As the pace of technological development quickens towards an ever more digitally advanced planet, it is said that by 2020 20.8 billion objects will be connected to the internet. Rooted in complex webs of now commonplace technology such as IoT, Mobile and Cloud, our interconnectedness is a double-edged sword, bringing with it risks as well as benefits. Defending networks and IT infrastructure has become the top priority for governments and boardrooms alike, and organisations whether they be public or private, start-ups or international, are quickly realising the need to invest in securing their infrastructure, networks and data from both outside and insider threats.

With this in mind, the Cyber Security Summit’s Main Stage opens on the subject of Cyber Defence. In this section we explore how the UK is overcoming global cyber threats.


The objective of cyber crime is changing, with national infrastructure becoming as prevalent a target as businesses. Power grids, air traffic control, satellites and over 21 million cars are connected to the internet, representing new avenues for maleficent agents. It is also changing in its sophistication as we meet hyper-resilient forms of Malware and Ransomware. And perhaps most importantly, it is changing in its origin, from the proliferation of script kiddies to the development of state-sponsored hacker groups and cyber savvy crime syndicates.

In this 2nd component we look at how the UK government in collaboration with industry is helping to bring down crime networks as well as those individuals who represent Advanced Persistent Threats through offensive measures. We also look at how the government and its partners are helping to deter the uptake of cyber crime among would-be hackers.


As networks become more complex and as the capabilities of malicious forces becomes more advanced, it is no surprise that over 80% of cyber security professionals believe that threats will increase. With an unstable future it is essential that governments, businesses and solution providers come together to ensure that structures are put in place to maintain superiority of defensive and offensive technologies.

What is more, the education of a next generation of cyber professionals as well as the continued development of the current workforce must be a national priority. With over 75% of cyber professionals believing that there is a current shortage, concerted attention is being brought to bear on education. Covering the final element of the government’s 3-pronged National Cyber Security Strategy, in this section we explore how technology and skills are being developed in the UK.



  • Modelling the Threat Landscape: Discerning Advanced Persistent Threats
  • Shedding light on the practices and principles of the Dark/Deep Web
  • Developing the Cyber Defence Arsenal to Fend off the Latest Variations of Malware and Ransomware
  • Network Security – connect all your devices without compromising the network
  • Security Information and Event Management (SIEM): Ensuring the Right People have the Right Knowledge
  • Wireless intrusion protection
  • Importance of Standards and Certification, ISO 27001
  • Next Generation Endpoint Protection


  • Threat Intelligence Platform to protect against advanced cyber-attacks
  • Data-Centric Security innovative approach to protecting critical data and safeguarding information sharing
  • Simulating Attacks and Testing Systems to Secure Critical Infrastructure
  • Understanding your Network Topology and Adopting Software-Defined Secure Networks (SDSNs)
  • Cloud Security across SaaS, PaaS and IaaS
  • Harnessing the Possibilities of IoT while Maintaining Security
  • Next Generation Data Security: Secure at Storage and in Transit


  • Communication Encryption: Solutions and Standards for Email and VOIP
  • Allowing Your Organisation to Reap the Benefits of Mobile without the Risks
  • Latest Advances in Authentication: Multi-Factor, Biometrics and Voice Authentication
  • Putting Cyber Security Firmly on the Board’s Agenda
  • Insider Threats: The Latest in Internal Surveillance
  • Information Assurance: Right Products and Right Processes
  • Next Generation Data Security and Access Management


To complement the strategic overview of the main stage and the deep dive discussions of the seminar theatres, the Cyber Security Summit will play host to three floor features consisting of a Hackers Hot-Seat, a Cyber Attack Lounge and an Information Assurance Open Theatre. Each of the Summit’s features is designed to shed new light on the challenges and opportunities facing the Cyber Security and Data Compliance Communities.

Building on overwhelming positive feedback to the participation of ex-hacker Cal Leeming in the Cyber Security Summit 2016 programme, the Hackers Hot-Seat will provide insider knowledge on the behaviours and motives of modern hacker-culture.

Our Cyber Attack Lounge is designed to help our delegates visualise the anatomy of an attack, whether it be zero-day, recent adaptations of ransomware or simple DDoS. Understanding the evolution of an attack from entry to recovery is vital for any organisation wishing to build a resilient Cyber Security strategies.

Finally, our IA Open Theatre highlights the area of greatest impact for security policy, the correct management of information. Human error is involved in most investigated IT security incidents, it in this setting that we explore the latest tooling and best practice designed to mitigate common errors.