Our 2025 Conference Programme Included

Loading
Cloud & Cyber Security Expo Keynote
  1. Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
  2. In this session, we will explore why the key to long-term success in cybersecurity lies in returning to the fundamentals. By reinforcing core principles, we can build a strong, sustainable foundation ...
  3. Session presented by SentinelOne
  4. Breaking bad! Preventing attacks by enhancing basic security hygiene
    While AI-based attacks and dark web data leaks can threaten the security posture of your organisation, an actual compromise could stem from a minor misconfiguration. This session will focus on how you ...
  5. Prof. Simon will provide an in-depth look at the current perceptions and challenges facing the cybersecurity profession, highlighting the growing need for convergence between physical and cyber securi ...
  6. As AI becomes central to modern enterprises, cybersecurity is evolving rapidly. In this session, Delinea’s VP of Identity Threat & Research will discuss how identity security is leading this transform ...
  7. Maslow’s Hierarchy of Needs can be applied to organisational security culture, with security approaches driven by the fulfillment of fundamental needs similar to human development stages. A strong sec ...
  8. Methodologies for Testing and Defending AI Integrations
    Hackers are targeting business’ AI implementations. In this session Six Degrees’ Cyber Security Assurance Technical Director Andy Swift and Head of Cyber Security Assurance Michele Peroli explain how ...
  9. We’ll explore how Cyera is revolutionizing data security through the transformative power of artificial intelligence. Drawing from extensive experience protecting Fortune 500 companies, Ash will demon ...
  10. A Paradigm Shift Towards Exposure Risk Management
    With vulnerability debt mounting and attacks proliferating, relying on a reactive, siloed approach typically found in traditional vulnerability management programs isn't enough. In this session, we’ll ...
  11. In our rapidly evolving digital landscape, traditional cybersecurity strategies have predominantly focused on prevention, aiming to erect barriers against cyber threats. However, the complexity and so ...
  12. Join Snehal Antani, CEO of Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what NodeZero discovered in networks just like yours. You’ll hear about how fast and easy ...

Sponsored by:

Netskope Theatre Sponsor

Cloud & Cyber Security Expo Theatre 1
  1. Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
  2. Mitigating AI Threats in Modern Supply Networks: A Practical Defence Framework
    Modern supply networks face sophisticated attacks across digital and physical systems. As artificial intelligence and quantum computing rapidly advance, these threats will become more automated and co ...
  3. ChatGPT, Deepseek, and Onward: Future Proofing Security for the Next AI Boom
    From data leakage and regulatory non-compliance to shadow AI usage and insider threats, the rapid rise of GenAI continues to introduce new challenges that traditional security frameworks struggle to a ...
  4. The (r)evolution: from failing patching strategies to the Risk Operations Centre
    Every year, thousands of new security vulnerabilities are disclosed - more than any organisation can reasonably address by patching them all. In this session, Ivan will introduce a proven, risk-focused methodology for managing cyber threats in a way that aligns with business goals. Drawing on best practices, and what we advocat at Qualys, you’ll discover that patching isn’t always the only or even the best solution; sometimes a simple configuration change can reduce risk without causing the downtime and disruption often associated with patches. Moreover, by understanding an asset’s purpose and exposure, resources could be focused on mitigating the most critical, business-relevant risks first.
  5. AI in Security and Security in AI: Balancing Innovation and Resilience
    Artificial Intelligence is transforming workflows across industries, enhancing efficiency, decision-making, and security operations. However, alongside its benefits come new risks that require vigilan ...
  6. This talk will highlight that security is not merely a technical challenge, but a cultural and human one. The session will explore how security becomes deeply ingrained in an organisation when its "se ...
  7. Novice to Expert in 10 Steps: A Pragmatic Approach to Unified Cloud Security and Cyber Exposure Management
    What is step one in protecting cloud environments? A sea of native tools, traditional vulnerability management, or a collection of acronyms and buzz words?In this session, attendees will learn how to ...
  8. Security is only as strong as the accuracy of its data—but most organisations only see 60-70% of their devices, leaving a 30% blind spot that attackers exploit. Without real-time validation, security ...
  9. The Modern Threat Actors’ Playbook: How Initial Access and Ransomware Deployment Trends are Shifting in 2025
    As threat actors’ Tactics, Techniques, and Procedures become more complex, it becomes all that more critical for security leaders to understand how they are gaining initial access and fulfilling their ...
  10. Bridging Hype and Reality in AI-Driven SOCs
    Is the AI-driven SOC truly achievable, or just another industry buzzword? Join us as we explore the real challenges facing today's security teams overwhelmed by manual, reactive processes. Through an ...
  11. Entra Apps 101: Secure yourself against the next Midnight Blizzard attack
    Join CoreView to get a 101 on Entra Apps - how you find them, how you secure them, and why they have become a favourite attack vector for cyber criminals.   Attendees will get:   ·       An overview o ...

