CYBERUK 2018

Safer Digital Britain
When:  10 Apr 2018 to 12 Apr 2018
Price:  Free to £1099 +VAT
Registration has now closed
CYBERUK 2018 logo

Lead Sponsors

Amazon Web Services
NCC Group

CYBERUK 2018 is the National Cyber Security Centre’s (NCSC) flagship event on cyber security. Over three days, 1800+ people will attend events covering both strategy (CYBERUK Leadership) and delivery (CYBERUK In Practice) – giving you up to date information and industry leading insights.

Building on success

CYBERUK 2017 was rated a success by sponsors, exhibitors and delegates alike, so our approach this year is to learn from what worked best and build on it. Delegates liked the chance to mix with innovative start-ups as much as established names in the industry. We saw how well the informal atmosphere helped with networking, so we’ll have more networking events and more relaxed breakout areas. And we’ll be adding more ways for delegates to become a part of the event, from live polling and questions to more interactive events and team-based challenges.

CYBERUK 2018 will be a curated event, emphasising quality over quantity. Quality of speakers, quality of workshops, quality of exhibitors and, most of all, quality of delegates. Invitations will go out to the key decision makers and the most skilled professionals across every Whitehall department and the public sector. Both events will be free of charge to public sector participants. We’ll also attract thought leaders and specialists from Critical National Infrastructure, the information security and technology industry as well as Academia and the Third Sector. In other words, everyone at the conference needs to be there – and is worth getting to know.

A Diverse and Inclusive event

Following CYBERUK 2017, NCSC Technical Director Dr Ian Levy wrote about the need for a community of professionals to collectively deliver the goals of the National Cyber Security Strategy. In his closing speech Dr Levy threw out a call to arms to make the cyber security industry an exemplar for diversity and inclusion. In his blog, he discussed the need for a community code of conduct where we can all come together and describe "what's acceptable and what isn't", so that we can "start discouraging behaviours and attitudes we won't accept".

Since then, the NCSC, the wider community and businesses outside the security sector have worked on the code of conduct that we have released to trial at CYBERUK 2018. The eventual aim is for this to be a mandatory part of working with the NCSC and something that the whole community can be proud to back.

You can read the full policy here and more about the creation of the policy in this blog.

CYBERUK 2018: Three Days, Two Events, One Destination

The NCSC’s first annual review identified that the cyber security threat to the UK is large, growing and diverse. In its first year of operating, the NCSC has achieved a huge amount establishing itself as the lead UK authority when it comes to cyber security. To deliver the NCSC vision we need to create a wide range of partnerships between Government, Industry and Academia. More than this, we need to develop a national conversation with everyone living and working in the UK.

That means moving beyond encouraging partnership and co-operation, and looking to build a true community of interest, encompassing everyone with a stake in cyber security. And, since the online threat affects citizens, Industry, Government and wider society, this is the scope of the ‘big conversation’ we need to have. CYBERUK 2018 will be where this starts.

It will never be possible to stop every cyber attack, but the NCSC is committed to delivering a world-class incident management service. CYBERUK 2018 will give us an opportunity to discuss and identify how we can build on what we have done so far. 

We’ll also focus on some areas of the UK economy which face unique challenges in implementing effective cyber security, especially retail and the voluntary sectors. We will discuss how we can support them and help make them less vulnerable to attack.

We know that in the years ahead there is so much to do in countering the strategic threat to our values, prosperity and way of life.  People are our strongest link and we know that building a community of partners for cyber security is crucial to meeting these challenges together.

CYBERUK In Practice (10-11 April): Bringing together 1200+ information security professionals. This will include specialists in the design and development of online services and systems, plus professionals in procurement and delivery. It will be an opportunity to share best practice, learn about the latest security threats and solutions, and consider the growing challenges we all face.

CYBERUK Leadership (12 April): The Government’s leadership event for business and public sector decision makers and strategists.  This is where key senior staff – policy makers, CEOs and thought leaders – will learn about and contribute to the development of the latest thinking on how cyber security and business acumen come together to deliver successful business outcomes. Speakers will be drawn from the same community as the 600+ delegates – Government, Academia, the Third sector, Critical National Infrastructure and Industry.  Minister-led, it will feature senior representatives from GCHQ and the NCSC.  It will include the popular CYBERUK Leadership Networking Dinner on 11 April 2018.

Not just another event

The only UK Government-hosted event for this sector. CYBERUK 2018 will be the largest and most wide ranging event for cyber security leaders and professionals in the UK. It will attract the key players in Government, Academia, and Industry, and will offer unrivalled networking opportunities.

Truly interactive

Everything about the event will be designed to encourage debate, feedback and input. Bringing to you world-class speakers, creating dynamic Q&As, competing at the Cyber Games and sharing through interactive walls, we’ll create an event built around you. An event that will inform, challenge and inspire attendees – and create an atmosphere where networking is built-in, not bolted on.

Why attend?

  • Hear from thought leaders, be that Ministers, technology leaders, or others with interesting and relevant messages to give.
  • Meet leaders from across the sector.
  • Participate in challenging and thought provoking content.
  • Learn from the best – thought leaders from Government, Industry, Academia and the Critical National Infrastructure.
  • Connect with the wide range of public sector participants, personally invited by the UK Government.
  • Enjoy a mix of plenary talks, themed streams/tracks and Lightning Talks.

STREAMS AND TRACKS

Streams and Tracks offer participants an opportunity to share information, explore case studies and take part in debates on issues around information and security.

WORKSHOPS

Allow a deeper understanding of key issues, exchange ideas and develop effective action plans for the future, a strong workshop programme is offered at CYBERUK 2018.

SPOTLIGHT TALKS

Held during breaks, lunch and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2018 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate.

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams, Tracks and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions and chat to our graphic artist who will find visual ways to capture your insights.

CYBERUK In Practice logo

CYBERUK In Practice (10-11 April 2018)

The highly interactive event over two days will provide a wide range of sessions to cater for all levels of knowledge and experience using the much enjoyed chilli ratings we introduced in 2017.  The event content will be heavily informed by the delegates, sponsors, and exhibitors thus ensuring we create an environment to promote diversity, create challenging conversations and identify opportunities to achieve our vision of making the UK the safest place to live and work online. 

CYBERUK In Practice brings together the professional community responsible for developing and implementing cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling plenary keynotes and panel debates, the following four Tracks will span two days and will be led by NCSC Technical Directors.

TRACKS

Track 1 • Vulnerabilities and Bug hunting - A technical stream that will explore vulnerability discovery, with some strong use-cases.

Track 2 • Cutting edge mitigations and future technology - Showcasing the art of the possible in security mitigations with today’s technology as well as looking to the future.

Track 3 • Detect & Defend - An up to date view of real world attacks and a range of monitoring use-cases covering SOCs, analytical techniques and technology.

Track 4 • Whole System Security - Advanced approaches to security analysis and management, drawing on risk, modelling and learning from engineering practices.

NETWORKING

On Monday 9 April there will be an evening Welcome Drinks Reception, held at a central Manchester location.

A relaxed CYBERUK In Practice Networking Drinks evening will take place in the exhibition hall following the first day of CYBERUK In Practice (10 April). Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract 1200+ technology and cyber security professionals from across the public sector, Critical National Infrastructure, Industry and Academia. They’ll come together to share the cyber security challenges we all face.

Our programme of seminars, Lightning Talks and keynote speeches is designed to stimulate feedback, challenge thinking, create debate and enable networking. We saw how well last year’s interactive elements worked in getting delegates talking, exchanging experience and technical insights – so we have planned some new experiences for 2018.

Delegates will leave with a thorough understanding of latest practice and policies, new innovations and emerging cyber threats. And, most of all, they’ll have built valuable new connections.

AGENDA

 
SPEAKERS
 

Abigail Goodman | Track 3, Session 2 | 10 April

I work as a Cyber Intelligence Analyst at Barclays, running the Cyber Research and Development Team.
 

Adam Rudderman
Adam Ruddermann | Session 5, Track 1 | 11 April

Adam Ruddermann is the Director of the Bug Bounty Services Practice at NCC Group. He has extensive experience in the bug bounty community, having led Facebook's Bug Bounty Program and co-founding the BountyCraft conference series, and as Synack's first Operations Manager. He previously served in U.S. government security and intelligence consulting roles with Booz Allen Hamilton and as a Technical Lead at the NSA Red Team while in the United States Air Force.

 

Alison Vincent
Alison Vincent | Plenary Session, Diversity Panel | 11 April

Alison is an experienced technology leader holding senior level positions with global organisations such as HSBC, Cisco, NDS, Micro Focus and IBM. Her roles span Research and Development, Strategy Execution, Sales, Product Management and Business Development, with particular expertise in digital strategy, innovation and Mergers and Acquisitions. Alison was announced to be one of the Top 50 Influential Women in UK IT 2017 and is on the Council at Southampton University. Alison has a PhD in Cryptography and is a Fellow of the British Computer Society.
 

Andy Gittins
Andy Gittins | Track 3 | 10 April

Sgt Gittins RAF is a Cyberspace Communication Specialist (formerly ICT Technician), Currently employed in Joint Cyber Unit as Depth Analysis Malware team lead. Working within ICT since 2003 and Cyber Security since January 2017. Responsible for the Tactical implementation of the MOD’s Enterprise Threat Hunting Operations.

Awais Rashid
Awais Rashid | Session 2, Track 4 | 10 April

Awais Rashid heads the Cyber Security Group at University of Bristol. His research interests are in security of cyber-physical systems, such as, industrial control systems and IoT as well as human behaviours. He leads projects as part of the UK Research Institutes on: Trustworthy Industrial Control Systems (RITICS) and Science of Cyber Security (RISCS), co-leads the Security and Safety theme within the PETRAS Hub and heads the CyBOK  project.

Ben Payne
Ben Payne | Session 6, Track 4 | 11 April

Ben Payne joined Lloyds Commercial Bank in July 2017 as Cyber Security Manager where he is responsible for the cyber-security of the bank as well as supporting clients on cyber. Prior to Lloyds Ben held a number of cyber roles in the public sector leaving as Head of Incident Reporting. Ben ensures the risks are understood across an organisation, bridging the gap between IT and the business.

Campbell McCafferty
Campbell McCafferty | Plenary | 11 April

After a short post-doctoral career at the University of Edinburgh, Campbell joined the Ministry of Defence in 1995.  He held a number of scientific roles and was promoted to Asst Head in 2000. Roles in defence policy and Civilian HR, sandwiched an operational tour (Iraq 2003) and attendance at the Military’s Higher Command and Staff Course (2005).

Promoted to the SCS in 2006 he was Director Resources for the army.  In 2009, he was appointed Hd Counter Terrorism and UK Operational Policy, where he was the Policy lead for operations in Libya, counter-piracy and the Defence contribution to Security for London 2012.

He joined the Civil Contingencies Secretariat on promotion to Director in 2013 where he was responsible for the UK’s national preparedness for all disruptive challenges. His team oversaw the central coordination of the NATO Summit in Newport and led the UK Government response to widespread flooding in the UK and the Ebola outbreak in West Africa.

He became the Director of Cyber and Government Security in 2016 and was responsible for the delivery of the National Cyber Security Strategy and National Cyber Security Programme and the UK’s developing policy on the use of Cyber Capability.

In December 2017 he became HMG’s first Government Chief Security Officer and is leading transformational change in the Security machinery of Government, developing new standards, and is bringing together the means to deliver technology solutions to enable a more dynamic security policy in response to an ever changing threat environment .

Callum Wilson
Callum Wilson | Session 2, Track 2 | 10 April

Security Architect specialising in solving the problem of risky IoT devices in the home.

 

Carly West
Carly West | Session 7, Track 3 | 11 April

Carly is a cyber security analyst at the Bank of England, heading up a data-driven threat hunting and detection team.

 

Carol Peters
Carol Peters | Session 5, Track 2 | 11 April

Carol has worked in information security for 20 years with 15 of those years being in local government and was privileged to be previously elected as chair of the Scottish Local Authority Information Security Group. 

At Renfrewshire Council her focus is on modernising cyber security to fit today’s ways of working whilst remaining within strict regulatory boundaries.  Carol tries to bring fun into the subject and make it appealing.

Chris Anley
Chris Anley | Session 2, Track 1 | 10 April

Chris Anley is Chief Scientist at NCC Group plc, and has been carrying out security audits since 1996, performing thousands of penetration tests, code reviews and design reviews on a wide variety of platforms, languages and architectures for many of the world's largest companies.

As Chief Scientist, he promotes, advises and assists with NCC group research programs, as well as carrying out independent research into new and emerging security threats.

Chris McMahon Stone
Chris McMahon Stone | Session 4, Track 1 | 10 April

Chris is a PhD student in Computer Security at the University of Birmingham. To date his research has covered various topics including protocol implementation analysis and mobile application security.

 

Christian Wagner
Christian Wagner | Session 3, Track 4 | 10 April

Christian Wagner’s research focuses on modelling and handling of uncertain data arising from heterogeneous data sources with a particular focus on data from people such as experts. At an application level, he focuses on decision support in areas from data-driven environmental policy design to cyber security. He is Director of the Lab for Uncertainty in Data and Decision Making (LUCID) and Chair of the IEEE CIS Task Force on Cyber Security.

Ciaran Martin
Ciaran Martin | Plenary | 11 April

Ciaran is the first CEO of the National Cyber Security Centre. Prior to joining GCHQ in February 2014, Ciaran was Constitution Director at the Cabinet Office. In this role, he was the lead official negotiator for the Prime Minister and Secretary of State for Scotland in the run-up to the Edinburgh Agreement in 2012 on a referendum on independence for Scotland.

Daniel Dresner
Daniel Dresner | Session 4, Track 4 | 10 April

Daniel is Manchester University’s Academic Coordinator for Cyber Security, and co-founder of IASME. His PhD covered standards and risk mitigation; he’s an IISP Fellow. At NCC, he designed DTI’s TSE programme, created SANS training, edited ISBS, and wrote source code escrow standards. He authored SOCITM’s Cyber Resilience Guide and contributed to NCSC’s risk management guidance. He appears on the BBC and was second top influencer in UK cyber security 2017.

Daniel Cater
Daniel Cater | Session 4, Track 1 | 10 April

Daniel Cater is a Lead Security Consultant at Context Information Security. Previously a software developer for an investment bank, he now prefers trying to break things rather than make things. He holds the “CREST Certified Tester for Web Applications” certificate (CCT App), and enjoys hunting for bugs in web applications and web browsers, as well as doing research into Big Data, cloud security, and consumer products.

Dave Hogue
Dave Hogue | Plenary Session | 10 April

Mr. Dave Hogue is currently serves as the Technical Director for the NSA’s Cybersecurity Threat Operations Center (NCTOC), a dynamic, national-level entity that serves at the forefront in the fight against malicious cyber activity through integrated cybersecurity operations.  Previously, Mr. Hogue was the Technical Director of the Analysis Group within the National Security Agency (NSA) Threat Operations Center (NTOC), charged to deliver vital threat intelligence across a multitude of threat actors and technologies.  While in this position, Mr. Hogue also served as a corporate officer, leading agency-wide efforts such as NSA’s response in delivering foundational technical analysis and attribution of the 2014 Sony Pictures Entertainment (SPE) computer network attack (CNA).

David Rogers
David Rogers | Session 2, Track 3 | 10 April

Dave Rogers is Chief Technology Officer at the Ministry of Justice. Formerly of guardian.com , BBC, and Government Digital Service, and a software developer and technical architect by background. Dave writes and talks about leadership and strategy in technology, particularly within a central government context.

Derek McAuley
Derek McAuley | Session 8, Track 4 | 11 April

Derek McAuley is Professor of Digital Economy and Director of the Horizon Digital Economy Research Institute at the University of Nottingham. His computing research interests span ubiquitous computing, computer architecture, networking, distributed systems and operating systems, while his interdisciplinary interests include issues of ethics, identity, privacy, information policy, legislation and economics within a digital society.

Don Smith
Don Smith | Session 2, Track 3 | 10 April

Don Smith leads the CTU™ Cyber Intelligence Cell, a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients.

Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise.

Emma Green
Emma Green | Session 7, Track 2 | 11 April

Emma Green is Head of the Cyber Security Incentives and Regulation Team in Department for Digital, Culture, Media and Sport.  Her team’s focus to improve cyber security across the economy and ensure all organisations have in place appropriate measures to detect cyber attacks and to protect themselves and their customers from malicious online activity. Emma has extensive experience as a policy professional in departments including the Department for Communities and Local Government and the Department for Business, Innovation and Skills.

Emma Philpott
Dr Emma Philpott | Plenary Session, Diversity Panel | 11 April

Emma is founder and manager of the UK Cyber Security Forum, a network of more than 600 small cyber security companies. The Forum is starting a Community Cyber Security Centre to train neurodiverse individuals to work in Cyber Security.

Emma is also CEO of the IASME, a company that focuses on information assurance for small companies by offering certification against Cyber Essentials and their own governance standard including the GDPR.

Emma Smith
Emma Smith | Session 2, Track 3 | 10 April

Emma joined Vodafone in 2015 as Group Technology Security Director, responsible for all aspects of information and cyber security. The global security teams in Vodafone are responsible for setting security policy in line with local laws and regulations, implementing new security technologies and controls, securing new products and services and 24x7 cyber defence capabilities.  Emma is passionate about security. Specifically, about evolving security to protect customers against changing threats and the opportunity to contribute to improving the safety of the communities we operate in. Prior to joining Vodafone, Emma was Security Director at the Royal Bank of Scotland for 7 years.  

Greg Smith
Greg Smith | Session 7, Track 3 | 11 April | Session 8, Track 1 | 11 April

Greg works at the Ministry of Justice as a Senior Security Engineer within the Digital & Technology team, working closely with other government departments and for NCA NCCU as a Cyber Special, with 18 years cyber experience within government.

His role encompasses penetration testing of government used systems, development and implementation of pragmatic security in Agile and traditional environments.  He has an active interest in malware, vulnerabilities, research and informing MoJ security strategy.

Graham Calladine | Session 7, Track 1 | 11 April

Principal Security Engineer in the Windows Engineering Systems Group. Graham Calladine is a passionate leader in Microsoft, with substantial experience in leading edge security engineering in static analysis and open source software.

Harry Metcalfe
Harry Metcalfe | Session 1, Track 3 | 10 April

Harry Metcalfe is founder of dxw digital, and has been delivering secure digital services to public sector bodies since 2008. He’s also co-founder of dxw cyber, a sister company focussing on public sector security testing. dxw cyber believe good security starts with practical understanding of technical risk and teams that can respond to threats. It works with clients to establish  positive security cultures, and move away from bureaucratic risk-driven approaches.

