Date and Time | Title | |
---|---|---|
Jun 12, 2025 9:00am - 9:20am (London) | Chair's Opening Address | ![]() |
Jun 12, 2025 9:20am - 9:55am (London) | Identity at the Core: Securing Access in a Perimeterless World In a cloud-first, hybrid-work era, identities—not networks—form the new security perimeter. This session explores how modern identity security strategies are critical to safeguarding digital assets, preventing insider threats, and ensuring compliance. Learn how enterprises can move beyond traditional IAM to embrace adaptive authentication, risk-based access control, and unified identity governance to defend against sophisticated identity-based attacks | ![]() |
Jun 12, 2025 9:55am - 10:15am (London) | The Convergence of Networking and Security As the networking landscape evolves, the lines between networking and security are increasingly blurring. In this session, we’ll explore why it’s critical for organisations to think about network and security together, and how this convergence is reshaping IT infrastructure. With the rise of Secure Access Service Edge (SASE), CIOs and IT leaders must rethink traditional approaches to network security and observability.
We’ll dive into the benefits of converging network and security providers, from simplified management and enhanced performance to improved security posture. Join us to understand how this convergence can streamline operations, improve agility and drive stronger, more secure business outcomes in today’s complex, cloud-first world. | ![]() |
Jun 12, 2025 10:15am - 10:30am (London) | 2025 State of AI-Driven Security Automation: How Security Teams Are Moving From Manual Response to Autonomous Execution Based on a survey of over 1,000 security leaders and practitioners, this session reveals how AI-driven automation is reshaping the SOC. As attack speed increases and team capacity is stretched, automation is becoming a core operational function. The presentation outlines where organizations are making real progress, where friction remains, and what defines teams that are deploying faster and responding with greater precision.
Join this session to learn:
- Why Time to Automation (TTA) is becoming a leading metric of execution readiness and what fast-moving teams are doing differently
- Where agentic AI is gaining traction in threat detection, response, and policy enforcement, and how teams are building in oversight and auditability
- What structural changes, like centralized automation teams and low-code tooling, are helping organizations reduce complexity and scale automation across the SOC | ![]() |
Jun 12, 2025 10:30am - 11:05am (London) | KEYNOTE: Holly Foxcroft - How to stay cautious in our new world of AI adoption In this lightning talk, we will address how to approach AI and security tools in general with a risk aware approach. As businesses seek innovation and looking to seek ways of the ‘new and shiny’ tech on the market, how do we make sure the cyber teams approach ways of ensuring it’s not only a safe option, but also cost affective and needed for the business – not just because everyone else has it! With more than 15 years of experience in cyber security—encompassing military service, academia, and the private sector—Holly brings a wealth of expertise in aligning security with commercial interests to drive stronger cyber resilience. She is a recognised leader in the cyber security industry, celebrated for her work, research, and advocacy (particularly in championing neurodiversity), and was honoured earlier this year by being appointed a UK Ambassador to the Global Council for Responsible AI. | ![]() |
Jun 12, 2025 10:55am - 11:20am (London) | The Curse of Cybersecurity Knowledge Cybersecurity professionals often experience a unique perspective—witnessing potential threats that remain invisible to others. We observe the everyday actions that could lead to breaches: the casual insertion of unknown USB drives, the clicking of suspicious links, the courtesy of holding doors for strangers, and confidential documents mistakenly discarded in regular trash.
Rather than viewing this heightened awareness as a burden, this session explores how to transform it into an organisational asset. We'll examine practical strategies for communicating security concerns effectively through compelling narratives, accessible language, and well-timed interventions.
Discover how to channel your expertise into creating a security-conscious culture that empowers colleagues rather than alienating them. Join us to learn how your security Insights can become the foundation for positive organisational change rather than a source of frustration. | ![]() |
Jun 12, 2025 11:20am - 11:35am (London) | KEYNOTE – Ant Davis - Tell Better Stories, Build Better Security What makes a security message stick? In this talk, Ant Davis explores how storytelling can turn everyday moments into powerful lessons in cybersecurity. Forget nudges and tick boxes. If we want people to care, remember, and act, we need to speak in stories they can relate to. This is about making security human, memorable, and meaningful. | ![]() |
Jun 12, 2025 11:35am - 12:00pm (London) | Measuring what matters – Enhance security awareness through behavioural science and data Traditional security awareness metrics often focus on surface-level indicators, such as training completion rates or phishing click rates. that fail to capture meaningful behavioural change. The key question is: Are you measuring performance or real impact? In this talk, ThinkCyber's CEO and Co-founder, Tim Ward, will discuss how to transition toward metrics that reflect genuine behavioural changes while ensuring compliance and effectively measuring the impact of your security awareness initiatives. Tim will cover what to measure to provide deeper insights into security culture, the tools available for tracking progress over time, and how to present these findings effectively to leadership. By leveraging behavioural science and meaningful data, organizations can move beyond compliance and successfully influence employee behaviours, thereby reducing operational risks and enhancing their overall security posture. | ![]() |
Jun 12, 2025 12:00pm - 12:23pm (London) | GAMMA VIP LUNCH - Convergence: The Future of Security? Let’s Discuss Our view? Convergence is here, blurring the lines between cyber security and networking. Over lunch, we’ll open the floor to hear your perspective. Where do you stand on convergence and how is it influencing the way you define and strengthen your security posture? £30 lunch to the first 10 attendees that join - £15 lunch to all others that complete the session. | |
Jun 12, 2025 1:00pm - 1:25pm (London) | The Future of Identity Protection: AI Meets ITDR As digital identities multiply and become prime targets for threat actors, Identity Threat Detection and Response (ITDR) emerges as a critical pillar in modern cybersecurity. This session explores how organisations can integrate ITDR strategies to secure hybrid Active Directory (AD) environments and beyond. We’ll examine real-world statistics, attack vectors, and the role of tools like Netwrix Threat Manager, Access Analyzer, and PingCastle. Crucially, we will discuss how artificial intelligence is enhancing detection accuracy, accelerating incident response, and transforming ITDR into a proactive defense mechanism. Learn how AI is shaping the future of identity protection and what steps your organization can take now to stay ahead of evolving threats. | ![]() |
Jun 12, 2025 1:25pm - 1:50pm (London) | Cyber Resilience in the Age of AI: Navigating Technology, Threats and Regulations As artificial intelligence reshapes the digital landscape, organizations must confront new cyber threats, manage exponential data growth, and adapt to evolving regulatory frameworks. In this session, Drew Gibson, Security Product Advisor at Splunk, explores how organizations can build cyber resilience to absorb disruptions—both malicious and non-malicious—while maintaining business continuity. From the challenges of hybrid environments to the opportunities and risks introduced by AI, this session provides actionable insights into navigating complexity and aligning security strategies with operational needs.
