Our Virtual Platform
With impressive virtual venues built in 3D, our online cybersecurity conferences host up to 400 delegates. Immersive and engaging, it’s possible to perform video calls inside the platform for one-to-one chats with other delegates without the need to export to Zoom or Teams.
During the event, we provide the opportunity to eat and socialise with other delegates through a partnership with Just Eat. We even offer an afterparty with Live entertainment following the conference.
Home workers require a new approach to cyber security
COVID-19 has changed the workplace forever, with many firms saying they will implement more home working even after the pandemic is over. It can increase efficiency, but this approach also requires a greater focus on cyber security.
As businesses continue to realise the benefits of remote working, cyber security has never been more important, which is why we have decided to run the Future of Cyber Security as a virtual event.
Following hot on the heels of Cyber News Group’s highly successful 2020 and 2021 events, the Future of Cyber Security’s virtual conference will be better than ever. Attracting an exclusive audience of senior industry executives, the conference will feature topics relevant to the current COVID-19 working environment as a huge number of employees across all industries continue to work from home.
There is no doubt that cyber-criminals are jumping on opportunities to exploit employees working remotely during coronavirus, and the number of cyber-attacks will continue to increase, according to Europol.
Indeed, cyber-criminals are already profiting from the pandemic, with email phishing campaigns designed to steal employees’ credentials and compromise business systems, the agency has warned.
Ransomware is still a major threat to today’s businesses. Interpol’s Cybercrime Threat Response has detected a “significant increase” in the number of attempted ransomware attacks against key organisations around the world.
The cost of a breach can be huge, often reaching millions of pounds. According to Accenture and the Ponemon Institute, the average cost of a cyber-attack is $13 million.
The Annual Cost of Cybercrime study found that criminals are adapting their attack methods by targeting the human layer — the weakest link in cyber defence — through increased ransomware with phishing and social engineering attacks as a path to entry.
This is especially relevant in today’s climate, which has never been riskier for businesses as the work from home ethos opens new avenues for attack. With this in mind, the Future of Cyber Security and Virtual Conference will include sessions on the risks associated with a remote workforce and how to resolve them.
For example, many businesses and their employees are using video conferencing apps such as Zoom to communicate. This is attracting more hackers to the platform, exposing businesses that use video conferencing to an increased number of threats.
With this in mind, the Future of Cyber Security will examine the risks posed by video conferencing, especially when using consumer-grade apps, and outline how best to stay secure.
One of the greatest threats to businesses is email phishing, which sees employees targeted with malicious emails when they are working from home. The conference will address this and also look at how hackers use social engineering to track and lure victims in.
As part of this, The Future of Cyber Security Virtual Conference will include a professional social engineer who will share their tips and tricks to entice employees into giving up their data or give access to buildings or systems.
The Future of Cyber Security Virtual Conference will examine the general threat landscape during COVID-19 and assess the nation state threat to UK businesses.
The Future of Cyber Security Virtual Conference aims to help businesses to stay one step ahead of attackers through a number of insightful sessions not available at any other security conference.
In just one day, the event will provide essential intelligence that enables senior personnel to stay one step ahead of cyber criminals as the attack surface expands amid COVID-19.
Covering business security during COVID-19 and video conferencing in the morning, and password security, social engineering and the threat landscape in the afternoon, the conference covers today’s cyber security trends and threats across Europe – as well as those of the future – equipping delegates with the strategies, tools and technology needed to cope in an increasingly complex landscape.
It follows the huge success of our events in London. This educational one-day exclusive conference brings senior decision-makers face to face with leading cyber security specialists. Covering the strategic needs of all enterprises, the conference provides delegates with a unique opportunity to learn from thought leaders in the field and gain new knowledge and skills to manage the latest technology.
Election hacking, money laundering, billion-dollar cyber heists… author and investigative journalist Geoff White has covered it all.
His work’s been featured by BBC News, Audible, Sky News, The Sunday Times and many more.