Henrik Johansson
Henrik Johansson | Session 4, Track 3 Part 1 | 10 April

Henrik Johansson is a Principal Architect - CISO Engagements in AWS Security with focus on security at scale. This includes deep understanding of security automation (DevSecOps), automated incident response remediation, security testing and deep insight into various compliance framework. Henrik is an experienced public speaker at a number of industry events including AWS ReInvent.

Henrik also maintains multiple OSS repos focusing on security automation in cloud workloads / at scale.

Ian Levy
Dr Ian Levy | Closing Plenary Session | 11 April

Ian became Technical Director of the National Cyber Security Centre in October 2016, prior to which he was Technical Director of Cyber Security and Resilience at GCHQ. Ian leads on developing defences to manage cyber threats. This involves fostering technical innovation to find solutions that can protect the UK from large scale cyber attacks, and day-to-day malicious cyber activity.

James Dipple-Johnstone
James Dipple-Johnstone | Plenary Session | 11 April

James joined the ICO’s office in 2017 from the Solicitors Regulatory Authority (SRA), where he had been Director of Investigation and Supervision leading their teams assessing and investigating reports of professional misconduct, money laundering, cybercrime and fraud involving solicitors and law firms. James’s background is in regulatory investigation, appeals and complaints handling.   He has held posts as Commissioner for the Independent Police Complaints Commission, Director of Investigation for the Parliamentary and Health Service Ombudsman and in NHS regulators.

James Forshaw
James Forshaw | Session 6, Track 1 | 11 April

James is a security researcher in Google’s Project Zero. He has been involved with computer hardware and software security for over 10 years looking at a range of different platforms and applications. With a great interest in logical vulnerabilities he’s been listed as the #1 researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner. He has spoken at a number of security conferences including Black Hat USA, CanSecWest, Bluehat, HITB, and Infiltrate. He’s also the author of the book “Attacking Network Protocols” available from NoStarch Press.

Jasmine Mohammed
Jasmine Mohammed | Plenary Session, Diversity Panel | 11 April

Having been an educator for 18 years, Jasmine is currently the Head of Computer Science at Loreto College, Manchester and an external examiner for the subject area. Jasmine has successfully promoted the subject amongst underrepresented groups, and encouraged all of the students to develop their skills and insights beyond the constraints of the curriculum. More recently, Jasmine actively supports coding clubs and other initiatives in developing digital skills.

Joanna Place | Plenary Session | 10 April

Joanna was appointed Chief Operating Officer on 27 July 2017.

Previous roles at the Bank include Executive Director of HR, Head of Customer Banking Division (playing a key role in the financial crisis), Head of Monetary and Financial Statistics Division; and Director of Regulatory Operations, Prudential Regulation Authority. Joanna also had a secondment to the Border Agency (2004-2007).

Joanna has a BA (Hons) in Economics from Fitzwilliam College, Cambridge University.

John Thomas
Dr John Thomas | Session 1, Track 4 | 10 April

Dr. John Thomas received his Ph.D. working in MIT’s System Engineering Research Lab, and he holds bachelor's and master's degrees in computer engineering. Dr. Thomas’s research involves using systems theory to develop structured analysis methods for safety and cyber security, especially in systems that exhibit complex interactions with each other and their environment. More recently he has been extending these methods to cyber-physical-human systems that also depend on human-computer interactions and human interfaces to achieve safety and security goals.

Jonathan Marshall
Jonathan Marshall | Session 2 Track 2 | 10 April

 

 

Jonathan Pagett
Jonathan Pagett | Session 1, Track 3 | 10 April

Jonathan has spent the last 12 years designing, evolving and managing Security Operations Centres across Government and the finance sector. Most recently he is responsible for the Security Operations Centre at the Bank of England. He is also currently on part-time secondment to NCSC, developing security monitoring guidance and volunteers for the Cyber Security Challenge.

Kev Jones
Kev Jones | Session 3, Track 4 | 10 April | Session 8, Track 4 | 11 April

Kevin joined JP Morgan in June 2015 and is responsible for business engagement across Cybersecurity and Threat Intelligence

Previously, Kevin served for almost 30 years in the British Army, specialising in Military Intelligence. Throughout his career Kevin worked within the UK intelligence communities and served in various countries on operational service. He worked alongside international military and other government agencies in numerous at tactical, operational and strategic levels.

Luke O'Brien
Luke O'Brien | Session 3, Track 3 | 10 April

Flight Lieutenant Luke O’Brien is the operations officer at Joint Cyber Unit Corsham. Luke leads a team of 50 military and civilian personnel in the defence of the MOD’s networks in 2 SOCs. As an engineer in the RAF, Luke has previous operational experience with fast jet and transport aircraft in the UK, US, Far East and Middle East.

Mark Barnes
Mark Barnes | Session 8, Track 1 | 11 April

Mark is a Security Researcher at MWR InfoSecurity and a team leader within the research practice. He specialises in software reverse engineering, hardware hacking, platform security and software defined radios. Prior to working in information security he was a laser physicist and likes juggling.

Mark Harbord
Mark Harbord | Session 3, Track 2 | 10 April

Mark Harbord is Head of Cyber for the Parliamentary Digital Service, heading up the technical cyber security team. He’s worked in the IT Security arena since 2012, and was previously the Technical Delivery manager, running the third line support teams in Parliament.

 

Mark Ryland
Mark Ryland | Plenary Session, Keynote Address | 10 April

Mark Ryland is the Director of the Office of the Chief Information Security Officer (OCISO) at Amazon Web Service (AWS). Ryland leads a global team of Security Architects who help customers to understand more deeply how AWS builds and operates its highly secure cloud platform, and how they can best leverage that modern platform to enhance their own IT security. Ryland has more than 27 years of experience in the technology industry across a wide range of leadership roles in cybersecurity, software engineering, distributed systems, technical standardization, and public policy.

Matt Lewis
Matt Lewis | Session 8, Track 1 | 11 April

Matt has over 15 years’ experience in technical security research, testing and consulting. His experience spans most technologies across all sectors with much focus on facilitating security assurance within the government sector. He is a public speaker with global recognition of knowledge and expertise in biometric security, and has presented at many international conferences and seminars on all manner of cyber security topics.

Miles Brundage
Miles Brundage | Session 8, Track 4 | 11 April

Dr. Miles Brundage is a Research Fellow at the University of Oxford's Future of Humanity Institute. He researches the societal implications of artificial intelligence. Among other recent publications, Dr. Brundage was a lead author of the report, "The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation," and a co-author on a review of the AI sub-field of deep reinforcement learning. He received his PhD in Human and Social Dimensions of Science and Technology from Arizona State University in 2018.

Mohammad Dabbah | Session 8, Track 4 | 11 April

Dr Dabbah is an expert in artificial intelligence, machine learning and computer vision. He has contributed to and led work in various application fields, including biometrics, medical, pharmaceutical, situational awareness, autonomous systems, industrial inspections, defence, space and national security. Dr Dabbah has published many scientific articles, books and patents. He also won several awards, including from the IET. Dr Dabbah’s work has been internationally recognised in over 590 scientific publications.

Nic Miller
Nic Miller | Session2, Track 3, & Session 4, Track 4 |10 April | Session 6, Track 3 | 11 April

Currently a virtual CISO at Aedile Consulting, Nic founded the company in 2017 to provide light touch, affordable consultancy to startups and small businesses. He takes a pragmatic, back to basics view of security with a focus on self-sufficiency for his clients.

Previously Nic was the CISO at Brevan Howard, a global hedge fund, for 3 years. He began his career working for the UK Government investigating threat actors.

Nick Neave
Nick Neave | Session 7, Track 4 | 11 April

Associate Professor in the Department of Psychology at Northumbria University. Director of the Hoarding Research Group. Conducted research on  psychological characteristics of hoarders. Now exploring  ‘digital hoarding’, and find that such behaviours are common and might have cybersecurity implications. We received funding from CREST and have  designed a ‘Digital Hoarding Questionnaire’, and are now exploring the cybersecurity implications of digital hoarding in organisations.

Nicola Hudson
Nicola Hudson | Plenary Co-Chair | 10/11 April

Nicola became Director of Communications at the National Cyber Security Centre in September 2016. Prior to this she was Head of News in the Prime Minister’s office. Nicola was Deputy Director of Communications for the London 2012 Olympic Games and Paralympic Games, Director of Communications for the Control Risks Group and Head of Government Relations for Camelot.

Nilesh Gorasia
Nilesh Gorasia, C18 In Practice, Session 7, Track 3, 11

Nilesh describes himself as a relative newbie, having switched industries from mechanical engineering to cyber-security slightly less than 3 years ago; he found his niche in conducting SOC-related analyses with SIEM tool in hand. Headed down a data science path hereafter.

Pete D'Ardenne
Peter D'Ardenne | Session 4, Track 4 | 10 April

Pete has over 25 years experience in Cyber having served in the RAF, including  CISO RAF and Head MODCERT roles. He now leads security governace and delivery of DXC’s services to UK Government and wider Public Sector. A recognised Cyber Security Leader, with specialist knowledge and experience with managing major change, mergers and re-structuring.  Considerable experience delivering complex major programmes requiring exacting standards and challenging schedules.

Robert Laid
Robert Laid | Session 4, track 4 | 10 April

I currently work as a Senior Audit Manager for the Government Internal Audit Agency in the DDaT assurance specialism, and have worked in Information Assurance and Cyber Security in Government for 12 years.  Previous to this roll I have worked as a Principal Inspector in Cyber Security at The Office for Nuclear Regulation and Head of Information Assurance at HM Passport Office.

Robert Miller
Robert Miller | Session 3 Track 1 | 10 April

Robert has worked for MWR InfoSecurity since 2011, working with clients in a wide range of projects, from Android application security reviews to training engineers on secure hardware design. He now runs the company's Operational Technology team focusing on industrial and embedded device security.

Robert Watson | Session 6, Track 2 | 11 April

Dr Robert N. M. Watson is a University Senior Lecturer (Associate Professor) at the University of Cambridge Computer Laboratory, where he works across the areas of security, operating systems, and computer architecture. He led work on the CHERI architecture "from the ISA up", designing the hardware-software security model, and has led the CHERI software development team working on OS support, compiler support, and applications. In prior industrial research, he developed the MAC Framework used widely for OS kernel access-control extensibility in FreeBSD, Mac OS X, iOS, and Junos. He a coauthor of The Design and Implementation of the FreeBSD Operating System (Second Edition).

Rod Chapman
Rod Chapman | Session 1, Track 2 | 10 April

Rod is a Principal Engineer with the Intelligent Systems Expertise Centre of Altran UK in Bath. He specialises in the development of safety and security-critical systems, from requirements engineering, through architectural design and implementation, to verification, audit and assessment.

Ruth Massie
Dr Ruth Massie | Session 5, Track 4 | 11 April

Dr Ruth Massie is a Senior Lecturer in Cyber Governance at Cranfield University. Ruth’s research focuses on how Board leaders interact and engage with information, particularly in relation to cyber. Ruth is part of Cranfield’s Centre for Electronic Warfare, Information & Cyber.

Sarah S
Sarah S | Plenary Session, Diversity Panel | 11 April

Sarah leads CyberFirst a pivotal part of the National Cyber Security Programme (NCSP).  CyberFirst is primarily a bursary scheme, but to encourage diversity and inspire those who may not have considered a career in technology and cyber security, it  includes activities such as girls competitions and cross-UK development events for students aged between 11-17.  Previous to this role Sarah was the Head of L&D for GCHQ.

Sean Heelan
Sean Heelan | Session 3, Track 1 | 10 April

Sean Heelan is currently pursuing a PhD at the University of Oxford. Previously, he founded Persistence Labs, a reverse engineering tool development company, and worked as a security researcher at Immunity Inc. His primary research interests are in automated program analysis, with a focus on vulnerability detection, reverse engineering and exploitation.

Siddharthan Elangovan
Siddharthan Elangovan | Session 7, Track 3 | 11 April

Siddharthan is a cloud security specialist currently working at MoJ. He is responsible for maintaining and continually improving the security of the digital platform services, develop security capabilities to detect and mitigate malicious attacks, implement cloud security strategies and best practices. He is passionate about integrating security automation with DevOps practices.

Simon Moore | Session 6, Track 2 | 11 April

Simon Moore is a Professor of Computer Engineering at the University of Cambridge Computer Laboratory in England, where he undertakes research and teaching in the general area of computer design with particular interests in secure and rigorously-engineered computer architecture. Professor Moore is the senior member of the Computer Architecture research group.

Steven Hunter
Steven Hunter | Session 7, Track 1 | 11 April

Steven is a Security Software Engineer in the MSRC Vulnerabilities and Mitigations team at Microsoft. He focuses on finding and preventing security vulnerabilities, with an emphasis on static analysis techniques.

Stuart Aston
Stuart Aston | Session 2, Track 3 | 10 April

Stuart has been with Microsoft in the UK since 1998 and is the National Security Officer for Microsoft in the UK. Prior to joining Microsoft, Stuart worked as a consultant for ICL and Barclays Bank. He has been actively involved in computer security related activities since the early 80’s

Stuart Laidlaw
Stuart Laidlaw | Session 8, Track 4 | 11 April

Stuart Laidlaw is co-founder and CEO of Cyberlytic, which he co-founded in 2013. He previously held senior management positions at several global security companies including BAE Systems, CGI and Fujitsu, where he was responsible for delivering large-scale IT security programmes. Prior to starting Cyberlytic, Stuart led groundbreaking software and IT projects for both the National Crime Agency and UK Foreign Office.

Tom Farrar
Tom Farrar | Session 7, Track 3 | 11 April

14 years’ experience in both the private and public sector, with a background in operations, engineering and software development. Currently security operations engineer at GDS.

Tony Badsey-Ellis
Tony Badsey-Ellis | Session 3, Track 2 | 10 April

Tony has worked in information assurance and security for almost 20 years, specializing on risk management and assessment. He co-founded the cyber security company 2T Security in 2013. Since then he has designed and created the RiskTree process, which is being used across a variety of Government departments to provide fast, efficient risk assessments. Tony has spoken regularly about risk management at security and IA events.

Tony Beedle
Tony Beadle | Track 2, Session 3 | 10 April

Tony has been working as a Security Architect for the past 18 years, and co-founded the cyber security company 2T Security in 2013. He has been helping to solve some of the security design challenges for some of the complex problems within Government, in particular around the control of data flow between security domains.

Tony Smith
Tony Smith | Session 5, Track 2 | 11 April

Tony Smith has over 30 years experience as an ICT professional including over 15 years as an information security professional. Working in both the private and public sectors he holds CISSP, SCP and PCI IM certifications and is a full member of the Institute of Information Security Professionals.

Wendy Arrowsmith
Wendy Arrowsmith | Plenary Session, Diversity Panel | 11 April

Wendy Arrowsmith is a Security Manager within National Grid’s cyber security team; enabling the business to deliver its security responsibilities. Wendy has over three decades of experience in the energy industry, including service in the Royal Air Force; in IT/OT, risk, and process safety engineering. Wendy has also led a National Grid inclusion and diversity employee resource group, successfully implementing change programs to improve employee and customer services.

Yasemin Acar | Track 2, Session 1 | 10 April

Yasemin Acar is a researcher with a focus on supporting developers in improving the security of their decisions, workflow and code. She’s an enthusiastic collaborator in multi-disciplinary projects to make security more usable for everyone.

Yvonne Rigby
Yvonne Rigby | Session 2, Track 4 | 10 April

I am the Project Manager of the Cyber Security Body of Knowledge (CyBOK) project funded by the National Cyber Security Programme. The CyBOK is being developed by a team of leading UK academics led by the University of Bristol.

CYBERUK Leadership logo

CYBERUK Leadership (12th April 2018)

The 2018 event will develop highly interactive sessions which will focus on building our community for cyber security across four objectives; Reduce, Respond, Understand and Nurture.  It will bring together leaders who can enable a dynamic discussion, include workshops where challenges can be explored and time to build new relationships and networks across the public sector, Industry and Academia. 

CYBERUK Leadership will set the agenda for UK cyber security. This event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by an NCSC Engagement Deputy Director entrusted with shaping and leading the team’s delivery.

STREAMS

Stream 1 • REDUCE - Examining how the cyber security community reduces risks to the UK by securing public and private sector networks.

Stream 2  RESPOND - Demonstrating how the cyber security community responds to cyber security incidents to reduce the harm they cause to organisations and the wider UK.

Stream 3 • UNDERSTAND - How the cyber security community understands cyber security, and distils this knowledge into practical guidance that we make available to all.

Stream 4 • NURTURE - Developing industry and academic expertise to nurture the UK's cyber security capability.

NETWORKING DINNER

A prestigious CYBERUK Leadership Networking Dinner will be held on Wednesday 11 April, before the conference begins on Thursday.

THE AUDIENCE

CYBERUK Leadership will attract leaders in cyber security across Government and Industry, regulatory bodies and influencers. How can we be so sure? Last year’s event saw over 800 delegates – from senior leaders and risk owners from Government departments and cyber security leaders from the public and private sector including Academia. Over the day, we created a perfect environment for them to meet, network, and hear from leaders in their fields. This year will build on that success – but with more interactivity, more input from participants, and more opportunities to meet, exchange ideas and build relationships.

Around 60 per cent of participants will come from the public sector, and the public sector places are free.  The NCSC will ensure that we get the right mix by personally inviting key staff in strategic, decision-making roles. These are the people whose voices are listened to, who set the agenda, and who make things happen. CYBERUK Leadership attendance is invitation only for the public sector.

AGENDA

 
SPEAKERS
 

Adam Beaumont
Adam Beaumont | Session 1, Stream 3, Part 2 | Session 2, Stream 3 | 12 April

Adam Beaumont is the founder and CEO of telecoms operator aql and a visiting professor of cyber security at the University of Leeds. He’s built key parts of the UK’s internet infrastructure, including IXLeeds, the Northern internet exchange, and, as a leading figure in the Northern Powerhouse, is currently building the engineering that will allow Leeds to become a 5G city. He’s interested in security and integrity technology, or “TrustTech”.
 

Cath Goulding
Cath Goulding | Stream 3 | 12 April

Cath currently works as Head of Cyber Security for Nominet UK, the internet company best known for running the ‘dot.uk’ registry and therefore critical to internet operations in the UK. She was awarded Security Champion at the Women in IT awards 2015 and sits on the board of the Women’s Security Society.
 
Ciaran Martin
Ciaran Martin | Pleanary | 11 April
 
Ciaran is the first CEO of the National Cyber Security Centre. Prior to joining GCHQ in February 2014, Ciaran was Constitution Director at the Cabinet Office. In this role, he was the lead official negotiator for the Prime Minister and Secretary of State for Scotland in the run-up to the Edinburgh Agreement in 2012 on a referendum on independence for Scotland.
 

