Agenda
Tuesday 4th March | |
08:00 - 08:50 |
Breakfast Networking & Registration |
08:50 - 09:00 |
Chairman's Welcome |
09.00 - 09.20 |
►When Cybersecurity is National Security: A challenge in Leadership Cdr David Wilcocks MBE, Chief of Staff Cyber Defence At Defence Digital, MoD
|
09.20 - 09.40 |
►Having an Identity Crisis in the Age of Digital Dependency James Maude, Field Chief Technology Officer, BeyondTrust
|
09.40 - 10.00 |
►Fortify your Contact Centers against Fraudsters Sumant Mauskar, Senior Vice President, Sales and Global Partners, Pindrop
|
10.00 - 10.20 |
►Business Risk Management: Building and Leveraging Threat Intelligence to Enhance Operational Resilience Valentina Soria, Global Head of Cyber Threat Intelligence, UBS
|
10:20 - 11:00 |
► Education Seminar 1 Delegates will be able to choose from a range of topics:
|
11.00 - 11.30 |
Networking break |
11.30 - 11.50 |
►Value of a just Culture in Cyber Security – Insights from Health and Care Phil Huggins, Director for Cyber Policy and National CISO for Health & Care, DHSC
|
11.50 - 12.10 |
►Hacking Humans for Fun and Profit James Moore, CEO, CultureAI
|
12.10 - 12.30 |
►The Day-After Mindset – A Modern Cyber Resilience Approach Michael Adjei, Director, Systems Engineering, Illumio
|
12.30 - 12.50 |
►The Trust Imperative: Reinventing Digital Identity for a Secure B2B Future Alex Laurie, SVP Global Sales Engineering and Go-To-Market Programs, Ping Identity
|
12.50 - 13.30 |
► Education Seminar 2 Delegates will be able to choose from a range of topics:
|
13:30 - 14:30 |
Lunch Networking Break |
14.30 - 14.40 |
Chairman's Address |
14.40 - 15.00 |
►Fireside Chat: Protecting the Connected Future Simon Brady, Event Chair, AKJ Associates, Moderator
|
15.00 - 15.20 |
►The Human Edge: Evolving Security Culture in the Age of AI Noora Ahmed-Moshe, Vice President of Strategy and Operations at, Hoxhunt
|
15.20 - 15.40 |
► Seeing Cyber Risk Differently: The Impact of a Human-Centric Strategy Alistair Mills, Director, Sales Engineering, Proofpoint
|
15:40 - 16.00 |
Networking break |
16.00 - 16.30 |
►The Greatest Threat or an Amazing Opportunity: Quantum Computing and Cybersecurity William (Bill) J Buchanan OBE, Professor, School of Computing, Edinburgh Napier University
|
16.30 - 17.00 |
►Future-Proofing Security Architectures Simon Brady, Event Chairman & Managing Editor, AKJ Associates (Moderator)
|
17.00 - 18.00 |
Drinks Reception & Networking Break |
Wednesday 5th March | |
08.00 - 09.00 |
Breakfast Networking & Registration |
09.00 - 09.10 |
Chairman's Welcome |
09.10 - 09.30 |
►Building a New Approach to Government and Public Sector Cyber Security Alex Harris, Head of Future Cyber Capability, Cabinet Office
|
09.30 - 09.50 |
► Key Insights for Security Leaders: CrowdStrike 2025 Global Threat Report John Spencer, Engineering Director - Northern Europe, Crowdstrike
|
09.50 - 10.10 |
►Why Exposed Personal Data Might be Your Biggest Cybersecurity Blind Spot John Gilmore, Director of Research, DeleteMe
|
10.10 - 10.30 |
►OT Cloud Architecture, Security and Resilience by Design Peter Kaela, Lead Cybersecurity Architect, Scottish Power Energy Networks
|
10.30 - 11.10 |
► Education Seminar 3 Delegates will be able to choose from a range of topics:
|
11.10 - 11.40 |
Networking break |
11.40 - 12.00 |
►Quantum Computing and the Future of Security: HSBC's Strategy to Combat Emerging Threats Philip Intallura, Group Head of Quantum Technologies, HSBC
|
12.00 - 12.20 |
►Security through Continuous Threat Exposure Management Ben Jones, CEO, Searchlight Cyber
|
12.20 - 12.40 |
►Your Backups Won’t Save You John Anthony Smith, Founder and Chief Security Officer, Fenix24/Conversant Group
|
12.40 - 13.20 |
► Education Seminar 4 Delegates will be able to choose from a range of topics:
|
13:20 - 14:20 |
Lunch & Networking Break |
14.20 - 14.40 |
►Making UK Aviation Cyber Safe - A Regulator’s Perspective Peter Drissell, Director Aviation Security, UK Civil Aviation Authority
|
14.40 - 15.00 |
►The Role of AI in Understanding and Mitigating the UK's Threat Landscape Ali Uzun, Senior Solutions Engineer (EMEA & UKI), SOCRadar |
15.00 - 15.20 |
►AI in Cybersecurity: Defending Against the Next Generation of Threats Richard Orange, VP of Sales, EMEA, Abnormal Security
