Agenda
Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share
Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.
All of us are trained not to click on suspicious links, yet the volume and success rates of phishing incidents continue to rise. With reference to exclusive Computing research, we look at why that might be and what can be done to reverse the trend.
The biggest cybersecurity threats don’t start in the boardroom—they start in our homes. From weak passwords to social engineering, everyday digital habits can open the door to cybercriminals. Rebecca will share insights from the dark web on how individuals are targeted and explain why strong personal security naturally strengthens businesses
Delegates are assigned into peer groups of 12-15 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
Fuel up and network with peers over refreshments at our Morning Networking Break!
In today’s rapidly evolving threat landscape, technology alone isn’t enough to protect businesses from cyber risks. Just as workplace safety is ingrained into corporate culture through training and best practices, cybersecurity must adopt a similar approach—empowering employees as the first line of defence.
This session challenges the traditional mindset around cybersecurity, shifting the focus beyond awareness to real-world response and preparedness. Instead of relying on policies and passive training, organisations must rethink how they equip employees to handle cyber threats in practice. Explore how businesses can embed cybersecurity into workplace culture, ensuring security isn’t just understood but instinctively acted upon when it matters most.
Indulge in a networking lunch while exploring latest innovations at our Exhibit Stands!
Delve into the intersection of AI and futuristic technologies like quantum computing, blockchain, and IoT. What opportunities—and challenges—lie ahead for cybersecurity?
CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
Fuel up and network with peers over refreshments at our Afternoon Networking Break!
Whether ethical or former black hat, this hacker will reveal the tactics, motivations, and evolving methods of cyber attackers. Learn how they exploit vulnerabilities, why organisations remain prime targets, and what you can do to stay one step ahead. This unique perspective will leave you with actionable strategies to enhance your defences and a deeper understanding of the human element in cybersecurity.
As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.


