Keynote: Optimising Threat Detection and Response in Light of Increased Automation

Chairs Opening Remarks

Chair’s Closing Remarks

How to create a Resilient Software Supply Chain

Securing Critical Infrastructure

Panel Discussion: How to Stay Ahead of Insider Threats

Mesh Architecture – Creating a New Line of Defence

Panel Discussion: Securing the IoT: An Evolving Concern

Afternoon Keynote: The Evolution of Ransomware Attacks and How to Prevent Them

Why a Zero-Trust Approach Is the Key to Optimal Security