|
15.20 - 15.50 |
Networking Break |
15.50 - 16.10 |
►0-Day Bingo: Depth in Incident Response Rob Flanders, Head of Threat and Incident Response, BAE Systems
|
16.10 - 16.50 |
►Panel Discussion: Battling Nation-State Hackers: Winning the Cyber War Simon Brady, Event Chairman & Managing Editor, AKJ Associates (Moderator)
|
16.50 - 17:00 |
Chairs Closing Remarks |
Education seminars
From Cyber Security to Cyber Resilience
Ian Wood, Senior Director EMEA North Sales Engineering, Commvault
Threats are exponential, AI is only accelerating, and “cloud-first” is no longer a distant vision, but the reality of every global enterprise. Join Commvault as they share powerful insights into the constantly evolving cyber-attack surface and demonstrates the importance of why a focus on creating an optimised cyber resiliency strategy is imperative.
Attendees will learn:
- Why the traditional model of attack surfaces is not sufficient to describe the evolving threat landscape.
- The divide between infrastructure and security teams in an organisation and how to bridge it.
- Why cyber recovery is more than disaster recovery and how to build an optimal cyber recovery plan.
- Building a strategic approach to fully focus on risk, readiness, recovery... and resilience.
How to Align Cyber and Geopolitical Intelligence to Navigate Global Risks
Lukas Vaivuckas, Solutions Consultant, Silobreaker
David Hunt, Senior Product Manager, Silobreaker
In today’s volatile global landscape, the convergence of geopolitical and cyber threats creates complex challenges for organisations worldwide. Understanding how these issues intersect is essential for threat intelligence teams, who are tasked with helping stakeholders to anticipate risks that may disrupt operations, impact security, and affect business continuity. This talk, based on key findings from a new multi-industry study, will explore practical approaches for aligning cyber and geopolitical intelligence to navigate global risks.
Attendees will learn:
- Structure Priority Intelligence Requirements (PIRs) for geopolitical and cyber risks.
- The value of integrating between infosecurity and geopolitical risk domains.
- Identify patterns and correlations between geopolitical crises and cyber risk across industries to enhance response and resilience.
- Shift from reactive to proactive threat intelligence, providing stakeholders with timely insights on potential threats and impacts.
Mapping the Human Perimeter: Understanding and Mapping Modern Cybersecurity Threats
Oliver Simonnet, Lead Cybersecurity Researcher, CultureAI
The security game has changed. Your perimeter isn't just your office anymore - it's everywhere your people are. This shift has made understanding human risk critical, transforming our focus from securing individual endpoints to protecting individuals themselves. In this session, we'll explore the concept of the "human perimeter" and how organisations can develop a structured approach to managing human risk. We'll introduce the concept of human threat mapping to identify and assess the risks posed by employee behaviour in an increasingly decentralised workforce.
Attendees will learn:
- How the cybersecurity perimeter has evolved over the past decade.
- Why Human Risk Management is now essential for all organisations and how to integrate this into existing cybersecurity frameworks.
- The fundamentals of human threat mapping: tools, techniques, and methodologies.
Zero Trust in An AI World – Moving From Talk to Action
Michael Adjei, Director, Solutions Engineering, Illumio
In the face of evolving threat landscape, it is no longer a matter of if you are targeted by threat actors but rather when you are targeted. This fact is further amplified by the pervasive use of AI across various digital platforms today. How can organisations set themselves up to survive and thrive after an attack? This session will focus on how to implement zero trust principles to ensure critical business operations can continue during and after a cyber incident.
Attendees will learn:
- Rethinking cyber resilience in favour of ease of operationalisation.
- Key considerations for an effective defence-in-depth strategy.
- Pragmatic steps on business continuity through an adaptive security posture.
