

September 2025 | Glasgow


2024 Speakers


Director of Technical Account Management, Tanium

Founder, TechForce Cyber

Journalist & Broadcaster, BBC Scotland

Founder, DIGIT

2024 Agenda
Wednesday 11 September, Hilton Hotel Glasgow
08:20 - 08:55 Breakfast Briefing
​
Reducing Risk Through Automated Threat Profiling
​
-
Benefits of automated threat profiling - why we do it & why is it challenging
-
How can we prioritise threat actors & malware more dynamically and in real-time
-
How can we operationalise the output to further protect our organisation
​
Serge Palladino, Principal Consultant: Intelligence Advisory Services EMEA, Recorded Future
& Jai Aenugu, Founder, TechForce Cyber
​
SESSION 1
With an ever-changing security backdrop and a constant pipeline of new threats and vulnerabilities, it can be hard just to keep up - let alone stay ahead. In the opening session, we will look at proactive measures that leaders can take to help their organisation adopt a more strategic approach to security, and improve their ability to anticipate and mitigate threats.
​
09:15 Welcome and Introduction
​
Mark Stephen, Journalist & Broadcaster
​
09:25 Shifting to a Proactive Stance on Strategic Threat Intelligence
​
-
Cyber Security is inextricably linked to Geo Politics and Socio-technical trends
-
In order to effectively operationalise CTI, it is essential to be pro-active rather than re-active
-
Increasingly leadership is turning to strategic threat intelligence to identify trends & create long-term plans
-
This enables organisations to define their security posture and prioritise resources to priority threats
-
This requires strong collaboration across teams to ensure it informs and is informed by operational and tactical threat intelligence
​
Harriet Rogers, Strategic Cyber Threat Intelligence Specialist, BAE Systems
​
09:50 More than Monitoring: Proactive Security made Simple and Human
​
-
More than "Monitoring": security must be proactive and together you can de-silo
-
The carrot or the stick: get the business to clean up its tech debt
-
Communicating to "non-technical people"
-
Trickle up: cyber risk is business risk
-
Cyber beyond protection: security as an enabler
​
Celine Pypaert, Security Transformation Manager, Johnson Matthey
​
10:15 Unleashing AI for Effective Defence
​
-
Organisations must focus on addressing the dynamic and rapidly evolving nature of cyber threats.
-
Provide insight into the critical process of integrating artificial intelligence (AI) into cybersecurity operations.
-
Understand the practical steps and strategies to harness AI for enhancing your organisation’s cybersecurity posture in an ever-changing threat landscape
-
Real life AI relevant use cases
​
Elliot Went, Senior Systems Engineer, SentinelOne
​
10:35 Q&A​
11:00 Refreshments & Networking
SESSION 2
Session 2 will explore a series of key topics in a longer presentation format. The session will be run in a breakout format across four parallel streams, providing delegates the opportunity to attend two options.
​
11:35 First Breakout Option (A-D)
​
A. IT & OT: Collaborating to Protect Critical Infrastructure
​
-
Where can IT and OT bring experiences from their separate contexts to collaborate
-
How can this ultimately improve how our critical OT assets are protected
-
How will this help us contend with an ever-changing and escalating set of external threats
​
Iain Dougan, Head of Operational Technology and Cyber, SSEN Transmission
​
B. Fraud Detection and Prevention: Leveraging Advanced Techniques to Safeguard the Marketplace
​​
-
Unique Fraud Challenges in Marketplaces
-
Common Fraud Types
-
Advanced Detection Techniques
-
Multi-Layered Prevention Strategies
-
Real-world Case Studies
​
Maxim Filatov, Data Scientist, Meta
​
C. Demystification of XDR
​
-
Quick evolution of XDR
-
What it is and what it does
-
Where XDR fits best
-
Examples of XDR operations
​
Ryan McConechy, CTO, Barrier Networks
​
D. How To Create Successful Malware and Defend with Zero Trust
​
-
Recognise the ease of creating or using AI-generated malware, highlighting the need for strong cybersecurity.
-
Implement a default-deny security posture, allowing only authorised connections and processes.
-
