Agenda

-
Registration

Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share

-
Welcome & Opening Remarks from Computing

Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.

Speaker
Editor
Computing
-
Keynote Address: The Evolving Cyber Threat Landscape: Preparing for modern day threats

Join us for a captivating keynote address as we delve into the ever-changing landscape of cyber threats. In this illuminating session, we'll explore how modern-day adversaries continuously adapt their tactics, and how organizations can stay ahead of the curve to defend against emerging risks. Gain valuable insights and actionable strategies to fortify your defenses and safeguard your digital assets in an increasingly interconnected world.

-
Fireside chat: Stopping Insider Crime before it is too late – past the Insider Threat stage

Wayne Johncock endured a 15-month ordeal of insider fraud at Bank of America, despite its renowned cybersecurity measures. He reflects on the devastating impact on his family and delves into frustrations with authorities regarding ambiguous legislation and unclear roles. Despite the apparent sophistication, the fraud was surprisingly simple, highlighting the need for improved measures to prevent such crimes. Wayne prompts critical questions about the UK's readiness to combat financial crimes and advocates for proactive efforts from authorities to enhance detection and prevention strategies.

Speakers
Editor
Computing
CEO & Founder
SuperLearningSeries
-
Boardroom Appointments

XChange Solution providers are assigned into peer groups of 12-15 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Morning Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Morning Networking Break!

-
Fireside chat: Cyber Insurance: Is it worth it?
Explore the critical question of whether cyber insurance is worth the investment in this insightful session. Delve into the complexities, benefits, and potential pitfalls of cyber insurance coverage to make informed decisions that fortify your organization's resilience against digital threats.
Speakers
Editor
Computing
Group Information Security Officer
PIB Group
-
Vendor showcase

Explore cutting-edge solutions and innovations firsthand at our vendor showcase

-
Networking Lunch & Exhibit Stands

Indulge in a networking lunch while exploring latest innovations at our Exhibit Stands!

-
Panel Discussion: Diversity and the Cybersecurity Talent Pipeline

Join industry leaders in a thought-provoking panel discussion on Diversity and the Cybersecurity Talent Pipeline, exploring strategies to foster inclusivity and bridge the gap in this critical sector.

Speaker
Stott and May Consulting
Diversity Cyber Research and Consulting
-
Boardroom Appointments

Cybersecurity Festival attendees are assigned into peer groups of 10-12 based on business focus and technology interests. Vendors meet with the boardroom groups for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Afternoon Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Afternoon Networking Break!

-
How war overseas effects the cyber landscape in the UK

Explore the intricate relationship between international conflicts and the cyber landscape in the UK, uncovering the ripple effects and strategic implications in this enlightening session.

-
Vendor showcase

Explore cutting-edge solutions and innovations first-hand at our vendor showcase.

-
How do you look after your staff in wake of an attack?
Discover essential strategies for supporting your staff in the aftermath of a cyber attack, ensuring their well-being and resilience as you navigate the challenges together
-
Impact of AI and how it could generate bespoke, targeted attacks at scale.

Dive into the transformative power of AI and its potential to revolutionize cyber attacks, as experts unveil the nuances of bespoke, targeted assaults at an unprecedented scale. Explore the implications, challenges, and opportunities shaping the cybersecurity landscape in this captivating session.

Speaker
Chief Security advisor
Microsoft
-
Closing Remarks

As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.

Speaker
Editor
Computing