Agenda preview

Speakers coming soon...

-
Registration

Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share

-
Welcome & Opening Remarks from Computing

Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.

Speaker
Editor
Computing
-
TCC Research

Delve into the latest findings from The Channel Company's Research, uncovering critical insights and trends shaping the cybersecurity landscape. This session will provide attendees with data-driven perspectives to inform their security strategies.

-
Presentation: From Challenges to Triumph: Real-World Cybersecurity Case Studies

Practical success stories offer invaluable lessons in overcoming cybersecurity challenges. Dive into inspiring examples that showcase resilience, innovation, and actionable strategies for protecting your business.

-
Vendor Showcase

Explore innovative cybersecurity solutions during our fast-paced Vendor Showcase. Get a sneak peek at cutting-edge technologies and services designed to enhance your organization's security posture.

-
Boardroom Appointments

Delegates are assigned into peer groups of 12-15 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Morning Networking Break!

-
Forging a National Shield: Uniting Business and Law Enforcement for Cyber Resilience
This session highlights the ground-breaking collaboration between law enforcement, global businesses, and government to transform the UK's cyber resilience. The CEO of the National Cyber Resilience Centre Group will share insights on how these partnerships protect the economy, secure supply chains for large organisations, and empower SMEs to combat escalating cyber threats. Learn how this approach aligns with the UK Government’s Cyber Security Strategy to make the UK the safest place to work and invest.
Speakers
Editor
Computing
Detective Superintendent
National Cyber Resilience Centre Group
-
Vendor Showcase

Another opportunity to discover game-changing cybersecurity products and services. This quick showcase highlights additional vendors and their unique offerings to address your security challenges.

-
Boardroom Appointments

CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Networking Lunch & Exhibit Stands

Indulge in a networking lunch while exploring latest innovations at our Exhibit Stands!

-
Vendor Showcase

Kick off the afternoon with an extended Vendor Showcase, featuring in-depth demonstrations of leading-edge cybersecurity tools and platforms. Engage directly with solution providers to find the perfect fit for your organization's need.

-
The Fusion of AI and Future Tech: Cybersecurity at the Cutting Edge

Delve into the intersection of AI and futuristic technologies like quantum computing, blockchain, and IoT. What opportunities—and challenges—lie ahead for cybersecurity?

-
Boardroom Appointments

Cybersecurity Festival attendees are assigned into peer groups of 10-12 based on business focus and technology interests. Vendors meet with the boardroom groups for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Afternoon Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Afternoon Networking Break!

-
Budget Battles: Turning Cybersecurity from Afterthought to Priority
In tight economic times, how do you secure the budget you need? Learn strategies to advocate for cybersecurity funding and prioritize spending that delivers results.
-
Inside the Mind of a Hacker: Lessons from the Frontlines

Whether ethical or former black hat, this hacker will reveal the tactics, motivations, and evolving methods of cyber attackers. Learn how they exploit vulnerabilities, why organizations remain prime targets, and what you can do to stay one step ahead. This unique perspective will leave you with actionable strategies to enhance your defences and a deeper understanding of the human element in cybersecurity.

-
Computing Closing Remarks

As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.

Speaker
Editor
Computing