Day 1 - 1 December 2022



Chair’s Welcome

Chairpersons welcome and opening remarks. 



Presentation: The Perils and Promises of Cybersecurity Technology in 2022

  • Exploring the risks and opportunities of technological transformation in the Cybersecurity eco-system. 
  • Reviewing the best Cyber practices in 2022. 
  • What poses a concern for 2023 in Cybersecurity? 



Senior Representative, Manage Engine

Associated Talks:

10:15AM - Day 1

View Presentation: Wiped Out – Solutions to a Wiper Attack

View Full Info

Presentation: Wiped Out – Solutions to a Wiper Attack

  • What is meant by a ‘Wiper Attack’ 
  • The threats a Wiper Attack can have on your enterprise 
  • What would protect me from a Wiper Attack? 
. Senior Representative, Manage Engine, ,



Panel: Tricky Business – How to Evaluate Risk

  • Defining what risk is in today’s Cyber and Cloud environment. 
  • The benefits and pitfalls of metrics, access, and devices.  
  • How People, processes & products are utilised to evaluate risk. 
  • Whose job should it be? Should there be restrictions when working with other companies?  



Networking Break



Senior Representative, Darktrace

Associated Talks:

11:40AM - Day 1

View Presentation: Organized Cybercrimes – What Can We Do?

12:00PM - Day 1


03:50PM - Day 1

View Presentation TBC: Darktrace

View Full Info

Presentation: Organized Cybercrimes – What Can We Do?

  • What are the most common types of Organized Cybercrimes we see today? 
  • Review Examples of Organized Cybercrime. 
  • Cyber Crime Prevention: What Do I Need? 
. Senior Representative, Darktrace, ,



Presentation: No Phish for Me Please!

  • What is a Phishing Attack and why is it still a threat to businesses in 2022? 
  • What is the result of a Phishing Attack? How does it affect me? 
  • How to recognise a typical Phishing Attack and How to Respond. 



Presentation: The Ransomware Rising

  • Ransomware attacks are evolving their strategies in light of heavy crackdowns: how do we evolve alongside this? 
  • Learn more about ransomware prevention, mitigation, and response.  



Lunch & Networking



Panel: Head Stuck in the Cloud? What You Need to Consider

  • Should we be automatically moving to the cloud? Where is cloud not being adopted and why? 
  • Industry success stories of organizations using the cloud securely.
  • Using cloud-based resources safely – moving sensitive workloads out of legacy data centres. 



Presentation: Creating a Cyber Resilient Business

  • The impact of combining cybersecurity, business continuity and enterprise resilience.  
  • How to elevate the role of security in your business.  



Fireside Chat : Women in TechEx

  • Empowering the Next Generation of Women in Cybersecurity One byte at a time. 
  • How to drive and sustain change in the cybersecurity industry. 
  • How to Stay Motivated and Inspired in a Cybersecurity Role. 
  • The Importance of Cybersecurity Academic Integration.  



Networking Break



Presentation: Securing the Enterprise Against Potential Data Breaches

  • Understanding why the consequences of a data breach are worse than ever. 
  • Learn how to minimize the risk of a data breach with a comprehensive policy. 



Presentation: The Latest Social Engineering Threats

  • What are the current social engineering threats? 
  • Understanding the consequences of social engineering on enterprise. 
  • How to effectively equip your workforce to be prepared for social engineering threats. 



Presentation: Faking It – Deepfake Crime Exposing Cyber Security Gaps

  • Understanding the Deepfake Threat, why it is a current threat and not a future concern?  
  • How should I respond to Deepfake? 
  • Why Cybersecurity needs People, not just Technology. 



Chair’s Closing Remarks



End of Day 1