Key takeaways include:
- Data Prioritization: Managing critical data efficiently, reducing fragmentation, and adapting to hybrid and multi-cloud environments.
- AI in Security: Leveraging AI to enhance detection, streamline response times, and address anomalies effectively.
- Regulatory Resilience: Integrating compliance into daily operations to meet standards like DORA and GDPR while ensuring business continuity.
- Risk vs Reward: Balancing AI-driven opportunities with risks like expanded attack surfaces, inaccurate model outputs, and evolving threats to ensure a resilient security posture. | ![]() |
Jun 12, 2025 1:50pm - 2:05pm (London) | KEYNOTE – Lee Morton - The Trust Paradox: Can Trust Be Lost, or Must It be Earned Why are suppliers trusted, while employees are vetted and only given trust after checks or probation. Highlighting the contrasting expectations between trusted suppliers and new employees, emphasising the tension between automatic trust and rigorous vetting | ![]() |
Jun 12, 2025 2:05pm - 2:30pm (London) | Securing the Chain: Prevent Third Parties from becoming the weakest link in your Cyber Defences In an interconnected world, supply chains are crucial to business, yet they are increasingly vulnerable to cyber threats.
There are no shortage of media stories to highlight this point. Many organisations often overcomplicate vendor assurance activities, leading to inefficiencies and gaps in security.
We will explore common pitfalls in current vendor assurance practices and illustrate how overcomplicated procedures can hinder effective security measures.
The session will address how to efficiently and robustly ensure that third parties don’t become your organisations weakest link. | ![]() |
Jun 12, 2025 2:30pm - 2:55pm (London) | 2025 Cybersecurity Predictions. Join this session to see what our experts predict will happen in the cybersecurity space in 2025. Defending your business, data, and employees from cyberattacks in 2025 will become increasingly difficult. Not only are bad actors doing their best to crack your defenses, but their AI assistants will make it easier for them to launch highly targeted and advanced attacks. During this session we will review the new attacks we expect to see in the coming year, including:
| ![]() |
Jun 12, 2025 2:55pm - 3:20pm (London) | From Data Security Blind Spots to Recovery: Close Your Cyber Resilience Gaps Traditional cybersecurity defenses alone won’t cut it anymore. Organizations need a resilient, well-rounded strategy for fast, clean recovery and continuity. Druva’s Cyber Resilience Maturity Model helps you boost cyber resilience, protect data, and speed up recovery. Ready to level up yet?
Learn how to:
• Assess your organisation's readiness across five critical levels of cyber
resilience.
• Leverage proactive monitoring and automation for faster threat detection
and efficient recovery.
• Uncover security blind spots and address gaps in incident response and
recovery.
• Enhance data immutability, security, and cyber remediation to reduce
business impact | ![]() |
Jun 12, 2025 3:20pm - 3:45pm (London) | Innovation and Resilience for AI and Security | ![]() |
Jun 12, 2025 3:45pm - 4:10pm (London) | SIEMless Outcomes Breaking free from SIEM: The future of AI-driven security operations.
- Why are traditional SIEMs becoming outdated, and what challenges do they pose for modern security teams?
- How can AI-driven security operations deliver SIEM-like outcomes without the cost and complexity?
- What real-world examples show how lean security teams are detecting and responding to threats faster with AI? | ![]() |
Jun 12, 2025 4:10pm - 5:00pm (London) | Live Fireside Chat with Marcus Hutchins and Sarah Armstrong Smith This promises to be a session not to be missed! Remember to submit your questions during the session and Sarah will try and get as many over to Marcus as possible | ![]() |
Jun 12, 2025 5:00pm - 5:25pm (London) | Dean's Bonkers Cyber Quiz Join Dean for a live quiz with Amazon voucher giveaways! |