His new book, The Lazarus Heist – From Hollywood to High Finance: Inside North Korea’s Global Cyber War was adapted from the hit BBC podcast and will be published by Penguin Random House on 9 June 2022.
His first book, Crime Dot Com, took readers inside the murky world of the digital underground, uncovering cybercrime’s emergence as today’s global threat. His podcast series for Audible, The Dark Web exposed the shadow internet created by the US military and now home to hackers, crooks and freedom fighters.
The twists and turns of his investigations have informed and entertained audiences from music festivals to political party conferences, and his live phone-hacking stage show was a sell-out hit at the Edinburgh Fringe Festival.
Mass-scale migration to the cloud has surged as organizations embrace more flexible working patterns. This rapid transformation brings new security challenges as IT teams grapple with unfamiliar and complex technologies. Achieving visibility and control across third-party environments can be difficult, while attackers continue to find creative ways to scale their attacks and bypass common tools. Join Dr Beverly McCann, Principal Analyst Consultant at Darktrace, as she discusses the challenges of securing the cloud and SaaS applications, and why organizations are turning to Self-Learning AI technology that learns its unique surroundings in order to stop cyber-attacks in their tracks. Includes real-world examples of attacks detected and stopped by this technology.
Are you manually transferring numerous files on the daily in your workplace? If so, these file transfers may be taking up way too much of your time and opening the doors to security threats.
It’s all about speed, scale, and security when it comes to transferring sensitive data, and an automated secure solution can be the answer.
Join us for a deep dive on:
- Common file transfers pitfalls
- File transfer/encryption automation for reduced user error
- Why the lack of secure collaboration tools is a recipe for a data breach
- The top tips for improving the security and efficiency of file transfers
Deep fakes — audio or video adjusted using AI and machine learning technology — are a growing risk to businesses. In 2019, a Wall Street Journal outlined how criminals used artificial intelligence-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000). This session will cover:
• What are deep fakes and how sophisticated are they today?
• How is this likely to develop in the future? How the risks grow with COVID-19 home working
• What are the real-life risks of deep fakes to businesses, with examples
• Steps businesses can take now to mitigate the deep fakes risk
After phishing members of the White House and the CEOs of Wall Street Banks, James switched careers from web design to Threat Research. By socially engineering Threat Actors carrying out BEC attacks he was able to collect data which was then passed to financial institutions and law enforcement. Now James works in education, helping individuals and Organisations map out their email risks.
Please visit our exhibition area and network with our sponsors
Consumers, and customers, are becoming more privacy aware, and trust is a key factor when choosing which service to use. This was all too clear when Facebook-owned WhatsApp issued a new privacy policy in January, which was misinterpreted to mean more data sharing with Facebook. The incident, which has seen many users leaving WhatsApp for rival Signal, is a lesson for all businesses. Under the EU Update to Data Protection Regulation (GDPR), transparency is key —and transparency and clarity build trust.
This session will include:
• The importance of trust in a privacy-conscious global environment
• What can be done to break that trust – and to build it
• Rebuilding trust after an incident or breach
• GDPR and transparency: What does the regulation say and how can this be used as a business differentiator?
In late 2020, the SolarWinds hack demonstrated the damage that can be done through the supply chain. The sophisticated attack affected multiple companies with an ultimate aim of reaching US government systems.
This talk will cover:
• Breaking down the SolarWinds hack: What happened, who was impacted and what can be learned?
• Supply chain issues: How supply chain attacks work and impact businesses of all sizes
• How to protect against this sort of attack: Getting the basics right
John Doody is the Author of “From Stripes to Stars” and Director of Interlocutor Services Limited, a company established in 2003 to promote Information Assurance and Cyber Security issues both nationally and internationally, the company offers a range of services including Marketing, Communications, Public Speaking, Strategy Reviews, Information Assurance, Cyber Security and Information Technology, these services are geared to the strategic level within government and industry.
