Summit Highlights

Why Join Us At This Summit


  1. Acquire actionable insights, proven solutions and effective strategies to prevent data breaches during cyber-attacks
  2. Exclusive international case studies by frontier cyber warriors who have played imperative roles in cyber operations and cyber security innovations
  3. Engage and network with some of the most inventive minds at the frontier of cyber security community, build valuable strategic partnerships
  4. Stay ahead of the cyber technology curve and discover what’s next in new cyber technologies to help future-proof your organisation
  5. Be part of the exclusive gathering of CISOs, CIOs, CEOs of key and emerging players in the cyber battlefront
  6. Invaluable takeaways from best practices, new case studies and research findings, and practical insights on how innovations in cyber security technology can be help build a safer cyber environment and optimize operational efficiency
  7. Evaluate cyber security initiatives in areas like CASB, Cyber Governance, DevSecOps, Access Management, Vulnerability Assessment, Gap Insurance, Managed Security Services and Cyber Intelligence
  8. Join the many panel discussions and round tables at the summit, get all your pressing questions answered, and help map out your transformational cyber security journey
  9. Understand what are backdoors, zero day exploits and how security by design can address these challenges
  10. Ride the new 5G cyber wave, pre-empt new cybersecurity onslaughts from on-coming quantum cryptography

Hot Topics To Be Discussed


  • Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
  • Leveraging Machine Learning And AI In Next Generation Cybersecurity
  • Incident Response, Threat Hunting And Digital Forensics


  • Weaponizing AI: How Cyber Criminals Are Using Machine Learning To Launch Attacks And Machine Learning To Improve Exploits – Case Study Of Creating An Adaptive Blockchain For Messaging Purposes For Bypassing Government Controls
  • Managing Major Cyber Incidents – Insights And Observations
  • Lessons From Past Data Breaches
  • International CyberSecurity Frontier Case Studies
  • Global CEO –CIO- CTO – CISO Panel Discussion
  • Security By Design For IoT Networks


  • Deploying A Zero-trust Approach To Securing Access Of Mobile Devices, Apps And Networks. Securing User Access Authentication In A Perimeter-less World – A Corporate Perspective
  • Leveraging Machine Learning, Automation And AI In Next Generation Cybersecurity
  • Automating Cyber Security Defences In The Next Industrial Revolution
  • Next Wave Of The Future: Cyber Security In Space Systems & Technologies
  • 5G & Cybersecurity
    Why A Massive Cyber Attack On 5G & Vulnerable Iots Could Cripple An Entire City Or Country – Managing New Challenges In 5G, Cybersecurity, Security Design, Zero Day Exploits

Pre-Summit Workshops: 7 June 2023


Workshop A: Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits

  • Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.

Michael Connory

Ethical Hacker & CEO
Security In Depth

Security In Depth_logo

Seminar B

Workshop B: Leveraging Machine Learning, Automation And AI In Next Generation Cybersecurity

  • Building Robustness in AI Technology
  • Cybersecurity challenges that AI will pose in the future
  • How Hackers use AI to identify vulnerabilities
  • Deterring Hacking Through AI and Machine Learning
  • Combining Machine Learning with Network Traffic Analysis: How AI Will Help to Identify Which Traffic Will Be Potentially Malicious


Dr Michael Brand
Otzma Analytics

Otzma Analytics_logo_500px

Seminar C

Workshop C: Incident Response, Threat Hunting And Digital Forensics

Helping responders and threat hunting teams with advanced skills to hunt down, identify, counter and recover from a wide range of threats within enterprise networks including nation-state adversaries, organised crime syndicates and hactivism. Threat hunting is limited by a few factors: good quality data, pervasive visibility across your control points, advanced AI and Machine Learning, and superior detection/correlation. Legacy tools just don’t work. What are the right tools that will work, how the data needs to be improved, finding the threats, and how to build automation to respond and react to your events

  • Update with hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter and respond to real-world breach cases
  • Devising Penetration Testing and Vulnerability Assessment


Skeeve Stevens
Future Warfare Threat Analyst
Future Sumo

Future Sumo_logo