Skip to main content

UK Cyber Week 2023 - Where UK Businesses fight back against cyber crime - 4/5 April 2023

UK Cyber Week 2023 - Where UK Businesses fight back against cyber crime
Syndicated By: Iain Fraser Cybersecurity Journalist Gibraltar

15th March 2023

UK Cyber Week 2023 - 4th-5th April 2023
Business Design Centre - Islington, London

We are all in this together, but we believe there is a knowledge gap between the expertise of the cyber community and UK businesses leaders. We want to close that gap. Everyone has their part to play – policymakers, businesses, cyber professionals, IT departments, cyber vendors, software developers, law enforcement, media and educators. Join the community fighting back at UK Cyber Week.

We’re bringing everyone together to level up UK cyber security, demystify jargon, share the latest thinking and learn from truly world-class experts. Our promise is that everyone, no matter how much or how little expertise they have, leaves knowing more and is better equipped.

UK Cyber Week 2023 - 4th-5th April 2023
Business Design Centre - Islington, London

2 days of jam-packed networking and content

UK Cyber Week brings together the cyber and IT communities, as well as business leaders, looking to incorporate and improve cyber strategies across their organisations.

The agenda features over 100 cyber experts, hackers and disruptors; Exhibitors offering ground-breaking solutions; Networking opportunities throughout the day; Meet-ups, Book signings, Live Demos, Capture the Talent Immersive Experience and the Cyber House Party. 

Why Visit

We bring cyber and business communities together to learn from world class experts and leave with the knowledge, tools and skills to protect teams, companies, supply chains and infrastructure from future attacks. 

From phishing to ransomware, viruses to deep fake, cyber crime can bring down governments and organisations. Leaked data, system hacks, and fraud cost companies tens to hundreds of millions of pounds. 

With 95% of cybersecurity issues down to human error, are your policies, procedures, and defences up to date? Learn More /...


Agenda

An extensive programme of conference-level content for free. Held across 6 theatres, sessions include:

Confessions of a Hacker, Stealing the Crown Jewels, From Offensive to Defensive – How Exposure to Counter-Terrorism Efforts in the Middle East Shaped my Career, Building Cybersecurity Into Your Corporate Culture, An IT Manager’s Guide to Hacking Things Faster, The True Threat to Identity by Modern Attackers Learn More /...


Speakers

Over 100 cyber experts, hackers, case studies and disruptors.
Google, Microsoft, City of London Police, Thales Group, CIISec, ExpressVPN, Forescout, Crowdstrike. Case studies including Cecilie Fjellhoy (from Netflix's Tinder Swindler). 
Updates from Jayson E Street, biohacker Len Noe and live demos from the BBC and Lazarus Heist's Geoff White. Learn More /...


Cybersecurity Journalist


Comments

Popular posts from this blog

CYBER BREACH: Data Breach Exposed Thousands of Pet Medical Records Including Owner Information

Tuesday, 5th December 2023 CYBER BREACH: Data Breach Exposed Thousands of Pet Medical Records Including Owner Information By Jeremiah Fowler - Website Planet  Syndicated By IainFraser.net/CYBER_Voice Daily Cyber Insights  Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to WebsitePlanet about a non-password protected database that contained over 56,000 records, including pet medical reports, DNA tests, pedigree history and other potentially sensitive information. As a long-time cyber security researcher, this is one of the most interesting discoveries I have ever encountered and a first for me.  I recently discovered a non-password protected database that contained records of thousands of dogs from around the world and included the information of their human owners. The publicly exposed cloud storage database contained a total of 56,624 documents in .PDF, .png, and .jpg formats with a total size of 25 GB. Upon further investigation, the database appeared...

CYBERSECURITY NEWS: ECSO Launches its latest ground-breaking initiative CYBERHive

28th November 2023  CYBERSECURITY NEWS: ECSO Launches its latest ground-breaking initiative CYBERHive  Syndicated By: Iain Fraser/ Cyber PR Wire via IainFRASER.net/ CyberPRWire ECSO is delighted to announce the launch of its new, ground-breaking initiative: Cyberhive EUROPE. Cyberhive is the first-ever European marketplace co-created with- and for the European cybersecurity ecosystem, and will offer global accessibility to all Europe-headquartered cybersecurity solution providers, while also being freely accessible to end-users worldwide. Through the Cyberhive, ECSO will connect market players, promote European-made products, and ultimately strengthen the European cybersecurity market as a whole. To learn more about the Cyberhive, read below.  The second Annual CISO Meetup, organised by ECSO, starts today! Over 150 CISOs are joining us in Florence from all over Europe to engage in high-level discussions on critical cybersecurity topics. Read more below. Learn More /... ...

CYBER THREAT INTEL: AI - UK & US Spooks publish AI Development Guidance

Tuesday, 28th November 2023 CYBER THREAT INTEL: AI - UK & US Spooks publish AI Development Guidance Posted by: Iain Fraser - Cybersecurity Journalist Gibraltar via IainFraser.net/ Daily Cyber Insights CYBER THREAT INTEL: AI - UK & US Spooks publish AI Development Guidance The UK NCSC & US CISA have joint-published what they term as "security-focused guidance" for AI & ML developers and those who leverage AI/ML with their protocols and systems.  The Publication of Guidelines for Secure AI System Development (PDF),  apply to all types of AI/ML systems, regardless of whether built from wireframe up or added as a bolt-on on third-party resources, to address issues related to AI, cybersecurity, and critical infrastructure. Devised to be used in conjunction with existing Cybersecurity, Incident Response and Cyber Risk-Management protocols. The NCSC and CISA have said “Providers should implement security controls and mitigations where possible within their mode...