Cindy Widick
Cindy Widick | Plenary Session | 12 April

Ms. Cynthia L. Widick is Chief of the National Security Agency/Central Security Service's (NSA/CSS) Cybersecurity Operations (CSO) Group in the Operations Directorate where she leads integrated cybersecurity operations to enable high impact operational effects in the cyber domain and deny adversaries the ability to influence, exploit or threaten cyber and information infrastructure domains within the bounds of our authorities.
 

David Harcourt
David Harcourt | Stream 3 | 12 April

Dave is a highly experienced security advisor, influencing strategy in cyber security within BT and across wider industry and governments globally. He provides thought leadership into the strategy and implementation of BT's security programmes, is driving cyber security improvements in the telecoms industry as part of the Active Cyber Defence programme, and is a driving force behind BT's approach to proactive threat hunting and discovery.
 

Elizabeth Denham
Elizabeth Denham | Plenary Session | 12

Elizabeth Denham was appointed UK Information Commissioner in July 2016, having previously held the position of Information and Privacy Commissioner for British Columbia, Canada and Assistant Privacy Commissioner of Canada.

She has set out a commitment to increase consumer trust people have in what happens to their personal data. This forms the basis of her strategic plan, and has been demonstrated in her commitment to ensuring companies are transparent with the public about how personal information is used.

In 2018, she was named as the most influential person in data-driven business in the updated DataIQ 100 list.

Elisabetta Zaccaria
Elisabetta Zaccaria | Session 1, Stream 3, Part 2 | Session 2, Stream 3, Part 2 | 12 April

Co-founder & Chairman of Secure Chorus Ltd, a platform for private-public collaboration, development of common standards & capabilities to provide a security baseline for the global digital economy. Founder of cyberY Ltd, a firm delivering strategy for innovation ecosystems. Former Group COO/CSO of Global Strategy Group where she set the strategy and co-led the explosive growth of the company, turning the UK start-up into a $600 revenue business in 6 years.
 

Greg Roberts
Greg Roberts | Leadership Dinner | 11 April

Greg Roberts joined L3 TRL in September 2015 as President and Chief Executive Officer. Having originally trained and worked as a Production Engineer within the medical industry, Greg moved to the defence and security sector in 1985. Over his career Greg has held various business, functional and programme roles in addition to successfully running a number of defence businesses. Greg specialises in strategic growth and leadership within an international environment.
 

John Wariner
John Wariner | Session 1, Stream 1 | Session 2, Stream 1 | 12 April

John “JW” Wariner was commissioned into the Royal Air Force in 1983. He read an Honours degree in Electrical and Electronic Engineering at Brunel University and a Defence Studies Masters at Kings College London.

His early career built upon Information Communications and Technology (ICT) specialisation in command, on operations and in staff roles. Appointed to Wing Commander in 2002, he led capability development and acquisition in the MOD for Offensive Cyber and Intelligence Capabilities. At the Defence Concepts and Doctrine Centre, he was the UK lead for Multi National interagency coordination and strategic planning. He commanded the Tactical Communications Wing (2005) delivering operational ICT worldwide. Moreover, he deployed to Iraq (2007) as Commander Joint Force CIS responsible for all UK ICT deployed in the Middle East. On his return he was promoted to group captain (2008) and appointed as Chief of Staff of MOD’s Information Systems and Services. He moved to the Permanent Joint HQ to lead ICT Operations in 2009, after which he assumed command of 90 Signals Unit at RAF Leeming (~900 personnel) from 2011. He was the RAF lead for Defence Transformation within the MOD Head Office in direct support of Acquisition System Reform before being appointed to HQ AIR Command in Oct 2014 to head the RAF’s C4i Capability branch. He was promoted to Air Cdre and appointed the Air Officer A6 / A6 Force Commander in Apr 2016.

Katy Winterborn
Katy Winterborn | Plenary Session | 12 April

Katy Winterborn is a Managing Security Consultant at NCC Group where she works with a wide variety of clients providing advice of topics ranging from infrastructure and web application to code review.

She has worked in a range of roles looking at both offensive and defensive perspectives.  She also contributes whitepapers and blogs on a variety of topics from exploitation techniques, to mitigating the insider threat and gender diversity.

Ollie Whitehouse
Ollie Whitehouse | Plenary Session | 12 April

Ollie Whitehouse is Chief Technical Officer at NCC Group and is responsible for the group’s thought leadership, technical strategy, research and development functions.

Previously he held various operational roles within the group since joining in 2012.

Over the past 20 years Ollie has worked in a variety of cyber security consultancy, applied research and management roles. Ollie is also a research and science adviser to UK Government on cyber security.

Paul Chichester
Paul Chichester | Plenary | 12 April

Paul is Director Operations of the National Cyber Security Centre. He has worked in the UK government intelligence and security community for over 25 years in a variety of offensive and defensive cyber roles. Paul was awarded the MBE in 2005 for his ground-breaking work in cyber.

Paul Thorlby | Session 1 Stream 4 | 12 April

Paul is a senior technical leader in QinetiQ with over 20 years’ experience in cyber security and related, mainly for National Security and Defence markets in the UK. He's currently Chief Technology Officer for IA and Cryptosecurity and also the Cyber & Intelligence Group Leader. Paul chairs the employer steering group that has pioneered development of national cyber security apprenticeship standards, including most recently the Cyber Degree Apprenticeship standard.

Richard Porter
Richard Porter | Session 1, Stream 3 | Session 2 Part 2, Stream 3 | 12 April

Meridian Mobility’s lead for Technology Strategy and development of the UK’s Connected and Autonomous development ecosystem. Previously Director Research and Innovation at Highways England, UK Research Liaison to US DoD, Security policy advisor and crisis manager at FCO and Intelligence Analyst. Always interested in new technologies and how to bring them to market quickly and effectively.

Sarah Lucas | Session 1, Stream 4 | 12 April

Sarah Lucas has been working in government security policy for a number of years, and has been in cyber skills since 2016. Previously to the civil service, she was a civil engineer.

Stephen Baker
Stephen Baker | Stream 3 | 12 April

Stephen is the joint Chief Executive of Suffolk Coastal and Waveney District Councils.  Whilst the role is wide and varied, Stephen has four areas of particular interest: shared services and collaboration; digital services and inclusion; growth and economic development; and civil resilience.  Stephen is the official spokesperson on matters of Civil Resilience and Community Safety for the Society of Local Authority Chief Executives and has represented local government in the development of the National Cyber Security Centre.

Yochana
Yochana Henderson | Plenary | 12 April

Yochana Henderson is a leading Identity and Security expert working in the Parliamentary Digital Service. Yochana started her career in the Army and after 5 years and a tour of Afghanistan joined the Parliamentary Digital Service. Yochana was a key member of the Digital Service response team during the cyber-attack against Parliament in 2017.

Most recently Yochana received an MBE for her parliamentary and voluntary services.

 
 

Lead Sponsors

Amazon Web Services

For more than 11 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 100 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, and application development, deployment, and management from 44 Availability Zones (AZs) across 16 geographic regions in the U.S., Australia, Brazil, Canada, China, Germany, India, Ireland, Japan, Korea, Singapore, and the UK. AWS services are trusted by millions of active customers around the world—including the fastest-growing startups, largest enterprises, and leading government agencies—to power their infrastructure, make them more agile, and lower costs.

Amazon Web Services

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.

NCC Group

Networking Sponsors

Trend Micro Incorporated

Networking Sponsor

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro Incorporated

L3 TRL

CYBERUK Leadership Dinner Sponsor

L3 TRL – Transforming the way you manage your cryptos

Since 1983 we have been a security partner of choice for defence and government organisations, we are an authorised development partner and key capability provider to HM Government.

Across 2018 we are launching a series of new CATAPAN High Grade capabilities into the UK Cyber market that will transform the ability to achieve secure missions in a variety of scenarios. The new capabilities include:

  • Data at rest for private clouds, public clouds and personal applications
  • New Micro data in transit crypto
  • Revolutionary benign key delivery solution

Reducing the risk in high threat operations whilst lowering the infrastructure management and costs, thus reducing the significant operating burdens.

CATAPAN is best in breed for High Grade Cyber security – the most effective line of defence to counter the growing threat and evolving nature of cyber-attacks, whilst giving freedom and flexibility to operate without constraint.

L3 TRL

SANS

Delegate Brochure Sponsor and Exhibitor

Established in 1989, SANS Institute is the largest information security training organisation in the world and is a cyber security supplier to HM Govt. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats. SANS training is led by world-renowned, expert instructors and the curriculum covers the most crucial areas of security. Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. In addition, SANS and its partners are currently delivering the HMG Cyber Schools Programme – Cyber Discovery.

SANS

Track and Stream Sponsors

Microsoft

Track 1 Sponsor

Technology is a disruptive force – enabling new business models, opening new sources of revenue and shaping entire industry landscapes. Ensuring security, privacy, and compliance is key to enabling digital transformation. As people bring in devices, apps, and data into organisations today, protecting company data requires a new approach.

Microsoft is building a platform that looks holistically across all the critical end-points of today’s cloud & mobile world. Our platform investments are across four categories: identity and access management, information protection, threat protection, and security management – with a comprehensive approach that is inclusive of the technologies our customers are using. We act on the intelligence that comes from our security-related signals and insights, and foster a vibrant ecosystem of partners who help us raise the bar across the industry – helping to securely enable our customers’ digital transformations.

Microsoft

Northrop Grumman

Track 2 Sponsor

Northrop Grumman is a recognised leader in cyber resilience solutions with more than thirty years’ experience in cyber security and information assurance. As a mission partner, Northrop Grumman brings unparalleled expertise in managing and protecting networks, and delivering trusted security solutions to high-risk customers both here in the UK and overseas.

Northrop Grumman’s aggressive investments in technology harness critical elements of human-decision making with advanced analysis of complex data sets to enable decisive action. The company is committed to building tomorrow’s cyber workforce through advanced cyber education, developing a Cyber Research Consortium with leading UK universities and offering its own Cyber Academy worldwide.

Northrop Grumman is a member of CyberFirst and CyberInvest, and leads CyberCenturion, the cyber defence competition for 12-18 year olds.

Northrop Grumman

Roke

Track 3 and Stream 1 Sponsor

Blending world-class expertise in cyber security, autonomy and communications, Roke is one of Britain’s leading providers of advanced technology R&D, innovation and advisory services. Established in 1956, we are trusted by clients across national security, defence and commercial sectors to deliver advantage and protect what matters most in an uncertain world.

Focusing on solving difficult cyber security challenges, we are the ideal product-independent partner to help you overcome your information security needs, including:

  • Security architecture and design assurance
  • Vulnerability investigations and risk assessments
  • Component assurance
  • Defensive code reviews
  • Information security management
  • Deception services
  • Crypt-key services and solutions
Roke

QinetiQ

Track 3 and Stream 1 Sponsor

QinetiQ is a leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions to human performance.

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

DXC Technology

Track 4 Sponsor

DXC Technology was formed in 2017 through the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise, creating a new company with more than 4,000 security specialists and over 12 security operations centres on five continents. DXC, the world’s leading independent IT services company, helps clients harness the power of innovation by providing digital transformation services to commercial and public sector organisations. DXC’s end-to-end security services help clients protect data, applications, infrastructure and endpoints; detect and predict attacks; and proactively respond to threats. Our world-class Security Advisory and Managed Security Services professionals are ideally positioned to help organisations manage increasingly complex cyber security challenges and secure the free flow of information between customers, employees, partners and suppliers. DXC works with more than 40 security industry partners to deliver best-of-breed solutions to our clients.

DXC Technology

Nominet

Stream 2 Sponsor

Nominet is driven by a commitment to use technology to improve connectivity, security and inclusivity online.  For 20 years, Nominet has run the .UK internet infrastructure, developing an expertise in the Domain Name System (DNS) that now underpins sophisticated network analytics used by governments and enterprises to mitigate cyber threats.  The company provides registry services for top level domains, and is exploring applications for a range of emerging technologies. A profit with a purpose company, Nominet supports initiatives that contribute to a vibrant digital future.

Nominet

BAE

Stream 3 Sponsor

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE

BT

Stream 4 Sponsor

We manage security for ourselves and our customers, from the smallest to the largest organisation across both the public and private sector, including significant parts of the UK’s Critical National Infrastructure.  The insight we possess as a global network provider, along with our team of 2,500 security experts, means we provide customers with confidential support around the clock, 24 x 7. We’re constantly watching, analysing, predicting and responding to the emerging threats to protect our network and our customers.  Our security analytics and tools give us a unique perspective on cyber threats, helping us to stay one step ahead of criminal entrepreneurs and attackers. It’s our knowledge and expertise that helps us to work together with organisations like the National Cyber Security Centre and Interpol, sharing resources and intelligence to help in the fight against global cyber-crime.  So let us to protect your organisation the way we do ours. 

BT

Sponsors

Raytheon

Future Zone Sponsor

Raytheon UK is a subsidiary of Raytheon Company. It is a prime contractor and major supplier to the U.K. Ministry of Defence and has developed strong capabilities in mission systems integration in defence, national security and commercial markets. Raytheon UK also designs, develops and manufactures a range of high-technology electronic systems and software at facilities in Harlow, Glenrothes, Gloucester, Waddington, Broughton and Manchester. About Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specialising in defence, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts.

Raytheon

Lockheed Martin

Bursary Sponsor

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Lockheed Martin

Anomali

Workshop Sponsor

Anomali delivers critical threat intelligence capabilities, allowing organisations to detect, investigate and respond to serious external threats. The company’s unmatched customer base spans all major verticals and includes partnerships with many ISACs and threat exchanges. Anomali integrates with internal infrastructure to identify new attacks, or search forensically over the past year to discover existing breaches, and enables security teams to quickly understand and contain threats.

Anomali

Atkins

Workshop Sponsor

SNC-Lavalin’s Atkins business is one of the world’s most respected design, engineering and project management consultancies. Together, SNC-Lavalin, a globally fully integrated professional services and project management company and Atkins help our clients plan, design and enable major capital projects, and provide expert consultancy that covers the full lifecycle of projects. We strive to build strong relationships by understanding the challenges our clients face, sharing their vision and helping them transform potential into reality. Our world-class expertise at scale delivers value to our clients, and the depth and breadth of our capabilities sets us apart from the competition.

Atkins

Cisco

Workshop Sponsor

Today’s cybersecurity experts use up to 50 vendors to protect their networks. Multiple vendors and multiple products lead to needless complexity. And to gaps in threat defense.

Cisco security products work together. They deliver effective network security and incident response. And they boost IT productivity through automation.

We have integrated a comprehensive portfolio of security technologies to provide advanced threat protection. Our technologies include next-generation firewalls, intrusion prevention systems (IPS), secure access systems, security analytics, and malware defense. We offer web and email security, network security, and cloud security.

All this is backed by in-depth threat and malware intelligence.

Cisco

Context

Workshop Sponsor

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from cyber strategy and risk assessments, penetration testing and assurance to incident management and response, training and technical security research. We focus on helping clients avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks. Established in 1998, Context’s client base includes some of the world’s leading blue chip companies, alongside public sector and government organisations. With offices in the UK, Australia, Germany and USA, Context is ideally placed to work with clients worldwide.

Context

Egress Software Technologies

Workshop Sponsor

Egress is the leading provider of data privacy and risk management services designed to protect shared information throughout its lifecycle.

Offering Government and Enterprise customers a portfolio of complementary services, the Egress Switch platform leverages machine learning led policy management, encryption and eDiscovery to enable end-users to share and collaborate securely, while reducing the risk of loss and maintaining compliance. These award-winning integrated services include email and document classification, accidental send prevention, secure email and file transfer, secure managed file transfer, secure online collaboration and secure archive.

Certified by Government, Switch offers a seamless user experience, powerful real-time auditing and patented information rights management, all accessible using a single global identity.

Egress Software Technologies

ForeScout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2017 more than 2,500 customers in over 70 countries improve their network security and compliance posture with ForeScout solutions. See devices. Control them. Orchestrate system-wide threat response.

ForeScout

Symantec

Workshop Sponsor

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats.

Symantec

Tanium

Workshop Sponsor

Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. Serving as the "central nervous system" for enterprises, Tanium empowers cybersecurity and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale, and simplicity of Tanium, organizations can effectively protect against modern-day threats and realize new levels of cost efficiency in IT operations.

Tanium

DCMS

SME Innovation Zone Sponsor

The Department for Digital, Culture, Media and Sport (DCMS) is leading the Government’s work to develop the world’s best digital economy. We want to the UK to be the best place to start and grow a digital business, and the most secure place in the world to live and do business online.

The 2016 National Cyber Security Strategy (NCSS) set out the Government’s vision to 2021: that the UK is secure and resilient to cyber threats, prosperous and confident in the digital world. Our three broad strands of activity are to defend our cyberspace, to deter our adversaries and to develop our capabilities.

The UK cannot become the world’s leading digital nation and be the best place to do business online unless organisations within the UK are secure and resilient. A crucial part of this is promoting the UK’s cyber security sector, ensuring Government, industry and academia work together to support a thriving ecosystem of successful, innovative companies.

This work supports DCMS's overall mission, which is to ensure every organisation in the UK is cyber secure and resilient to support a prosperous digital nation.

DCMS

CrowdStrike

Conference Bag Sponsor

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture.

CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time.

CrowdStrike

Partner Exhibitor

Fortinet

Only Fortinet can provide you with a powerful, complete, and integrated threat management solution that delivers industry leading protection and performance.

Today’s security networks are too complex - Too many different vendors, too many alerts, and too many different ways of managing each device: it all leads to an unmanageable infrastructure where gaps can be difficult to find. Only Fortinet can deliver a seamless, comprehensive security infrastructure across the entire attack surface. From the cloud to the edge and to the endpoint, Fortinet’s industry-leading suite of products and tools address all phases of the attack cycle – from prevention to detection to remediation. With a complete solution from Fortinet, you deliver more control, greater visibility and less complexity.

Fortinet

Fujitsu

As one of the largest IT services and solutions providers in the world, Fujitsu are globally renowned for their expertise in digital transformation.

Fujitsu’s vision for the digital age is to make coherent information available, whenever and wherever it is needed, capitalising on our cyber-secure capabilities in networking and systems integration to link and enhance situational awareness. 

Through the development of our cutting edge digital solutions, we are helping to shape a new world and transform how people live, work, communicate and share data. Our approach extracts maximum benefit from existing IT systems, innovating, developing and extending capability and functionality.

Fujitsu

IBM

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services, and operates one of the world’s broadest security research, development and delivery organisations, monitoring 35 billion security events per day. In the UK IBM has 20,000 employees and IBM Security supports UK Critical National Infrastructure across a range of industries. IBM Security delivers proven outcomes for UK Government with Government trained and cleared consultants in UK based List-X facilities.