Addressing Email Misdelivery — A Human-Centric Approach
Alistair Mills, Director, Sales Engineering, Proofpoint
Email misdelivery is a persistent yet often overlooked risk in cybersecurity. Whether it’s sending sensitive information to the wrong recipient or accidental exposure of confidential data, the consequences of email misdelivery can be severe.
Attendees will learn:
- The Risk of Email Misdelivery: Understanding the types of misdelivery events and their potential impact on data security, compliance, and business reputation.
- AI-Powered Prevention: How machine learning and behavioural analytics can automatically detect and prevent email misdelivery before it happens.
- Integrating Email Security: The benefits of combining email misdelivery protection with broader human-centric security strategy for comprehensive risk mitigation.
Transforming Cybersecurity Culture: Venator’s Blueprint for Behaviour Change Building
Noora Ahmed-Moshe, Vice President of Strategy and Operations, Hoxhunt
Ian Littlefair, Head of Cybersecurity, Venator Materials
Building a strong security culture is critical for addressing the human element in cybersecurity. In this session, Noora Ahmed Moshe, Vice President of Strategy and Operations at Hoxhunt, and Ian Littlefair, Head of Cybersecurity at Venator Materials—a global leader in the chemical industry—share how Venator successfully transformed its cybersecurity strategy by embedding behaviour change into its culture. Gain insights into how Venator tackled human risk management challenges, implemented tailored training programs, and fostered psychological safety to empower its workforce. Learn how leadership alignment, positive reinforcement, and actionable insights can drive meaningful behaviour change and resilience against evolving threats.
Attendees will learn:
- How Venator overcame key challenges in managing human risk.
- The role of tailored, continuous training in fostering secure behaviours.
- Strategies to create a culture of psychological safety that encourages positive engagement.
- Why leadership alignment and data-driven insights are essential for sustained change.
- Proven techniques to transform employees into your strongest cybersecurity defence.
Enhancing Privileged Access Security: Silverfort and Microsoft AD Tiering in Action
Kev Smith, Strategic Principal Sales Engineer - EMEA, Silverfort
Scott Goodall, Commercial Sales Manager UKI, Silverfort
As cyber threats grow exponentially sophisticated, securing privileged access has become a top priority for organisations worldwide. With identity-based attacks on the rise, safeguarding privileged resources is no longer optional - it’s essential. This session will explore how Silverfort, in conjunction with Microsoft AD Tiering best practices, provides a proactive defense against unauthorized access and lateral movement.
Attendees will learn:
- Best practices for structuring and securing privileged resources using Microsoft AD Tiering.
- How Silverfort’s patented technology enables visibility into authentication patterns across users, machines, and service accounts.
- Strengthening AD Tier protection with Silverfort’s Privileged Access Service and Just-In-Time access control.
Paths to Privilege - The Battleground in Identity Security
James Maude, Field Chief Technology Officer, BeyondTrust
A deeper dive into the world of identity threats, risks and mitigations drawing on examples from real world attacks.
Attendees will learn:
- Paths to Privilege - the often-overlooked routes that attackers exploit to escalate privileges and access critical systems.
- The challenges around securing identities and how MFA might not be as secure as you think.
- Explore common blind spots and misconfigurations that leave organisations vulnerable.
- This session will include practical recommendations of things to consider for reducing the attack surface in your own environment.
The Security Gap No One Talks About
John Wood, Senior Regional Sales Manager, Contrast Security
For years, organisations have relied on a simple security model: find vulnerabilities early, fix them before deployment. This approach sounds reasonable - until we confront the reality of modern cyber threats. Real-world cyber threats occur against live production applications, not pre-production environments. Cybercriminals exploit gaps—zero-days, unpatched dependencies, and hidden misconfigurations—as soon as they emerge. Join John Wood from Contrast Security to explore the future of application security with real-time protection and intelligence.
Attendees will learn:
- Why traditional security approaches fail against production threats.
- How modern attacks bypass static testing and legacy security tools like WAFs.
- The importance of real-time application security and detection (ADR).
- New techniques for measuring risk and building resilient applications.
Fighting Misinformation and Fraud in a Deepfake Era
Adam Shearn, Solutions Engineer, UK, Pindrop
AI-powered voice fraud is a major cybersecurity threat. Pindrop will show how criminals use synthetic voices to bypass authentication, demonstrate real attacks, and present solutions to detect and combat this threat. It's time to rethink voice security in the AI era.
