Agenda preview

Speakers coming soon...

-
Registration

Pick up your conference badge and personalised itinerary at registration, then pop back any time you have questions that you need answered or feedback that you would like to share

-
Welcome & Opening Remarks from Computing

Embark on an enlightening journey as Computing extends a warm welcome and delivers opening remarks, setting the stage for a day filled with insightful discussions and innovative solutions in the realm of cybersecurity.

-
Keynote Address

Prepare to be inspired as our keynote speaker delivers a thought-provoking address on the cutting-edge trends and challenges in cybersecurity. Gain valuable insights and a fresh perspective on securing our digital future.

-
TCC Research

Delve into the latest findings from The Channel Company's Research, uncovering critical insights and trends shaping the cybersecurity landscape. This session will provide attendees with data-driven perspectives to inform their security strategies.

-
Vendor Showcase

Explore innovative cybersecurity solutions during our fast-paced Vendor Showcase. Get a sneak peek at cutting-edge technologies and services designed to enhance your organization's security posture.

-
Boardroom Appointments

Delegates are assigned into peer groups of 12-15 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Morning Networking Break!

-
Fireside Chat
Explore the critical question of whether cyber insurance is worth the investment in this insightful session. Delve into the complexities, benefits, and potential pitfalls of cyber insurance coverage to make informed decisions that fortify your organization's resilience against digital threats.
-
Vendor Showcase

Another opportunity to discover game-changing cybersecurity products and services. This quick showcase highlights additional vendors and their unique offerings to address your security challenges.

-
Boardroom Appointments

CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Networking Lunch & Exhibit Stands

Indulge in a networking lunch while exploring latest innovations at our Exhibit Stands!

-
Vendor Showcase

Kick off the afternoon with an extended Vendor Showcase, featuring in-depth demonstrations of leading-edge cybersecurity tools and platforms. Engage directly with solution providers to find the perfect fit for your organization's need.

-
Boardroom Appointments

Cybersecurity Festival attendees are assigned into peer groups of 10-12 based on business focus and technology interests. Vendors meet with the boardroom groups for 25 minutes, presenting new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Afternoon Networking & Refreshments Break

Fuel up and network with peers over refreshments at our Afternoon Networking Break!

-
Panel Discussion
Join industry experts for a lively panel discussion on pressing cybersecurity topics. Gain diverse perspectives, practical insights, and actionable strategies as our panellists debate current challenges and future trends in the field.
-
Closing Keynote

Conclude the day with an inspiring closing keynote that synthesizes key learnings and provides a forward-looking vision for the cybersecurity industry. Leave energized and equipped with new ideas to tackle tomorrow's security challenges.

-
Computing Closing Remarks

As the curtains draw to a close, join us for heartfelt closing remarks, reflecting on the day's enlightening discussions and charting a course for continued collaboration and advancement in cybersecurity.