IBM

Leonardo

Leonardo, NATO’s Global Cyber Defence Mission Partner. Delivering confidence in the Cyber Security Domain for more than 25 years, through design, developing and delivery of security services and solutions in close partnership with customers, suppliers and authorities.  Constantly investing, we offer public and private organisations comprehensive security solutions needed to comply and defend.

Leonardo offers a consult, design, build and operate model with a broad product and service offering.

Leonardo

Premium Exhibitor

APMG International

APMG International has a broad portfolio of world-class cyber security products. We’ve partnered with the National Cyber Security Centre to deliver Certified Cyber Professional and GCHQ Certified Training, and the Defence Science and Technology Laboratory (DSTL) to develop The Cyber Defence Capability Assessment Tool (CDCAT®).

Visit our stand, C303, to find out more about these products and our diverse portfolio of internationally renowned solutions including Cyber Essentials, ISO/IEC 27001 and Cloud Computing.

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android and BlackBerry.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Deep Secure

Deep Secure has recently pioneered a unique and highly disruptive technology that delivers completely threat-free content.  The efficacy of the technology is unsurpassed, addressing a significant gap in the market for being able to simultaneously defeat all content threats – known, unknown (zero-day), and the undetectable – without the need to examine or isolate traffic.  Deep Secure’s 'Content Threat Removal' has universal relevance in protecting information systems, enabling organisations - to Click, Share, and Transact in perfect safety.

Deep Secure

e2e-assure

e2e-assure offer SOC-as-a-Service to protect your organisation which provides a complete cyber defence service suitable for all Government and Commercial customers, large and small. Protect your critical assets from cyber-attacks and GDPR breaches with our continuous security monitoring and active incident response. We provide the people, technology, and processes to deliver cost effective, high value protection. Deployed as-a-service for cloud services and/or on-premise with pay-as-you-go flexible pricing. Quick to implement, with immediate benefit. e2e-assure provides a range of secure cyber services including Protective Monitoring, SOC Services, Cyber Investigation and Incident Response, Cyber Assessments, Web Gateway and Secure Managed Clouds.

e2e-assure

Frazer-Nash Consultancy

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains. We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise. We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

Ixia Solutions Group

Ixia, a Keysight Business, provides testing, visibility, and security solutions to strengthen networks and cloud environments for enterprises, service providers, and network equipment manufacturers. Ixia offers organizations trusted environments in which to develop, deploy, and operate. Customers worldwide rely on Ixia to verify their designs, optimize their performance, and ensure protection of their networks and cloud environments.

Ixia Solutions Group

Reliance acsn

Reliance acsn is a Digital and Cybersecurity Service provider that believes results come from a well-executed and business-integrated approach stemming from the application of our skills and expertise, combined with threat intelligence and effective risk management.

ACSN was founded in 2003. Reliance acsn was born through merger with Reliance Cyber Science in 2016. We’ve built strong partnerships with over 80 customers across 5 continents, helping them to address Digital Transformation and Cybersecurity challenges. We have a highly skilled and experienced team, accredited by all the major security vendors

Reliance acsn

Securestorm

Securestorm® are leading security experts who deliver pragmatic advice, practical solutions and solve security challenges across the Digital, Cloud, Cyber and Data Protection (GDPR) domains. With a combination of experience, expertise and strategic awareness, Securestorm offers technical and strategic consultancy, managed security services and solutions to clients across both Public and Private sectors.

Securestorm are a NCSC Certified Cyber Security Consultancy with demonstrable experience and proven delivery capabilities. Advanced security solutions and services include: Nol-ij® - Continuous Risk Management, Edgescan® - Full Stack Vulnerability Management, CybSafe® - Unified Cyber Awareness Platform, and Falanx MidGARD™ - Advanced Monitoring Platform.

Securestorm

Surevine

Described by the Financial Times at launch as a “secure Facebook for cyber threats”, Threatvine is a cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

Threatvine unites critical national infrastructure, law enforcement and academia, moving beyond cyber-security information sharing to collaborative cyber-security intelligence analysis; keeping you one step ahead of the cyber threat.

Surevine, the company behind Threatvine, build secure, scalable collaboration environments for the most security conscious organisations; joining people up and enabling collaboration on their most sensitive information.

Smart, secure networks of connected people.

Surevine

UKCloud

UKCloud – the multi-cloud experts

UKCloud is dedicated to helping the UK Public Sector, delivering more choice and flexibility through safe and trusted cloud technology. Since its inception UKCloud has helped revolutionise the way Government deploys and procures IT and delivers public services.

It has been at the forefront of driving digital transformation in the sector and has a multi-cloud approach – which supports access to a suite of technology platforms - and enables UKCloud to uniquely place the right workload, on the right cloud, in the right place.

UKCloud

Exhibitors

2T Security

RiskTree is a business-focused, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2. Using our innovative, browser-based software, it’s being used by both public and private sector clients to reduce the cost and delivery time for accreditation, and to support ISO27001 certification.

2T Security

4 Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions, we for over a decade have worked in the UK and overseas to create secure end to end systems.

4 Secure

Airbus CyberSecurity

Airbus CyberSecurity is a European specialist in Cyber Security. We protect Government, Military and Critical National Infrastructure organisations from cyber threats.

We are over 700 experts based across our main locations in France, Germany and the UK, each with a 24/7 Security Operating Centre and expertise across Cryptography and Key Management.

Airbus CyberSecurity

Armour Communications

Armour Communications Limited provides market leading technology for secure communications on everyday devices. Easy to use, cost effective technology combined with advanced security techniques to deliver cloud-based and on-premises secure solutions.  Advanced features like MCPTT are available as well as integration with unified communications. Armour’s technology is FIPS, CPA and NATO approved.

Armour Communications

BSI Cybersecurity and Information Resilience

BSI Cybersecurity and Information Resilience is a centre of excellence for managing and securing corporate information. We provide expertise to clients on the identification, protection, compliance and management of their information assets through a combination of consultancy, cloud security solutions, and training.

BSI Cybersecurity and Information Resilience

Checkmarx

Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications. Amongst the company's 1,000 customers are 5 of the world's top 10 software vendors and many Fortune 500 and government organizations.

Checkmarx

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

CompTIA

CompTIA is the voice of the world’s information technology industry; building internationally recognised, vendor-neutral technical certifications in areas such as IT Infrastructure, Networking and Cybersecurity. Our popular Cybersecurity Career Pathway offers a progressive route of certifications to validate critical skills that are required to prevent, detect and combat cybersecurity threats.

CompTIA

Cyber Exchange

Cyber Exchange is a not-for-profit initiative that provides a focal point for UK industry, academia and government to connect, engage and collaborate. Membership is FREE and over 600 organisations have already signed-up to showcase their capabilities, products and services and drive new opportunities.

Cyber Exchange

Darktrace

Darktrace is the world’s leading AI company for cyber security. Darktrace’s Enterprise Immune System uses AI algorithms that mimic the human immune system to defend networks of all types and sizes. Our self-learning approach is the first non-consumer application of machine learning to work at scale, across all network types.

Darktrace

Deep3

Deep3 Software Limited - Mission critical software. 

Your challenges. Solved together

We deliver mission-­critical software that ensures your organisation operates effectively in an increasingly challenging world. We work together, in partnership with you to solve your challenges and help you become more dynamic, resilient and effective as an organisation.

Deep3

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.

DomainTools

EclecticIQ

EclecticIQ helps organizations turn cyber threat intelligence into business value with a suite of products built for cyber security professionals in threat intelligence, threat hunting, SOC, and Incident Response roles.

EclecticIQ Platform is the analyst-centric threat intelligence platform based on STIX/TAXII that meets the full spectrum of intelligence needs.

EclecticIQ Fusion Center enables the acquisition of thematic bundles of human-qualified cyber threat intelligence from leading suppliers with a single contract.

In 2016, the company won Deloitte’s Technology FAST50 Rising Star Award for “Most Disruptive Innovator”.

EclecticIQ is headquartered in Amsterdam, The Netherlands.

EclecticIQ

Euro Recycling

On-Site CPNI, NVSC & MoD Approved Data Media Destruction Services. All levels of Protectively Marked and commercially confidential data destroyed at your premises by Police and Government Vetted operatives. In full compliance with HMG IAS No.5

We now provide On-Site Data Erasure and Secure Migration of IT hardware.

Euro Recycling

Exabeam

The Exabeam Security Intelligence Platform provides organizations of all sizes with end-to-end detection, analytics, and response capabilities from a single platform. Exabeam SIP provides unlimited log management at a predictable, cost effective price, leverages UEBA for accurate threat detection, and provides automated security orchestration and playbooks for efficient incident response.

Exabeam

F-Secure

F-Secure is a European cyber security company, delivering an array of information security assessments, consultancy, security management, compliance and training throughout the public and private sectors. Our consultants have developed their skills through dedicated research, experimentation and exposure to technology.

F-Secure

Forcepoint

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries.

Forcepoint

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.

(ISC)²

iStorage

iStorage is the trusted global leader of PIN authenticated, hardware encrypted data storage devices, that include: flash drives, hard drives and solid-state drive formats from 4GB up to 12TB! We are the world’s first and only vendor to attain NCSC CPA & NLNCSA BSPA certifications for our hardware encrypted hard drives and solid-state drives.

iStorage

Ivanti

Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI and the data centre, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation. The company also helps organisations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world.

Ivanti

IT Governance

IT Governance is a leading global provider of IT governance, risk management and compliance solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001 and cyber security.

In an increasingly punitive and privacy-focused business environment, we are committed to helping businesses protect themselves and their customers from the perpetually evolving range of cyber threats.

IT Governance

MWR InfoSecurity

We provide specialist advice and solutions in all areas of security, from professional and managed services, through to developing commercial and open source security tools. We focus on working with clients to develop and deliver security programs, tailored to meet the needs of each individual organization.

MWR InfoSecurity

Outsource UK

Outsource UK are proud to be one of the country’s largest independent recruitment companies, supplying highly-skilled cyber security talent to clients within a range of specialist sectors.

We work with and supply Cyber Directors, CISOs, SOC / SIEM / IAM specialists, IAs, Cyber Risk Managers, Pen Testers, and AppSec Consultants.

Outsource UK

SolarWinds

SolarWinds provides powerful and affordable IT management software to government agencies worldwide, including the UK’s National Health Service, European Parliament, NATO, and nearly every U.S. civilian agency, DoD branch, and intelligence agency. SolarWinds products are designed to solve the problems government IT professionals face every day and eliminate complexity from every IT process imaginable.

SolarWinds

SST

SST has designed and manufactured TEMPEST Secure IT equipment for over 30 years from its Gloucester base. A NCSC accredited facility following CFTCS guidelines. SST has established a track record of solving customer problems via reliable, well-engineered, innovative solutions. The increase in cyber security threats mitigating strategies are becoming vital. 

SST

Telesoft Technologies

Telesoft Technologies is an independent global provider of Cyber Security, Telecoms Mobile products and services and Government Infrastructure. We develop, manufacture and support systems and applications that generate revenue, keep critical infrastructure operational and important data safe.

Telesoft Technologies

Tenable

Tenable™, Inc. is the Cyber Exposure company. Over24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io, the world’s first platform to see and secure any digital asset on any computing platform.

Tenable

Thales

Thales is a global technology leader for the Aerospace, Space, Transport, Defence and Security markets. With over 20,000 engineers and researchers, Thales has a unique capability to design and deploy equipment, systems and services to meet the most complex security requirements

Thales

Thinklogical

Thinklogical, A Belden Brand, manufactures secure KVM and video extension and switching solutions for C4ISR and command and control. Thinklogical enables instant situational awareness, improves cyber security, lowers TCO and simplifies management of multi-classification information. IA accredited: Common Criteria EAL4, NATO NIAPC, TEMPEST Level B, U.S. JITC UC APL 2013.

Thinklogical

Tripwire

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprise and public sector organizations. Tripwire solutions are based on high-fidelity asset visibility and endpoint intelligence combined with business context. Tripwire’s solutions include configuration and policy management, file integrity monitoring, vulnerability management, log management, reporting and analytics.

Tripwire

Ultra Electronics CIS

Ultra Electronics is a leading supplier of CESG-certified encryption solutions at all grades, with a long-established reputation for providing exceptional levels of manageability and reliability.

Ultra Electronics is an internationally successful defence & aerospace, security & cyber, transport and energy company with a consistent track record of development and growth.

Ultra Electronics CIS

White Hat Rally

White Hat Rally organise an annual navigation and driving challenge that really does put the fun in fundraising! Dedicated to supporting children and young people in the UK affected by online abuse & grooming, the Children and Sexual Exploitation (CSE) services are the only beneficiary of the monies we raise. Our event brings together like-minded, socially responsible participants from all aspects of the infosec & cyber sector with a common goal - to raise money for our chosen industry charity, Barnardo’s. Speak to us today about joining the 70+ participants on the ‘Roaming Romans’ car rally in September 2018 and how you can get involved as a participant or sponsor.

White Hat Rally

Small Business Hub

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

CASQUE SNR

CASQUE SNR protects access. It is NCSC CAPS certified, suitable for Secret and resists Insider Attacks. Customer Controlled Keys with Out-of-the-Box Gateway Integration. Built for Cloud Identity as a Service."

CASQUE SNR

Cyber Security Jobsite

Cyber Security Jobsite.com, The definitive Job Board for Cyber Security Professionals. Search 100s of vacancies from the UKs top employers. Register your CV for FREE.

Cyber Security Jobsite

Countercraft

Developer of the pioneering deception-based cybersecurity platform for active cyber-defence; combining research, technology and Threat Intelligence to provide automated counterintelligence campaigns. Solution used by Governments, Law Enforcement and Fortune500 companies.

Countercraft

Data Eliminate

Data Eliminate specializes in the secure disposal and recycling of electronic and other sensitive assets and the provision of secure transport.  Accreditations for certain services include the MoD & CPNI.

Data Eliminate

IASME Consortium

The IASME Consortium is one of 5 Accreditation Bodies appointed by Government to assess against the Cyber Essentials scheme.  IASME also assesses against its own highly regarded and award-winning governance standard which includes the GDPR requirements.

IASME Consortium

ISARA Corporation

ISARA Corporation specializes in creating class-defining quantum-safe cryptography (QSC) for today's computing ecosystems. Embedding ISARA Radiate™ into ICT products secures information with long-term protection requirements while maintaining current encryption standards.

ISARA Corporation

Rivington

Rivington are a niche Information Security Consultancy and Managed Services provider. We specialise in supporting our clients to ensure they have pragmatic, scalable solutions that enable secure business delivery and reputational protection.

Rivington

OnDMARC

OnDMARC is an intuitive cloud-based DMARC solution that helps organisations to secure their domains against email impersonation. Built on an innovative cybersecurity platform OnDMARC is here to make implementing such a crucial layer of protection smarter, simpler and more secure.

OnDMARC

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Topsec

Topsec is a leading provider of cloud-based managed email filtering & security solutions. Our services include anti-spam, anti-virus, continuity email, blended threats (real-time malware & phishing protection), content filtering, image analysis, email archiving, secure-file-transfer, phishing-training-as-a-service & Domain Management. 

Topsec

Yellow Room Learning

Yellow Room Learning empowers your workforce to protect business critical information and data by combining education, simulated phishing, augmented reality, video, and more, as part of a security awareness campaign.

Yellow Room Learning

Innovation Zone

AutoCrypt Solutions

AutoCrypt Solutions is a London based startup creating easy-to-use applications that provide organisations with secure and shareable file encryption for workgroups of any size and across any domain.

AutoCrypt Solutions

Awen Collective

Awen Collective produces next-generation digital forensics & incident response software for complex networks, such as those found in Industrial Control Systems. Applicable throughout the entire DFIR lifecycle.

Awen Collective

Cambridge Authentication

Cambridge Authentication offers Pico, helping companies and their employees to be more productive and secure by liberating them from passwords. The Pico smartphone app removes the need to remember passwords. It automatically and securely logs the user in when they arrive and locks their session when they leave.

Cambridge Authentication

Countersight

Countersight is security monitoring for every organisation. We take care of the heavy lifting and minimise the complexity, delivering powerful attack detection capability that is economical and easy to use.

Countersight

Data Solver

Data Solver's privacy management software. Simplifies the GDPR into a set of accessible steps enabling real time compliance, mitigation of privacy breaches and evidence of Accountability and Privacy by Design. 

Data Solver

DynaRisk

DynaRisk is transforming the way individuals protect themselves from cyber threats. The average person has little or no idea how to secure themselves properly, even basic terms like encryption and data breach are hard to understand. If you don’t understand something, you don’t do anything about it.

This is why we have developed the first Personal Security Score which determines what security issues a person has and helps them fix them. We are working with some of the largest insurers, banks and telecommunications companies in the world to help keep their clients and staff safe online. 

DynaRisk

Galaxkey

Galaxkey, a data protection company, addresses the security and management of data. Galaxkey’s data-centric security protects data whilst fulfilling the data protection requirements of the law, compliance, standards and regulations.

Galaxkey

GBR14

GBR14 applies proven cryptographic techniques to the global challenges of securing databases and applications. GBR14 makes cryptographic security an enabler for innovative data-driven business processes.

GBR14

GemaSecure

GemaSecure: Specialist developer of powerful (up to 400GbE) superfast cryptographic hardware platforms including a number of embedded applications achieving processing speeds through the device of <20uS at full wire speed.

GemaSecure

KETS Quantum Security

KETS Quantum Security offers future-proof, scalable, and easily-deployed communications security with our pioneering on-chip quantum secured encryption technologies – from quantum random number generators to full quantum key distribution devices.

KETS Quantum Security

Think Cyber Security

Think Cyber Security are transforming the delivery of security awareness. Their products embed awareness training into the day-to-day user experience, drawing on Behavioural Psychology and “Nudge” theory to create enduring behaviour change.

Think Cyber Security

VChain Technology

Award-winning security software, improving aviation security + passenger identity through multi-patented tech with blockchain and machine learning. First client - world's third largest airline group - IAG (owner of British Airways).

VChain Technology

CYBERUK 2018 In Practice Agenda.pdf

PDF, 3018.86KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 In Practice Agenda

CYBERUK 2018 Leadership Agenda.pdf

PDF, 1008.04KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 Leadership Agenda

CYBERUK_2018_Sponsorship_Brochure.pdf

PDF, 5379.79KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 Sponsorship Brochure

CYBERUK 2018 E-Bulletin.pdf

PDF, 480.54KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 1

CYBERUK E-Bulletin 2.pdf

PDF, 2394.65KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 2

CYBERUK 2018 E-Bulletin 3.pdf

PDF, 3190.48KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 3

CYBERUK 2018 E-Bulletin 4.pdf

PDF, 5504.24KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 4

CYBERUK 2018 is the National Cyber Security Centre’s (NCSC) flagship event on cyber security. Over three days, 1800+ people will attend events covering both strategy (CYBERUK Leadership) and delivery (CYBERUK In Practice) – giving you up to date information and industry leading insights.

