Cyber Leaders Summit

The Cyber Leaders Summit is a closed-room, invite-only event for senior decision-makers, budget-holders and innovators. Brought together to tackle the biggest challenges on the horizon and navigate the expanding threat landscape, this is an unmissable opportunity to share ideas, gain new tactics and prepare your systems. Discuss the latest trends, collaborate to refine strategies and get your plans locked down for the year ahead.

What's in it for you?

 Network and collaborate with fellow influential members of the cyber community and join pre-qualified
meetings with the handpicked solution providers that you want to meet.

STRATEGIC KEYNOTES FROM INDUSTRY TRAILBLAZERS

PEER TO PEER ROUND TABLES ON KEY CHALLENGES

PRE-SCHEDULED MEETINGS TO EVALUATE YOUR SYSTEMS

OPPORTUNITIES TO NETWORK AND CONNECT

Previous DTX Speakers

Who's it for?

Chief Information Security Officer // Chief Information Officer // Head of Information Security // Head of Cyber Security // Head of Cyber Defence
Head of Security Operations // Head of Incident Response // Head of Security Architecture // Head of Threat Intelligence // Head of IT

What our delegates say

Round table topics

 

Join our peer to peer round tables specially curated by the DTX team to encourage collaboration

with other leaders on some of the biggest, critical Cyber issues. Hover over the below topics

Cloud security

Protect your weaknesses

Hybrid Work

Securing the endpoint

Monitoring threats

Increase enterprise visibility

Become a defender

How to guard against attacks

Advanced threat protection

Automation

How to use data and automation to drive better security?

Zero trust

Managing identity and access for a hybrid workforce

Prepare the war room

Is your incident response strategy ready?

What to expect on the day

Morning

-
Registration & Networking Breakfast
-
Welcome Address
-
Opening Keynote Panel

Panel Discussion: What attacks are set to cause the biggest damage in 2022 and beyond?

• Lessons from the biggest changes in the past year across malware, ransomware, high-risk URLs, phishing and malicious Ips
• What elements of hybrid working have introduced the most risk?
• Where will future exploits cluster? Is it possible to protect systems that are increasingly connected?

-
Panel Discussion: Mastering Migration: Building the right control environment


• What is driving the move to the cloud? What business outcomes do you need to support
• Dangers of lift and shift: Why you need to think critically about your migration plans
• Can you balance end-to-end security with simplicity? Can you be secure by design and default?

-
Round Tables, 121 Meetings and Networking

Think Tank Sessions (Choice of 4)

• Cloud Security: Protect Your Weaknesses
• Hybrid Work: Securing the endpoint
• Monitoring Threats: Increase Enterprise Visibility
• Become a defender: How to guard against attacks

-
Panel Discussion: How to transform and modernise security infrastructure using cyber culture


• Breaking it down: Helping people at all levels to make sense of cyber security
• How to initiate an open door policy to support business functions and foster collaboration
• What does it take to change security mind-set? How do you need to adapt your plans for different regions or abilities?

Afternoon

-
Lunch
-
Panel Discussion: Ensuring resilience in the face of ransomware


• What have we learned from the latest wave of ransomware attacks?
• How to reclaim control in the immediate aftermath of a ransomware attack
• What can you do to change the outcome and beat the odds?

-
Round Tables, 121 Meetings and Networking

Think Tank Sessions (Choice of 4)

• Advanced Threat Protection
• How to use data and automation to drive better security?
• Zero trust: Managing identity and access for a hybrid workforce
• The war room: Is your incident response strategy ready

-
Coffee & Refreshments
-
Session: How to use data and automation to drive better security


• How can you ensure the business is armed with the tools and knowledge to make use of risk data
• Moving to an orchestrated approach to security: What can you do to better automate workflows across IT and security
• Does AI help or hinder security teams?

-
Closing Keynote

Panel Discussion: From barrier to business partner: How to change the enterprise view on cyber security

• What do you need to do to align IT and cyber security to business priorities?
• How to speak the language of the executive board to overcome disconnect
• Thinking beyond risk: How to move from retro-fit action to security maturity

-
Closing Remarks
-
Evening Reception & Networking Party