Prior to this John served at CESG/GCHQ for 10 years in the appointment of Head of Information Assurance Customer Services. John has a wealth of knowledge across the whole spectrum of Cyber Security and Information Assurance. In this latter appointment he was a major contributor to CESG’s move to a commercial business footing. John also had a role as a Non-Executive Director to a security company as well as providing Strategic Advice to a number of major UK and US IT Security companies. John’s recent major role was as the Global Strategic Cyber Security Adviser to Ultra Electronics Limited where he reported directly to the CEO on Cyber Security matters. He also provided Strategic Advice to FireEye, Booze Allan and Safenet, three large US Cyber companies. John has the unique experience of having held appointments in Defence, the Intelligence Services and Industry.
John is currently a Deloitte Associate.
John is a retired officer of the UK Royal Corps of Signals, a Corps in which he served for 33 years rising to the rank of Colonel.
John is a qualified engineer and has held a number of strategic engineering appointments in the UK Ministry of Defence including system support to PTARMIGAN and WAVELL, the army’s tactical communication and CIS systems, Director in the Procurement Executive as Project Director for Army Electronic Warfare, Battlefield Target Engagement System (BATES), Air Defence CIS system (ADCIS) and WAVELL managing £1B of programmes.
John has also worked in the R&D environment working on Electronic Warfare Simulation. John also served in various operational environments including Loan Service to the Trucial Oman Scouts (A Paramilitary Force) in the Middle East.
John has chaired many international committees dealing with Cyber, Information Assurance, Communications and Interoperability. John is well known on the national and international Cyber/ Information Assurance Conference circuit where he has chaired many events and has given over 100 talks on Cyber and Information Assurance. John is a renowned Evangelist for Cyber Security and Information Assurance.
John held the position of an International Class Director for the Armed Forces Communications and Electronics Association (AFCEA) International (Fairfax Virginia USA). John is a past President and Vice-President of the AFCEA UK WEST Chapter and he served as a Member at Large for AFCEA London in the early 90s. John was also the Cyber Security Lead for the BCS Security Community of Expertise.
John was awarded the CESG/GCHQ Directors Medal in 2003.
John was elevated to the Infosecurity Europe Hall of Fame in 2012.
John was nominated “Godfather of Cyber Security 2021” at the Unsung Cyber Heroes Award Ceremony in the city of London in October 2021
AI and machine learning are increasingly being used in cybersecurity to spot unusual behaviour, with some systems able to respond in real times to mitigate attacks. Unsurprisingly, AI is also being utilised by cyber-attackers to increase the speed and scale of attacks as well as making them harder to detect and attribute.
This talk will look at:
• AI and machine learning in defence: How sophisticated is it today and how reliable?
• The problem with data: How AI based security systems need the right data, and why that’s a challenge
• AI in cyber-attacks: How is AI being used and what are the risks to businesses?
• Getting the balance right: Protecting the business while mitigating against cyber-attacks
2021 stacked up as one of the most costly years on record as ransomware attacks exploded with a 148% increase in frequency year over year. Over the last 6 months at Unitrends, we’ve seen a 20x increase in the number of organizations engaging our Support and Cloud teams due to a ransomware attack. In response to these rampant threats, Unitrends is more focused on securing your backup infrastructure and helping organizations recover than ever before Join our team for an in-depth look at incident response planning and ransomware preparedness. You will learn…
– How to optimize your incident response plan in the face of rising cyber threats
– The necessary steps to protect the integrity of your digital assets related to a security incident
– How Unitrends Unified BCDR mitigates threats and improves time-to-recovery
In an era of increasing nation state attacks, such as the now infamous SolarWinds hack believed to have been perpetrated by Russia, threat intelligence is integral.