Building on success

CYBERUK 2017 was rated a success by sponsors, exhibitors and delegates alike, so our approach this year is to learn from what worked best and build on it. Delegates liked the chance to mix with innovative start-ups as much as established names in the industry. We saw how well the informal atmosphere helped with networking, so we’ll have more networking events and more relaxed breakout areas. And we’ll be adding more ways for delegates to become a part of the event, from live polling and questions to more interactive events and team-based challenges.

CYBERUK 2018 will be a curated event, emphasising quality over quantity. Quality of speakers, quality of workshops, quality of exhibitors and, most of all, quality of delegates. Invitations will go out to the key decision makers and the most skilled professionals across every Whitehall department and the public sector. Both events will be free of charge to public sector participants. We’ll also attract thought leaders and specialists from Critical National Infrastructure, the information security and technology industry as well as Academia and the Third Sector. In other words, everyone at the conference needs to be there – and is worth getting to know.

A Diverse and Inclusive event

Following CYBERUK 2017, NCSC Technical Director Dr Ian Levy wrote about the need for a community of professionals to collectively deliver the goals of the National Cyber Security Strategy. In his closing speech Dr Levy threw out a call to arms to make the cyber security industry an exemplar for diversity and inclusion. In his blog, he discussed the need for a community code of conduct where we can all come together and describe "what's acceptable and what isn't", so that we can "start discouraging behaviours and attitudes we won't accept".

Since then, the NCSC, the wider community and businesses outside the security sector have worked on the code of conduct that we have released to trial at CYBERUK 2018. The eventual aim is for this to be a mandatory part of working with the NCSC and something that the whole community can be proud to back.

You can read the full policy here and more about the creation of the policy in this blog.

CYBERUK 2018: Three Days, Two Events, One Destination

The NCSC’s first annual review identified that the cyber security threat to the UK is large, growing and diverse. In its first year of operating, the NCSC has achieved a huge amount establishing itself as the lead UK authority when it comes to cyber security. To deliver the NCSC vision we need to create a wide range of partnerships between Government, Industry and Academia. More than this, we need to develop a national conversation with everyone living and working in the UK.

That means moving beyond encouraging partnership and co-operation, and looking to build a true community of interest, encompassing everyone with a stake in cyber security. And, since the online threat affects citizens, Industry, Government and wider society, this is the scope of the ‘big conversation’ we need to have. CYBERUK 2018 will be where this starts.

It will never be possible to stop every cyber attack, but the NCSC is committed to delivering a world-class incident management service. CYBERUK 2018 will give us an opportunity to discuss and identify how we can build on what we have done so far. 

We’ll also focus on some areas of the UK economy which face unique challenges in implementing effective cyber security, especially retail and the voluntary sectors. We will discuss how we can support them and help make them less vulnerable to attack.

We know that in the years ahead there is so much to do in countering the strategic threat to our values, prosperity and way of life.  People are our strongest link and we know that building a community of partners for cyber security is crucial to meeting these challenges together.

CYBERUK In Practice (10-11 April): Bringing together 1200+ information security professionals. This will include specialists in the design and development of online services and systems, plus professionals in procurement and delivery. It will be an opportunity to share best practice, learn about the latest security threats and solutions, and consider the growing challenges we all face.

CYBERUK Leadership (12 April): The Government’s leadership event for business and public sector decision makers and strategists.  This is where key senior staff – policy makers, CEOs and thought leaders – will learn about and contribute to the development of the latest thinking on how cyber security and business acumen come together to deliver successful business outcomes. Speakers will be drawn from the same community as the 600+ delegates – Government, Academia, the Third sector, Critical National Infrastructure and Industry.  Minister-led, it will feature senior representatives from GCHQ and the NCSC.  It will include the popular CYBERUK Leadership Networking Dinner on 11 April 2018.

Not just another event

The only UK Government-hosted event for this sector. CYBERUK 2018 will be the largest and most wide ranging event for cyber security leaders and professionals in the UK. It will attract the key players in Government, Academia, and Industry, and will offer unrivalled networking opportunities.

Truly interactive

Everything about the event will be designed to encourage debate, feedback and input. Bringing to you world-class speakers, creating dynamic Q&As, competing at the Cyber Games and sharing through interactive walls, we’ll create an event built around you. An event that will inform, challenge and inspire attendees – and create an atmosphere where networking is built-in, not bolted on.

Why attend?

  • Hear from thought leaders, be that Ministers, technology leaders, or others with interesting and relevant messages to give.
  • Meet leaders from across the sector.
  • Participate in challenging and thought provoking content.
  • Learn from the best – thought leaders from Government, Industry, Academia and the Critical National Infrastructure.
  • Connect with the wide range of public sector participants, personally invited by the UK Government.
  • Enjoy a mix of plenary talks, themed streams/tracks and Lightning Talks.

STREAMS AND TRACKS

Streams and Tracks offer participants an opportunity to share information, explore case studies and take part in debates on issues around information and security.

WORKSHOPS

Allow a deeper understanding of key issues, exchange ideas and develop effective action plans for the future, a strong workshop programme is offered at CYBERUK 2018.

SPOTLIGHT TALKS

Held during breaks, lunch and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2018 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate.

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams, Tracks and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions and chat to our graphic artist who will find visual ways to capture your insights.

CYBERUK In Practice logo

CYBERUK In Practice (10-11 April 2018)

The highly interactive event over two days will provide a wide range of sessions to cater for all levels of knowledge and experience using the much enjoyed chilli ratings we introduced in 2017.  The event content will be heavily informed by the delegates, sponsors, and exhibitors thus ensuring we create an environment to promote diversity, create challenging conversations and identify opportunities to achieve our vision of making the UK the safest place to live and work online. 

CYBERUK In Practice brings together the professional community responsible for developing and implementing cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling plenary keynotes and panel debates, the following four Tracks will span two days and will be led by NCSC Technical Directors.

TRACKS

Track 1 • Vulnerabilities and Bug hunting - A technical stream that will explore vulnerability discovery, with some strong use-cases.

Track 2 • Cutting edge mitigations and future technology - Showcasing the art of the possible in security mitigations with today’s technology as well as looking to the future.

Track 3 • Detect & Defend - An up to date view of real world attacks and a range of monitoring use-cases covering SOCs, analytical techniques and technology.

Track 4 • Whole System Security - Advanced approaches to security analysis and management, drawing on risk, modelling and learning from engineering practices.

NETWORKING

On Monday 9 April there will be an evening Welcome Drinks Reception, held at a central Manchester location.

A relaxed CYBERUK In Practice Networking Drinks evening will take place in the exhibition hall following the first day of CYBERUK In Practice (10 April). Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract 1200+ technology and cyber security professionals from across the public sector, Critical National Infrastructure, Industry and Academia. They’ll come together to share the cyber security challenges we all face.

Our programme of seminars, Lightning Talks and keynote speeches is designed to stimulate feedback, challenge thinking, create debate and enable networking. We saw how well last year’s interactive elements worked in getting delegates talking, exchanging experience and technical insights – so we have planned some new experiences for 2018.

Delegates will leave with a thorough understanding of latest practice and policies, new innovations and emerging cyber threats. And, most of all, they’ll have built valuable new connections.

AGENDA

 
SPEAKERS
 

Abigail Goodman | Track 3, Session 2 | 10 April

I work as a Cyber Intelligence Analyst at Barclays, running the Cyber Research and Development Team.
 

Adam Rudderman
Adam Ruddermann | Session 5, Track 1 | 11 April

Adam Ruddermann is the Director of the Bug Bounty Services Practice at NCC Group. He has extensive experience in the bug bounty community, having led Facebook's Bug Bounty Program and co-founding the BountyCraft conference series, and as Synack's first Operations Manager. He previously served in U.S. government security and intelligence consulting roles with Booz Allen Hamilton and as a Technical Lead at the NSA Red Team while in the United States Air Force.

 

Alison Vincent
Alison Vincent | Plenary Session, Diversity Panel | 11 April

Alison is an experienced technology leader holding senior level positions with global organisations such as HSBC, Cisco, NDS, Micro Focus and IBM. Her roles span Research and Development, Strategy Execution, Sales, Product Management and Business Development, with particular expertise in digital strategy, innovation and Mergers and Acquisitions. Alison was announced to be one of the Top 50 Influential Women in UK IT 2017 and is on the Council at Southampton University. Alison has a PhD in Cryptography and is a Fellow of the British Computer Society.
 

Andy Gittins
Andy Gittins | Track 3 | 10 April

Sgt Gittins RAF is a Cyberspace Communication Specialist (formerly ICT Technician), Currently employed in Joint Cyber Unit as Depth Analysis Malware team lead. Working within ICT since 2003 and Cyber Security since January 2017. Responsible for the Tactical implementation of the MOD’s Enterprise Threat Hunting Operations.

Awais Rashid
Awais Rashid | Session 2, Track 4 | 10 April

Awais Rashid heads the Cyber Security Group at University of Bristol. His research interests are in security of cyber-physical systems, such as, industrial control systems and IoT as well as human behaviours. He leads projects as part of the UK Research Institutes on: Trustworthy Industrial Control Systems (RITICS) and Science of Cyber Security (RISCS), co-leads the Security and Safety theme within the PETRAS Hub and heads the CyBOK  project.

Ben Payne
Ben Payne | Session 6, Track 4 | 11 April

Ben Payne joined Lloyds Commercial Bank in July 2017 as Cyber Security Manager where he is responsible for the cyber-security of the bank as well as supporting clients on cyber. Prior to Lloyds Ben held a number of cyber roles in the public sector leaving as Head of Incident Reporting. Ben ensures the risks are understood across an organisation, bridging the gap between IT and the business.

Campbell McCafferty
Campbell McCafferty | Plenary | 11 April

After a short post-doctoral career at the University of Edinburgh, Campbell joined the Ministry of Defence in 1995.  He held a number of scientific roles and was promoted to Asst Head in 2000. Roles in defence policy and Civilian HR, sandwiched an operational tour (Iraq 2003) and attendance at the Military’s Higher Command and Staff Course (2005).

Promoted to the SCS in 2006 he was Director Resources for the army.  In 2009, he was appointed Hd Counter Terrorism and UK Operational Policy, where he was the Policy lead for operations in Libya, counter-piracy and the Defence contribution to Security for London 2012.

He joined the Civil Contingencies Secretariat on promotion to Director in 2013 where he was responsible for the UK’s national preparedness for all disruptive challenges. His team oversaw the central coordination of the NATO Summit in Newport and led the UK Government response to widespread flooding in the UK and the Ebola outbreak in West Africa.

He became the Director of Cyber and Government Security in 2016 and was responsible for the delivery of the National Cyber Security Strategy and National Cyber Security Programme and the UK’s developing policy on the use of Cyber Capability.

In December 2017 he became HMG’s first Government Chief Security Officer and is leading transformational change in the Security machinery of Government, developing new standards, and is bringing together the means to deliver technology solutions to enable a more dynamic security policy in response to an ever changing threat environment .

Callum Wilson
Callum Wilson | Session 2, Track 2 | 10 April

Security Architect specialising in solving the problem of risky IoT devices in the home.

 

Carly West
Carly West | Session 7, Track 3 | 11 April

Carly is a cyber security analyst at the Bank of England, heading up a data-driven threat hunting and detection team.

 

Carol Peters
Carol Peters | Session 5, Track 2 | 11 April

Carol has worked in information security for 20 years with 15 of those years being in local government and was privileged to be previously elected as chair of the Scottish Local Authority Information Security Group. 

At Renfrewshire Council her focus is on modernising cyber security to fit today’s ways of working whilst remaining within strict regulatory boundaries.  Carol tries to bring fun into the subject and make it appealing.

Chris Anley
Chris Anley | Session 2, Track 1 | 10 April

Chris Anley is Chief Scientist at NCC Group plc, and has been carrying out security audits since 1996, performing thousands of penetration tests, code reviews and design reviews on a wide variety of platforms, languages and architectures for many of the world's largest companies.

As Chief Scientist, he promotes, advises and assists with NCC group research programs, as well as carrying out independent research into new and emerging security threats.

Chris McMahon Stone
Chris McMahon Stone | Session 4, Track 1 | 10 April

Chris is a PhD student in Computer Security at the University of Birmingham. To date his research has covered various topics including protocol implementation analysis and mobile application security.

 

Christian Wagner
Christian Wagner | Session 3, Track 4 | 10 April

Christian Wagner’s research focuses on modelling and handling of uncertain data arising from heterogeneous data sources with a particular focus on data from people such as experts. At an application level, he focuses on decision support in areas from data-driven environmental policy design to cyber security. He is Director of the Lab for Uncertainty in Data and Decision Making (LUCID) and Chair of the IEEE CIS Task Force on Cyber Security.

Ciaran Martin
Ciaran Martin | Plenary | 11 April

Ciaran is the first CEO of the National Cyber Security Centre. Prior to joining GCHQ in February 2014, Ciaran was Constitution Director at the Cabinet Office. In this role, he was the lead official negotiator for the Prime Minister and Secretary of State for Scotland in the run-up to the Edinburgh Agreement in 2012 on a referendum on independence for Scotland.

Daniel Dresner
Daniel Dresner | Session 4, Track 4 | 10 April

Daniel is Manchester University’s Academic Coordinator for Cyber Security, and co-founder of IASME. His PhD covered standards and risk mitigation; he’s an IISP Fellow. At NCC, he designed DTI’s TSE programme, created SANS training, edited ISBS, and wrote source code escrow standards. He authored SOCITM’s Cyber Resilience Guide and contributed to NCSC’s risk management guidance. He appears on the BBC and was second top influencer in UK cyber security 2017.

Daniel Cater
Daniel Cater | Session 4, Track 1 | 10 April

Daniel Cater is a Lead Security Consultant at Context Information Security. Previously a software developer for an investment bank, he now prefers trying to break things rather than make things. He holds the “CREST Certified Tester for Web Applications” certificate (CCT App), and enjoys hunting for bugs in web applications and web browsers, as well as doing research into Big Data, cloud security, and consumer products.

Dave Hogue
Dave Hogue | Plenary Session | 10 April

Mr. Dave Hogue is currently serves as the Technical Director for the NSA’s Cybersecurity Threat Operations Center (NCTOC), a dynamic, national-level entity that serves at the forefront in the fight against malicious cyber activity through integrated cybersecurity operations.  Previously, Mr. Hogue was the Technical Director of the Analysis Group within the National Security Agency (NSA) Threat Operations Center (NTOC), charged to deliver vital threat intelligence across a multitude of threat actors and technologies.  While in this position, Mr. Hogue also served as a corporate officer, leading agency-wide efforts such as NSA’s response in delivering foundational technical analysis and attribution of the 2014 Sony Pictures Entertainment (SPE) computer network attack (CNA).

David Rogers
David Rogers | Session 2, Track 3 | 10 April

Dave Rogers is Chief Technology Officer at the Ministry of Justice. Formerly of guardian.com , BBC, and Government Digital Service, and a software developer and technical architect by background. Dave writes and talks about leadership and strategy in technology, particularly within a central government context.

Derek McAuley
Derek McAuley | Session 8, Track 4 | 11 April

Derek McAuley is Professor of Digital Economy and Director of the Horizon Digital Economy Research Institute at the University of Nottingham. His computing research interests span ubiquitous computing, computer architecture, networking, distributed systems and operating systems, while his interdisciplinary interests include issues of ethics, identity, privacy, information policy, legislation and economics within a digital society.

Don Smith
Don Smith | Session 2, Track 3 | 10 April

Don Smith leads the CTU™ Cyber Intelligence Cell, a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients.

Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise.

Emma Green
Emma Green | Session 7, Track 2 | 11 April

Emma Green is Head of the Cyber Security Incentives and Regulation Team in Department for Digital, Culture, Media and Sport.  Her team’s focus to improve cyber security across the economy and ensure all organisations have in place appropriate measures to detect cyber attacks and to protect themselves and their customers from malicious online activity. Emma has extensive experience as a policy professional in departments including the Department for Communities and Local Government and the Department for Business, Innovation and Skills.

Emma Philpott
Dr Emma Philpott | Plenary Session, Diversity Panel | 11 April

Emma is founder and manager of the UK Cyber Security Forum, a network of more than 600 small cyber security companies. The Forum is starting a Community Cyber Security Centre to train neurodiverse individuals to work in Cyber Security.

Emma is also CEO of the IASME, a company that focuses on information assurance for small companies by offering certification against Cyber Essentials and their own governance standard including the GDPR.

Emma Smith
Emma Smith | Session 2, Track 3 | 10 April

Emma joined Vodafone in 2015 as Group Technology Security Director, responsible for all aspects of information and cyber security. The global security teams in Vodafone are responsible for setting security policy in line with local laws and regulations, implementing new security technologies and controls, securing new products and services and 24x7 cyber defence capabilities.  Emma is passionate about security. Specifically, about evolving security to protect customers against changing threats and the opportunity to contribute to improving the safety of the communities we operate in. Prior to joining Vodafone, Emma was Security Director at the Royal Bank of Scotland for 7 years.  

Greg Smith
Greg Smith | Session 7, Track 3 | 11 April | Session 8, Track 1 | 11 April

Greg works at the Ministry of Justice as a Senior Security Engineer within the Digital & Technology team, working closely with other government departments and for NCA NCCU as a Cyber Special, with 18 years cyber experience within government.

His role encompasses penetration testing of government used systems, development and implementation of pragmatic security in Agile and traditional environments.  He has an active interest in malware, vulnerabilities, research and informing MoJ security strategy.

Graham Calladine | Session 7, Track 1 | 11 April

Principal Security Engineer in the Windows Engineering Systems Group. Graham Calladine is a passionate leader in Microsoft, with substantial experience in leading edge security engineering in static analysis and open source software.

Harry Metcalfe
Harry Metcalfe | Session 1, Track 3 | 10 April

Harry Metcalfe is founder of dxw digital, and has been delivering secure digital services to public sector bodies since 2008. He’s also co-founder of dxw cyber, a sister company focussing on public sector security testing. dxw cyber believe good security starts with practical understanding of technical risk and teams that can respond to threats. It works with clients to establish  positive security cultures, and move away from bureaucratic risk-driven approaches.

Henrik Johansson
Henrik Johansson | Session 4, Track 3 Part 1 | 10 April

Henrik Johansson is a Principal Architect - CISO Engagements in AWS Security with focus on security at scale. This includes deep understanding of security automation (DevSecOps), automated incident response remediation, security testing and deep insight into various compliance framework. Henrik is an experienced public speaker at a number of industry events including AWS ReInvent.

