Menu Close


  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks

With threat actors continuing to evolve and changing their tactics, it has become more challenging for organizations to defend against sophisticated phishing attacks – especially those that are getting past secure email gateways.

Listen in as Cofense Sales Engineer, Alain Salesse, and Account Manager, Mark Ross, share their expert insight into the current threat landscape, how these threats are getting past these security perimeter controls and landing in the inbox of the end users.

Highlights will include:
– Insights of various phishing campaigns that evaded SEGs and reached enterprise end users, delivering credential phish and malware.
– How threat actors are using trusted services, such as online business surveys and document sharing platforms, to evade SEGs.
– Expert predictions of what we will continue to see through the remainder of 2020.

ThinkCyber unpick the science and theory behind behaviour models to help us understand why risky behaviours happen, and more importantly how to stop them. From research that questions the efficacy of teaching at the point of failure in phishing tests, to behaviour models that highlight the need for timely cues. Looking at examples of how cognitive psychology, behavioural and social science can and are being used to guide user behaviour. This talk will offer real world examples and ways that all organisations can apply the theories to drive secure behaviour change.

Cybersecurity has evolved with these changing times due to COVID-19 situations. The priorities have shifted and so have the IT budgets.
-How does Cybersecurity look in the current situation?
-What can you do to manage your IT budgets?
-Which technological areas you shall be focusing on and investing in?
-How will the new world look like in terms of cybersecurity?

Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 billion internet-connected devices in early 2020. While IoT devices can provide a new level of convenience and efficiency across an organization, they also create opportunities for hackers to compromise the security of your network and gain access to critical data.
In this webinar, we’ll identify the top cybersecurity risks associated with IoT devices and effective ways to mitigate common vulnerabilities linked to: port forwarding, VPN, credential management, data encryption, firmware signing, and firmware upgrades.

“Migrating to the cloud offers many benefits, but do you feel you need more control over your crypto assets and can you leverage the full benefits that an HSM can offer within your chosen deployment model. This talk will help you evaluate the environment, assess the risks and choose the right solution to bring trust, integrity and control to your cloud strategy.”

Please take time to visit our sponsor area.

Overview coming soon

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:
• Paradigm shifts in the cyber landscape
• Advancements in offensive AI attack techniques
• The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
• Real-world examples of emerging threats that were stopped with Cyber AI

The idea that someone might be secretly lurking in your account and spying on you is bad enough, let alone the security and compliance implications. Unfortunately, that’s what happens with Account Takeover – an increasingly common attack Juniper Research estimate will cost organisations $25bn worldwide in 2020.

In this presentation from Censornet CTO Richard Walters, he will cross-examine the Account Takeover attack, the risk it presents, and the action you can take to stop criminals from getting a foothold into your organisation.

International lockdowns have, for now, killed off the availability of classroom-based, instructor-led training. But for technical employees, they really weren’t suitable in any case. They were inconvenient and expensive and point-in-time learning is easily forgotten weeks, or even days, later. Equally, video-based snooze-fest internet learning platforms don’t cut it either. Cybersecurity professionals need an authentic, hands-on, interactive experience that reflects the real requirements of their role and prepares them for critical data breach scenarios but in a format that is available 24×7 through a browser.

The continued effectiveness of certain threat actor tools is in part due to poor password hygiene. There is no honour among thieves, and some of these tools have been cracked, allowing any interested cybercriminal to use them at a cheaper price than offered by the original seller — or even completely free. Checkers and brute forcers are among these popular tools sold and shared on the criminal underground to validate credentials quickly and easily.

In this presentation, Jason Steer, director of EMEA presales at Recorded Future, will draw on recent Insikt Group research to share insight into checkers and brute forcers that facilitate threat actor campaigns, and explain how security intelligence can help organisations defend against malicious attacks, strengthen password management, and prevent threat actors from capitalizing on password reuse.

As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

In credential stuffing attacks, threat actors use stolen credentials from one breach to takeover users’ other accounts. This is effective because 65% of people reuse passwords across multiple accounts, according to Google. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

Join Jamie Hughes, Lead Solutions Engineer, to learn:
• How credential stuffing attacks work
• What effect they can have on your company

The Cyber Threat Landscape: where will we stand after Covid?

Covid has had an impact on the cyber threat landscape – some of it obvious but some less so. How much of this change is permanent? How will cyber security – threats and responses – change as we move out of the pandemic period?

Enjoy a catch up with speakers, sponsors & peers and join our after party and Live comedy from Bennett Arron

Delegates booked so far


Community Area


Home Workouts


spaghetti Bolognese