- Sophisticated Cyber Threats and Attacks: As the cyber threat landscape continues to evolve with increasingly sophisticated and persistent attacks, learn how to defend against advanced threats that can bypass traditional security measures
- Supply Chain and Third-Party Risk: Brainstorm the best ways to assess and manage the security posture of vendors, partners, and suppliers to prevent potential vulnerabilities from compromised systems
- Zero Trust Implementation: How can you rethink traditional security models, establish strict access controls, and ensure seamless user experiences?
- Regulatory and Compliance Complexities: Navigate a web of regulations, from GDPR and CCPA to emerging laws, and ensure their organization’s data handling practices align with these requirements
- Talent Acquisition and Retention: The persistent shortage of skilled IT professionals continues to challenge CIOs in building and maintaining high-performing teams. What do you need to do to attract top-tier talent, upskill existing employees, and foster a culture of continuous learning to navigate talent scarcity?
Welcome to CyberSec 2024 Where Visionary Cybersecurity Leaders Uniteto Fortify Tomorrow's Digital Frontier!
Discover the ultimate gathering ground for trailblazing CISOs and cybersecurity leaders at CyberSec 2024. As the technology ecosystem continues to evolve at an unprecedented pace, and every digital interaction carries unprecedented importance, the role of the CISO has never been more critical.
Join us at CyberSec 2024 and discover the insights, strategies, and connections that will empower you to safeguard the digital landscape of the future.
CyberSec 2024 is not just a conference; it's a nexus of innovation, collaboration, and forward-thinking insight.
Our high-level keynote presentations, interactive panels and round table discussions, led by industry luminaries and visionaries, will delve into the most pressing challenges and emerging trends in the cybersecurity landscape.
From AI-powered threat detection to blockchain-driven data integrity, our agenda is tailored to empower you with the tools and knowledge to stay ahead of the cyber curve.
Engage with a community of like-minded professionals who share your passion for defending against digital threats, and explore innovative solutions that will shape the future of cybersecurity.
Your seat at the CyberSec 2024 table awaits – let's shape the future together!
SOME OF OUR ATTENDEES...
JUST SOME OF OUR CONFIRMED PARTNERS...
SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS
250
Thought Leaders on Site
20 +
Solutions on Show
57%
of IT leaders have been given extra budget to cope with the post-Covid WFH scenario
71%
of IT leaders prefer physical events to virtual events
42%
of IT leaders identify data security as a top priority
Topics to be covered include:
Who Should Attend?
FIELD
IT Security, 78%
Data, 12%
Governance, 10%
SENIORITY
C-Level, 60%
Directors/VP, 25%
Project Leads, 15%
- WFH & Hybrid
- Digital Transformation
- Cloud
- Collaboration
- Security
- Tooling
- Leadership
“Great discussions with other like-minded experts” – EAO
“A super opportunity to take a step back, reflect, see“A super opportunity to take a step back, reflect, see & learn things from other industries.”& learn things from other industries.” – IQVIA
“The room was truly world class. You could not imagine a better group to discuss what we discussed” – RightCrowd
EPN IT Vision at a Glance / Top 3 reasons you should attend
1: Save time & money by meeting your peers & discovering new technologies all in one place
2: Take part in dynamic discussions, tailored to you and your specific business concerns
3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks.
You have full control of your agenda.
Expert Insights
20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…
Exclusive Features
A new awards show, match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…
Like-minded Senior Peers
Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…
New Technologies
Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…
YOUR AGENDA FOR THE DAY (Click below to expand)
Registration and Coffee
8:30
Opening Keynote
09:00 – 09:30 Opening Keynote: Microsoft Futures: Accelerating Innovation, Discovery and R&D Transformation
Which disruptive technologies are poised to influence industries, governments, and societies within the next five years? What are the core incubations and key strategic investments shaping Microsoft’s roadmap? Discover Microsoft’s vision for the next wave of innovations and opportunities for your organization. Learn how emerging technologies such what’s next for generative AI and quantum, are both enabling new customer scenarios today in scientific discovery, R&D transformation and shaping the future of computing in the process. Gain actionable steps on how to co-innovate with us today for meaningful business transformation, and plan for the future with new possibilities on the horizon.
Nick McQuire, Director Incubation Management, AI and Quantum Computing, Microsoft
Keynote Presentation
09:30 – 10:00 From Data Egosystem to Ecosystem.
Sharing data to leverage business success seems to be a ‘no-brainer’, but the reality still falls short of expectation. How to overcome the pitfalls and identify the relevant capabilities to enable data-driven growth?
Greta Schnell, Technology Strategy & Advisory Senior Manager, Accenture
Solution Spotlight Sessions
10:00 – 10:45
This focused session is your opportunity to learn more about the cutting edge technologies transforming the future of the IT and Cybersecurity markets. Each solution spotlight lasts just ten minutes.
Solution Spotlight #1
Data Governance: Driving Cost Savings and Financial Success!