Henrik also maintains multiple OSS repos focusing on security automation in cloud workloads / at scale.

Ian Levy
Dr Ian Levy | Closing Plenary Session | 11 April

Ian became Technical Director of the National Cyber Security Centre in October 2016, prior to which he was Technical Director of Cyber Security and Resilience at GCHQ. Ian leads on developing defences to manage cyber threats. This involves fostering technical innovation to find solutions that can protect the UK from large scale cyber attacks, and day-to-day malicious cyber activity.

James Dipple-Johnstone
James Dipple-Johnstone | Plenary Session | 11 April

James joined the ICO’s office in 2017 from the Solicitors Regulatory Authority (SRA), where he had been Director of Investigation and Supervision leading their teams assessing and investigating reports of professional misconduct, money laundering, cybercrime and fraud involving solicitors and law firms. James’s background is in regulatory investigation, appeals and complaints handling.   He has held posts as Commissioner for the Independent Police Complaints Commission, Director of Investigation for the Parliamentary and Health Service Ombudsman and in NHS regulators.

James Forshaw
James Forshaw | Session 6, Track 1 | 11 April

James is a security researcher in Google’s Project Zero. He has been involved with computer hardware and software security for over 10 years looking at a range of different platforms and applications. With a great interest in logical vulnerabilities he’s been listed as the #1 researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner. He has spoken at a number of security conferences including Black Hat USA, CanSecWest, Bluehat, HITB, and Infiltrate. He’s also the author of the book “Attacking Network Protocols” available from NoStarch Press.

Jasmine Mohammed
Jasmine Mohammed | Plenary Session, Diversity Panel | 11 April

Having been an educator for 18 years, Jasmine is currently the Head of Computer Science at Loreto College, Manchester and an external examiner for the subject area. Jasmine has successfully promoted the subject amongst underrepresented groups, and encouraged all of the students to develop their skills and insights beyond the constraints of the curriculum. More recently, Jasmine actively supports coding clubs and other initiatives in developing digital skills.

Joanna Place | Plenary Session | 10 April

Joanna was appointed Chief Operating Officer on 27 July 2017.

Previous roles at the Bank include Executive Director of HR, Head of Customer Banking Division (playing a key role in the financial crisis), Head of Monetary and Financial Statistics Division; and Director of Regulatory Operations, Prudential Regulation Authority. Joanna also had a secondment to the Border Agency (2004-2007).

Joanna has a BA (Hons) in Economics from Fitzwilliam College, Cambridge University.

John Thomas
Dr John Thomas | Session 1, Track 4 | 10 April

Dr. John Thomas received his Ph.D. working in MIT’s System Engineering Research Lab, and he holds bachelor's and master's degrees in computer engineering. Dr. Thomas’s research involves using systems theory to develop structured analysis methods for safety and cyber security, especially in systems that exhibit complex interactions with each other and their environment. More recently he has been extending these methods to cyber-physical-human systems that also depend on human-computer interactions and human interfaces to achieve safety and security goals.

Jonathan Marshall
Jonathan Marshall | Session 2 Track 2 | 10 April

 

 

Jonathan Pagett
Jonathan Pagett | Session 1, Track 3 | 10 April

Jonathan has spent the last 12 years designing, evolving and managing Security Operations Centres across Government and the finance sector. Most recently he is responsible for the Security Operations Centre at the Bank of England. He is also currently on part-time secondment to NCSC, developing security monitoring guidance and volunteers for the Cyber Security Challenge.

Kev Jones
Kev Jones | Session 3, Track 4 | 10 April | Session 8, Track 4 | 11 April

Kevin joined JP Morgan in June 2015 and is responsible for business engagement across Cybersecurity and Threat Intelligence

Previously, Kevin served for almost 30 years in the British Army, specialising in Military Intelligence. Throughout his career Kevin worked within the UK intelligence communities and served in various countries on operational service. He worked alongside international military and other government agencies in numerous at tactical, operational and strategic levels.

Luke O'Brien
Luke O'Brien | Session 3, Track 3 | 10 April

Flight Lieutenant Luke O’Brien is the operations officer at Joint Cyber Unit Corsham. Luke leads a team of 50 military and civilian personnel in the defence of the MOD’s networks in 2 SOCs. As an engineer in the RAF, Luke has previous operational experience with fast jet and transport aircraft in the UK, US, Far East and Middle East.

Mark Barnes
Mark Barnes | Session 8, Track 1 | 11 April

Mark is a Security Researcher at MWR InfoSecurity and a team leader within the research practice. He specialises in software reverse engineering, hardware hacking, platform security and software defined radios. Prior to working in information security he was a laser physicist and likes juggling.

Mark Harbord
Mark Harbord | Session 3, Track 2 | 10 April

Mark Harbord is Head of Cyber for the Parliamentary Digital Service, heading up the technical cyber security team. He’s worked in the IT Security arena since 2012, and was previously the Technical Delivery manager, running the third line support teams in Parliament.

 

Mark Ryland
Mark Ryland | Plenary Session, Keynote Address | 10 April

Mark Ryland is the Director of the Office of the Chief Information Security Officer (OCISO) at Amazon Web Service (AWS). Ryland leads a global team of Security Architects who help customers to understand more deeply how AWS builds and operates its highly secure cloud platform, and how they can best leverage that modern platform to enhance their own IT security. Ryland has more than 27 years of experience in the technology industry across a wide range of leadership roles in cybersecurity, software engineering, distributed systems, technical standardization, and public policy.

Matt Lewis
Matt Lewis | Session 8, Track 1 | 11 April

Matt has over 15 years’ experience in technical security research, testing and consulting. His experience spans most technologies across all sectors with much focus on facilitating security assurance within the government sector. He is a public speaker with global recognition of knowledge and expertise in biometric security, and has presented at many international conferences and seminars on all manner of cyber security topics.

Miles Brundage
Miles Brundage | Session 8, Track 4 | 11 April

Dr. Miles Brundage is a Research Fellow at the University of Oxford's Future of Humanity Institute. He researches the societal implications of artificial intelligence. Among other recent publications, Dr. Brundage was a lead author of the report, "The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation," and a co-author on a review of the AI sub-field of deep reinforcement learning. He received his PhD in Human and Social Dimensions of Science and Technology from Arizona State University in 2018.

Mohammad Dabbah | Session 8, Track 4 | 11 April

Dr Dabbah is an expert in artificial intelligence, machine learning and computer vision. He has contributed to and led work in various application fields, including biometrics, medical, pharmaceutical, situational awareness, autonomous systems, industrial inspections, defence, space and national security. Dr Dabbah has published many scientific articles, books and patents. He also won several awards, including from the IET. Dr Dabbah’s work has been internationally recognised in over 590 scientific publications.

Nic Miller
Nic Miller | Session2, Track 3, & Session 4, Track 4 |10 April | Session 6, Track 3 | 11 April

Currently a virtual CISO at Aedile Consulting, Nic founded the company in 2017 to provide light touch, affordable consultancy to startups and small businesses. He takes a pragmatic, back to basics view of security with a focus on self-sufficiency for his clients.

Previously Nic was the CISO at Brevan Howard, a global hedge fund, for 3 years. He began his career working for the UK Government investigating threat actors.

Nick Neave
Nick Neave | Session 7, Track 4 | 11 April

Associate Professor in the Department of Psychology at Northumbria University. Director of the Hoarding Research Group. Conducted research on  psychological characteristics of hoarders. Now exploring  ‘digital hoarding’, and find that such behaviours are common and might have cybersecurity implications. We received funding from CREST and have  designed a ‘Digital Hoarding Questionnaire’, and are now exploring the cybersecurity implications of digital hoarding in organisations.

Nicola Hudson
Nicola Hudson | Plenary Co-Chair | 10/11 April

Nicola became Director of Communications at the National Cyber Security Centre in September 2016. Prior to this she was Head of News in the Prime Minister’s office. Nicola was Deputy Director of Communications for the London 2012 Olympic Games and Paralympic Games, Director of Communications for the Control Risks Group and Head of Government Relations for Camelot.

Nilesh Gorasia
Nilesh Gorasia, C18 In Practice, Session 7, Track 3, 11

Nilesh describes himself as a relative newbie, having switched industries from mechanical engineering to cyber-security slightly less than 3 years ago; he found his niche in conducting SOC-related analyses with SIEM tool in hand. Headed down a data science path hereafter.

Pete D'Ardenne
Peter D'Ardenne | Session 4, Track 4 | 10 April

Pete has over 25 years experience in Cyber having served in the RAF, including  CISO RAF and Head MODCERT roles. He now leads security governace and delivery of DXC’s services to UK Government and wider Public Sector. A recognised Cyber Security Leader, with specialist knowledge and experience with managing major change, mergers and re-structuring.  Considerable experience delivering complex major programmes requiring exacting standards and challenging schedules.

Robert Laid
Robert Laid | Session 4, track 4 | 10 April

I currently work as a Senior Audit Manager for the Government Internal Audit Agency in the DDaT assurance specialism, and have worked in Information Assurance and Cyber Security in Government for 12 years.  Previous to this roll I have worked as a Principal Inspector in Cyber Security at The Office for Nuclear Regulation and Head of Information Assurance at HM Passport Office.

Robert Miller
Robert Miller | Session 3 Track 1 | 10 April

Robert has worked for MWR InfoSecurity since 2011, working with clients in a wide range of projects, from Android application security reviews to training engineers on secure hardware design. He now runs the company's Operational Technology team focusing on industrial and embedded device security.

Robert Watson | Session 6, Track 2 | 11 April

Dr Robert N. M. Watson is a University Senior Lecturer (Associate Professor) at the University of Cambridge Computer Laboratory, where he works across the areas of security, operating systems, and computer architecture. He led work on the CHERI architecture "from the ISA up", designing the hardware-software security model, and has led the CHERI software development team working on OS support, compiler support, and applications. In prior industrial research, he developed the MAC Framework used widely for OS kernel access-control extensibility in FreeBSD, Mac OS X, iOS, and Junos. He a coauthor of The Design and Implementation of the FreeBSD Operating System (Second Edition).

Rod Chapman
Rod Chapman | Session 1, Track 2 | 10 April

Rod is a Principal Engineer with the Intelligent Systems Expertise Centre of Altran UK in Bath. He specialises in the development of safety and security-critical systems, from requirements engineering, through architectural design and implementation, to verification, audit and assessment.

Ruth Massie
Dr Ruth Massie | Session 5, Track 4 | 11 April

Dr Ruth Massie is a Senior Lecturer in Cyber Governance at Cranfield University. Ruth’s research focuses on how Board leaders interact and engage with information, particularly in relation to cyber. Ruth is part of Cranfield’s Centre for Electronic Warfare, Information & Cyber.

Sarah S
Sarah S | Plenary Session, Diversity Panel | 11 April

Sarah leads CyberFirst a pivotal part of the National Cyber Security Programme (NCSP).  CyberFirst is primarily a bursary scheme, but to encourage diversity and inspire those who may not have considered a career in technology and cyber security, it  includes activities such as girls competitions and cross-UK development events for students aged between 11-17.  Previous to this role Sarah was the Head of L&D for GCHQ.

Sean Heelan
Sean Heelan | Session 3, Track 1 | 10 April

Sean Heelan is currently pursuing a PhD at the University of Oxford. Previously, he founded Persistence Labs, a reverse engineering tool development company, and worked as a security researcher at Immunity Inc. His primary research interests are in automated program analysis, with a focus on vulnerability detection, reverse engineering and exploitation.

Siddharthan Elangovan
Siddharthan Elangovan | Session 7, Track 3 | 11 April

Siddharthan is a cloud security specialist currently working at MoJ. He is responsible for maintaining and continually improving the security of the digital platform services, develop security capabilities to detect and mitigate malicious attacks, implement cloud security strategies and best practices. He is passionate about integrating security automation with DevOps practices.

Simon Moore | Session 6, Track 2 | 11 April

Simon Moore is a Professor of Computer Engineering at the University of Cambridge Computer Laboratory in England, where he undertakes research and teaching in the general area of computer design with particular interests in secure and rigorously-engineered computer architecture. Professor Moore is the senior member of the Computer Architecture research group.

Steven Hunter
Steven Hunter | Session 7, Track 1 | 11 April

Steven is a Security Software Engineer in the MSRC Vulnerabilities and Mitigations team at Microsoft. He focuses on finding and preventing security vulnerabilities, with an emphasis on static analysis techniques.

Stuart Aston
Stuart Aston | Session 2, Track 3 | 10 April

Stuart has been with Microsoft in the UK since 1998 and is the National Security Officer for Microsoft in the UK. Prior to joining Microsoft, Stuart worked as a consultant for ICL and Barclays Bank. He has been actively involved in computer security related activities since the early 80’s

Stuart Laidlaw
Stuart Laidlaw | Session 8, Track 4 | 11 April

Stuart Laidlaw is co-founder and CEO of Cyberlytic, which he co-founded in 2013. He previously held senior management positions at several global security companies including BAE Systems, CGI and Fujitsu, where he was responsible for delivering large-scale IT security programmes. Prior to starting Cyberlytic, Stuart led groundbreaking software and IT projects for both the National Crime Agency and UK Foreign Office.

Tom Farrar
Tom Farrar | Session 7, Track 3 | 11 April

14 years’ experience in both the private and public sector, with a background in operations, engineering and software development. Currently security operations engineer at GDS.

Tony Badsey-Ellis
Tony Badsey-Ellis | Session 3, Track 2 | 10 April

Tony has worked in information assurance and security for almost 20 years, specializing on risk management and assessment. He co-founded the cyber security company 2T Security in 2013. Since then he has designed and created the RiskTree process, which is being used across a variety of Government departments to provide fast, efficient risk assessments. Tony has spoken regularly about risk management at security and IA events.

Tony Beedle
Tony Beadle | Track 2, Session 3 | 10 April

Tony has been working as a Security Architect for the past 18 years, and co-founded the cyber security company 2T Security in 2013. He has been helping to solve some of the security design challenges for some of the complex problems within Government, in particular around the control of data flow between security domains.

Tony Smith
Tony Smith | Session 5, Track 2 | 11 April

Tony Smith has over 30 years experience as an ICT professional including over 15 years as an information security professional. Working in both the private and public sectors he holds CISSP, SCP and PCI IM certifications and is a full member of the Institute of Information Security Professionals.

Wendy Arrowsmith
Wendy Arrowsmith | Plenary Session, Diversity Panel | 11 April

Wendy Arrowsmith is a Security Manager within National Grid’s cyber security team; enabling the business to deliver its security responsibilities. Wendy has over three decades of experience in the energy industry, including service in the Royal Air Force; in IT/OT, risk, and process safety engineering. Wendy has also led a National Grid inclusion and diversity employee resource group, successfully implementing change programs to improve employee and customer services.

Yasemin Acar | Track 2, Session 1 | 10 April

Yasemin Acar is a researcher with a focus on supporting developers in improving the security of their decisions, workflow and code. She’s an enthusiastic collaborator in multi-disciplinary projects to make security more usable for everyone.

Yvonne Rigby
Yvonne Rigby | Session 2, Track 4 | 10 April

I am the Project Manager of the Cyber Security Body of Knowledge (CyBOK) project funded by the National Cyber Security Programme. The CyBOK is being developed by a team of leading UK academics led by the University of Bristol.

CYBERUK Leadership logo

CYBERUK Leadership (12th April 2018)

The 2018 event will develop highly interactive sessions which will focus on building our community for cyber security across four objectives; Reduce, Respond, Understand and Nurture.  It will bring together leaders who can enable a dynamic discussion, include workshops where challenges can be explored and time to build new relationships and networks across the public sector, Industry and Academia. 

CYBERUK Leadership will set the agenda for UK cyber security. This event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by an NCSC Engagement Deputy Director entrusted with shaping and leading the team’s delivery.

STREAMS

Stream 1 • REDUCE - Examining how the cyber security community reduces risks to the UK by securing public and private sector networks.

Stream 2  RESPOND - Demonstrating how the cyber security community responds to cyber security incidents to reduce the harm they cause to organisations and the wider UK.

Stream 3 • UNDERSTAND - How the cyber security community understands cyber security, and distils this knowledge into practical guidance that we make available to all.

Stream 4 • NURTURE - Developing industry and academic expertise to nurture the UK's cyber security capability.

NETWORKING DINNER

A prestigious CYBERUK Leadership Networking Dinner will be held on Wednesday 11 April, before the conference begins on Thursday.

THE AUDIENCE

CYBERUK Leadership will attract leaders in cyber security across Government and Industry, regulatory bodies and influencers. How can we be so sure? Last year’s event saw over 800 delegates – from senior leaders and risk owners from Government departments and cyber security leaders from the public and private sector including Academia. Over the day, we created a perfect environment for them to meet, network, and hear from leaders in their fields. This year will build on that success – but with more interactivity, more input from participants, and more opportunities to meet, exchange ideas and build relationships.

Around 60 per cent of participants will come from the public sector, and the public sector places are free.  The NCSC will ensure that we get the right mix by personally inviting key staff in strategic, decision-making roles. These are the people whose voices are listened to, who set the agenda, and who make things happen. CYBERUK Leadership attendance is invitation only for the public sector.

AGENDA

 
SPEAKERS
 

Adam Beaumont
Adam Beaumont | Session 1, Stream 3, Part 2 | Session 2, Stream 3 | 12 April

Adam Beaumont is the founder and CEO of telecoms operator aql and a visiting professor of cyber security at the University of Leeds. He’s built key parts of the UK’s internet infrastructure, including IXLeeds, the Northern internet exchange, and, as a leading figure in the Northern Powerhouse, is currently building the engineering that will allow Leeds to become a 5G city. He’s interested in security and integrity technology, or “TrustTech”.
 

Cath Goulding
Cath Goulding | Stream 3 | 12 April

Cath currently works as Head of Cyber Security for Nominet UK, the internet company best known for running the ‘dot.uk’ registry and therefore critical to internet operations in the UK. She was awarded Security Champion at the Women in IT awards 2015 and sits on the board of the Women’s Security Society.
 
Ciaran Martin
Ciaran Martin | Pleanary | 11 April
 
Ciaran is the first CEO of the National Cyber Security Centre. Prior to joining GCHQ in February 2014, Ciaran was Constitution Director at the Cabinet Office. In this role, he was the lead official negotiator for the Prime Minister and Secretary of State for Scotland in the run-up to the Edinburgh Agreement in 2012 on a referendum on independence for Scotland.
 

