9:20 am - 9:30 am

Chair’s Opening Remarks


9:30 am - 9:55 am

A Universal Regulatory Approach to Cyber Security

  • Supporting organisations through legislation and regulatory clarity – Guidance with NIS Directive and GDPR.
  • No business left behind: Breaking down the complexity of cyber through an evolving rationale of general and bespoke guidance.
  • Working with international organisations and allies to secure Britain’s economy and its place as global cyber power.


9:55 am - 10:15 am

Strategic Headline Sponsor


10:15 am - 10:40 am

Spotlight on Leadership: Championing the Place of Cyber in Strategic Decision Making

  • Moving beyond mitigation by building a whole-team approach to business impact assessment.
  • From Customers to the C-Suite – How HSBC has sought to embed and champion a security culture.
  • Upholding the role of Cyber in HSBC’s engagement with disruptive transformation and emerging technologies and practices.


10:40 am - 11:25 am

Morning Refreshment and Exhibition Break


11:25 am - 12:10 pm

Panel Discussion: Building the Next Generation of Cyber Practitioners: Talent & Diversity

  • Defining the talent shortage and working with government and education to identify the skills gaps of the future.
  • Moving beyond recognising the diversity shortcomings within the Cyber profession and developing strategies to redress historic under representation.
  • Balancing the need to provide advanced and intermediate upskilling opportunities.
  • Working with government and education providers build career pathways for young Cyber professionals.


2:00 pm - 2:45 pm



1:00 pm - 2:00 pm

Lunch and Exhibition


12:15 pm - 1:00 pm



2:50 pm - 3:10 pm

Stream Keynote

Stream 1 : The Threat
The Rise of the OCGs and the Evolving Crime Toolkit

  • The OCG landscape and the exploitation of AI and data analytics to target organisational vulnerabilities
  • Defending against outsider trading spreads out from traditional finance markets to other sectors.
  • Meeting adversarial capabilities with the latest armoury of digital forensics, intelligence and data sharing tools as well as dedicated regional specialists in Cyber Crime

Stream 2: The Tech
Fighting Bots with Bots: Post-Hype Applications of AI and ML

  • Exposing the cavities created by the non-linear growth in essential organisational data through AI and ML.
  • Mastering the threat vectors and nature as an essential caveat to employing advanced technologies.
  • Viewing technology trends with a human eye and building a deployment strategy based on the expertise and team makeup.

Stream 3: The Training
A Collaborative Approach to Building A Security Culture

  • Developing the essential skills of recognition whilst building a tested escalation policy
  • Making it easier for staff to engage in cyber-safe practices by providing easily absorbable information and simple to use security tools
  • Training upwards as well as downwards to ensure that executives are engaging as much as any member of the organisations


3:10 pm - 3:30 pm

Stream Sponsor


3:30 pm - 4:00 pm

Afternoon Refreshments and Exhibition


4:00 pm - 4:20 pm

Case Studies

Stream 1 : The Threat
Phishing Season: Developing the Right Approach to Socially Engineered Cyber Attacks

  • Building Internal Awareness through insight into the HMRC tax rebate phishing phenomenon
  • Reducing spoof smashing scams by up to 90% through tag and terminate technology
  • Keeping ahead of the enemy by identifying vulnerable target groups such as students or the elderly.

Stream 2: The Tech
Access, Authorisation and Monitoring

  • Learning not to underestimate the role of human error and malice and finding suitable monitoring practices and technologies to mitigate their impact
  • Shifting access control from device-focused protection to data-focused security
  • Reckoning with the identity question in an organisation’s digital transformation strategy

Stream 3: The Training
Recruitment and Retention in an Insecure Security Employment Market

  • Working with comms and HR to attract the right talent and bake security into the image of your company.
  • Obtaining the right balance between upskilling and work-life balance to incentivise and retain your security team.
  • The idiosyncrasies of growing a security team at pace and the place of cyber in the story of TransferWise’s success.


4:20 pm - 5:00 pm

Panel Discussions

Stream 1 : The Threat
Hyperconnected, Hype-vulnerable: Anticipating the Threats Posed by Emerging Technology and Future Digital Practices

  • Spelling out the threat vectors to determine the greatest area of vulnerability in hyper connected networks.
  • Balancing risk and cost when baking security into product development – What is the right formula?
  • Championing relationships with suppliers, partners and third parties as the strongest safeguard

Stream 2: The Tech
To What Extent Can We Secure the Supply Chain

  • Shifting mindsets to view business and security as win-win when evaluating supplier contracts.
  • Employing and developing standards and models through which to establish secure and resilient supply chains.
  • Developing a supplier based play-book to safeguard business continuity and the user when the chain is compromised.

Stream 3: The Training
TEST, TEST, TEST: Building Best Practice for Testing within your Team

  • Putting yourself in the attacker’s mindset to build a better awareness of your assets/vulnerabilities and routes to exploit them.
  • Working with certified ethical hackers 101 and knowing what you want to learn before you begin.
  • The evolution of penetration testing the emerging threats discovered by the practice of testing.