24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

Event Agenda

A highly focused event that connects senior industry professionals with key solution providers for a unique experience. The event includes one-to-one business meetings with suppliers to fit your business projects, insightful seminars, and valuable networking opportunities with your peers.

Buyers who attend...

• Security Directors
• Systems Managers
• Compliance Managers

• Network Infrastructure Manager
• Information Security Manager
• IT Managers, Specialists and Heads of

Places are fully funded and include:

• A personalised itinerary matched with your projects
• Access to a full seminar programme
• Multiple networking opportunities with 50+ peers
• Lunch and refreshments throughout

Speakers
Timeline of your day

Day 1

  1. Registration &
    Refreshments

    08.00 – 08.45

  2. Opening Presentation

  3. Seminar

  4. 9.55 - 12.55

    Face to Face Meetings

  5. Seminar

  6. Seminar

  7. Face to Face Meetings

    14.50 – 16.50

Buying Trends

Access Control
Authentication
Advanced Threat Dashboard
Adaptive Authentication
A/I Machine Learning
Anti-Virus
Anti-Malware
Application Control
Application Security
ATA Breach Services
Automation
Blockchain
Botnet
Browser Security
Business Continuity
Cloud Business Continuity
Cloud Web Security
Compliance
Cyber Risk Quantification

Data Protection
Data Theft/Loss
DDoS Protection
Data Forensics
Encryption
Endpoint Detection and Response (EDR)
Employee Security Awareness
Firewalls
Gateway Threat Analysis
Identity/Privacy Protection
Identity Access Management
Incident Response
Inside Threat
Intrusion Detection
Internet Security
IPS
Legislative Changes
Malicious Software Removal
Malware

Managed Services
Managed Detection and Response (MDR)
Managed SIEM
Multi-Factor Authentication
Mobile Security
Network Security Management
Off Site Storage Compliance
Password Management
Payment Security
PCI-DSS
Penetration Testing
Phishing Detection
Public Key Infrastructure Security
Privileged Access Management (PAM)
Ransomware Detection
Recovery Assurance Testing
Red Teaming
Remote Working
Reporting Solutions

Risk Management
Secure e-Commerce
Secure Hardware
Security as a Service (SAAS)
Social Media Security
Single Sign-on
Spyware
Supplier Due Diligence
Third Party Cyber Risk
Third Party IT Risk Assurance
Trojan Detection
Unified Access Management
Unified Directory
User Provisioning
UK Cyber Strategy
Vulnerability Management
Web Access Management
Web Filters
Web Security

Testimonials