Cindy Widick
Cindy Widick | Plenary Session | 12 April

Ms. Cynthia L. Widick is Chief of the National Security Agency/Central Security Service's (NSA/CSS) Cybersecurity Operations (CSO) Group in the Operations Directorate where she leads integrated cybersecurity operations to enable high impact operational effects in the cyber domain and deny adversaries the ability to influence, exploit or threaten cyber and information infrastructure domains within the bounds of our authorities.
 

David Harcourt
David Harcourt | Stream 3 | 12 April

Dave is a highly experienced security advisor, influencing strategy in cyber security within BT and across wider industry and governments globally. He provides thought leadership into the strategy and implementation of BT's security programmes, is driving cyber security improvements in the telecoms industry as part of the Active Cyber Defence programme, and is a driving force behind BT's approach to proactive threat hunting and discovery.
 

Elizabeth Denham
Elizabeth Denham | Plenary Session | 12

Elizabeth Denham was appointed UK Information Commissioner in July 2016, having previously held the position of Information and Privacy Commissioner for British Columbia, Canada and Assistant Privacy Commissioner of Canada.

She has set out a commitment to increase consumer trust people have in what happens to their personal data. This forms the basis of her strategic plan, and has been demonstrated in her commitment to ensuring companies are transparent with the public about how personal information is used.

In 2018, she was named as the most influential person in data-driven business in the updated DataIQ 100 list.

Elisabetta Zaccaria
Elisabetta Zaccaria | Session 1, Stream 3, Part 2 | Session 2, Stream 3, Part 2 | 12 April

Co-founder & Chairman of Secure Chorus Ltd, a platform for private-public collaboration, development of common standards & capabilities to provide a security baseline for the global digital economy. Founder of cyberY Ltd, a firm delivering strategy for innovation ecosystems. Former Group COO/CSO of Global Strategy Group where she set the strategy and co-led the explosive growth of the company, turning the UK start-up into a $600 revenue business in 6 years.
 

Greg Roberts
Greg Roberts | Leadership Dinner | 11 April

Greg Roberts joined L3 TRL in September 2015 as President and Chief Executive Officer. Having originally trained and worked as a Production Engineer within the medical industry, Greg moved to the defence and security sector in 1985. Over his career Greg has held various business, functional and programme roles in addition to successfully running a number of defence businesses. Greg specialises in strategic growth and leadership within an international environment.
 

John Wariner
John Wariner | Session 1, Stream 1 | Session 2, Stream 1 | 12 April

John “JW” Wariner was commissioned into the Royal Air Force in 1983. He read an Honours degree in Electrical and Electronic Engineering at Brunel University and a Defence Studies Masters at Kings College London.

His early career built upon Information Communications and Technology (ICT) specialisation in command, on operations and in staff roles. Appointed to Wing Commander in 2002, he led capability development and acquisition in the MOD for Offensive Cyber and Intelligence Capabilities. At the Defence Concepts and Doctrine Centre, he was the UK lead for Multi National interagency coordination and strategic planning. He commanded the Tactical Communications Wing (2005) delivering operational ICT worldwide. Moreover, he deployed to Iraq (2007) as Commander Joint Force CIS responsible for all UK ICT deployed in the Middle East. On his return he was promoted to group captain (2008) and appointed as Chief of Staff of MOD’s Information Systems and Services. He moved to the Permanent Joint HQ to lead ICT Operations in 2009, after which he assumed command of 90 Signals Unit at RAF Leeming (~900 personnel) from 2011. He was the RAF lead for Defence Transformation within the MOD Head Office in direct support of Acquisition System Reform before being appointed to HQ AIR Command in Oct 2014 to head the RAF’s C4i Capability branch. He was promoted to Air Cdre and appointed the Air Officer A6 / A6 Force Commander in Apr 2016.

Katy Winterborn
Katy Winterborn | Plenary Session | 12 April

Katy Winterborn is a Managing Security Consultant at NCC Group where she works with a wide variety of clients providing advice of topics ranging from infrastructure and web application to code review.

She has worked in a range of roles looking at both offensive and defensive perspectives.  She also contributes whitepapers and blogs on a variety of topics from exploitation techniques, to mitigating the insider threat and gender diversity.

Ollie Whitehouse
Ollie Whitehouse | Plenary Session | 12 April

Ollie Whitehouse is Chief Technical Officer at NCC Group and is responsible for the group’s thought leadership, technical strategy, research and development functions.

Previously he held various operational roles within the group since joining in 2012.

Over the past 20 years Ollie has worked in a variety of cyber security consultancy, applied research and management roles. Ollie is also a research and science adviser to UK Government on cyber security.

Paul Chichester
Paul Chichester | Plenary | 12 April

Paul is Director Operations of the National Cyber Security Centre. He has worked in the UK government intelligence and security community for over 25 years in a variety of offensive and defensive cyber roles. Paul was awarded the MBE in 2005 for his ground-breaking work in cyber.

Paul Thorlby | Session 1 Stream 4 | 12 April

Paul is a senior technical leader in QinetiQ with over 20 years’ experience in cyber security and related, mainly for National Security and Defence markets in the UK. He's currently Chief Technology Officer for IA and Cryptosecurity and also the Cyber & Intelligence Group Leader. Paul chairs the employer steering group that has pioneered development of national cyber security apprenticeship standards, including most recently the Cyber Degree Apprenticeship standard.

Richard Porter
Richard Porter | Session 1, Stream 3 | Session 2 Part 2, Stream 3 | 12 April

Meridian Mobility’s lead for Technology Strategy and development of the UK’s Connected and Autonomous development ecosystem. Previously Director Research and Innovation at Highways England, UK Research Liaison to US DoD, Security policy advisor and crisis manager at FCO and Intelligence Analyst. Always interested in new technologies and how to bring them to market quickly and effectively.

Sarah Lucas | Session 1, Stream 4 | 12 April

Sarah Lucas has been working in government security policy for a number of years, and has been in cyber skills since 2016. Previously to the civil service, she was a civil engineer.

Stephen Baker
Stephen Baker | Stream 3 | 12 April

Stephen is the joint Chief Executive of Suffolk Coastal and Waveney District Councils.  Whilst the role is wide and varied, Stephen has four areas of particular interest: shared services and collaboration; digital services and inclusion; growth and economic development; and civil resilience.  Stephen is the official spokesperson on matters of Civil Resilience and Community Safety for the Society of Local Authority Chief Executives and has represented local government in the development of the National Cyber Security Centre.

Yochana
Yochana Henderson | Plenary | 12 April

Yochana Henderson is a leading Identity and Security expert working in the Parliamentary Digital Service. Yochana started her career in the Army and after 5 years and a tour of Afghanistan joined the Parliamentary Digital Service. Yochana was a key member of the Digital Service response team during the cyber-attack against Parliament in 2017.

Most recently Yochana received an MBE for her parliamentary and voluntary services.

 
 

Lead Sponsors

Amazon Web Services

For more than 11 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 100 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, and application development, deployment, and management from 44 Availability Zones (AZs) across 16 geographic regions in the U.S., Australia, Brazil, Canada, China, Germany, India, Ireland, Japan, Korea, Singapore, and the UK. AWS services are trusted by millions of active customers around the world—including the fastest-growing startups, largest enterprises, and leading government agencies—to power their infrastructure, make them more agile, and lower costs.

Amazon Web Services

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.

NCC Group

Networking Sponsors

Trend Micro Incorporated

Networking Sponsor

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro Incorporated

L3 TRL

CYBERUK Leadership Dinner Sponsor

L3 TRL – Transforming the way you manage your cryptos

Since 1983 we have been a security partner of choice for defence and government organisations, we are an authorised development partner and key capability provider to HM Government.

Across 2018 we are launching a series of new CATAPAN High Grade capabilities into the UK Cyber market that will transform the ability to achieve secure missions in a variety of scenarios. The new capabilities include:

  • Data at rest for private clouds, public clouds and personal applications
  • New Micro data in transit crypto
  • Revolutionary benign key delivery solution

Reducing the risk in high threat operations whilst lowering the infrastructure management and costs, thus reducing the significant operating burdens.

CATAPAN is best in breed for High Grade Cyber security – the most effective line of defence to counter the growing threat and evolving nature of cyber-attacks, whilst giving freedom and flexibility to operate without constraint.

L3 TRL

SANS

Delegate Brochure Sponsor and Exhibitor

Established in 1989, SANS Institute is the largest information security training organisation in the world and is a cyber security supplier to HM Govt. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats. SANS training is led by world-renowned, expert instructors and the curriculum covers the most crucial areas of security. Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. In addition, SANS and its partners are currently delivering the HMG Cyber Schools Programme – Cyber Discovery.

SANS

Track and Stream Sponsors

Microsoft

Track 1 Sponsor

Technology is a disruptive force – enabling new business models, opening new sources of revenue and shaping entire industry landscapes. Ensuring security, privacy, and compliance is key to enabling digital transformation. As people bring in devices, apps, and data into organisations today, protecting company data requires a new approach.

Microsoft is building a platform that looks holistically across all the critical end-points of today’s cloud & mobile world. Our platform investments are across four categories: identity and access management, information protection, threat protection, and security management – with a comprehensive approach that is inclusive of the technologies our customers are using. We act on the intelligence that comes from our security-related signals and insights, and foster a vibrant ecosystem of partners who help us raise the bar across the industry – helping to securely enable our customers’ digital transformations.

Microsoft

Northrop Grumman

Track 2 Sponsor

Northrop Grumman is a recognised leader in cyber resilience solutions with more than thirty years’ experience in cyber security and information assurance. As a mission partner, Northrop Grumman brings unparalleled expertise in managing and protecting networks, and delivering trusted security solutions to high-risk customers both here in the UK and overseas.

Northrop Grumman’s aggressive investments in technology harness critical elements of human-decision making with advanced analysis of complex data sets to enable decisive action. The company is committed to building tomorrow’s cyber workforce through advanced cyber education, developing a Cyber Research Consortium with leading UK universities and offering its own Cyber Academy worldwide.

Northrop Grumman is a member of CyberFirst and CyberInvest, and leads CyberCenturion, the cyber defence competition for 12-18 year olds.

Northrop Grumman

Roke

Track 3 and Stream 1 Sponsor

Blending world-class expertise in cyber security, autonomy and communications, Roke is one of Britain’s leading providers of advanced technology R&D, innovation and advisory services. Established in 1956, we are trusted by clients across national security, defence and commercial sectors to deliver advantage and protect what matters most in an uncertain world.

Focusing on solving difficult cyber security challenges, we are the ideal product-independent partner to help you overcome your information security needs, including:

  • Security architecture and design assurance
  • Vulnerability investigations and risk assessments
  • Component assurance
  • Defensive code reviews
  • Information security management
  • Deception services
  • Crypt-key services and solutions
Roke

QinetiQ

Track 3 and Stream 1 Sponsor

QinetiQ is a leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions to human performance.

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

DXC Technology

Track 4 Sponsor

DXC Technology was formed in 2017 through the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise, creating a new company with more than 4,000 security specialists and over 12 security operations centres on five continents. DXC, the world’s leading independent IT services company, helps clients harness the power of innovation by providing digital transformation services to commercial and public sector organisations. DXC’s end-to-end security services help clients protect data, applications, infrastructure and endpoints; detect and predict attacks; and proactively respond to threats. Our world-class Security Advisory and Managed Security Services professionals are ideally positioned to help organisations manage increasingly complex cyber security challenges and secure the free flow of information between customers, employees, partners and suppliers. DXC works with more than 40 security industry partners to deliver best-of-breed solutions to our clients.

DXC Technology

Nominet

Stream 2 Sponsor

Nominet is driven by a commitment to use technology to improve connectivity, security and inclusivity online.  For 20 years, Nominet has run the .UK internet infrastructure, developing an expertise in the Domain Name System (DNS) that now underpins sophisticated network analytics used by governments and enterprises to mitigate cyber threats.  The company provides registry services for top level domains, and is exploring applications for a range of emerging technologies. A profit with a purpose company, Nominet supports initiatives that contribute to a vibrant digital future.

Nominet

BAE

Stream 3 Sponsor

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE

BT

Stream 4 Sponsor

We manage security for ourselves and our customers, from the smallest to the largest organisation across both the public and private sector, including significant parts of the UK’s Critical National Infrastructure.  The insight we possess as a global network provider, along with our team of 2,500 security experts, means we provide customers with confidential support around the clock, 24 x 7. We’re constantly watching, analysing, predicting and responding to the emerging threats to protect our network and our customers.  Our security analytics and tools give us a unique perspective on cyber threats, helping us to stay one step ahead of criminal entrepreneurs and attackers. It’s our knowledge and expertise that helps us to work together with organisations like the National Cyber Security Centre and Interpol, sharing resources and intelligence to help in the fight against global cyber-crime.  So let us to protect your organisation the way we do ours. 

BT

Sponsors

Raytheon

Future Zone Sponsor

Raytheon UK is a subsidiary of Raytheon Company. It is a prime contractor and major supplier to the U.K. Ministry of Defence and has developed strong capabilities in mission systems integration in defence, national security and commercial markets. Raytheon UK also designs, develops and manufactures a range of high-technology electronic systems and software at facilities in Harlow, Glenrothes, Gloucester, Waddington, Broughton and Manchester. About Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specialising in defence, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts.

Raytheon

Lockheed Martin

Bursary Sponsor

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Lockheed Martin

Anomali

Workshop Sponsor

Anomali delivers critical threat intelligence capabilities, allowing organisations to detect, investigate and respond to serious external threats. The company’s unmatched customer base spans all major verticals and includes partnerships with many ISACs and threat exchanges. Anomali integrates with internal infrastructure to identify new attacks, or search forensically over the past year to discover existing breaches, and enables security teams to quickly understand and contain threats.

Anomali

Atkins

Workshop Sponsor

SNC-Lavalin’s Atkins business is one of the world’s most respected design, engineering and project management consultancies. Together, SNC-Lavalin, a globally fully integrated professional services and project management company and Atkins help our clients plan, design and enable major capital projects, and provide expert consultancy that covers the full lifecycle of projects. We strive to build strong relationships by understanding the challenges our clients face, sharing their vision and helping them transform potential into reality. Our world-class expertise at scale delivers value to our clients, and the depth and breadth of our capabilities sets us apart from the competition.

Atkins

Cisco

Workshop Sponsor

Today’s cybersecurity experts use up to 50 vendors to protect their networks. Multiple vendors and multiple products lead to needless complexity. And to gaps in threat defense.

Cisco security products work together. They deliver effective network security and incident response. And they boost IT productivity through automation.

We have integrated a comprehensive portfolio of security technologies to provide advanced threat protection. Our technologies include next-generation firewalls, intrusion prevention systems (IPS), secure access systems, security analytics, and malware defense. We offer web and email security, network security, and cloud security.

All this is backed by in-depth threat and malware intelligence.

Cisco

Context

Workshop Sponsor

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from cyber strategy and risk assessments, penetration testing and assurance to incident management and response, training and technical security research. We focus on helping clients avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks. Established in 1998, Context’s client base includes some of the world’s leading blue chip companies, alongside public sector and government organisations. With offices in the UK, Australia, Germany and USA, Context is ideally placed to work with clients worldwide.

Context

Egress Software Technologies

Workshop Sponsor

Egress is the leading provider of data privacy and risk management services designed to protect shared information throughout its lifecycle.

Offering Government and Enterprise customers a portfolio of complementary services, the Egress Switch platform leverages machine learning led policy management, encryption and eDiscovery to enable end-users to share and collaborate securely, while reducing the risk of loss and maintaining compliance. These award-winning integrated services include email and document classification, accidental send prevention, secure email and file transfer, secure managed file transfer, secure online collaboration and secure archive.

Certified by Government, Switch offers a seamless user experience, powerful real-time auditing and patented information rights management, all accessible using a single global identity.

Egress Software Technologies

ForeScout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2017 more than 2,500 customers in over 70 countries improve their network security and compliance posture with ForeScout solutions. See devices. Control them. Orchestrate system-wide threat response.

ForeScout

Symantec

Workshop Sponsor

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats.

Symantec

Tanium

Workshop Sponsor

Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. Serving as the "central nervous system" for enterprises, Tanium empowers cybersecurity and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale, and simplicity of Tanium, organizations can effectively protect against modern-day threats and realize new levels of cost efficiency in IT operations.

Tanium

DCMS

SME Innovation Zone Sponsor

The Department for Digital, Culture, Media and Sport (DCMS) is leading the Government’s work to develop the world’s best digital economy. We want to the UK to be the best place to start and grow a digital business, and the most secure place in the world to live and do business online.

The 2016 National Cyber Security Strategy (NCSS) set out the Government’s vision to 2021: that the UK is secure and resilient to cyber threats, prosperous and confident in the digital world. Our three broad strands of activity are to defend our cyberspace, to deter our adversaries and to develop our capabilities.

The UK cannot become the world’s leading digital nation and be the best place to do business online unless organisations within the UK are secure and resilient. A crucial part of this is promoting the UK’s cyber security sector, ensuring Government, industry and academia work together to support a thriving ecosystem of successful, innovative companies.

This work supports DCMS's overall mission, which is to ensure every organisation in the UK is cyber secure and resilient to support a prosperous digital nation.

DCMS

CrowdStrike

Conference Bag Sponsor

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture.

CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time.

CrowdStrike

Partner Exhibitor

Fortinet

Only Fortinet can provide you with a powerful, complete, and integrated threat management solution that delivers industry leading protection and performance.

Today’s security networks are too complex - Too many different vendors, too many alerts, and too many different ways of managing each device: it all leads to an unmanageable infrastructure where gaps can be difficult to find. Only Fortinet can deliver a seamless, comprehensive security infrastructure across the entire attack surface. From the cloud to the edge and to the endpoint, Fortinet’s industry-leading suite of products and tools address all phases of the attack cycle – from prevention to detection to remediation. With a complete solution from Fortinet, you deliver more control, greater visibility and less complexity.

Fortinet

Fujitsu

As one of the largest IT services and solutions providers in the world, Fujitsu are globally renowned for their expertise in digital transformation.

Fujitsu’s vision for the digital age is to make coherent information available, whenever and wherever it is needed, capitalising on our cyber-secure capabilities in networking and systems integration to link and enhance situational awareness. 

Through the development of our cutting edge digital solutions, we are helping to shape a new world and transform how people live, work, communicate and share data. Our approach extracts maximum benefit from existing IT systems, innovating, developing and extending capability and functionality.

Fujitsu

IBM

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services, and operates one of the world’s broadest security research, development and delivery organisations, monitoring 35 billion security events per day. In the UK IBM has 20,000 employees and IBM Security supports UK Critical National Infrastructure across a range of industries. IBM Security delivers proven outcomes for UK Government with Government trained and cleared consultants in UK based List-X facilities.