Marc Crauwels, CEO, Progressivum
Solution Spotlight #2
From Upload to Data Storage: Data Security in the Context of IT Security
Dario Trambale, Regional Sales Manager, OPSWAT
Solution Spotlight #3
How Legacy Tech and Insufficient Access to Data are Holding GenAI Back
Dominic Wellington, Enterprise Architect, SnapLogic
Coffee Break
10:45 – 11:15
1-2-1 Meetings/Conference Roundtables/Networking
11:15 – 12:00
The Way into and out of Cyber Crisis
In the ever-evolving landscape of cybersecurity threats, Ransomware-as-a-Service (RaaS) has emerged as the number one threat. This round table will delve into the operations of the RaaS ecosystem, exploring how it enables cybercriminals to launch devastating ransomware attacks. We will dissect the kill chain that needs to be taken to trigger a cyber crisis and highlighting each stage from initial access through to the final demand for ransom. We then will go through the tactical steps needed to recover from the crisis and how to strengthen the security posture for emergency operations.
Christopher Golitschek, Team Lead Incident Response and Senior Security Consultant, Eviden
12:15 – 13:00
Navigating Cyber Risks and Insurance: Strategies to Overcome Evolving Cyber Threats and Risks in Today’s Digital Ecosystem
- Exploring the role of cyber insurance as a risk management tool and its effectiveness in mitigating potential financial losses
- Identifying critical factors CISOs should consider when selecting cyber insurance policies, including coverage limitations, exclusions, and policy terms
- The importance of maintaining robust cybersecurity measures and how they impact insurance premiums and coverage
- Strategizing proactive incident response plans to minimize the impact of cyber breaches and facilitate smoother insurance claims processes.
- Anticipating future cyber threats, emerging technologies, and regulatory changes, and their implications for cyber insurance strategies
Bernd Wenninger, CIO, A3M Global Monitoring
Lunch
13:00 – 13:45
Keynote Presentation
13:45 – 14:15 Keynote Presentation: Vulnerability Assessment of Office 365: The Good, The Bad and The Bounty Bucks
In this presentation, Ashar will share his firsthand experiences in identifying vulnerabilities within Office 365—a platform hailed by Microsoft as the world’s premier productivity cloud, meticulously designed with a robust Security Development Lifecycle (SDL). Microsoft places security at the core of Office 365, subjecting it to annual third-party penetration testing and vulnerability assessments. Additionally, the platform boasts a public bounty program, attracting a community of researchers and bug hunters who continuously scrutinize its security posture.
Despite these rigorous security measures, his investigation revealed 365 bugs lurking within Office 365. Ashar will explore some of the most intriguing bugs I discovered across critical components like Outlook, Word, Excel, PowerPoint, PowerApps, Dynamics 365, SharePoint, and Azure.
His session will culminate in a critical reflection on Office 365’s security landscape and its implications for your own applications. If a meticulously secured platform like Office 365 harbours 365 vulnerabilities, it prompts us all to reevaluate our security strategies. Let’s delve deeper and fortify our defences.
Dr Ashar Javed, Chief Information Security Officer, Hyundai Autoever Europe
Closing Keynote Panel Discussion
14:15 – 15:00 Securing the Future: Collaborative Strategies for Cyber Resilience in the Digital Age
- As leaders tasked with safeguarding organisations against ever-evolving cyber threats, it is imperative that CIOs and CISOs unite both expertise and resources to confront these challenges head-on. In this session, our panellists will explore strategic approaches to enhance cyber resilience, foster collaboration between IT and security teams, and fortify defences against cyber adversaries.
- Understanding the evolving cyber threat landscape and the importance of proactive defence strategies
- Building a culture of cyber resilience that prioritizes continuous improvement and adaptation to emerging threats
- Embracing collaboration between CIOs and CISOs to align technology investments with security priorities and business objectives
- Leveraging threat intelligence and information sharing to enhance situational awareness and response capabilities
- Implementing robust incident response and recovery plans to minimize the impact of cyber incidents and ensure business continuity
Riccardo Riccobene, Head of CISO Security Assurance, DWS Group
Bernd Wenninger, CIO, A3M Global Monitoring
Robert Hellwig, Chief Information Security Office, University of Siegen
Moderated by: Fawsy Bendeck, Senior Principal, Accenture
Drinks Reception
15:00
YOUR TECHNOLOGY SHOWCASE
Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Vision 2024.
Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CIO community.
- ITSM
- Identity & Access Management
- Communications
- API
- IOT
- Remote IT
- CRM & ERP
- DevOps
- Network Infrastructure
- 3rd Party Risk
- Cloud Management
- Data Management
- AI & Automation
- Mobile & Applications
- Monitoring & Reporting
- Security
TITANIUM
- Exhibition Space in Tier 1 Area
- Solution Spotlight Slot
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
Co-branding on All Literature - Priority networking
- Bespoke Thought Leadership Dinner the night before
PLATINUM
- Exhibition Space in Tier 1 Area
- Solution Spotlight Slot
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
- Co-branding on All Literature
- Priority networking
GOLD
- Exhibition Space in Tier 1 Area
- Solution Spotlight Slot
- 5 x 121 Meetings in the build up and over the course of the day
- Co-Branding on All Literature
- Priority Networking
SILVER
- Exhibition space in Tier 2 Area
- 3 x 121 Meetings in the build-up and over the course of the day
- Co-Branding on Some Literature, Networking Sponsorship
BRONZE
- Exhibition space in Tier 3 Area
- Co-Branding on Some Literature
- Networking Sponsorship
ENTRY-LEVEL SPONSORS
- Branded Table in the Coffee Area
- Networking Sponsorship
Take Part in the Expo / Top 3 ways you can gain exposure
1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.
2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.
3: We know the power of face-to-face business networking. You should be part of the conversation.
Thought-Leadership
Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.
Brand Visibility
Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.
Demonstrating Value
Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them