Be the first to witness and hear the groundbreaking product launches and revolutionary solutions. Our stage offers a dynamic platform to explore real-world applications and in-depth case studies. Engage directly with technical experts, ready to answer your questions on the spot. Don't miss this chance to dive into the cutting-edge of technology.
)

We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
-
Tech Hub Stage20 minsThe human factor remains cybersecurity's most critical, yet often overlooked, element. This keynote dives into the fascinating psychology of trust – how we build it, how it's exploited, and whether we should even try to validate it in a digital world. From a grandmother's Facebook recipe group to a North Korean fake IT worker infiltrating a tech company, this presentation will explore real-world tales of social engineering. It will unpack why human brains are wired to fall for scams, and how AI is blurring the lines of reality, and how we can navigate the modern trust paradox.
-
Tech Hub Stage20 minsJake will delve into the darker, more controversial aspects of facial recognition technology, exposing its unsettling potential. He'll unveil cutting-edge glasses capable of real-time identification, allowing you to discover someone's identity with nothing more than a glance. But it doesn't stop there — Jake will also demonstrate how AI can be used to outsmart these systems, revealing how he successfully bypassed a bank’s supposedly secure facial recognition system using nothing but freely available software. For the grand finale, Jake will push the boundaries even further. He’ll add himself to a high-security watchlist of known suspects - only to walk straight past the system undetected with the use of AI, proving just how vulnerable and exploitable this technology truly is.
-
Tech Hub Stage20 mins
Discover how to apply behavioural models such as MINDSPACE and proactive nudges to drive lasting security behaviour change. Learn how to keep security front of mind across your organisation—and how to measure and report its impact effectively to leadership, proving the value of your awareness efforts.
Speakers
-
Tech Hub Stage20 minsDiscover how Secure Access Service Edge (SASE) can transform your security architecture by unifying network and security services into a cloud-native platform. Learn how SASE enhances web security, streamlines remote user access, and supports a modern, scalable, and secure digital workplace
-
Tech Hub Stage20 mins• Trends and Emerging Cybersecurity Risks – An overview of the latest threats and vulnerabilities in cybersecurity, from advanced attack methods to evolving tactics used by threat actors.
• The Evolution of Cybersecurity: Are We Doing Something Wrong? – A critical look at today’s security strategies, identifying key gaps and exploring innovative ways to stay ahead.
• AI in Cybersecurity: Risks and Opportunities – Exploring how AI is reshaping both cyber threats and defense, and what steps organizations must take to use it effectively while reducing risks
-
Tech Hub Stage20 minsThis presentation addresses the urgent need to future-proof digital security against emerging quantum computing threats, which enable "harvest now, decrypt later" attacks by allowing adversaries to collect encrypted data today for future decryption. Co-Founder and CTO of Senetas, Julian Fay will explain how high speed encryptors provide a robust and high-performance solution, designed to protect data as it travels across various network types. This includes a simplified guide to Post-Quantum Cryptography (PQC), detailing how our encryptors implement NIST quantum-resistant algorithms through hybrid key establishment and inherently quantum-safe Transport Independent Mode, alongside support for Quantum Key Distribution (QKD). Attendees will gain insight into why proactive preparation is critical now to safeguard sensitive information, leveraging our globally certified and future-ready encryption portfolio.
-
Tech Hub Stage20 minsAn overview of Datambit’s Deepfake Detection Solutions for Audio and Video deepfakes will be presented, as well as the use cases Datambit is targeting. An overview of the ease of use and deployment of the solution will be discussed. The tenants of performance and trust that the Company is built upon will be explained
-
Tech Hub Stage20 minsThis session explores strategies to strengthen cyber resilience by addressing the full threat spectrum—from human error to ransomware. It highlights the importance of security awareness, proactive defenses, and incident response planning, empowering organizations to mitigate risks, safeguard data, and maintain business continuity in an increasingly hostile landscape.
-
Tech Hub Stage20 minsAs more sectors are drawn into the regulatory net, are new rules enabling or stifling cyber resilience? This session explores how organisations can respond to emerging threats, not just by meeting regulatory baselines but by building true operational resilience. Drawing on recent events, we’ll ask: who didn’t get hit - and why?
