Cyber Security
Vendor Day
Join us on Thursday 6th March at
One Great George Street
Register your place
Home » Vendor Day
Stay Ahead of Emerging Threats
As cyber threats become more sophisticated, it’s essential to stay informed. This event offers the perfect platform to learn about the latest trends, technologies, and tactics from those who are leading the charge in cyber security.
Network with Industry Leaders
Meet and connect with fellow IT professionals, security experts, and industry innovators. Share experiences, strategies, and solutions in an environment designed for professional collaboration and growth.
Gain Actionable Insights
Learn how to implement and optimize the latest technologies to protect your organization, mitigate risks, and respond to cyber threats efficiently.
Our Vendors




Agenda
Arrivals and Registration
Juniper Networks
Censys
NetScout
Palo Alto
Welcome and Introduction
Refreshments Break
Lunch
Refreshments Break
Refreshments and Networking
News and articles

Beware the Supply Chain “Nearsider” Threat!
We’ve talked a lot about securing supply chains on this blog in recent months – not the actual physical security of goods in transit, but the increasing range of potential threats to corporate data and infrastructure that all too frequently go undetected until a breach occurs. This is an ongoing concern for both enterprise and public sector businesses, and one that we cannot afford to treat lightly, but as we work to secure these potential attack vectors, it’s important that we don’t lose sight of other existing and emerging threats (and believe me, there are a lot of them!).

AI is a game-changing technology… and a cyber security timebomb
In just a few short years, generative AI has moved from a relatively niche, conceptual technology to a near-constant presence in our personal and professional lives. Indeed, Deloitte recently estimated that more than 7 million people across the UK now utilise some form of AI

More data is publicly available than ever before… And it’s a major cyber security risk
Whenever we first engage with organisations to help them optimise their cyber security posture, they’re often surprised at the number of hidden attack vectors that need to be given careful consideration. While the fundamentals of cyber best practice are well-documented at this point, new threats