Skip to main content

Agenda

Sample Image

Agenda for UK Cyber Week 2024 that took place on 17-18 April 2024 at Olympia London.

Our conference program is meticulously crafted to address the pressing challenges in cyber security. From thought-provoking keynotes to engaging panels and informative case studies, this agenda promises a wealth of insights and strategies to stay ahead in the ever-evolving cyber landscape.

With additional sessions set to be announced in the coming weeks, this agenda is set to spark thousands of conversations and shape the future of cyber security.

Explore the wealth of insights waiting for you!

REGISTER YOUR INTEREST TO VISIT IN 2025

UK Cyber Week 2025 will be held at Olympia London again, on the 23rd and 24th of April 2025.

Stay tuned for the new 2025 agenda that will go live in the new year.

Loading
17 Apr 2024
  1. Keynote
    UK Cyber Week is delighted to host the UK lead investigator from the recent LockBit Operation. This is a rare opportunity to hear their findings first-hand and get an update on the current operational ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. Keynote
    It's no secret where Finland stands after the invasion of Ukraine on February 2022. A year after, Finland became part of NATO. Did that visible declaration of alliance also change the types of threats ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Keynote
    It was the fastest theft in history - $625m stolen in under two minutes. The target: a Vietnamese video game. The suspect: North Korean hackers. But now they faced a challenge: how on earth do you lau ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Keynote
    This session will explore the rapidly approaching future of AI-powered disinformation. We have awoken in the world of Generative Adversarial Networks, Large Language Models and scientific crises of co ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  5. Keynote
    Hear from panellists who will discuss their path into the cyber industry from a non traditional/non technical background & see how they are now thriving. Key Takeaways: You don’t have to be technical ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. Keynote
     

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  7. Keynote
    The session, presented by Stephanie Itimi, focuses on the security risks associated with deepfakes and generative AI, emphasising their impact on individuals, businesses, and society. It covers the da ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  8. Keynote
     

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  9. Keynote
    You have been hit with a ransomware attack, DDoS or an unauthorised intrusion resulting in a data breach and are being extorted by a financially motivated adversary. During this session we will explor ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  10. Keynote
    We are delighted that Marcus Hutchins will be dialling in from Los Angeles to join us for a wide ranging chat around all things cyber.

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

18 Apr 2024
  1. Keynote
    Philip INGRAM MBE will expand on his wider television commentary and explain the global geopolitical scene shaping the wider security environment and while doing so, develop some areas in the cyber or ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  2. Keynote
    Adversaries are flying under the radar. Protectors need to double down. Join CrowdStrike’s Northern Europe Engineering Director, John Spencer, for an exclusive threat briefing to hear the latest adver ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  3. Keynote
    With all the hype of Artificial Intelligence affecting every single industry, Jake has been researching how AI has also been benefiting cybercriminals. From text and image creation tools to audio and ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Keynote
     

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. Keynote
    Join us for an insightful panel discussion on the realities and challenges of diversity in Cyber Security, debunking myths and exploring strategies for creating inclusive environments. From breaking s ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. Keynote
    In recent years, the adoption of cloud services has significantly increased, enabling organizations to leverage the benefits of scalability, availability, and cost-efficiency. However, this shift towa ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  7. Keynote
    Human nature leads to so many security problems. Or more accurately our industry's refusal to understand humans and human nature leads to so many security problems. How do we improve this? How do we m ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  8. Keynote
    In this session Sebastian will cover DevSecOps transformation roadmap development, planning for cultural change and how to apply academic leadership and change theories in practice. He will also discu ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

17 Apr 2024
  1. Culture & Strategy
    Errors are bound to happen, but by implementing the appropriate technologies and processes, they don't always have to pose a significant risk. We’ll explore how well-executed security nudges can surfa ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. Culture & Strategy
    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itsel ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Culture & Strategy
    Traditional awareness assumes that the β€œproblem” with insecure behaviour stems from a lack of knowledge, skills or understanding. In this talk, Tim explores why behavioural science says otherwise. He ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Culture & Strategy
     

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. Culture & Strategy
    The Application Security landscape is constantly evolving. AI has become a major disruptor, both for development and security teams. Meanwhile, software supply chains continue to grow in complexity. Q ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  6. Culture & Strategy
    In this session, cybersecurity expert James Rees reveals the escalating threat of cybercrime and how intelligence can empower your defence. We will discuss the alarming ascent of organised cybercrime, ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  7. Culture & Strategy
    Join us for an engaging session with Tim Grieveson, a distinguished security leader renowned for his role as a "Chief Storytelling Officer", as he delves into key topics such as aligning security stra ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  8. Culture & Strategy
    At present, the level of cyber risk in the UK is high. The increasing sophistication of attacks, frequency of their success and well-documented seven figure losses suffered by victims has led to many ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  9. Culture & Strategy
    You know cybersecurity needs to be taken more seriously by your organisation, but demands on stakeholders mean it gets sidelined. So how do you bring cybersecurity into the spotlight? That’s exactly w ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  10. Culture & Strategy
    The process of threat modelling can seem an abstract art, especially regarding scoring and prioritisation. We show how a non-expert can practically validate threat modelling predictions and quantify t ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

