AGENDA |

PLENARY

STREAM A

STREAM B

STREAM C

STREAM D

STREAM E / WORKSHOPS

TECHNICAL MASTERCLASSES

Please see below full CYBERUK 2025 agenda. 

Time Name Type Audience Keywords
2:00 PM - 7:00 PMEarly Registration and Pass Collection   
6:00 PM - 9:30 PMWelcome Drinks Reception   
Time Name Type Audience Keywords
8:00 AM - 9:20 AMRegistration and Exhibition Open    
9:20 AM - 11:00 AMOpening Plenary - Transforming Resilience: Continue & Recover

AllKEYWORD 1
9:25 AM - 11:00 AMTechnical Masterclass - Trends in Cyber Threats – Evolving Attacker Behaviours

 KEYWORD 2
11:00 AM - 11:45 AMRefreshment Break and Exhibition   
11:45 AM - 12:45 PMEcosystem Plenary - Cyber Essentials… Getting the Basics Right

AllKEYWORD 1
11:45 AM - 12:45 PMTechnical Masterclass - Countering Cyber Threats for Resilient Global Supply Chains - How Vulnerable Are You?

 

 KEYWORD 2
12:45 PM - 2:15 PMNetworking Lunch, Exhibition and Spotlight Stage Lightning Talks   
1:00 PM - 1:50 PMCabinet Office Workshop - Cyber Resilient Government (Or, How We Learned to Stop Worrying and Embrace Transparency)

  
1:00 PM - 2:00 PMCyber Den   
1:00 PM - 1:50 PMNCSC Workshop - Security Informed Safety for Resilient OT Systems

 

  
2:15 PM - 3:05 PMAkamai Workshop - Resilient Digital Infrastructure: Ensuring Performance, Trust and Security in the Face of Disruptions

 

  
2:15 PM - 3:05 PMSophos Workshop - The Unsophisticated Art of Ransomware Attacks

 

  
2:15 PM - 3:05 PMStream A - Transforming Resilience: A Whole-of-System Response to Complex and Evolving Threats

 KEYWORD 3
2:15 PM - 3:05 PMStream B - Can Passwords Become Extinct? Passkeys in Theory and Practice

 KEYWORD 3
2:15 PM - 3:05 PMStream C - Outpacing the Opposition: Navigating the Evolving Threat Landscape

 KEYWORD 3
2:15 PM - 3:05 PMStream D - Transforming Resilience: Rethinking the Cyber Security Ecosystem and Sociotechnical Approaches

 KEYWORD 3
3:05 PM - 3:50 PMRefreshment Break and Exhibition   
3:50 PM - 5:10 PMTechnology Plenary - Market Incentives for Technology Transformation

AllKEYWORD 1
5:10 PM - 6:40 PMInformal Networking Reception   
6:30 PM - 10:30 PMLeaders' Dinner (Invitation only)   
Time Name Type Audience Keywords
8:00 AM - 9:15 AMRegistration and Exhibition Open   
8:15 AM - 9:00 AMWomen in Cyber Networking Breakfast   
9:30 AM - 10:45 AMResilience Plenary / International Plenary - Transforming Resilience: Lessons from International Partners

 KEYWORD 1
9:30 AM - 10:45 AMTechnical Masterclass - Research for Better Cyber Defence

 

 KEYWORD 2
10:45 AM - 11:30 AMRefreshment Break and Exhibition   
11:30 AM - 12:20 PMESET Workshop - The World is One Giant Supply Chain – What Can You Do to Secure It?

 

  
11:30 AM - 12:20 PMLeonardo Workshop - The Floor is Lava – Cyber Threats facing UK CNI

 

  
11:30 AM - 12:20 PMStream A - Cyber Is Not a Technical Problem, It’s a Governance Issue

  

 KEYWORD 3
11:30 AM - 12:20 PMStream B - Protecting our Critical Sectors - Sharing the CNI Security Burden

 KEYWORD 3
11:30 AM - 12:20 PMStream C - The Art of the Takedown

 KEYWORD 3
11:30 AM - 12:20 PMStream D - How to Make Informed Choices about Cyber Security Technology and Products. Introducing CRT: Cyber Resilience Testing

 

 KEYWORD 3
12:30 PM - 1:20 PMBlueVoyant Workshop - Enhancing Your TPRM Programme: Strategies and Case Studies

 

  
12:30 PM - 1:20 PMGoogle Cloud Workshop - Are You Ready for a Crisis? Mandiant Experts Will Test Your Readiness for a Crisis in this Tabletop Interactive Workshop

 

  
12:30 PM - 1:20 PMStream A - Taking an Interventionist Approach to Government Cyber Resilience

  

 KEYWORD 3
12:30 PM - 1:20 PMStream B - Pioneering in AI Security - What Have We Learned So Far

 KEYWORD 3
12:30 PM - 1:20 PMStream C - Tracking and Combatting Commercial Hacking (a lot has changed in a year..)

 KEYWORD 3
12:30 PM - 1:20 PMStream D - How Collaboration can Counter the Growing Cyber Threat

 

 KEYWORD 3
1:20 PM - 2:40 PMNetworking Lunch, Exhibition and Spotlight Stage Lightning Talks   
1:30 PM - 2:30 PMCyber Den   
1:30 PM - 2:20 PMDSIT Workshop - Telecoms Security in a Connected World: Challenges & Opportunities

 

  
1:30 PM - 2:20 PMNCSC Workshop - The Next Generation: The Emerging Technology Standards That Will Transform Security

 

  
2:40 PM - 3:30 PMCloudflare Workshop - Securing Critical National Infrastructure: PDNS for Cyber Resilience

 

  
2:40 PM - 3:30 PMKnowBe4 Workshop - AI-Driven Phishing: Managing Human Risk in an Era of Intelligent Threats

 

  
2:40 PM - 3:30 PMStream A - Secure by Design - From Theory to Practice

  

 KEYWORD 3
2:40 PM - 3:30 PMStream B - The Application of Evidence - What Works in Cyber Security?

 KEYWORD 3
2:40 PM - 3:30 PMStream C - Curious Compromises: Lessons from Incidents

 KEYWORD 3
2:40 PM - 3:30 PMStream D - NCSC and International Interoperability on the Software Security Code of Practice

 

 KEYWORD 3
3:40 PM - 4:40 PMThreat Plenary - Giving our Adversaries a Bad Day, Every Day

 KEYWORD 1
4:40 PMClose of CYBERUK 2025    

CYBERUK is always a hive of activity, even beyond the 30+ hours of conference sessions. Discover the exclusive areas and activities that are included in your event ticket.