Sponsored By:

Manage Engine Theatre Sponsor

Cloud & Cyber Security Expo Theatre 2
  1. Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
  2. Endpoints are no longer just devices like laptops and smartphones; the lines keep moving and endpoints are suddenly everywhere and nowhere at once. AI is redefining endpoint security by predicting thr ...
  3. Generative AI is reshaping every corner of your organization, with opportunity comes risk. As a leader, you must balance innovation with resilience, all while managing tighter budgets & heightened sec ...
  4. Observability doesn't work. Instrumenting applications has proven to be too difficult and there has been too much reliance on distributed traces and metrics to try and help operations teams stay on to ...
  5. This session will dive into the key aspects of securing the cloud-native enterprise. We will begin by exploring the benefits and challenges of fully embracing cloud-native technologies, examining both ...
  6. Mastering unstructured data in the AI era
    Jim will talk about how, in the age of AI, corporate data has become a major company asset rather than just a cost, with the challenge to all organizations being how to leverage it to reduce costs, in ...
  7. As AI becomes a crucial tool for detecting cyber threats, it also becomes a target itself. Adversaries can manipulate data collection, corrupt models, and tamper with outputs—raising critical question ...
  8. Jake will delve into the darker, more controversial aspects of facial recognition technology, exposing its unsettling potential. He'll unveil cutting-edge glasses capable of real-time identification, ...
  9. Best Practices to Optimize Telemetry Pipelines for Security, Performance, and Compliance
    As IT&OT environments grow more complex, organizations face challenges in managing an exponentially increasing amount of telemetry data, weakening their security posture and lowering operational effic ...
  10. Why It Is Important to Put People at the Frontline of Cybersecurity
    This session will explore the importance of fostering a people-powered workforce, covering how collaboration across departments and integrating security practices into daily operations can enhance you ...
  11. With the sheer volume of findings generated by pentests and vulnerability scanners, identifying and addressing the most critical issues can be a daunting task. Effective remediation requires tools and ...
  12. AI-pocalypse Averted: Emerging Services and Proactive Cloud Security
    This session will discuss how to navigate the shifting cybersecurity landscape and secure emerging services in the cloud. Nicholas will explore machine learning and AI powered cloud security services ...
Cloud & Cyber Security Expo Keynote
  1. In today’s world, talent knows no boundaries. However, opportunities and user experience often are limited. Organisations face the dual challenge of tapping into a global talent while ensuring secure, ...
  2. Global Talent: How Secure Access, Network Modernisation, and Zero Trust Empowers Organisations and Employees to Reach Further
    In today’s world, talent knows no boundaries. However, opportunities and user experience often are limited. Organisations face the dual challenge of tapping into a global talent while ensuring secure, ...
  3. In a world where cyber threats evolve faster than ever, Big Data is the key to staying ahead. This session explores how businesses can harness the power of big data to revolutionise their Cybersecurit ...
  4. With the undeniable evolution of Technology in the modern world, it often becomes difficult to improve cybersecurity to fit each innovation. However, educating employees on security practices can help ...
  5. Supply Chain Security Assurance - as per above
  6. Strengthening the Weak Link: Enhancing Your Cybersecurity Posture Through Effective Employee Engagement.
  7.  This engaging panel discussion will explore the evolving landscape of cyber security talent and how embracing diverse career paths and backgrounds can create a more adaptive and innovative workforce. ...
  8. Cultivating a security-conscious culture without undermining employee morale
    In this session, KnowBe4's Javvad Malik explores the delicate balance between maintaining a robust cybersecurity posture and fostering a positive work environment. The audience can expect to learn inn ...
  9. The Implications of AI in a Modern Defence Strategy
    With today’s rapidly evolving landscape of cybersecurity, the integration of artificial intelligence presents both unprecedented opportunities and complex challenges.In this session, learn from SumoLo ...
  10. Can Large Language Models (LLMs) replace static analysis in application security? The short answer is no—but when combined, they unlock a new era of precision, speed, and efficiency in secure software ...
  11. Data Resiliency in the Cloud: Who’s Responsible for What?
    As businesses embrace the cloud, ensuring data resiliency is more critical than ever. In this session, CrashPlan will explore the Shared Responsibility Model, clarifying the division of protection bet ...

