Conference Programme 2024

Subpage Hero

     

Loading
CYBER SECURITY KEYNOTE THEATRE
Crowdstrike
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    A ransomware attack! How to react? In this turn-based table top simulation, participants take on the role of the CISO and have to make decisions that influence the further course of events.   Will you ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    Cloud Security Consolidation Extends Protection from Code to Runtime
    Cloud exploitations increased 95% over the past year — a clear indicator that attack surfaces are becoming more dynamic and sophisticated in the cloud. While 2023 saw some cloud infrastructure and wor ...
    • Human Factors of Cyber Security
    CYBER SECURITY KEYNOTE THEATRE
    It's more than phishing - how to supercharge your security awareness program
    Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.In this session, Javvad Malik, Lead Security Awareness Ad ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    Session Title Coming Soon!
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY KEYNOTE THEATRE
    In July 2022, new cybersecurity regulations came into effect in Europe, demanding that the automotive industry has robust cyber security to protect vehicles from design to end-of-life. Great news for ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    Session Title Coming Soon!
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    As organisations transition to the cloud, navigating the complexities of security, compliance, and operational efficiency becomes paramount. Our panel today will explore how organisations can not only ...
CYBER SECURITY THEATRE 2
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    As cybercriminals continue to exploit weak passwords, it’s evident that companies need a new approach to ensure robust security. Join LastPass to see how vulnerable password protected accounts are and ...
  1. CYBER SECURITY THEATRE 2
    There are numerous challenges in building effective incident response capabilities within the automotive industry. Vehicles are complex environments and this creates difficulties in monitoring and con ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY THEATRE 2
    Session Title Coming Soon!
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    In this session Hila Meller will cover several aspects of Human factors in Cyber Security: from myth-busting trues and lies about Biometrics trough sharing her personal story and insights about Divers ...
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY THEATRE 2
    The DEV, The SEC and The OPS: A developer’s guide to modern security
    Legacy application security solutions like SAST and DAST miss the point of modern application development. Findings are riddled with false positives, results arrive too late for fixing and take way to ...
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY THEATRE 2
    From Source to Production: Navigating Supply Chain Risks in Software Development and Strategies for Mitigation
    Ensuring the integrity of software is imperative for safeguarding against security threats and ensuring compliance. In this talk, we will explore the pivotal role of Software Bill of Materials (SBOM), ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    When the Sky Is Falling: Secure Communication in Cyber-Security and BCM
    Why do you need cloud security? In this presentation, Tom Hofmann illustrates the extent to which our daily communication runs via the cloud and shows what consequences arise if the usual communicatio ...
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY THEATRE 2
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    • Emphasising the human factors in cybersecurity and their influence on security risks. • Analysing case studies that show how human decisions have influenced cyberattacks. • Approaches to strengthen ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    Session Title Coming Soon!
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    Simplify CVE Remediation
    Last year 28,902 critical vulnerabilities were published by NIST, each specific to a device and enabled features. These vulnerabilities provide bad actors an entry point to the network. The volume and ...
CYBER SECURITY KEYNOTE THEATRE
Crowdstrike
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    Cybersicherheit im Zeitalter von KI - Wie erreichen Sie die nächste Stufe der IT Sicherheit
    Die Diskussion über Künstliche Intelligenz (AI) und mögliche Anwendungsfälle ist omnipräsent und auch im Security Kontext sind diese aktueller denn je. In diesem Vortrag beleuchten wir die jüngsten En ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    The evolving landscape of fraud in the age of e-commerce, highlighting the ever-changing threats that come with the digital era. We stress the importance of agility, preparedness, and the constant nee ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    Session Title Coming Soon!
  1. CYBER SECURITY KEYNOTE THEATRE
    Securing Tomorrow’s Software: Emerging trends in Application Security, AI Generated Code and the Software Supply Chain
    The Application Security landscape is constantly evolving. AI has become a major disruptor, both for development and security teams. Meanwhile, software supply chains continue to grow in complexity.   ...
  2. CYBER SECURITY KEYNOTE THEATRE
    Most cyber security threats have the potential to be encountered regardless of the size of organisations involved. However, the organisation’s ability to face and manage the resulting challenges can v ...
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    Why AI is everywhere in Cyber Security.
    • AI Security: A Threat or Opportunity?
    • Human Factors of Cyber Security
    CYBER SECURITY KEYNOTE THEATRE
    Coming soon
CYBER SECURITY THEATRE 2
    • Addressing the Evolving Threat Landscape
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    In this presentation, I will share my experience of using established standards and frameworks to construct a robust security program for an electronics manufacturing company with a growing SaaS divis ...
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY THEATRE 2
    Security Testing Reinvented: Embracing the Era of AI-Generated Code
    Join us for an insightful discussion on reshaping security testing in response to the growing prevalence of AI-generated code in today’s software landscape. As we navigate this shift, maintaining reli ...
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY THEATRE 2
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY THEATRE 2
    Uncover the adversaries hiding in plain sight
    Tracking 230+ adversaries and noting a record eCrime breakout time, the 2024 Global Threat Report unveils an alarming rise in covert activity and a cyber threat landscape dominated by stealth. Dominik ...
    • AI Security: A Threat or Opportunity?
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    Examination of the current role of artificial intelligence in cybersecurity.   Identification of strengths and weaknesses of both human and artificial actors in the security context.   Discussion of o ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    Cloud Data Breaches – Leading Cause in 2023 & Prevention
    In today’s digital landscape, where cloud adaption is pervasive, ensuring robust security measures across the entire lifecycle is paramount. Join us in this insightful session as we delve into the cru ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    5 Ways Data Will Supercharge your Cloud and Network Security
    Security teams constantly have urgent “challenges” (a nice way of saying disasters) thrown at them, and each one needs to be solved immediately. Given the scope, complexity and total lack of visibilit ...

Sponsors Included

Platinum Sponsors



 

Gold Sponsors

Silver Sponsors


 

Content Stream Sponsors



 

Partners Included

PARTNER

PARTNER

PARTNER

Partner

Partner


 

Partner


 

Partner

Partner

Partner

Partner

Partner

Partner

Partner

Travel Partner