2024 Agenda

We've introduced a technical rating to help you understand the complexity of our workshops - learn more about our technical rating here.

8:00 AM - 9:00 AM
 
 
9:00 AM - 9:10 AM
 
 
9:10 AM - 9:55 AM
Delve into AI's security implications and uncover practical insights for maximising its potential in safeguarding digital landscapes.
🔧
10:00 AM - 10:30 AM
Explore how leveraging cyber threat intelligence can help you increase resilience, prioritise security objectives, and achieve regulatory compliance.
🔧🔧🔧
Discover how tailored cybersecurity awareness resonates with different roles and responsibilities, and can drive greater participation and empower individuals to become proactive defenders against cyber threats.
🔧🔧
Discuss how our understanding of insider risk has evolved and discover a far more effective approach, focusing on the human element and behavioural intent through data-driven science.
🔧🔧
10:45 AM - 11:15 AM
Discover how threat actors breach AD/Entra ID/Okta environments, and why hybrid AD recovery planning is vital to operational resilience.
🔧🔧
Uncover how to leverage AI & ML to prepare data for AI applications & LLMs with a focus on maintaining robust data security and privacy standards.
🔧🔧
Explore how a well-executed security nudge can turn a mistake into an opportunity.
🔧🔧
11:30 AM - 12:00 PM
Discover why and how you can gain visibility beyond your third parties, what regulators are saying, and how you can protect your business.
🔧
Dive into the dangers of AI, how it's impacting cybersecurity across the workforce, and what you need to know to build resilience against threats.
🔧
Explore how to take your security awareness to the next level and prevent it from going stale.
🔧🔧
12:00 PM - 1:00 PM
 
 
1:00 PM - 1:30 PM
Uncover how the visibility of your assets, networks, business, and security data impacts vulnerability risk, what scanners miss in discovery and prioritisation, and how to fill in the gaps.
🔧🔧
Explore the indispensable role of artificial intelligence in contemporary defense strategies and why organisations must embrace AI as a linchpin for fortifying their security posture.
🔧🔧🔧
Uncover a comprehensive roadmap that aligns breach resilience with strategic objectives, risk appetite, and regulatory requirements.
🔧🔧🔧
1:45 PM - 2:15 PM
Explore how to measure behavioural change, why it is so important to do so, the measures already used in the industry, and their flaws.
🔧🔧
As China challenges the US in an ever-volatile geopolitical arena, we explore how cyber threat actors have been deployed to assist key objectives outlined by the CCP.
🔧🔧
Discover 5 practical tips that you can apply to regain control, supported by statistics and input from your peers.
🔧🔧
2:30 PM - 3:00 PM
Discover how adopting Zero Trust principles can keep your data safe and operations running, regardless of hacking attempts by man or machine.
🔧🔧🔧
Learn how to achieve and maintain compliance with PCI DSS 4.0 requirements.
🔧🔧
Learn how to harness GenAI to supercharge SOCs, increase efficiency, and reduce technology fatigue.
🔧🔧
3:15 PM - 3:45 PM
Uncover how zero trust architecture enables organisations to gain productivity benefits from AI tools while staying secure in the face of emerging threats.
🔧🔧
Explore the next wave and delve into the rising tide of AI-powered threats and sophisticated automated attacks.
🔧🔧
Discover how you can reduce risks and insurance premiums with threat intelligence and managed detection and response.
🔧🔧🔧
4:00 PM - 4:45 PM
Join our panel of experts to explore the escalating cyber risks related to geopolitical tensions and how we can mitigate them.
🔧
5:00 PM - 6:15 PM
 
 
6:15 PM - 6:30 PM