Apply Zero Trust principles to continuously validate and secure all users and devices.
-
Protect data and maintain operations even during cyber-attacks.
​
Eoin McGrath, Solutions Engineer, ThreatLocker
​
12:10 Transition
12:15 Second Breakout Option (E-H)
​
Breakout options include:
​
E. Proactive Risk Reduction in an Age of Exponential Vulnerabilities
​
-
What is the state of the threat landscape
-
Why is proactive risk reduction critical to keeping a secure environment in today's day and age
-
How can we implement safe automations to keep a baseline of compliance to continuously lower risk in our environments
​
Katherine Chipdey, Director: Solutions Engineering and Alliances, Automox
​
F. From Quishing to Deepfakes: The latest phishing threat trends for 2024
​
-
The rise of Quishing and evolution of payloads
-
How AI is used in phishing attacks, including deepfakes
-
How multi-channel attacks play out
-
The threats that are getting through secure email gateways
​
James Dyer, Threat Intelligence Lead, Egress
​
G. How do you win at Cyber Security, a strategic approach.
​
-
Review of the technological trends over the last few decades and priorities heading into 2024
-
Taking a deeper dive into Visibility and Control - you cannot protect it if you cannot see it
-
Maintaining a good IT hygiene posture through Continuous Safeguarding
-
Do you have the right tools around Detection and Countermeasures
​
Ben Hall, Director of Technical Account Management, Tanium
​
H. Security Operations – Develop, not operate, your way to success
​
-
Detection quality over quantity
-
Why a flat structure beats tiers every time
-
Automate until you can’t. Then automate some more
-
But humans still win…
​
Kevin Robertson, Chief Operating Officer and Co-Founder, Acumen Cyber
​
12:45 Lunch & Networking
​
​
SESSION 3
The afternoon session will look at risk reduction in key areas that are currently impacting security practitioners, including: data protection, information governance, and AI. The programme will then conclude with a look at improving our response to a major attack, taking a CISOs walkthrough of what really happens in the trenches when a full-scale hack occurs at your organisation - and how you can better prepare to deal with it.
​
13:35 Breakout Selection (I-K)
​
I. What are the odds of .... Somewhere between 78 minutes and 8.5 million computers
​
-
Context: A massive, recent, globe-spanning outage of IT systems
-
A review of the incident and how it was handled
-
What happened in the world
-
The aftermath
-
What we can take from the issue to improve our own resilience, attitudes + controls.
​
David McKenzie, Ethical Hacker & Blue Team Specialist
​
J. Security & AI: Do We Really Need New Governance?
​
-
Culture change, awareness, and shadow AI
-
Suppliers using AI: What you need to ask your vendors and why
-
Developing AI: Considerations to maximise the benefits while minimising the harm
-
We already have some good tools and process: we just need to know how to apply it to AI
​
Rachel Close, Senior Responsible AI Manager, BBC
K. Cybersecurity and the GDPR - Mission Impossible?
​
-
How to embed good data governance into a digital strategy by default
-
Some of the common challenges and vulnerabilities in managing / sharing data in enterprise environments
-
Proactive ways to address some of these issues – key learnings, best practice​
​
Katharina West, Head of Information Governance, The Scottish Government
​
14:05 Transition to main stage
​
14:10 So You've Been Hacked - Now What?
​
-
Preparation and identification
-
Containment, eradication and recovery
-
Lessons learned… and now what
-
The psychological impact, helping your team, customer, partners
-
The bit no-one talks about
​
Lena Smart, CISO & Business Consultant
​
14:35 Combined Q&A
​
-
Katharina West, Head of Information Governance, The Scottish Government
-
Rachel Close, Senior Responsible AI Manager, BBC
-
Lena Smart, CISO & Business Consultant
-
David McKenzie, Ethical Hacker & Blue Team Specialist
-
Mark Stephen, Journalist & Broadcaster
​
15:10 Closing Remarks
15:15 End of Programme
​
15:15 Networking & Drinks Reception
16:30 Conference Close
​
*The conference agenda is provisional and subject to change