8:00 AM - 9:15 AM | Registration and Exhibition Open | | | |
8:15 AM - 9:00 AM | Women in Cyber Networking Breakfast | | | |
9:30 AM - 10:45 AM | Resilience Plenary / International Plenary - Transforming Resilience: Lessons from International Partners | 
| | KEYWORD 1 |
9:30 AM - 10:45 AM | Technical Masterclass - Research for Better Cyber Defence |  | | KEYWORD 2 |
10:45 AM - 11:30 AM | Refreshment Break and Exhibition | | | |
11:30 AM - 12:20 PM | ESET Workshop - The World is One Giant Supply Chain – What Can You Do to Secure It? |  | | |
11:30 AM - 12:20 PM | Leonardo Workshop - The Floor is Lava – Cyber Threats facing UK CNI |  | | |
11:30 AM - 12:20 PM | Stream A - Cyber Is Not a Technical Problem, It’s a Governance Issue |  | | KEYWORD 3 |
11:30 AM - 12:20 PM | Stream B - Protecting our Critical Sectors - Sharing the CNI Security Burden | 
| | KEYWORD 3 |
11:30 AM - 12:20 PM | Stream C - The Art of the Takedown | 
| | KEYWORD 3 |
11:30 AM - 12:20 PM | Stream D - How to Make Informed Choices about Cyber Security Technology and Products. Introducing CRT: Cyber Resilience Testing |  | | KEYWORD 3 |
12:30 PM - 1:20 PM | BlueVoyant Workshop - Enhancing Your TPRM Programme: Strategies and Case Studies |  | | |
12:30 PM - 1:20 PM | Google Cloud Workshop - Are You Ready for a Crisis? Mandiant Experts Will Test Your Readiness for a Crisis in this Tabletop Interactive Workshop |  | | |
12:30 PM - 1:20 PM | Stream A - Taking an Interventionist Approach to Government Cyber Resilience |  | | KEYWORD 3 |
12:30 PM - 1:20 PM | Stream B - Pioneering in AI Security - What Have We Learned So Far | 
| | KEYWORD 3 |
12:30 PM - 1:20 PM | Stream C - Tracking and Combatting Commercial Hacking (a lot has changed in a year..) | 
| | KEYWORD 3 |
12:30 PM - 1:20 PM | Stream D - How Collaboration can Counter the Growing Cyber Threat |  | | KEYWORD 3 |
1:20 PM - 2:40 PM | Networking Lunch, Exhibition and Spotlight Stage Lightning Talks | | | |
1:30 PM - 2:30 PM | Cyber Den | | | |
1:30 PM - 2:20 PM | DSIT Workshop - Telecoms Security in a Connected World: Challenges & Opportunities |  | | |
1:30 PM - 2:20 PM | NCSC Workshop - The Next Generation: The Emerging Technology Standards That Will Transform Security |  | | |
2:40 PM - 3:30 PM | Cloudflare Workshop - Securing Critical National Infrastructure: PDNS for Cyber Resilience |  | | |
2:40 PM - 3:30 PM | KnowBe4 Workshop - AI-Driven Phishing: Managing Human Risk in an Era of Intelligent Threats |  | | |
2:40 PM - 3:30 PM | Stream A - Secure by Design - From Theory to Practice |  | | KEYWORD 3 |
2:40 PM - 3:30 PM | Stream B - The Application of Evidence - What Works in Cyber Security? | 
| | KEYWORD 3 |
2:40 PM - 3:30 PM | Stream C - Curious Compromises: Lessons from Incidents | 
| | KEYWORD 3 |
2:40 PM - 3:30 PM | Stream D - NCSC and International Interoperability on the Software Security Code of Practice |  | | KEYWORD 3 |
3:40 PM - 4:40 PM | Threat Plenary - Giving our Adversaries a Bad Day, Every Day | 
| | KEYWORD 1 |
4:40 PM | Close of CYBERUK 2025 | | | |