Attendees will learn:
- AI is changing the way we see and hear information. With the rise of deepfakes, so does misinformation and fraud.
- The human ear can detect synthetic voice only 60% of the time. How do we close the 40% gap?
- Learn how deepfakes are becoming more sophisticated and how “good AI” needs to be ready to combat “bad AI”.
The Ever-Evolving Threat Landscape: Staying Ahead of Adversaries
Craig Hinchliffe, Regional Sales Engineer, Crowdstrike
Cyber adversaries are evolving rapidly, using sophisticated techniques to breach organisations faster than ever. With breakout times shrinking, security teams have minimal time to detect and respond before damage occurs. To stay ahead, businesses need real-time visibility, proactive intelligence, and AI-powered detection to outpace modern threats.
Join CrowdStrike as we dive into the latest intelligence on how adversaries operate and, more importantly, how to stop them before they gain a foothold in your environment.
Attendees will learn:
- How to identify unknown risks and exposures in real time – Attackers are constantly probing for vulnerabilities, whether in external-facing assets or within cloud environments. Learn how to map and mitigate risks before they become entry points for intrusion.
- Falcon Shield: What is it? Why is it important? And why now? – Discover how CrowdStrike Falcon Shield is redefining proactive defence, offering real-time attack surface monitoring and automated threat disruption to keep organisations secure against evolving threats.
- Leveraging AI-powered detection and response to disrupt adversaries faster – With AI-driven detection and intelligence-led response, security teams can move from reactive to proactive defence, neutralising threats before they escalate into full-blown incidents.
B2B(2X) Under Siege: The Billion-Dollar Economy You Are Funding
Rob Otto, EMEA Field CTO, Ping Identity
In the era of B2B(2X), where organisations must seamlessly connect with customers, partners, and suppliers, identity must be treated as the new security perimeter. Traditional authentication methods are failing, leaving businesses exposed to costly breaches, operational disruption, and reputational damage. Security leaders must rethink identity strategies to stay ahead. This session will break down the latest innovations in identity security—so you can eliminate threats before they strike, enable frictionless user experiences, and future-proof your organisation against the competition. If you think MFA is enough, think again. Identity is your first line of defense, how will you ensure it's built to win?
Attendees will learn:
- B2B(2X) at Risk – How stolen credentials and third-party access create new vulnerabilities in extended business ecosystems.
- AI-Powered Fraud is Here – How attackers are using automation to bypass traditional identity defenses.
- Beyond Passwords: The Future of Authentication – Passkeys, behavioral biometrics, and invisible security.
- Frictionless, Secure Access – Achieving airtight security while ensuring seamless B2B(2X) interactions.
- Lessons from the Front Lines – How leading enterprises are securing identity across B2B(2X) networks.
Ransomware in the Real World: What No One Prepares For
John Anthony Smith, Founder and Chief Security Officer, Fenix24/Conversant Group
Most organisations believe their cybersecurity program includes a clear path to recovery after a ransomware attack. In reality, it’s the hidden complications that cause businesses to suffer the most. This session breaks down the breach patterns that lead to widespread failures, the tactics of modern-day threat actors, and the critical missteps most organisations make when securing their backups.
Attendees will learn:
- How ransomware attacks unfold.
- Why “having backups” isn’t the same as being able to recover.
- Why restoration isn’t just about data, but full business operations.
- Proven recovery strategies that minimize downtime and financial loss.
Gathering Intelligence From the Dark Web
Robert Fitzsimons, Lead Threat Intelligence Engineer, Searchlight Cyber
In this seminar, Searchlight Cyber will walk through real-life case studies to demonstrate how organisations can effectively gather intelligence from the dark web to inform their security, based on extensive work with both public and private sector entities.
Attendees will learn:
- How to identify an active threat against your organisation by monitoring dark web sites.
- Spotting exploit development to inform CVE prioritization and patch management.
- How to gather intelligence on a specific dark web threat actor.
Harder, Better, Faster, Stronger
Chris Jones, Senior Advanced Consulting Engineer, Tanium
In this session Chris Jones, will delve into the key things organisations need to consider when building a robust cybersecurity strategy.
Attendees will learn:
- Cybersecurity is getting Harder. How can organisations be secure when they have less people, a larger estate and a larger attack surface?
- How can organisations make it Better? The importance of People, Technology and Process.
- Why you need your data Faster? And why Real Time Data Measured in Milliseconds is imperative.
