We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Cybersecurity Summit London

Search

Clear Expand Collapse

Achieving Predictive Resilience With AI

Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.

Price
Course duration Duration: 35 minutes

Automating Incident Response Challenges in Your SOC

Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.

Price
Course duration Duration: 30 minutes

Boosting Discovery & Visibility for Operational Resilience

Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.

Price
Course duration Duration: 25 minutes

Ensuring Compliance With EU Regulations

Jonathan Armstrong, Declan Burke and Rory Alsop navigate the complexities of NIS2, DORA and AI Act compliance for U.K. organizations in the post-Brexit landscape.

Price
Course duration Duration: 35 minutes

Guarding Against AI's Expanded Threats

Nathan Swain of Binance, Max Kington of BNP and Surinder Lall of Paramount analyze AI-driven cyberthreats, from deepfakes to automated phishing, sharing real-world examples and practical defense strategies.

Price
Course duration Duration: 35 minutes

Lessons from 3 CISOs Who Battled Ransomware

Ian Thornton-Trump, Jon Staniforth and Heather Lowrie share their frontline experiences managing major ransomware attacks, offering practical strategies for incident response, stakeholder communication and recovery strategies.

Price
Course duration Duration: 35 minutes

Reducing Risk Through Automated Threat Profiling

Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.

Price
Course duration Duration: 30 minutes

Third-Party Risk & Emerging Supply Chain Threats

Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.

Price
Course duration Duration: 30 minutes

Unmasking Cyber Deception in a Tabletop Simulation

Martin Peters and Phillip Davies lead an interactive tabletop simulation of a deepfake-driven cyberattack, focusing on organizational readiness and response strategies.

Price
Course duration Duration: 20 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement