September 2025 | Glasgow
2023 Speakers
Global Head of Cyber Security Research, Banco Santander
Senior Research Director: Cybersecurity, Omdia
CISO, Trustpilot
Innovation Lead: Digital Security by Design, InnovateUK, UKRI
CEO, Cyber & Fraud Centre Scotland
Head of Information and Cyber Security, NHS NSS
Head of Department for Cyber Security & Networks, GCU
Cloud Security Engineer, AWS
Hacker, Security Researcher & Lecturer, MMU
Cyber Security Manager, Tesco Bank
InfoSec Governance Analyst, abrdn
Security Engineer, Fortinet
Founder, TechForce Cyber
Pen Tester & Security Consultant, TechForce Cyber
Managing CISO, Barrier Networks
Senior Engineer, CrowdStrike
Professor of Cryptography, Edinburgh Napier University
Head of InfoSec Programme & Culture, Ovo
Chief Operating Officer, Droplet Computing
Senior Sales Engineer, Bitdefender
Solutions Engineer, SentinelOne
Chief Commercial Officer, Silver Cloud
Journalist & Broadcaster, BBC Scotland
Founder, DIGIT
2023 Agenda
08.30 Registration desk and exhibition area opens. Light refreshments provided.
SESSION 1 - Re-Watch on YouTube
The opening session will examine some of the key security landscape trends of 2023 and consider the biggest challenges currently facing practitioners. Speakers will explore: the problem with the security budget deficit, the need for more eyes and attention on detecting and fixing vulnerabilities, and ask what we can learn from recent attacks and ongoing industry research.
09:15 Welcome from the Conference Chair
Mark Stephen, Journalist & Broadcaster, BBC Scotland
09:25 Maximum Attention Minimum Budget
-
Research consistently shows cybersecurity at the top of business and IT challenges
-
Despite the high profile in organizations, security budgets are often being reduced
-
The business issues driving the attention towards security, both globally and regionally
-
The need for cyber-resilience as a component of organisational resilience
-
Making the case for better budgets to support the organisational scrutiny and provide security ROI
Maxine Holt, Sr Research Director, Omdia
09:50 Security Crossroads: Something Has to Change
-
It's easier to hack than ever before
-
Bugs are being found and weaponised at an alarming rate
-
The idea of data privacy is fast becoming a dream over a reality
-
Something has to give, and this is where you, and the community, need to act
-
This talk is inspired by Doc Brown, and if my calculations are correct, when this baby hits 88 miles per hour, you are gonna see some serious...
Daniel Cuthbert, Global Head of Cyber Security Research, Banco Santander
10:15 From Prey to Play: Think like an Attacker to Level up your Security
-
An overview of the threat landscape
-
Current trends and how to mitigate
-
Sentinel Labs: the engine behind SentinelOne's threat intelligence
-
How this research fuels technology
-
Real-world threat hunting case studies
Jonny De Silva, Solutions Engineer, SentinelOne
10:35 Combined Q&A
11:00 Refreshments & Networking
SESSION 2 - Re-Watch on YouTube
Session 2 will hone-in on a variety of key security topics in longer, individual slots. Presentations will be run across four parallel streams, providing delegates the opportunity to attend two options live. The alternative breakouts will be accessible on-demand post event via the DIGIT.FYI YouTube Channel.
11:30 First Breakout Option (A - D)
Breakout Options include:
A. Panel Session: Improving the Security Talent Pipeline
-
Jude McCorry, CEO, Cyber & Fraud Centre Scotland
-
Emma Mackenzie, InfoSec Governance Analyst, abrdn
-
Jackie Riley, Head of Department for Cyber Security, Glasgow Caledonian University
-
Scott Barnett, Head of Information and Cyber Security, NHS NSS
-
Grant Cairns, Cyber Security Manager, Tesco Bank
B. Cloud Security Architecture and Resiliency
-
Migration to Cloud
-
Cloud Security Architecture
-
Journey of Cloud to DevSecOps.
-
Future Architecture of Cloud
Akshita Nikude, Cloud Security Engineer, AWS
C. Drowning in Data; throw your SOC a life ring to improve security posture with efficient contextual awareness
-
Handling large volumes of data to your benefit; better threat hunting and supply chain security
-
Are there more efficient ways than a SIEM?
