14 March 2023 | The Carlton Tower Jumeirah, London

The Cyber Security Leaders Summit is a closed room peer-to-peer forum for senior IT and security leaders to connect, innovate and collaborate on key challenges in the field. Throughout the day, attendees will come together to drive innovative ideas, tackle the biggest threats on the horizon and navigate new ideas and start formulating next steps for the year ahead.

What's in it for you?

Network and collaborate with fellow influential members of the cyber community and join pre-qualified
meetings with handpicked solution providers that you want to meet.

STRATEGIC KEYNOTES FROM INDUSTRY TRAILBLAZERS

PEER TO PEER ROUNDTABLES ON KEY CHALLENGES

PRE-SCHEDULED MEETINGS TO EVALUATE YOUR SECURITY TOOL STACK

OPPORTUNITIES TO NETWORK AND CONNECT

Confirmed Speakers

Who's it for?

Chief Information Security Officer, Chief Information Officer, VP/Director/Head of:

• Information Security, Cyber Security, IT, Cyber Defense, Security Operations, Incident Response, Security Architecture, Threat Intelligence, Pen Testing

HAS AN ACTIVE CYBER PROJECT

RESPONSIBLE FOR OR INFLUENCES IT PROCUREMENT

SOURCING SOLUTIONS TO IMPLEMENT IN THE NEXT 12 MONTHS

INTERESTED IN PEER-TO-PEER NETWORKING AND COLLABORATION

What our delegates say

What to expect on the day

 

Morning

-
Arrival & Refreshments
-
Chair's Opening Remarks
-
Panel Discussion

RaaS? AI-enabled hackers? Pure-play extortion? What’s the next evolution of ransomware attacks?

• What happens when even novel hackers can execute highly sophisticated attacks?
• Thriving in the shadows: Where is your physical and digital supply chain susceptible to attack?
• We won’t negotiate with hackers: Will you get back what has been stolen?

Speakers
Head of Network Security
Global Head of Offensive Security & DFIR Services
Head of Digital Cryptography & Cybersecurity - MD
Senior Manager and Associate Director
Head of Security Strategy EMEA
-
Sponsored Keynote

Why patching your way to security is just preparing to be reactive

• What to do when staying on top of the volume of vulnerabilities is near impossible
• How to gain resilience in an environment of unpatchable risks
• Moving to an exposure management approach by gaining the attacker’s perspective

Speaker
Senior Strategy Leader

-
Keynote

From New Recurit to Next Threat: How to hack your way into a new job

• Why try and break into a company from the outside when you can simply get offered a job directly from the target?
• Learn how Jake manipulated recruitment staff to land a job inside a company – and gain full access to the data within
• The Insider Threat is becoming more of a risk to businesses – can we really protect ourselves from creative ideas?

Speaker
Global Cybersecurity Advisor
-
Tea & Coffee Break
-
Roundtables

Theme: Lean, mean, security machine

  1. Combatting cloud complexity: How to integrate your toolset to streamline threat visibility and manage costs
  2. Money talks: Understanding the interplay between cybersecurity and business risk, to secure the budget you need
  3. At what stage in security maturity should you be thinking about your strategy for automation and orchestration?
  4. Shooting phish in a barrel: Can you stop employees falling for phishing attacks?
-
1-2-1 Meetings

Afternoon

-
Lunch
-
Panel Discussion

What are the new trends and attack patterns you need to look out for?

• Managing your true attack surface: How does a business present itself as a target to attackers?
• Will threat profiling and modelling help an organisation defend against the threats of the future?
• Going beyond one-size-fits-all: How and when should an organisation embrace threat intelligence?

Speakers
Security Operations Lead
Senior Manager - Threat Intelligence
Head of Offensive Security Operations
Head of Cyber Operations
Security Engineering Manager EMEA
-
Panel Discussion

The big debate on Zero Trust, SASE & DevSecOps: What’s the next platform security evolution?

• Is Zero Trust a buzzword or a breakthrough?
• Is SASE the new de facto standard for future proof enterprise networks?
• Can you really stop smart developers going rogue with a DevSecOps strategy?

Speakers
Founder & Managing Director
VP Cyber Security
Senior Security Architect
Senior Manager Solution Engineering Enterprise EMEA & LATAM
-
1-2-1 Meetings
-
Roundtables

Theme: Beat the breach

  1. The MITRE ATT&CK framework: Where can it be used to obtain the most value?
  2. Proactive vs reactive spending: How to gain consistent security investment, that’s not just off the back of an incident.
  3. Are hackers reinventing the wheel? Are there really new threats, or are they just variations of known techniques?
  4. Limiting the impact: Building playbooks to ensure your teams stay on-track when disaster strikes?
-
Chair's Closing Remarks
-
Networking Drinks Receptions


Interested in sponsoring?

Fill in the form and our team will be in touch to discuss packages