OLD TRAFFORD FOOTBALL STADIUM, MANCHESTER
6TH FEBRUARY 2025
HEADLINE SPEAKER DAVID WALLIAMS
A look back over the first half of 2025 - how attackers are evolving their tactics and techniques
The introduction of the Cyber Security and Resilience Bill to Parliament highlights that, despite the UK's departure from the EU, future regulations will likely follow international standards. The interconnected nature of global cyber threats makes it impractical to deviate from existing frameworks. By aligning with NIS2, DORA, and GDPR, UK organisations can better prepare for upcoming national regulations and enhance protection against cyber risks. This isn't about rewriting the rulebook—business continuity and data resilience remain central to all cybersecurity regulations. That’s why ensuring your organisation has tamper-proof backups and effective disaster recovery capabilities is key to surviving infrastructure and data threats. Join Kim Larsen, CISO at Keepit and seasoned cybersecurity advisor with experience in NATO, the EU, and international corporations, for insights on:
• Data governance
• Regulatory compliance
• Business continuity strategies
In this session, we explore how Edgescan is transforming the cybersecurity landscape through the integration of AI Insights into our platform. As organisations face increasingly complex threats, the ability to extract actionable intelligence from vast amounts of vulnerability data has become crucial. This presentation will highlight the evolution of AI within Edgescan, showcasing how AI Insights has been designed to enhance the precision, relevance, and effectiveness of vulnerability management.
We will walk through the journey of developing AI Insights, from its initial concept to its current capabilities, which include providing tailored recommendations in key areas such as ransomware, remediation, compliance, and training. The discussion will also cover the technical setup, including data integration and prompt engineering, that ensures the highest levels of accuracy and client-specific relevance.
Overview Coming Soon
In this talk, we will explore the evolving landscape of cybersecurity threats as observed through Cloudflare's extensive network in 2024. Attendees will gain a deep understanding of emerging attack vectors and sector-specific threats, with a particular focus on the alarming year-over-year increase in DDoS attacks. By exploring key trends across Web Application Firewalls (WAF), bot management, threat hunting, and threat events, we will highlight the critical importance of tailored security strategies. Participants will leave equipped with actionable insights and strategies to fortify their defenses against the ever-changing cybersecurity challenges.
Why anticipate the impact?
Techniques effective in healthcare
Benefits and outcomes
ThinkCyber’s CEO Tim Ward will delve into the reasons for implementing security awareness programs within organisations. Is it purely a matter of compliance or does it serve a deeper purpose of empowering employees to protect sensitive information and themselves?
Tim will explore the fundamental question: why invest in security awareness training? He will examine how to ensure these programs work—focusing on the science behind how people learn and retain security knowledge. By applying behavioural science principles, Tim will discuss how organisations can effectively change employee behaviours, reducing operational risks and enhancing overall security posture.
The session will also address key metrics for success. Tim will explore the importance of measuring not attendance or click rate, but the effectiveness of security awareness efforts. Are you measuring performance or real impact?
He will share real-world examples from some of ThinkCyber’s clients to illustrate how to assess the effectiveness of security training and discuss the best practices for ensuring lasting behavioural change.
Deepfakes are getting easier to make but how can they be used in crime? Are they the next tool in the social engineer’s toolkit? From hacked CCTV to cloned RFID cards and quality deepfakes, Jake will uncover what is currently possible when breaking into a business with a little help from AI. Plus learn what happens when you experiment the spread of misinformation and how it can be used in financial crime.
Developing a robust security culture within an organisation is a critical challenge in today's threat landscape. Traditional security awareness programs often struggle to drive lasting behavioural changes. This session explores the power and role of "nudges" – subtle environmental cues and design elements that can positively influence employees' security-related behaviours.
Changing behaviours is a challenging task, changing your organisational culture can be even more difficult. Understanding why social engineering works, or how errors are so frequently made needs a better understanding of oneself. Grounded in the principles of behavioural economics and mindsets, attendees will learn practical strategies to educate, inform, nudge, and ultimately influence the culture of their workforce towards better security practices.
A Kudelski Security Incident Response expert shares stories of what happens behind the scenes while learning tips from someone that sees these attacks happen on the daily.
We as an industry have been heavily focused on the ransomware threat. A loud and dramatic threat that commands the attention of security professionals, governments and CEO’s globally but has possibly diverted some of our resources away from another increasingly concerning threat.
Hacktivists seem like an old adversary that are the concern only of big banks and extractive industry organisations. This is a dangerous assessment. In this talk we will look at the rapid increase in their number, capability and motivation. Who are they? How do they select targets? How are they funded? Why do they pose a threat to you? What discussions do we need to have in 2025 to combat them?
Threat Intelligence is at a critical juncture where traditional methods of threat analysis must evolve to address emerging threats. The challenge lies in determining the best path forward
The talk explored the transformative potential of AI in redefining how humans interact with technology, emphasizing the principle of AI-assisted human progression. Central to the discussion was the recognition that while we often refer to "artificial intelligence," AI is not truly intelligent in the human sense. Instead, it is a combination of advanced machine learning and automation, designed to process data, recognize patterns, and execute tasks at unprecedented speed and scale.
Each year, a team within Synopsys work with 130 firms who participate in an annual study, called BSIMM. In this study, we monitor 126 unique activities that make up companies’ software security initiatives. Since its launch in 2008, the world has changed. Software has changed. And this study has tracked those changes. Sometimes to look forwarded we need to look back.
Join Adam Brown, as he draws from his experience as a BSIMM assessor and software security consultant. In this talk discover some of the current and future trends of software security. And yes, AI will be discussed, though not FUD and hype. Just real security challenges that may arise and how we might deal with them.
This presentation explores the relationship between cyber resilience and cyber insurance, but not in the way you'd think! Rather than looking at the benefits of risk transfer through insurance, we will study real life examples of how intel or requirements from the insurance world has helped organisations improve their maturity and shape cyber risk services on the market.
In the past, compliance efforts have largely centred around providing a snapshot of security at a specific moment. However, with evolving regulations like DORA, NIS2, CRA and others, this approach is becoming outdated. These new standards demand a more dynamic and continuous view of security.
This promises to be a session not to be missed