Questioning the Future-Takeaways from Cyber Manchester

Questioning the Future-Takeaways from Cyber Manchester



Sarah Armstrong-Smith opened the dialogue with a sobering look at the APT attacks originating from state actors such as Russia, Iran, North Korea, and China. She briefly highlighted the tactics and repercussions of these breaches and underscored the new era of cyber warfare we find ourselves. The sophistication and persistence of these threats demand equally sophisticated countermeasures.

Tim Ward shifted the conversation to the psychological front, introducing the nudge theory as a potent tool in the cybersecurity arsenal. By creating prompts that are easy, attractive, social, and timely, we can significantly influence user behaviour. Tim emphasised that understanding the triggers that lead to action—or inaction—can be the key to designing effective security measures. His insights into how simple interventions can lead to better security hygiene were particularly compelling, especially his case study on promoting safe email practices.

Lee Morton 's talk focused on the importance of simplicity in communication, especially when discussing complex topics like cybersecurity. He emphasised that to effectively convey information, it's crucial to speak the language of the audience. Highlighting the gap between technical experts and board members who may not be familiar with cybersecurity jargon, he used an innovative approach by explaining cybersecurity concepts through the analogy of American Football.

Jen's session was a stark reminder that incident recovery is as crucial as prevention. Her candid talk, aptly titled "Jen, We Have a Problem," walked us through the stages of responding to a breach. Her pragmatic approach to incident management stressed the importance of readiness and the ability to respond swiftly and effectively.

Darcy Delich-Coull addressed the pressing issue of data security in the era of remote work. With the increase in remote monitoring, the need for organisations to collect only what is necessary has become paramount. Her talk on data minimisation, along with strategies for restriction, encryption, and training, highlighted that customer trust hinges on an organisation's ability to protect sensitive information. Compliance is a journey, not a destination.

Hazel McPherson encouraged a culture of curiosity and knowledge-sharing through her story becoming a Chief Information Security Officer.

Daniel Selman brought a creative angle to the discourse, sharing how they raised cybersecurity awareness through unconventional means like puppet shows. This approach not only captured attention but also made complex topics more approachable and memorable. But he didn't tell us how we could win the lottery.


Patrick Grillo focused on the critical need for rapid detection and response, pointing out that many cyber attacks unfold within minutes or hours. He advocated for the use of AI/ML and GenAI in security operations to keep pace with these fast-moving threats and to manage the ever-expanding external attack surface. SoC is not a flat layer.

Lianne P. and Jeff Watkins discussed the rapid integration of IoT and AI in our lives through IoT devices like smart TVs and smartphones. They highlighted the risks of this tech, calling it a "digital panopticon" that may compromise our privacy. They suggested we might need to become "digital preppers" to protect ourselves against these intrusions. They questioned the wisdom of the smart tech revolution, noting its benefits for big tech firms and potential exploitation by cybercriminals.

Deborah Meaden encapsulates a strategic approach to innovation and storytelling in the business landscape. It suggests a methodology not just of improvement but of differentiation. Here’s a breakdown of how to apply this wisdom:

  1. Identify Existing Solutions: Start by researching and understanding what others are doing in your area of interest. This isn't about imitation but about identifying gaps and opportunities for innovation.
  2. Discover a Unique Angle: Look for a new perspective or approach that hasn't been fully explored. This could involve enhancing the user experience, employing a more sustainable method, or tapping into a niche market. The goal is to offer something that stands out because of its novelty or superior execution.(Just a little better is enough)
  3. Refine Your Story: Every brand and product has a story. Yours should encapsulate what makes your approach different and better. A compelling narrative that resonates with your audience can significantly impact your project's success. This story should weave through all your communications to ensure consistency and clarity of your brand's value proposition.
  4. Choose the Right Platform: Not all stories thrive on the same platforms. Depending on your target audience, product, or service, find the medium that best suits your message.

Overall, the talks presented were enlightening, yet the absence of a proactive approach and a forward-looking perspective on the future of cybersecurity was notably missing. While the discussions covered the current landscape, strategies, and challenges in great detail, there was a gap in exploring the evolving threats and the next generation of cybersecurity innovations. A deeper dive into emerging technologies such as quantum computing, the expanding role of artificial intelligence in both offense and defense, and the implications of global data privacy regulations would have provided a more comprehensive view of where cybersecurity is headed and how we can prepare for the challenges that lie ahead. Furthermore, the emergence of deepfake technology and its potential misuse underscores the need for advanced detection techniques that leverage AI to distinguish between real and synthetic media.

Let's invite the future into our present, challenging ourselves to think beyond the horizon and redefine the boundaries of cybersecurity.

?? Vikki Turner

Cyber Security Analyst | Passionate about Building Resilient Cyber Ecosystems

9 个月

That was a really interesting article. The thing that scares me since looking into this industry is IOT and SCADA and the processes in between eg water treatment plants, analytical labs etc. They affect everybody lives but there seems to be very little work on this despite that. Having worked in these industries I think there is a massive amount of work to do around this with companies such as GSK, Astrazeneca etc and all of their suppliers. The legislation does not seem to be there at the moment.

Lianne P.

Head of SecOps | Anthropologist | Award-winning Podcaster| NED | Author | Keynote Speaker | MSc AI & Data Science | Security Specialist of the Year | Cybersecurity Personality of the Year | Security Leader of the Year

9 个月

Great write up and you were spot on, more future please!

要查看或添加评论,请登录

社区洞察

其他会员也浏览了