Agenda
Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share
Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.
Join us for a captivating keynote address as we delve into the ever-changing landscape of cyber threats. In this illuminating session, we'll explore how modern-day adversaries continuously adapt their tactics, and how organizations can stay ahead of the curve to defend against emerging risks. Gain valuable insights and actionable strategies to fortify your defenses and safeguard your digital assets in an increasingly interconnected world.
The cyber game is rigged against defenders. With technology centre stage, an every increasing number of miscreants is lining up to bring it down. Their numbers are rising while security teams are chronically understaffed. Their rewards are riches, recognition or political advantage, while the defenders are only noticed when things go wrong. They have the advantage of surprise, while defenders are forced to react.
'Twas always thus of course. Cyber teams have never been able to keep all the bad stuff out, and much of the job is about mitigation and damage limitation. A wary balance has had to been struck. But easy to use generative AI is one of those technologies that could change the game and tip the balance. How and in whose favour is now playing out.
Based on exclusive Computing Research, John Leonard will be looking at the new automated threats, and also the tools and strategies at defender's disposal to take cyber security further down the road from prevention to prediction
Wayne Johncock endured a 15-month ordeal of insider fraud at Bank of America, despite its renowned cybersecurity measures. He reflects on the devastating impact on his family and delves into frustrations with authorities regarding ambiguous legislation and unclear roles. Despite the apparent sophistication, the fraud was surprisingly simple, highlighting the need for improved measures to prevent such crimes. Wayne prompts critical questions about the UK's readiness to combat financial crimes and advocates for proactive efforts from authorities to enhance detection and prevention strategies.
Delegates are assigned into peer groups of 12-15 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
Fuel up and network with peers over refreshments at our Morning Networking Break!
Join industry leaders in a thought-provoking panel discussion on Diversity and the Cybersecurity Talent Pipeline, exploring strategies to foster inclusivity and bridge the gap in this critical sector.
Indulge in a networking lunch while exploring latest innovations at our Exhibit Stands!
The Baltimore Bridge collapse. The Suez canal obstruction. Attacks in the Red Sea. In today's global economy, maritime security affects supply chains around the planet. More concerningly, the comparatively basic level of cybersecurity on modern vessels exposes them to cyber risk. What can we do in a world where a compromised cargo vessel can be used as a 165,000-ton battering ram?
Cybersecurity Festival attendees are assigned into peer groups of 10-12 based on business focus and technology interests. Vendors meet with the boardroom groups for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.
Fuel up and network with peers over refreshments at our Afternoon Networking Break!
Dive into the transformative power of AI and its potential to revolutionize the next generation of cyber attacks and influence operations, as Sarah unveils the nuances of bespoke, targeted assaults. Explore the implications, challenges, and opportunities shaping the cybersecurity landscape, and why the balance might finally be tipping back into the hands of defenders, in this captivating session.
As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.