Summit Highlights
Why Join Us At This Summit
10 REASONS TO JOIN US IN JUNE:
- Acquire actionable insights, proven solutions and effective strategies to prevent data breaches during cyber-attacks
- Exclusive international case studies by frontier cyber warriors who have played imperative roles in cyber operations and cyber security innovations
- Engage and network with some of the most inventive minds at the frontier of cyber security community, build valuable strategic partnerships
- Stay ahead of the cyber technology curve and discover what’s next in new cyber technologies to help future-proof your organisation
- Be part of the exclusive gathering of CISOs, CIOs, CEOs of key and emerging players in the cyber battlefront
- Invaluable takeaways from best practices, new case studies and research findings, and practical insights on how innovations in cyber security technology can be help build a safer cyber environment and optimize operational efficiency
- Evaluate cyber security initiatives in areas like CASB, Cyber Governance, DevSecOps, Access Management, Vulnerability Assessment, Gap Insurance, Managed Security Services and Cyber Intelligence
- Join the many panel discussions and round tables at the summit, get all your pressing questions answered, and help map out your transformational cyber security journey
- Understand what are backdoors, zero day exploits and how security by design can address these challenges
- Ride the new 5G cyber wave, pre-empt new cybersecurity onslaughts from on-coming quantum cryptography
Hot Topics To Be Discussed
PRE-SUMMIT WORKSHOPS: WEDNESDAY, 7 JUNE 2023
- Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
- Leveraging Machine Learning And AI In Next Generation Cybersecurity
- Incident Response, Threat Hunting And Digital Forensics
SUMMIT DAY 2: THURSDAY, 8 JUNE 2023
- Weaponizing AI: How Cyber Criminals Are Using Machine Learning To Launch Attacks And Machine Learning To Improve Exploits – Case Study Of Creating An Adaptive Blockchain For Messaging Purposes For Bypassing Government Controls
- Managing Major Cyber Incidents – Insights And Observations
- Lessons From Past Data Breaches
- International CyberSecurity Frontier Case Studies
- Global CEO –CIO- CTO – CISO Panel Discussion
- Security By Design For IoT Networks
SUMMIT DAY 3: FRIDAY, 9 JUNE 2023
- Deploying A Zero-trust Approach To Securing Access Of Mobile Devices, Apps And Networks. Securing User Access Authentication In A Perimeter-less World – A Corporate Perspective
- Leveraging Machine Learning, Automation And AI In Next Generation Cybersecurity
- Automating Cyber Security Defences In The Next Industrial Revolution
- Next Wave Of The Future: Cyber Security In Space Systems & Technologies
- 5G & Cybersecurity
Why A Massive Cyber Attack On 5G & Vulnerable Iots Could Cripple An Entire City Or Country – Managing New Challenges In 5G, Cybersecurity, Security Design, Zero Day Exploits
Pre-Summit Workshops: 7 June 2023
Workshop A: Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
- Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.
Michael Connory
Ethical Hacker & CEO
Security In Depth
Workshop B: Leveraging Machine Learning, Automation And AI In Next Generation Cybersecurity
- Building Robustness in AI Technology
- Cybersecurity challenges that AI will pose in the future
- How Hackers use AI to identify vulnerabilities
- Deterring Hacking Through AI and Machine Learning
- Combining Machine Learning with Network Traffic Analysis: How AI Will Help to Identify Which Traffic Will Be Potentially Malicious
Dr Michael Brand
Founder
Otzma Analytics
Workshop C: Incident Response, Threat Hunting And Digital Forensics
Helping responders and threat hunting teams with advanced skills to hunt down, identify, counter and recover from a wide range of threats within enterprise networks including nation-state adversaries, organised crime syndicates and hactivism. Threat hunting is limited by a few factors: good quality data, pervasive visibility across your control points, advanced AI and Machine Learning, and superior detection/correlation. Legacy tools just don’t work. What are the right tools that will work, how the data needs to be improved, finding the threats, and how to build automation to respond and react to your events
- Update with hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter and respond to real-world breach cases
- Devising Penetration Testing and Vulnerability Assessment
Skeeve Stevens
Future Warfare Threat Analyst
Future Sumo