IBM

Leonardo

Leonardo, NATO’s Global Cyber Defence Mission Partner. Delivering confidence in the Cyber Security Domain for more than 25 years, through design, developing and delivery of security services and solutions in close partnership with customers, suppliers and authorities.  Constantly investing, we offer public and private organisations comprehensive security solutions needed to comply and defend.

Leonardo offers a consult, design, build and operate model with a broad product and service offering.

Leonardo

Premium Exhibitor

APMG International

APMG International has a broad portfolio of world-class cyber security products. We’ve partnered with the National Cyber Security Centre to deliver Certified Cyber Professional and GCHQ Certified Training, and the Defence Science and Technology Laboratory (DSTL) to develop The Cyber Defence Capability Assessment Tool (CDCAT®).

Visit our stand, C303, to find out more about these products and our diverse portfolio of internationally renowned solutions including Cyber Essentials, ISO/IEC 27001 and Cloud Computing.

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android and BlackBerry.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Deep Secure

Deep Secure has recently pioneered a unique and highly disruptive technology that delivers completely threat-free content.  The efficacy of the technology is unsurpassed, addressing a significant gap in the market for being able to simultaneously defeat all content threats – known, unknown (zero-day), and the undetectable – without the need to examine or isolate traffic.  Deep Secure’s 'Content Threat Removal' has universal relevance in protecting information systems, enabling organisations - to Click, Share, and Transact in perfect safety.

Deep Secure

e2e-assure

e2e-assure offer SOC-as-a-Service to protect your organisation which provides a complete cyber defence service suitable for all Government and Commercial customers, large and small. Protect your critical assets from cyber-attacks and GDPR breaches with our continuous security monitoring and active incident response. We provide the people, technology, and processes to deliver cost effective, high value protection. Deployed as-a-service for cloud services and/or on-premise with pay-as-you-go flexible pricing. Quick to implement, with immediate benefit. e2e-assure provides a range of secure cyber services including Protective Monitoring, SOC Services, Cyber Investigation and Incident Response, Cyber Assessments, Web Gateway and Secure Managed Clouds.

e2e-assure

Frazer-Nash Consultancy

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains. We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise. We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

Ixia Solutions Group

Ixia, a Keysight Business, provides testing, visibility, and security solutions to strengthen networks and cloud environments for enterprises, service providers, and network equipment manufacturers. Ixia offers organizations trusted environments in which to develop, deploy, and operate. Customers worldwide rely on Ixia to verify their designs, optimize their performance, and ensure protection of their networks and cloud environments.

Ixia Solutions Group

Reliance acsn

Reliance acsn is a Digital and Cybersecurity Service provider that believes results come from a well-executed and business-integrated approach stemming from the application of our skills and expertise, combined with threat intelligence and effective risk management.

ACSN was founded in 2003. Reliance acsn was born through merger with Reliance Cyber Science in 2016. We’ve built strong partnerships with over 80 customers across 5 continents, helping them to address Digital Transformation and Cybersecurity challenges. We have a highly skilled and experienced team, accredited by all the major security vendors

Reliance acsn

Securestorm

Securestorm® are leading security experts who deliver pragmatic advice, practical solutions and solve security challenges across the Digital, Cloud, Cyber and Data Protection (GDPR) domains. With a combination of experience, expertise and strategic awareness, Securestorm offers technical and strategic consultancy, managed security services and solutions to clients across both Public and Private sectors.

Securestorm are a NCSC Certified Cyber Security Consultancy with demonstrable experience and proven delivery capabilities. Advanced security solutions and services include: Nol-ij® - Continuous Risk Management, Edgescan® - Full Stack Vulnerability Management, CybSafe® - Unified Cyber Awareness Platform, and Falanx MidGARD™ - Advanced Monitoring Platform.

Securestorm

Surevine

Described by the Financial Times at launch as a “secure Facebook for cyber threats”, Threatvine is a cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

Threatvine unites critical national infrastructure, law enforcement and academia, moving beyond cyber-security information sharing to collaborative cyber-security intelligence analysis; keeping you one step ahead of the cyber threat.

Surevine, the company behind Threatvine, build secure, scalable collaboration environments for the most security conscious organisations; joining people up and enabling collaboration on their most sensitive information.

Smart, secure networks of connected people.

Surevine

UKCloud

UKCloud – the multi-cloud experts

UKCloud is dedicated to helping the UK Public Sector, delivering more choice and flexibility through safe and trusted cloud technology. Since its inception UKCloud has helped revolutionise the way Government deploys and procures IT and delivers public services.

It has been at the forefront of driving digital transformation in the sector and has a multi-cloud approach – which supports access to a suite of technology platforms - and enables UKCloud to uniquely place the right workload, on the right cloud, in the right place.

UKCloud

Exhibitors

2T Security

RiskTree is a business-focused, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2. Using our innovative, browser-based software, it’s being used by both public and private sector clients to reduce the cost and delivery time for accreditation, and to support ISO27001 certification.

2T Security

4 Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions, we for over a decade have worked in the UK and overseas to create secure end to end systems.

4 Secure

Airbus CyberSecurity

Airbus CyberSecurity is a European specialist in Cyber Security. We protect Government, Military and Critical National Infrastructure organisations from cyber threats.

We are over 700 experts based across our main locations in France, Germany and the UK, each with a 24/7 Security Operating Centre and expertise across Cryptography and Key Management.

Airbus CyberSecurity

Armour Communications

Armour Communications Limited provides market leading technology for secure communications on everyday devices. Easy to use, cost effective technology combined with advanced security techniques to deliver cloud-based and on-premises secure solutions.  Advanced features like MCPTT are available as well as integration with unified communications. Armour’s technology is FIPS, CPA and NATO approved.

Armour Communications

BSI Cybersecurity and Information Resilience

BSI Cybersecurity and Information Resilience is a centre of excellence for managing and securing corporate information. We provide expertise to clients on the identification, protection, compliance and management of their information assets through a combination of consultancy, cloud security solutions, and training.

BSI Cybersecurity and Information Resilience

Checkmarx

Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications. Amongst the company's 1,000 customers are 5 of the world's top 10 software vendors and many Fortune 500 and government organizations.

Checkmarx

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

CompTIA

CompTIA is the voice of the world’s information technology industry; building internationally recognised, vendor-neutral technical certifications in areas such as IT Infrastructure, Networking and Cybersecurity. Our popular Cybersecurity Career Pathway offers a progressive route of certifications to validate critical skills that are required to prevent, detect and combat cybersecurity threats.

CompTIA

Cyber Exchange

Cyber Exchange is a not-for-profit initiative that provides a focal point for UK industry, academia and government to connect, engage and collaborate. Membership is FREE and over 600 organisations have already signed-up to showcase their capabilities, products and services and drive new opportunities.

Cyber Exchange

Darktrace

Darktrace is the world’s leading AI company for cyber security. Darktrace’s Enterprise Immune System uses AI algorithms that mimic the human immune system to defend networks of all types and sizes. Our self-learning approach is the first non-consumer application of machine learning to work at scale, across all network types.

Darktrace

Deep3

Deep3 Software Limited - Mission critical software. 

Your challenges. Solved together

We deliver mission-­critical software that ensures your organisation operates effectively in an increasingly challenging world. We work together, in partnership with you to solve your challenges and help you become more dynamic, resilient and effective as an organisation.

Deep3

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.

DomainTools

EclecticIQ

EclecticIQ helps organizations turn cyber threat intelligence into business value with a suite of products built for cyber security professionals in threat intelligence, threat hunting, SOC, and Incident Response roles.

EclecticIQ Platform is the analyst-centric threat intelligence platform based on STIX/TAXII that meets the full spectrum of intelligence needs.

EclecticIQ Fusion Center enables the acquisition of thematic bundles of human-qualified cyber threat intelligence from leading suppliers with a single contract.

In 2016, the company won Deloitte’s Technology FAST50 Rising Star Award for “Most Disruptive Innovator”.

EclecticIQ is headquartered in Amsterdam, The Netherlands.

EclecticIQ

Euro Recycling

On-Site CPNI, NVSC & MoD Approved Data Media Destruction Services. All levels of Protectively Marked and commercially confidential data destroyed at your premises by Police and Government Vetted operatives. In full compliance with HMG IAS No.5

We now provide On-Site Data Erasure and Secure Migration of IT hardware.

Euro Recycling

Exabeam

The Exabeam Security Intelligence Platform provides organizations of all sizes with end-to-end detection, analytics, and response capabilities from a single platform. Exabeam SIP provides unlimited log management at a predictable, cost effective price, leverages UEBA for accurate threat detection, and provides automated security orchestration and playbooks for efficient incident response.

Exabeam

F-Secure

F-Secure is a European cyber security company, delivering an array of information security assessments, consultancy, security management, compliance and training throughout the public and private sectors. Our consultants have developed their skills through dedicated research, experimentation and exposure to technology.

F-Secure

Forcepoint

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries.

Forcepoint

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.

(ISC)²

iStorage

iStorage is the trusted global leader of PIN authenticated, hardware encrypted data storage devices, that include: flash drives, hard drives and solid-state drive formats from 4GB up to 12TB! We are the world’s first and only vendor to attain NCSC CPA & NLNCSA BSPA certifications for our hardware encrypted hard drives and solid-state drives.

iStorage

Ivanti

Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI and the data centre, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation. The company also helps organisations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world.

Ivanti

IT Governance

IT Governance is a leading global provider of IT governance, risk management and compliance solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001 and cyber security.

In an increasingly punitive and privacy-focused business environment, we are committed to helping businesses protect themselves and their customers from the perpetually evolving range of cyber threats.

IT Governance

MWR InfoSecurity

We provide specialist advice and solutions in all areas of security, from professional and managed services, through to developing commercial and open source security tools. We focus on working with clients to develop and deliver security programs, tailored to meet the needs of each individual organization.

MWR InfoSecurity

Outsource UK

Outsource UK are proud to be one of the country’s largest independent recruitment companies, supplying highly-skilled cyber security talent to clients within a range of specialist sectors.

We work with and supply Cyber Directors, CISOs, SOC / SIEM / IAM specialists, IAs, Cyber Risk Managers, Pen Testers, and AppSec Consultants.

Outsource UK

SolarWinds

SolarWinds provides powerful and affordable IT management software to government agencies worldwide, including the UK’s National Health Service, European Parliament, NATO, and nearly every U.S. civilian agency, DoD branch, and intelligence agency. SolarWinds products are designed to solve the problems government IT professionals face every day and eliminate complexity from every IT process imaginable.

SolarWinds

SST

SST has designed and manufactured TEMPEST Secure IT equipment for over 30 years from its Gloucester base. A NCSC accredited facility following CFTCS guidelines. SST has established a track record of solving customer problems via reliable, well-engineered, innovative solutions. The increase in cyber security threats mitigating strategies are becoming vital. 

SST

Telesoft Technologies

Telesoft Technologies is an independent global provider of Cyber Security, Telecoms Mobile products and services and Government Infrastructure. We develop, manufacture and support systems and applications that generate revenue, keep critical infrastructure operational and important data safe.

Telesoft Technologies

Tenable

Tenable™, Inc. is the Cyber Exposure company. Over24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io, the world’s first platform to see and secure any digital asset on any computing platform.

Tenable

Thales

Thales is a global technology leader for the Aerospace, Space, Transport, Defence and Security markets. With over 20,000 engineers and researchers, Thales has a unique capability to design and deploy equipment, systems and services to meet the most complex security requirements

Thales

Thinklogical

Thinklogical, A Belden Brand, manufactures secure KVM and video extension and switching solutions for C4ISR and command and control. Thinklogical enables instant situational awareness, improves cyber security, lowers TCO and simplifies management of multi-classification information. IA accredited: Common Criteria EAL4, NATO NIAPC, TEMPEST Level B, U.S. JITC UC APL 2013.

Thinklogical

Tripwire

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprise and public sector organizations. Tripwire solutions are based on high-fidelity asset visibility and endpoint intelligence combined with business context. Tripwire’s solutions include configuration and policy management, file integrity monitoring, vulnerability management, log management, reporting and analytics.

Tripwire

Ultra Electronics CIS

Ultra Electronics is a leading supplier of CESG-certified encryption solutions at all grades, with a long-established reputation for providing exceptional levels of manageability and reliability.

Ultra Electronics is an internationally successful defence & aerospace, security & cyber, transport and energy company with a consistent track record of development and growth.

Ultra Electronics CIS

White Hat Rally

White Hat Rally organise an annual navigation and driving challenge that really does put the fun in fundraising! Dedicated to supporting children and young people in the UK affected by online abuse & grooming, the Children and Sexual Exploitation (CSE) services are the only beneficiary of the monies we raise. Our event brings together like-minded, socially responsible participants from all aspects of the infosec & cyber sector with a common goal - to raise money for our chosen industry charity, Barnardo’s. Speak to us today about joining the 70+ participants on the ‘Roaming Romans’ car rally in September 2018 and how you can get involved as a participant or sponsor.

White Hat Rally

Small Business Hub

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

CASQUE SNR

CASQUE SNR protects access. It is NCSC CAPS certified, suitable for Secret and resists Insider Attacks. Customer Controlled Keys with Out-of-the-Box Gateway Integration. Built for Cloud Identity as a Service."

CASQUE SNR

Cyber Security Jobsite

Cyber Security Jobsite.com, The definitive Job Board for Cyber Security Professionals. Search 100s of vacancies from the UKs top employers. Register your CV for FREE.

Cyber Security Jobsite

Countercraft

Developer of the pioneering deception-based cybersecurity platform for active cyber-defence; combining research, technology and Threat Intelligence to provide automated counterintelligence campaigns. Solution used by Governments, Law Enforcement and Fortune500 companies.

Countercraft

Data Eliminate

Data Eliminate specializes in the secure disposal and recycling of electronic and other sensitive assets and the provision of secure transport.  Accreditations for certain services include the MoD & CPNI.

Data Eliminate

IASME Consortium

The IASME Consortium is one of 5 Accreditation Bodies appointed by Government to assess against the Cyber Essentials scheme.  IASME also assesses against its own highly regarded and award-winning governance standard which includes the GDPR requirements.

IASME Consortium

ISARA Corporation

ISARA Corporation specializes in creating class-defining quantum-safe cryptography (QSC) for today's computing ecosystems. Embedding ISARA Radiate™ into ICT products secures information with long-term protection requirements while maintaining current encryption standards.

ISARA Corporation

Rivington

Rivington are a niche Information Security Consultancy and Managed Services provider. We specialise in supporting our clients to ensure they have pragmatic, scalable solutions that enable secure business delivery and reputational protection.

Rivington

OnDMARC

OnDMARC is an intuitive cloud-based DMARC solution that helps organisations to secure their domains against email impersonation. Built on an innovative cybersecurity platform OnDMARC is here to make implementing such a crucial layer of protection smarter, simpler and more secure.

OnDMARC

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Topsec

Topsec is a leading provider of cloud-based managed email filtering & security solutions. Our services include anti-spam, anti-virus, continuity email, blended threats (real-time malware & phishing protection), content filtering, image analysis, email archiving, secure-file-transfer, phishing-training-as-a-service & Domain Management. 

Topsec

Yellow Room Learning

Yellow Room Learning empowers your workforce to protect business critical information and data by combining education, simulated phishing, augmented reality, video, and more, as part of a security awareness campaign.

Yellow Room Learning

Innovation Zone

AutoCrypt Solutions

AutoCrypt Solutions is a London based startup creating easy-to-use applications that provide organisations with secure and shareable file encryption for workgroups of any size and across any domain.

AutoCrypt Solutions

Awen Collective

Awen Collective produces next-generation digital forensics & incident response software for complex networks, such as those found in Industrial Control Systems. Applicable throughout the entire DFIR lifecycle.

Awen Collective

Cambridge Authentication

Cambridge Authentication offers Pico, helping companies and their employees to be more productive and secure by liberating them from passwords. The Pico smartphone app removes the need to remember passwords. It automatically and securely logs the user in when they arrive and locks their session when they leave.

Cambridge Authentication

Countersight

Countersight is security monitoring for every organisation. We take care of the heavy lifting and minimise the complexity, delivering powerful attack detection capability that is economical and easy to use.

Countersight

Data Solver

Data Solver's privacy management software. Simplifies the GDPR into a set of accessible steps enabling real time compliance, mitigation of privacy breaches and evidence of Accountability and Privacy by Design. 

Data Solver

DynaRisk

DynaRisk is transforming the way individuals protect themselves from cyber threats. The average person has little or no idea how to secure themselves properly, even basic terms like encryption and data breach are hard to understand. If you don’t understand something, you don’t do anything about it.

This is why we have developed the first Personal Security Score which determines what security issues a person has and helps them fix them. We are working with some of the largest insurers, banks and telecommunications companies in the world to help keep their clients and staff safe online. 

DynaRisk

Galaxkey

Galaxkey, a data protection company, addresses the security and management of data. Galaxkey’s data-centric security protects data whilst fulfilling the data protection requirements of the law, compliance, standards and regulations.

Galaxkey

GBR14

GBR14 applies proven cryptographic techniques to the global challenges of securing databases and applications. GBR14 makes cryptographic security an enabler for innovative data-driven business processes.

GBR14

GemaSecure

GemaSecure: Specialist developer of powerful (up to 400GbE) superfast cryptographic hardware platforms including a number of embedded applications achieving processing speeds through the device of <20uS at full wire speed.

GemaSecure

KETS Quantum Security

KETS Quantum Security offers future-proof, scalable, and easily-deployed communications security with our pioneering on-chip quantum secured encryption technologies – from quantum random number generators to full quantum key distribution devices.

KETS Quantum Security

Think Cyber Security

Think Cyber Security are transforming the delivery of security awareness. Their products embed awareness training into the day-to-day user experience, drawing on Behavioural Psychology and “Nudge” theory to create enduring behaviour change.

Think Cyber Security

VChain Technology

Award-winning security software, improving aviation security + passenger identity through multi-patented tech with blockchain and machine learning. First client - world's third largest airline group - IAG (owner of British Airways).

VChain Technology

CYBERUK 2018 In Practice Agenda.pdf

PDF, 3018.86KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 In Practice Agenda

CYBERUK 2018 Leadership Agenda.pdf

PDF, 1008.04KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 Leadership Agenda

CYBERUK_2018_Sponsorship_Brochure.pdf

PDF, 5379.79KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 Sponsorship Brochure

CYBERUK 2018 E-Bulletin.pdf

PDF, 480.54KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 1

CYBERUK E-Bulletin 2.pdf

PDF, 2394.65KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 2

CYBERUK 2018 E-Bulletin 3.pdf

PDF, 3190.48KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 3

CYBERUK 2018 E-Bulletin 4.pdf

PDF, 5504.24KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin 4

Share this page

Was this information helpful?

We need your feedback to improve this content.

Yes No