Our 2024 Conference Programme Included

Loading
Cloud & Cyber Security Expo Keynote Theatre
  1. Let's Explore the three fundamental building blocks that every organisation needs to strengthen in order to tackle the complexities of cyber threats in the age of AI and Quantum computing. Uncover the ...
  2. In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny postu ...
  3. In the cybersecurity space where professionals need to be seen to be trustworthy and knowledgeable, imposter syndrome can really hinder career development. It is often overlooked, and needs be to addr ...
  4. Join us for a powerful session delving into the critical intersection of mental health and cybersecurity. Our speaker shares his personal mental health journey, setting the stage for an insightful dis ...
  5. The MGM '23 attack caused over 100M$ in losses and halted some of their operations. The Uber '22 attack resulted in complete loss of control of all apps and services. What is common to both attacks is ...
  6. From data breaches to compliance challenges, this session will delve into common concerns surrounding cloud computing and provide actionable insights to fortify your organisation's digital assets. Joi ...
  7. The session will cover the dynamic shift we have seen in Networking and Security programmes as businesses move to a cloud-centric infrastructure and along with the introduction of new, disruptive tech ...
  8. Executives expect teams to explain how data informs their decisions. Enabling staff to make data-driven, informative decisions is key. However, data literacy contains a wide spectrum from regulatory c ...
  9. You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than aga ...
  10.    
Cloud & Cyber Security Expo Theatre 1
  1. This session will cover the importance of building a robust cyber defence that blends proactive and reactive approaches. Explore threat intelligence, predictive analytics, and incident response tactic ...
  2. Operational Technology security breaches can feel abstract – until they hit you. In this session, we’ll hear from cybersecurity experts who’ve witnessed and dealt with OT security breaches first-hand ...
  3. In this session we will explore how individuals from diverse professional backgrounds can leverage their transferable skills to excel in cybersecurity. Our speakers will tell their stories of how they ...
  4. A strategic approach that juxtaposes the intricate process of managing cyber identities with the structured guidelines of the Cyber Assessment Framework (CAF) by the NCSC. It aims to highlight the ali ...
  5. Join us to explore the pivotal role allies play in promoting diversity, equity and inclusion within the cybersecurity sector. We are joined by senior leaders who will explore actionable strategies to ...
  6. In this session, we will explore the current state of email security and the role of automation in combating evolving cyber threats. Join us as we discuss the feasibility, benefits, and challenges of ...
  7. Threat, vulnerability, risk. These are words that are often used loosely or incorrectly. So first off, let’s define exactly what these mean Risk mitigation alone is not enough. Find out why threats ma ...
  8. In a world of cliches and jargon, has cybersecurity become a comms problem rather than a tech issue? Communications plays a central role in preparing for and responding to cyberattacks, but is there a ...
  9. Generative AI has unlocked enormous opportunities in the cybersecurity arena, from streamlined vulnerability management to faster incident response. However, the new attack pathways created as a resul ...
  10. Understand the tools and techniques cyber criminals use to penetrate your defences. Beat them. Using real threat intelligence can determine the severity of a vulnerability based on its ability to caus ...
Cloud & Cyber Security Expo Theatre 2
  1. Join us for a crucial discussion on securing your Cloud organisation. Whether you're just gaining access or seeking to fortify existing defences, safeguarding your Cloud infrastructure is paramount. A ...
  2. Adversaries’ tactics, Techniques, and Procedures (TTPs) are continuously evolving and become more sophisticated. CrowdStrike is continuously monitoring and mitigating these threats and adapting to the ...
  3. Can historical insights help build a better cybersecurity future? In this session we explore how the Managed Service Provider landscape is set to change rapidly over the coming years and how a change ...
  4. With many any organisations already using some kind of automated threat detection solutions, and increased opportunities for the tech such as generative AI will allow users to request event data using ...
  5. As organisations conduct more critical operations in the cloud, managing exposure to cloud cyber risk becomes essential. Join this session to learn about innovations in automated cloud penetration tes ...
  6. Using research and analyses from multiple sources, this session will highlight how to formulate a strategy to reduce visibility gaps and communicate business risk tied to your exposure.   • Least Priv ...
  7. During this session, women cybersecurity leaders will address the pressing gender gap that remains in the field. With women making up just 25% of the cybersecurity workforce, urgent progress needs to ...
  8. Due to the increasingly far reaching and comprehensive digitization and networking of IT and OT infrastructures, new attack possibilities are constantly emerging, such as phishing, SQL injection, rans ...
  9. Session Description (one paragraph and three bullet points): “AI poses new trust, risk and security management requirements that conventional controls do not address.” * The opportunities of AI are as ...
Cloud & Cyber Security Expo Keynote Theatre
  1. Unlock the secrets to building high-performing cybersecurity teams in this dynamic session that intertwines the principles of psychological safety and diversity. Our expert panel will share insights i ...
  2. In today's rapidly evolving threat landscape, organizations face increasing challenges in securing their endpoints. The realm of cloud computing has touched and transformed every industry - this sessi ...
  3. Explore the pivotal role of organisational transformation in cybersecurity implementation, unveiling how it enhances overall business value. Delve into the process of integrating cybersecurity awarene ...
  4. Discover the key elements of effective cybersecurity awareness training in this panel discussion. Our expert panellists will delve into innovative training approaches, share success stories, and offer ...
  5. This talk demonstrates Tools, Techniques and Procedures used to identify, replicate and exploit Active Directory and related weaknesses from the perspective of recent Google Cloud/Mandiant Red Teams. ...
  6. Secure Access Service Edge (SASE) promises to finally close the security gap that’s been opened by the emergence of remote working. SASE essentially allows organisations to apply the same level of sec ...
  7. Though many organisations understand the basics of cyber hygiene, and the importance of ensuring your sensitive data is protected from cyber-attacks, many still fall victim to cyber-attacks due to the ...
  8. As enterprises adopt the cloud, new and broader attack surfaces pose a significant risk to organizations. Most measures of risk focus on vulnerabilities and misconfigurations and ignore active threats ...
  9. Discover best practices for evaluating your cloud environment's security, delve into threat identification, assess overall infrastructure security, and learn to implement effective measures for safegu ...
  10. The AI trend will continue throughout 2024-2025 as more organisations build their AI capabilities for the now and the future. This session will focus on real-world practical methods to safely enable a ...
  11. The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create sophisticated email attacks at scale—void of typos and grammatical err ...
  12.    
Cloud & Cyber Security Expo Theatre 1
  1. The cyber assurance role/function is one that has started gaining serious ground in most maturing organisations. But some others are yet to create or understand the need for this expertise. What does ...
  2. In this session, we will delve into the dynamic landscape of digital sovereignty and its profound impact on global collaboration, particularly for multinational organisations. We will address the secu ...
  3. Discover an engaging case study that highlights DLA Piper's innovative approach to bolstering security awareness using KnowBe4. They successfully fostered a security-focused culture by gamifying user ...
  4. In this session, we will explore the nature of cloud attacks, emphasizing that they are not sudden, two-move checkmates but rather a progression of exploitable vulnerabilities. Our focus will include: ...
  5. Top tips: How to Secure Everything You Build and Run in the Cloud
    As cloud adoption expands, so does the complexity, and keeping pace requires a new approach. Organisations need a solution that deploys without agents in minutes and enables security teams to unify a ...
  6. This session will explore emerging technology solutions, and will dive into discussions on artificial intelligence, machine learning, and other innovations shaping the future of cybersecurity. Discove ...
  7. With the increasing adoption of cloud computing, traditional security measures have proven ineffective, necessitating the emergence of new technologies like CNAPP. Join us as we explore: The Current S ...
  8. Delve into the world of cybersecurity with Wire19's CEO, Munesh Jadoun. Gain valuable insights into proactive cybersecurity measures, threat intelligence, and risk mitigation strategies, including: -P ...
  9. Join Kaseya for a fast-paced session diving into the world of Cybercrimes and how Kaseya’s IT Complete stack is possibly the missing piece to your business. Key Takeaways: • Setting the right security ...
  10. Every reported breach has by definition circumvented existing security measures. Planning to protect alone is insufficient; we must be Breach Ready. • Measurably reducing the internal attack surface a ...
Cloud & Cyber Security Expo Theatre 2
  1. Explore the essentials of data security in our digital age. This session provides actionable strategies to locate, manage, and secure your data, highlighting best practices for data protection, resili ...
  2. To build a cyber resilient organisation you need to focus both on prevention, by raising your security posture, and recovery capabilities, in the assumption that when the worst happens you are operati ...
  3. Just over a year ago, OWASP refreshed its list of the top 10 vulnerabilities. Broken access controls moved up four spots to top the list, and it is followed by cryptographic failures, and injection. T ...
  4. Empathetic leadership in cybersecurity is a pivotal approach that transcends technicalities to prioritise the well-being and concerns of cybersecurity professionals. This style goes beyond conventiona ...
  5. Explore groundbreaking innovations reshaping the cybersecurity landscape. Uncover cutting-edge technologies, strategies, and mindsets vital for defending against ever-evolving threats. Join experts as ...
  6. In today's rapidly evolving landscape of cybersecurity, the integration of artificial intelligence (AI) presents both unprecedented opportunities and complex challenges. Understanding the implications ...
  7. In this session, I’ll detail my journey and the transition from a degree in Electronic and Electrical Engineering to a career in cyber security as an international student. I will cover the essentials ...
  8. Join us for a dynamic discussion on navigating the Cyber space career landscape. Our panel of experts address pressing questions such as the UK's technology skills shortage, ideal entry points into cy ...
  9. Steve Grey (ALSO Cloud UK), discusses the benefits of using artificial intelligence (AI) to improve productivity and efficiency for small and medium-sized enterprises (SMEs) and mid-market businesses. ...
  10. Adversaries are gaining speed every day and organizations need the ability to stay ahead of cyber threats. Yet in today’s complex IT environment, remediating and patching vulnerabilities on endpoints ...
  11. Browsers are the most popular enterprise application yet they lack essential enterprise security capabilities and are the targets of a wide variety of attacks.  Seraphic takes any modern browser and i ...

