We've introduced a technical rating to help you understand the complexity of our workshops - learn more about our technical rating here.
8:00 AM - 9:00 AM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 9:10 AM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:10 AM - 9:55 AM | Delve into AI's security implications and uncover practical insights for maximising its potential in safeguarding digital landscapes. 🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:00 AM - 10:30 AM | Explore how leveraging cyber threat intelligence can help you increase resilience, prioritise security objectives, and achieve regulatory compliance. 🔧🔧🔧 | Discover how tailored cybersecurity awareness resonates with different roles and responsibilities, and can drive greater participation and empower individuals to become proactive defenders against cyber threats. 🔧🔧 | Discuss how our understanding of insider risk has evolved and discover a far more effective approach, focusing on the human element and behavioural intent through data-driven science. 🔧🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:45 AM - 11:15 AM | Discover how threat actors breach AD/Entra ID/Okta environments, and why hybrid AD recovery planning is vital to operational resilience. 🔧🔧 | Uncover how to leverage AI & ML to prepare data for AI applications & LLMs with a focus on maintaining robust data security and privacy standards. 🔧🔧 | Explore how a well-executed security nudge can turn a mistake into an opportunity. 🔧🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:30 AM - 12:00 PM | Discover why and how you can gain visibility beyond your third parties, what regulators are saying, and how you can protect your business. 🔧 | Dive into the dangers of AI, how it's impacting cybersecurity across the workforce, and what you need to know to build resilience against threats. 🔧 | Explore how to take your security awareness to the next level and prevent it from going stale. 🔧🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12:00 PM - 1:00 PM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:00 PM - 1:30 PM | Uncover how the visibility of your assets, networks, business, and security data impacts vulnerability risk, what scanners miss in discovery and prioritisation, and how to fill in the gaps. 🔧🔧 | Explore the indispensable role of artificial intelligence in contemporary defense strategies and why organisations must embrace AI as a linchpin for fortifying their security posture. 🔧🔧🔧 | Uncover a comprehensive roadmap that aligns breach resilience with strategic objectives, risk appetite, and regulatory requirements. 🔧🔧🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:45 PM - 2:15 PM | Explore how to measure behavioural change, why it is so important to do so, the measures already used in the industry, and their flaws. 🔧🔧 | As China challenges the US in an ever-volatile geopolitical arena, we explore how cyber threat actors have been deployed to assist key objectives outlined by the CCP. 🔧🔧 | Discover 5 practical tips that you can apply to regain control, supported by statistics and input from your peers. 🔧🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:30 PM - 3:00 PM | Discover how adopting Zero Trust principles can keep your data safe and operations running, regardless of hacking attempts by man or machine. 🔧🔧🔧 | Learn how to achieve and maintain compliance with PCI DSS 4.0 requirements. 🔧🔧 | Learn how to harness GenAI to supercharge SOCs, increase efficiency, and reduce technology fatigue. 🔧🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:15 PM - 3:45 PM | Uncover how zero trust architecture enables organisations to gain productivity benefits from AI tools while staying secure in the face of emerging threats. 🔧🔧 | Explore the next wave and delve into the rising tide of AI-powered threats and sophisticated automated attacks. 🔧🔧 | Discover how you can reduce risks and insurance premiums with threat intelligence and managed detection and response. 🔧🔧🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:00 PM - 4:45 PM | Join our panel of experts to explore the escalating cyber risks related to geopolitical tensions and how we can mitigate them. 🔧 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5:00 PM - 6:15 PM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6:15 PM - 6:30 PM |