18 Apr 2024
  1. Culture & Strategy
    The Digital Security by Design Programme UKRI’s Digital Security by Design is a UK government supported initiative to help transform digital technology and create a more resilient and secure foundatio ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. Culture & Strategy
    IBM discuss the immense opportunities and challenges presented by both the AI revolution, and the rise of quantum computing, and how security teams can prepare today. Quantum research promises to hera ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  3. Culture & Strategy
    As governments rapidly roll-out AI-enabled tools for public service delivery the digital-security maturity gap widens. Infrastructure resilience often is secondary to the allure of being added to glob ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Culture & Strategy
    Cybersecurity is an innovative industry, yet its marketing approach is surprisingly old-fashioned. Neon binary code, men in hoodies, poor production quality, complex language and acronyms in every oth ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. Culture & Strategy
    Cyber security remains a key priority for organisations of all sizes but can represent a particular challenge for Small and Medium-sized Enterprises (SMEs). The most recent Cyber Security Breaches Sur ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. Culture & Strategy
    What would it be like to be β€œthere”, just when you were needed, to offer a tap on the shoulder and steer your colleagues in the right direction when they were about to do something risky? Click a link ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  7. Culture & Strategy
    In today's interconnected world, businesses of all sizes face a constant barrage of cyber threats. Protecting sensitive data, maintaining business continuity, and safeguarding brand reputation are par ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  8. Culture & Strategy
    UK Cyber Cluster Collaboration (UKC3) understands that staying on top of the latest cyber trends can be tricky and tedious. In this session, we will explore how through a connected cyber ecosystem, cy ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

17 Apr 2024
  1. Prevention & Resilience
    Cloud applications have become the lifeblood of organisations across the UK. The average company has 254 SaaS applications – many aimed at increasing productivity. But, for IT teams, they introduce mo ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. Prevention & Resilience
    As the cybersecurity landscape continues to evolve with new threats emerging constantly, IT leaders face the critical task of prioritizing budgets and resources effectively to safeguard their organisa ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  3. Prevention & Resilience
    Providing insight into the only point of a ransomware attack chain is typically where we see the personal behaviour traits of the operators. Key Takeaways: The changing method of the ransomware negoti ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. Prevention & Resilience
    We will discuss a number of technical actions you can implement today to help reduce this risk of ransomware threat actors gaining a foothold on your network, including the most critical actions to en ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. Prevention & Resilience
    In today's interconnected digital landscape, organizations face unprecedented challenges in securing their applications and managing the complexities of their supply chains. This session delves into t ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. Prevention & Resilience
    Over the last 20 years, many tools have emerged to address new challenges – from firewalls to unified threat platforms, anti-virus software to EPPs and EDRs, and log aggregation to intelligent SIEMs + ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

  7. Prevention & Resilience
    MOBSTR (Mobile App Security Testing and Ratings) platform addresses GRC (Governance, Risk and Compliance) challenges at a scale. We will demonstrate the platform's capabilities in real-time and share ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  8. Prevention & Resilience
    Insightful session on leveraging the Maltego CTI Package & OSINT Profiler to elevate cyber investigations. Discover how Maltego enhances efficiency by aggregating and visualizing threat data, streamli ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  9. Prevention & Resilience
    Azure, AWS, GCP…Pick your poison. We are in the midst of a digital revolution as organisations are putting an unearthly (pardon the pun) amount of their business operations and data in the cloud. Resp ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

18 Apr 2024
  1. Prevention & Resilience
    2023 will go down as the year that AI became mainstream, sparking a generative AI arms race. Even in its infancy, the technology is already ubiquitous, and will loom large in security leaders’ conside ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. Prevention & Resilience
    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itsel ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. Prevention & Resilience
    Back to basics is my theme for the day. Too many organisations get lost in layers of complexity, compounded by bolt-on solutions that add even more layers, and detract focus from the things that reall ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  4. Prevention & Resilience
    In a turbulent geopolitical landscape, where new cyber threats emerge on a near-daily basis, a new breed of proactive defence and remediation is vital. But what form will this take? Jay Gray, Head of ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  5. Prevention & Resilience
    Operationalising a Cyber Defence strategy requires significant investments in time, budget, personnel and technology. Meanwhile, the cyber talent gap is wider than ever, as the industry remains short- ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  6. Prevention & Resilience
    A Deep Dive on the use of information theory and matrix mathematics to classify and categorise arbitrary datasets, from cocktails to APT groups aimed at IT and cyber professionals (Forensics and Incid ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  7. Prevention & Resilience
    This speech will unravel the complexities of cybersecurity in third-party supply chains. Exploring innovative intelligence lead options to assess risk and enhance the resilience of your 3rd party supp ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜

17 Apr 2024
  1. OT & Cloud Security
    Ransomware gangs, criminal threat actors and nation-state espionage operators have been observed targeting β€œPorts to Pipelines” – nearly every aspect of the National Critical Infrastructure (NCI) has ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. OT & Cloud Security
    Why are cyber-attacks on the rise? Why are the sophistication and effectiveness of these attacks increasing? How can organisations be prepared for future trends? How can managing suppliers help with t ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  3. OT & Cloud Security
    Even when cybersecurity professionals successfully defend their organizations against cyber threats, they still struggle to demonstrate the value of proactively investing in various security measures. ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. OT & Cloud Security
    The ubiquitous nature of Bluetooth Low Energy (BLE) in automotive and consumer devices makes it a prime target for security analysis. In this study, I demonstrate a reliable Denial of Service (DoS) at ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄

  5. OT & Cloud Security
    The worlds of IT and OT are converging, with both businesses and operators of essential services looking to establish seamless, secure flows of data between previously disconnected environments. Peter ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. OT & Cloud Security
    The escalating pace and complexity of AI-driven threats demand a shift in industry focus towards proactive defence measures. With the rapid decrease in the time it takes for threats to infiltrate syst ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  7. OT & Cloud Security
     

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  8. OT & Cloud Security
    Cloud platforms play a critical role in modern business operations, offering scalable infrastructure and services. However, their widespread adoption makes them prime targets for cyber attacks. In ord ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜

  9. OT & Cloud Security
    In the landscape of cybersecurity, organizations face an ever-increasing threat from cyber attacks, particularly ransomware. These attacks can cripple businesses, leading to downtime and significant f ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  10. OT & Cloud Security
    Deep Dive into Operation Triangulation new details surrounding iOS vulnerabilities and exploits that underpin this assault, providing an analysis of the campaign that has targeted both the public and ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄πŸ”΄

18 Apr 2024
  1. OT & Cloud Security
    The vISM team hear it all the time - "The board just don’t understand security enough!" Let us share some tips and techniques for getting buy in and increasing understanding across the business. Key T ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  2. OT & Cloud Security
    This session will dissect cloud attacks, disproving the myth of sudden strikes. We'll explore their gradual progression through vulnerabilities, understand their characteristics, and identify detectio ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜

  3. OT & Cloud Security
    Anton's workshop, 'The Cyber Resilience Architect,' equips participants with the foresight to pro-actively disarm threats and reflect on what they need to do to improve their cyber resilience posture. ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  4. OT & Cloud Security
    When you read reports about cyber-attacks affecting operational technology (OT), it’s easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over t ...

    Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  5. OT & Cloud Security
    This talk will dive into the OT landscape, bringing out the nuances within the OT space that mark it differently; also where there are common areas of issue, and hindrances to the same instances found ...

     Technical Rating

    πŸ”΄πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜

  6. OT & Cloud Security
    In today’s competitive landscape, attracting and retaining top cloud security talent is crucial. Get the inside scoop, as we explore current perceptions from both sides of the table and offer up our t ...

     Technical Rating

    πŸ”΄πŸ”˜πŸ”˜πŸ”˜πŸ”˜πŸ”˜

17 Apr 2024
  1. The Inclusive Cyber Space
    The Zensory is a scientifically backed productivity and wellbeing solution dedicated to transforming work habits - helping to reduce burnout and achieve a healthy work-life balance.
  2. The Inclusive Cyber Space
    Did you know that multitasking and distractions are some of the leading reasons people fall for phishing and social engineering attacks? Research shows that multi-tasking, cognitive overload, and dist ...
  3. The Inclusive Cyber Space
    Embracing Menopause, Inspiring balance and Driving exceptional results in the workplace!
  4. The Inclusive Cyber Space
     
18 Apr 2024
  1. The Inclusive Cyber Space
    Join Daniel for an enlightening journey through the intersections of cybersecurity, psychology, and personal wellbeing, and take the first step towards mastering your digital life.
  2. The Inclusive Cyber Space
    If you have seniority then you should help open the doors, the rewards are intrinsic.
  3. The Inclusive Cyber Space
    Whilst studying I applied for a competition. The word 'cyber' was linked to a company as a job role.. I'd never heard of cyber before.' Why not?
  4. The Inclusive Cyber Space