Attend Cloud & Cyber Security Expo on 12-13 March 2025 at ExCeL London

Cloud & Cyber Security Expo is designed for C-level staff, IT security leaders, managers and key decision makers. No matter the size of your business, or whether you represent the public or private sector, there will be lots of takeaways and goals to achieve at the event.

Register your interest

2024 Sponsors

Platinum Sponsors

google cloud

Platinum Sponsors

pentera

Platinum Sponsors

delinea

Platinum Sponsors

paloalto prisma

Gold Sponsors

lenovo

Gold Sponsors

softcat

Gold Sponsors

vodafone

Gold Sponsors

wasabi

Silver Sponsors

absnormal

Silver Sponsors

rubrik

Silver Sponsors

it complete

Silver Sponsors

ironscales

Theatre Sponsors

ibm

Theatre Sponsors

vultr

Theatre Sponsors

cato

Theatre Sponsors

crowdstrike

Security the cloud stream

technology

Conquering the evolving threat landscape stream

cyber

Building a blueprint for trust stream

business focus magazine

The future of cyber security stream

cyber resilience centre

Fortifying industry 4.0 stream

grc outlook

2024 Partners

Headline partners

excel london

Headline partners

cybersecurity jobsite

Headline partners

cyber security council

Media Partners

cloudtango

Media Partners

silicon

Media Partners

isaca

Media Partners

media planet

Media Partners

she can code

Media Partners

technology

Media Partners

cyber

Media Partners

business focus magazine

Media Partners

cyber resilience centre

Media Partners

grc outlook