-
Balancing automation vs. human intervention
-
Compliance for deletion as well as retention
Nicio Ginestri, Sr Engineer, Crowdstrike
D. Secure SD-WAN and SASE: Bringing the Best of Converged Networking and Security Together
-
Secure SD-WAN and SASE have both revolutionized secure networking but have largely been adopted by organisations to serve two distinct communities
-
Secure SD-WAN for fixed locations including homeworking and SASE for remote access. But this means managing two distinct environments
-
To reduce operational and vendor management complexity, the trend is now to leverage the best of both worlds, sometimes referred to as Single Vendor SASE
-
This session will focus on the convergence of SD-WAN and SASE, addressing the questions of What, Why, and How
Mark Mitchell, Security Engineer, Fortinet and Mark Robertson, Chief Commercial Officer,
Silver Cloud
12:05 Transition
12:10 Second Breakout Option (E - H)
E. Improve Your Security Outcomes by Making it All About the People
-
The value of giving people empowerment, control, and responsibility
-
Storyboarding security: showing people where they fit within the organisational jigsaw
-
People often practice security without thinking, make them aware of what they are already doing
-
Look at personal development, building certifications like CISP and ISO into every day use
-
Some people will be less interested or motivated, so find a reasonable minimum security standard
-
Some will be highly engaged and want to learn, leverage and encourage this learning
Raymond Fenton, Head of InfoSec Programme & Culture, Ovo
F. AI-m Sorry: The ‘Prose’ and Cons of Generative AI Chatbots
-
Quick primer on GenAI language tools, like ChatGPT, and what they can do
-
The security dangers of using GenAI tools
-
How GenAI tools will make security more difficult
-
“The Future” of GenAI, and what security pros might need to prepare for
Jordan Schroeder, CISO, Barrier Networks
G. Mobile: the forgotten attack surface
-
How is a mobile a weak point in our defences?
-
How do Threat Actors use this neglected entry point to their advantage?
-
What can be done to harden our defences against these attacks?
-
How do you integrate this into the bigger picture and bring it together?
Ollie Sheridan, Senior Sales Engineer, Bitdefender
H. Achieve Cyber Essentials and Accreditation Whilst Running Unsupported Apps
-
The impact of running legacy apps and servers in 2023
-
What’s new in Cyber Essentials v3, and how will it impact me?
-
How to easily address all your compatibility, security, and compliance challenges
Barry Daniels, Chief Operating Officer, Droplet Computing
12:40 Lunch, Exhibition and Networking
SESSION 3 - Re-Watch on YouTube
Building on the themes from the morning, the afternoon session will take a closer look at some of the most prominent threats and vulnerabilities organisations are dealing with, and what we can do to address them. Key areas of focus will include: the rise of crypto hacks, weak security posture, security by design, and the emerging threat posed by the advancement of quantum computing.
13:40 Breakout Selection (I-K)
I. I Spent 2 Years Down the Crypto Security Rabbit Hole so You Don't Have To
-
Crypto - the wild west of tech!
-
An insight into some of the bizarre goings-on that occur
-
Some of the ways crypto and blockchain is being weaponised and leveraged for criminality
-
From rug pulls and major hacks, to scams a-plenty, nefarious characters and more
Stu Hirst, CISO, Trustpilot
J. Your Organisation Through the Eyes of an Attacker
-
How easy it is for attackers to target your organization
-
Three key questions you need to ask yourself about your security posture
-
The common mistakes your organization can make when building cyber defenses
-
What do you do if you the proverbial stuff hits the fan
Holly Grace Williams, Pen Tester & Security Consultant, TechForce
Jai Aenugu, Founder, TechForce
K. Digital Security by Design: Why Care & Why Now
-
Transforming digital technology to create a more resilient and safer digital future
-
Cross-sector collaboration to create more secure semiconductor devices
-
Enabling a digital environment where only expected access to data + operations are permitted
-
Promoting a mindset change for cyber security, with the freedom to learn, trade, play & collaborate
-
Reducing the attack surface by default, and protecting operational integrity by design
-
The role of DSbD prototype Morello Boards for organisations and academics to explore
Nuala Kilmartin, Innovation Lead: Digital Security by Design, Innovate UK, UKRI
14:10 Transition to Main Hall
14:15 The Threats and Opportunities of Quantum Computing
-
How quantum computer systems work.
-
The cracking of public key encryption with Shor’s algorithm and in breaking symmetric key/hashing with Grover’s method.
-
The new public key encryption methods that will replace RSA and ECC (Elliptic Curve Cryptography) for encryption, digital signing and key exchange.
-
The migration path for businesses to cope with the threats and opportunities caused by quantum computers and associated methods.
-
The opportunities to create new models of cybersecurity detection using quantum computing methods and which integrate machine learning.
Bill Buchanan OBE, Professor of Cryptography, Edinburgh Napier University
14:45 Combined Q&A Panel
15:20 Closing Remarks
15:25 End of Session 3
---
15:30 Networking Drinks Reception
17:00 End of Summit
ON DEMAND: VIRTUAL KEYNOTE WATCH ON YOUTUBE
Your Technical Debt is my Bug Bounty
-
What is bug bounty hunting and how does it work?
-
Stories of real vulnerabilities in real software used by people every single day and how I found them
-
What is the future of software engineering, how can we reduce these vulnerabilities?
-
How can we implement all the new technology like AI and still remain secure
Katie Paxton-Fear, Hacker, Security Researcher & Lecturer, MMU
*The conference agenda is provisional and subject to revision