Sponsored by:

Netskope Theatre Sponsor

Cloud & Cyber Security Expo Theatre 1
  1. Cloud, GenAI, Identity and Data - how to level-up security in the accelerating landscape?
    Securing your data when everyone inside and outside of your organisation wants greater productivity, collaboration and agility, can’t be achieved without better visibility and control of your sensitiv ...
  2. In cybersecurity, technology alone cannot fully safeguard digital assets. While advanced systems are vital, the human firewall plays a crucial role in preventing and mitigating threats. This session f ...
  3. As data continues to be the fastest-growing resource on the planet, it has also become the fastest-growing attack surface. Yet, despite its critical nature, data security remains one of the least matu ...
  4. Modern Data Security in the Generative AI Era
  5. As technology advances, application security faces new complexities. This presentation focuses on three critical areas:1) AI-Generated Code Risks: AI revolutionizes software development but introduces ...
  6. This session will explore imposter syndrome in the tech and cybersecurity fields, with an interactive Q&A to engage attendees and highlight famous figures who’ve struggled with it. Yemurai will define ...
  7. Tackling the PQC challenge: How to get going
  8. Catch AI if you can : Preventing AI from escaping with your knowledge investments!
    Investing in AI while preventing it from running out of the door with your knowledge currency.Data is the currency of knowledge and AI can help you utilise this currency as an investment. The possible ...
  9. This session will explore how broadening the scope of threat intelligence can enhance business decision-making, particularly in relation to utility efficiency. By expanding threat intelligence, organi ...
  10. Join Snehal Antani, CEO of Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what NodeZero discovered in networks just like yours. You’ll hear about how fast and easy ...

Sponsored By:

Manage Engine Theatre Sponsor

Cloud & Cyber Security Expo Theatre 2
  1. Driving Security Outcomes with a Unified Strategy
    Join us for an insightful session on driving security outcomes through a unified identity strategy. Discover why traditional SSO and MFA fall short and learn how to address identity security challenge ...
  2. Attack Surface Unmasked: Top Attack Vectors in 2025 and Beyond
    The attack surface is expanding exponentially, driven by rapid cloud adoption, evolving technologies, and increasingly sophisticated cyber threats. In this session, Ellis will examine the leading atta ...
  3. With governments worldwide proposing legislation to ban ransomware payments, organisations face mounting pressure to strengthen their cyber resilience and compliance strategies. This session explores ...
  4. Achieving higher accreditations such as Professional Registration and Chartership is a mark of excellence, demonstrating expertise, integrity, and a commitment to the highest industry standards. Altho ...
  5. Whilst Cybersecurity’s focus is to combat current threats, it is also important to remain forward-thinking and assess how to prevent future evolving cyber-attacks. In this session, we will delve into ...
  6. With 91% of UK cybersecurity professionals reporting skills gaps in their teams, employers need to begin to rethink how they attract, develop, and retain talent. In this session, we will explore insig ...
  7. No Device Unnoticed, No Risk Unmanaged: Closing the Security Visibility Gap
    Security is only as strong as the accuracy of its data—but most organisations only see 60-70% of their devices, leaving a 30% blind spot that attackers exploit. Without real-time validation, security ...
  8. Join industry experts as they delve into Deepfake technology and its impact on privacy, trust, and security. Discover how AI-generated content is used both for innovation and exploitation, raising con ...
  9. The Technology Skills Gap: Training as a Solution - Certification vs. Experience: What Matters More?
    Join us for a thought-provoking session exploring the skills gap and the ongoing debate between the value of certifications versus hands-on experience. We'll delve into whether the skills gap is real ...
  10. The global tech workforce is brilliantly neurodiverse, but is your organisation supporting the needs of your autistic employees so that they can thrive? In this session, Nellie will explore why it’s c ...
  11. Encryption for the Quantum Era
    Join us as we define a new standard for data protection with zero key management. In this session, we will dive into the power of Post Quantum Cryptography (PQC) services, showcasing how they ensure s ...
  12. Email Security Made Simple - Latest Trends, Innovation & Free Certification
    Join CEO, Gerasim Hovhannisyan & Marketing VP, Courtney Austin for a dynamic session covering the latest DMARC adoption trends, new innovations and our new EasyDMARC Academy with free certification. E ...

Attend Cloud & Cyber Security Expo on 4-5 March 2026 at Excel London

Cloud & Cyber Security Expo is designed for C-level staff, IT security leaders, managers and key decision makers. No matter the size of your business, or whether you represent the public or private sector, there will be lots of takeaways and goals to achieve at the event.

REGISTER YOUR INTEREST

2025 Sponsors

Theatre Sponsors


 

Platinum Sponsors


 

Gold Sponsors


 

Silver Sponsors


 

Keynote Sponsor

SentinelOne Logo

2025 Partners

Media partner

excel london

Media partner

cybersecurity jobsite

Media partner

cyber security council

Media partner

WiCyS logo

Media Partner

The Security Institute Logo

Media Partner

Entrepreneur UK Logo

Media Partner

The Security Institute Logo

Media partner

ISC2 logo

Media partner

Tech Monitor logo

Media partner

she can code

Media Partners

Computing Security Magazine

Media Partners

Unicorns in Tech

Media Partners

Diversity Atlas