28 November 2023 | Hilton Deansgate, Manchester

The Manchester Cyber Leaders Summit is a closed room peer-to-peer forum, bringing together IT and infosec leaders to assess threats on the horizon, share tactical approaches, and address current blockers. With a mix of technical insight and open-floor discussions, you can gain critical intel on how other leaders are tackling the challenge of securing their enterprise and share your own thoughts on how to drive the security agenda forward.

Confirmed Speakers

What's in it for you?

Gain insight from industry leaders, network and collaborate with fellow members of the enterprise IT community
and meet with your chosen solution providers to set a clear roadmap for your next initiative.

STRATEGIC INSIGHTS FROM LEADING PRACTITIONERS

ADVANCED SECURITY CASE STUDIES & NOVEL RESEARCH

PEER-TO-PEER ROUNDTABLES & NETWORKING

1-2-1 MEETINGS WITH HAND-PICKED SOLUTION PROVIDERS

The DTX Leaders Summit Experience

Who's it for?

Leaders, influencers and trailblazers in the Manchester technology landscape; including:

• Chief Information Security Officer and Chief Information Officer

• Director/Head/VP of: Information Security, Cyber Security, IT, Security Architecture, 
Security Operations and Cyber Defence

What to expect on the day

Morning

-
Arrival & Refreshments
-
DTX Welcome
-
Panel Discussion

Clashing priorities, rapidly advancing tech and geopolitical turmoil: What are the cyber risks you can’t ignore in 2024?

• Will supply chain threats remain the achilles heel of security strategy?
• Is trying to keep pace with an expanding threat landscape a fool's errand?
• Are new tools the route to resilience or a potential path to downfall?

Kam Karaji , Global Head of Information Security, Bibby Finance
Jennifer McGhee , Chief Information Security Officer, Element Materials Technology

-
Sponsored Keynote: Threat Insight

Unmasking the world of nation-state cyber threats: Where are the top threats to guard against?

-
Keynote

Yippee Ki-yay, Mofos. Or why movies get plane hacking all wrong

• An entertaining and informative critique of some of the best known plane hacking movies and TV shows
• Artistic licence is great, but it sets a narrative about airplane cyber that isn’t helpful
• What can we really learn about the security of instrument landing systems and other aviation tech from John McClane and others?

Ken Munro , Security Consultant, Pen Test Partners
-
Tea & Coffee Break
-
Peer-to-Peer Roundtables: Build Cyber Resilience

  1. How to master identity and access management strategy in line with your risk profile?
  2. What points of failure are hidden in your cloud footprint?
  3. How to give your security operations team a complete picture of risk and potential impact?
  4. How to build a human-first security strategy and get people to take ownership of secure behaviours?
  5. How to bridge the gap between business and security needs to bank future budget?
-
1-2-1 Meetings
-
Lunch

Afternoon

-
Case Study

Your risk is wider than internal systems: How I found and accessed over 16GB of our outsourcers data

• Exploring the evolving risks of storing data within managed external systems
• How supplier insecurity may affect, and ruin, your security posture
• Real-life examples of data breaches, via IT supply chain, and why supplier risk needs to be managed

Lee Morton , Information Security Officer, On The Beach

-
Fireside Chat

Ruthless prioritisation in a world of growing threats: How to stay on track with security plans when expectations mount

• How to communicate key security needs to the business and gain investment
• Is single vendor consolidation in security architecture a pipe dream?
• Build v buy v manage: How to best use external support

Jon Abbott, CEO, Threat Aware

-
Sponsor Session: Live Hack

Are the robots fighting for or against you in the AI cyber war?

-
1-2-1 Meetings
-
Peer-to-Peer Roundtables: Beat the Breach

  1. What is needed for incident response playbooks to keep your team breach ready?
  2. How will you combat the next evolution of ransomware?
  3. What are the top supply chain risks you need to resolve?
  4. How can thinking like an attacker help you build better defences?
  5. Will a shift left approach solve your software supply chain risks?
-
Closing Remarks
-
Networking Drinks Reception


What have other events looked like?


Take a look at some of the highlights from our last Manchester and seperate Cyber Leaders Summit event! 

Interested in sponsoring?

Click the link below to fill in the form and our team will be in touch to discuss packages.