Confirmed Speakers
What to expect on the day
Morning
Clashing priorities, rapidly advancing tech and geopolitical turmoil: What are the cyber risks you can’t ignore in 2024?
• Will supply chain threats remain the achilles heel of security strategy?
• Is trying to keep pace with an expanding threat landscape a fool's errand?
• Are new tools the route to resilience or a potential path to downfall?
Kam Karaji , Global Head of Information Security, Bibby Finance
Jennifer McGhee , Chief Information Security Officer, Element Materials Technology
Unmasking the world of nation-state cyber threats: Where are the top threats to guard against?
Yippee Ki-yay, Mofos. Or why movies get plane hacking all wrong
• An entertaining and informative critique of some of the best known plane hacking movies and TV shows
• Artistic licence is great, but it sets a narrative about airplane cyber that isn’t helpful
• What can we really learn about the security of instrument landing systems and other aviation tech from John McClane and others?
- How to master identity and access management strategy in line with your risk profile?
- What points of failure are hidden in your cloud footprint?
- How to give your security operations team a complete picture of risk and potential impact?
- How to build a human-first security strategy and get people to take ownership of secure behaviours?
-
How to bridge the gap between business and security needs to bank future budget?
Afternoon
Your risk is wider than internal systems: How I found and accessed over 16GB of our outsourcers data
• Exploring the evolving risks of storing data within managed external systems
• How supplier insecurity may affect, and ruin, your security posture
• Real-life examples of data breaches, via IT supply chain, and why supplier risk needs to be managed
Lee Morton , Information Security Officer, On The Beach
Ruthless prioritisation in a world of growing threats: How to stay on track with security plans when expectations mount
• How to communicate key security needs to the business and gain investment
• Is single vendor consolidation in security architecture a pipe dream?
• Build v buy v manage: How to best use external support
Are the robots fighting for or against you in the AI cyber war?
- What is needed for incident response playbooks to keep your team breach ready?
- How will you combat the next evolution of ransomware?
- What are the top supply chain risks you need to resolve?
- How can thinking like an attacker help you build better defences?
-
Will a shift left approach solve your software supply chain risks?
2022 Sponsors
What have other events looked like?
Take a look at some of the highlights from our last Manchester and seperate Cyber Leaders Summit event!
Register your interest
If you’re interested in attending, simply fill in the below form or send an email to transformers@imagotechmedia.com and a member of the team will be in touch.
Interested in sponsoring?
Click the link below to fill in the form and our team will be in touch to discuss packages.
Click the link below to fill in the form and our team will be in touch to discuss packages.