-
Tech Hub Stage20 mins"Trust but verify" is no longer just a regulatory mantra, it’s fast becoming a baseline expectation. Compliance frameworks like ISO 27001 and NIST CSF offer structure, but only threat-led testing reveals real vulnerabilities. In a world where breaches move at machine speed and AI is weaponised, TLPT is not a luxury; it’s the proving ground for survival
-
Tech Hub Stage20 minsIn an era of escalating threats, just as military forces rigorously train to ensure readiness and integration, the private sector must embrace the same ethos of continuous, tested development. This talk explores why exercises, ranging from tabletop scenarios to advanced cyber range simulations, are essential for assessing and strengthening cyber resilience across people, processes, and technology. It highlights how these exercises foster collaboration, sharpen incident response, and bolster supply chain resilience, while also demonstrating the necessary operational readiness needed to meet the stringent compliance requirements of the Cyber Resilience Act, NIS2, DORA and similar legislation.
-
Tech Hub Stage15 minsThe explosive growth of decentralised finance (DeFi) and the Metaverse has opened new opportunities—alongside unprecedented risks. In 2023, over $1.7 billion was stolen from crypto users globally due to fraud, phishing, and smart contract vulnerabilities. Traditional security measures are no longer sufficient to protect users in fast-evolving decentralised ecosystems.
-
Beyond the Buzz: Cutting False Positives by 90% — How Veribee Redefines Secure Software VerificationTech Hub Stage15 minsAI-driven code is shipping faster than ever, but enterprises face a trade-off between speed and security — and regulators demand both.
Veribee fuses formal verification, dynamic testing, and AI to cut false positives by 90% and detect 30% more flaws, delivering enterprise-ready assurance for the AI era.Speakers
-
Tech Hub Stage20 minsSupply chain risk management involves complex business relationships and vast data volumes, yet many organisations still rely on static spreadsheets in shared drives. We examine why Third-Party Risk Management (TPRM) often fails and how strategic collaboration can improve security across your entire supply chain.
-
Tech Hub Stage20 minsAre you post-quantum ready? Join FullProxy’s cyber specialists as they unpack the NCSC’s roadmap for post-quantum cryptography (PQC). Discover the practical actions you need to take today to ensure you're ready for the quantum leap.Speakers
-
Tech Hub Stage20 mins
Traditional pentesting stares into the abyss - snapshots, static reports, false certainty. Blind spots multiply while attackers move faster in the light of the present. This talk breaks the comfort of false confidence and demonstrates how AI-driven continuous pentesting drags security out of the dark, exposing risks as they emerge and arming defenders to move faster, sharper, and earlier than their adversaries.
-
Tech Hub Stage20 minsThis session explores how generative AI tools like Claude 4 revolutionise vulnerability assessment. Discover how cutting-edge AI streamlines threat detection, prioritises risks, and enhances attack surface protection—empowering security teams to work faster, smarter, and more effectively in today’s evolving cyber threat landscape.
-
Tech Hub Stage15 minsTurn threat intelligence from endless noise into decisive, business-ready action — join this 15-minute talk to learn how to cut through the clutter, focus on what truly matters, and strengthen your defenses where it counts. Discover how to unlock the real-time value of leading cybersecurity solutions — without the heavy price tag — and seamlessly measure and protect your infrastructure across on-prem, cloud, or hybrid environments.
-
Tech Hub Stage15 minsRoot accounts, master keys, recovery codes.. Where should you store them? How should you keep them safe? How can you ensure access to them when you need them the most? This session explores all the gotchas of this tricky subject.
-
Tech Hub Stage15 minsQuantum computing poses an imminent risk to today’s digital infrastructure, with strategies like “harvest now, decrypt later” threatening finance, telecom and defence long before practical quantum computers exist. Meeting this challenge requires quantum-secure communication that is not only technically robust but also commercially scalable.
Photarix is pioneering a breakthrough with compact, room-temperature single-photon sources designed for mass manufacturability and seamless integration with fibre-optic networks. Unlike bulky laser systems or cryogenic quantum-dot devices, Photarix delivers reliable, secure and cost-effective single-photon generation, removing key barriers to large-scale deployment of quantum key distribution (QKD).