This session will cover:
• The most capable threat actors: China, Russia, Iran, North Korea
• The tactics, techniques and procedures (TTPs) of the main threat actors and how these are evolving
• Why protection is important: The impact of nation state attacks and why proactive protection is key
• Implementing a threat intelligence programme to understand past mistakes
• Cyber threat intelligence solutions
Jenny Radcliffe—aka “The People Hacker”—is a force to be reckoned with. Jenny is a world-renowned Social Engineer, hired to bypass security systems through a no-tech mixture of psychology, con-artistry, cunning and guile. She can diffuse a crisis situation, talk her way into a secure building, and spot a psychopath at a hundred paces. She has been called a mind reader and a “human lie detector,” and likened to a Jedi Knight. In reality, she is an expert in social engineering (the human element of security), negotiation, persuasion and influence, and non-verbal communication and deception—using her skills to help clients ranging from global corporations and law enforcement organizations to poker players, politicians and the security industry. Exclusively represented by Leading Authorities speakers bureau, Radcliffe is an impactful speaker who uses a combination of anecdotes, science, and humour to share lessons that help executives better read people and understand social clues, use subtle tactics to persuade others during negotiations, open up avenues of conversation that were formerly shut, and understand and protect against their own vulnerabilities.
Radcliffe speaks, consults and trains people in the skills of “people hacking,” and explains how “social engineering” using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool not only for business executives but also for security professionals of all types working to prevent attacks, scams, and cons of all kinds. Jenny shares how she, without technology, uses the “machine between our ears” to “psychologically pen-test” companies and find the weaknesses in their security measures with the goal of helping them bolster their human defenses against future attacks.
A regular keynote at major security events—including Infosec, Rant, DISA, Nordic IT Security, ICS2, Trend Micro, Cisco, NTT, Bright talk, and Cyber Security Week—and a multiple-times TEDx contributor, Radcliffe has been a guest expert on security, scams and social engineering for various television and radio shows as well as online media. She originally got involved in the sector when she was approached to do some penetration testing by a private security firm who needed a social engineer to talk their way into a bank. She has been working in management training and consultancy for over a decade.
Jenny is the host of the internationally successful podcast “The Human Factor,” which interviews industry leaders, writers, bloggers, experts, fellow social engineers, and ethical con- artists about people and their stories connected to security.
Jenny was recognised as one of the top 25 Women in Cyber in 2020 by IT Security Guru and as a Top 50 Women of Influence in Cyber in 2019. She was nominated for the prestigious “Godmother of Security” award in 2020, won the “Most Educational Security Blog 2020,” and named one of the top 30 women in cyber/cyber leaders (pandemic leadership) in 2021. In 2022, she was inducted into Infosecurity Europe’s Hall of Fame in recognition of her lifelong work in advancing the human-centered aspect of information security.
Please visit our exhibition area and network with our sponsors
Ransomware is “the most immediate cyber threat” faced by UK businesses, according to NCSC CEO Lindy Cameron. The threat has already been demonstrated across the globe, with ransomware attacks such as the US’s Colonial Pipeline hack and the UK attack on Hackney Borough Council showing the damage that can be done. But most businesses aren’t as prepared as they need to be.
This session will cover:
• How big is the threat from ransomware to UK organisations?
• Examples of recent ransomware attacks and the damage caused
• Who is most likely to be affected by ransomware and why
• How incident response and the ability to test defences are key
• Increasingly sophisticated methods: Ransomware-as-a-service and multi-extortion attacks
• Paying the ransom—and how to avoid this
DDoS attacks are getting bigger. Microsoft reports it mitigated an attack on an Azure customer that came in at 2.4Tbps in 2021, beating the peak traffic volume of a 2.3Tbps attack that hit Amazon Webservices in 2020.
As DDoS attacks surge in scale and number, this talk will look at:
• The size and scale of DDoS: Examples of attacks
• Why attackers use DDoS
• The risk of DDoS to businesses: Who will be targeted and what’s the impact?
• Prevention and mitigation: How to prevent DDoS and mitigate attacks if they do happen
Confirmed Speakers







Sponsors