- How to make your organsation Stronger with Visibility, Control, and Remediation.
The AI Threat: Protecting Your Email from AI-Generated Attacks
David Lomax, Senior Engineering Manager, EMEA, Abnormal Security
As cybercriminals leverage AI to craft highly sophisticated and targeted attacks, traditional email security solutions are struggling to keep up. In this session, David Lomax, Senior Engineering Manager, EMEA, will explore how AI is reshaping the threat landscape—and how organisations can fight back using AI-driven defences.
Attendees will learn:
- The evolution of email-based threats and the rise of AI-powered attacks.
- How cybercriminals use AI to bypass traditional security measures.
- Why behavioural-based AI is the key to stopping these attacks.
- Real-world examples of AI-generated threats stopped by Abnormal.
Escaping Security Dogma: How Data and Evidence Are Redefining Security Awareness, Culture, and Human Risk Management
James Beary, Global Sales Director, CybSafe
Security awareness programs have long been driven by dogma rather than data, often leading to ineffective and misaligned security outcomes. This session will challenge conventional security thinking and reveal why outdated approaches to security awareness and culture are unraveling. Drawing on behavioral science, data analytics, and real-world evidence, James will highlight key industry shifts, emerging trends, and the critical role of human risk management in modern cybersecurity. Demystifying which metrics truly matter, helping security leaders measure and prove the real impact of their efforts.
Attendees will learn:
- Identifying, targeting, and influencing long-term security behaviors.
- Quantifying your human cyber risk.
- Orchestrating an impactful plan of action with measurable outcomes.
Demystifying Challenges in Personal Data Removal
John Gilmore, Director of Research, Delete Me
Scrubbing your digital footprint seems like a simple problem on the surface. But tackling this problem at scale quickly becomes a complex endeavour. Layer on unethical vendor practices and misleading claims of effectiveness and the picture suddenly becomes murky and confusing to navigate.
Attendees will learn:
- What you need to understand about data removal claims and ethical practices.
- How vendors are reporting on efforts and obfuscating actual results.
Connecting Data Security to the Identity Fabric
Dave Philpotts, Sales Engineer, Varonis
Data and access events are tied intrinsically to identity. Security teams monitor data access and administration by focusing on the “who?” of an action, including non-human identities like machine and service accounts. That’s why effective data security platforms must intrinsically incorporate the identity context, otherwise known as the identity fabric.
Attendees will learn:
- How cyberattacks start with an identity exploit and end with data compromise.
- Why identity posture is important for data security.
- Where ITDR can stop breaches before it's too late.
- What measures to take in integrating identity and data.
CISO Secrets: Strengthening Cyber Resilience in 2025
Andy Dreier, Sales Engineer, Varonis
In 2025 we’re already seeing an increase in AI-driven attacks, alongside the hidden risks of cloud adoption and ever-present insider threats. It's becoming harder than ever to ensure your data is secure. In this session, we’ll explore how a data-centric, identity-first approach, combined with automation and DSPM, can advance your security posture and help your organisation stay ahead of these emerging threats. We’ll share the security playbook created from conversations with top CISOs and other cybersecurity leaders across manufacturing, finance, and other industries.
Attendees will learn:
- Discover where top CISOs are focusing their efforts in 2025.
- Understand how hackers are logging in, not breaking in.
- Feel prepared to tackle AI security safely and securely.
- Better understand IaaS and SaaS security to strengthen your cloud data defences.
- How to use automation to improve your security posture and combat threats.
Cyber Attacks Targeting the UK
Ali Uzun, Senior Solutions Engineer (EMEA & UKI), SOCRadar
Ransomware attacks are a growing crisis, with cybercriminals extorting millions from businesses worldwide. This seminar explores real-world lessons from $100M ransomware cases, revealing the psychology, tactics, and strategies behind successful ransomware negotiations. Attendees will gain practical insights into managing crisis teams, understanding ransom demands, and negotiating with threat actors. By learning the art of negotiation, participants will be better equipped to minimise damage, protect their data, and turn the tables on cyber extortionists.
Attendees will learn:
- Understanding Ransomware Threats – How ransomware groups operate and set ransom demands.
- Key Negotiation Strategies – Setting limits, verifying threats, and managing crisis communications.
- Tactics to Reduce Ransom Payments – Extending negotiations, leveraging strategic offers, and psychological techniques.
- Post-Negotiation Best Practices – Ensuring data recovery, reporting incidents, and strengthening future defences.