologies like quantum computing, blockchain, and IoT. What opportunities—and challenges—lie ahead for cybersecurity?

Speaker
Managing Director EMEA Cyber Strategy Lead & Global C-Suite & Board
Accenture
-
Boardroom Appointments

CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Afternoon Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Afternoon Networking Break!

-
Inside the Mind of a Hacker: Lessons from the Frontlines

Whether ethical or former black hat, this hacker will reveal the tactics, motivations, and evolving methods of cyber attackers. Learn how they exploit vulnerabilities, why organisations remain prime targets, and what you can do to stay one step ahead. This unique perspective will leave you with actionable strategies to enhance your defences and a deeper understanding of the human element in cybersecurity.

Speaker
Former Hacker
-
Computing Closing Remarks

As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.

Speaker
Editor
Computing (The Channel Company)