CYBER SECURITY

30.10.24

About the conference

DISH, ManchesteR

08:30 Registration | 5pm Evening Social

In a fast-paced and ever changing world, companies are striving to keep ahead of the game with innovative security solutions. Hear from experts on these critical topics and network with like minded peers. We’re proud to have the very latest in thought leadership on our Cyber Security and Innovation stage held at the prestigious DiSH (Greater Manchester Digital Security Hub).

SPONSORED BY
MTF Dish Track Sponsor Logo

What to expect

Our Cyber Security conference is aimed at tech professionals working in the cyber space.

Hear from six keynote speakers and two panels delving into the topics most relevant to Manchester’s tech leaders. Our speakers have been chosen for their experience in the tech industry and the rawness of their talk topics. 

Throughout the day you will have the opportunity to forge connections with the Manchester Tech Community, from networking over lunch to our evening social.

At MTF we are dedicated to ensuring the conversation and support doesn’t stop at the end of the day, that’s why we invite you to join our 4000 strong community across social, Slack or at our physical events throughout the year. 

 

SPEAKERS

Check out our lineup of speakers by clicking their images below!

Amy Newton

Festival Director
MTF

Ricardo Sueiras

Principal Advocate
Open Source

Daniel Prince-Llewellyn

Director of Technology
CreateFuture

Emma Green

Managing Partner
CD Lawyers

Kendrick Curtis

VP of Technology
Codacy

Lewis Keeling

Senior Penetration Tester & Director
Wolf Network Security

Valeen Oseh-Ovarah

Founder & CEO
TisOva

Stuart Coulson

Director
HiddenText.

Nick Evans

COO
Lockular

AGENDA

Download the days agenda on the link below and explore the talk contents on the drop downs below.

Nick Evans
COO
Lockular

 

SESSION OVERVIEW: Data will drive the new economy, but the digital world will prosper to the benefit of us all only if people trust data- deep fake and AI make that a real concern.
I’ll explore the problems and give examples, such as evidence presented to UK Parliament recently to demonstrate vulnerabilities of data used in critical infrastructure, and how we all generate a huge volume of data that, unless it’s secured and accounted for, can be used by a bad actor to track our lives second by second.
The solution is offered by innovative web3 technology by writing an immutable record in blockchain, guaranteeing data is complete, accurate and real, thereby not only securing the data, but crucially ensuring its use is accountable and transparent.
Through such solutions, critical infrastructure is secured, we can be sure the data we use in our personal and business lives is complete, accurate and real, and we take control of personal data by ensuring it’s used only for purposes we’ve given consent

Ricardo Sueiras Sueiras
Principal Advocate
Open Source

 

SESSION OVERVIEW: Authorization is one of the foundational needs when building your applications and services. Making sure you are able to correctly and reliably grant or deny access to your application resources is critical. Yet this is still one of the hardest things we have to do as developers.

In this session I am going to cover a new open source project called Cedar that helps you solve this problem and build next generation authorization into your applications. I am going to provide a quick overview in authorisation first before looking at Cedar. I will cover why Cedar was created, and how through the use of formal reasoning and differential random testing, you can trust Cedar.

Finally I will dive into code and show you a working examples that brings this all to life, using a Python Flask application to show you how you can begin to use Cedar to help you simplify authorisation for your applications.

Daniel Prince-Llewellyn
Director of Technology
CreateFuture

 

SESSION OVERVIEW: With the incredible speed that developers have been integrating AI into their applications, the tools we have to prevent attackers from abusing AI has not kept up, and in fact unlike other vulnerabilities in web applications (like XSS) there is no easy or clear way of stopping prompt injection attacks

In this talk, I’ll discuss:

* The top threat from the OWASP top 10 to LLM Applications – Prompt Injection.
* I’ll go through what it is
* The impact it can have on an application, with a few notable case studies where applications have been attacked
* I’ll then tell the story of what defences have been proposed (which are interesting and novel), and how they have then been undermined (which is even more interesting).
* While there is no silver bullet the problem, I will finish by pointing the attendees to a few tools they can use to prevent prompt injection attacks in their own applications

Kendrick Curtis
VP of Technology
Codacy

SESSION OVERVIEW:

Modern developers have increasing cognitive load: we’re expected to own and operate our own software, which means learning not only how to program and debug but to build, package, deploy, observe and monitor. On top of this we’re expected to meet all the non-functional requirements under the sun: performance, scalability, maintainability, testability and now, notably: SECURITY.
 
How can we appropriately prioritize application security without anyone’s head exploding?
 
Join Kendrick Curtis, a 20-year software veteran and VP of Technology a Codacy to explore the processes, tools and culture that can help build meaningfully effective application security within your organization.

Lewis Keeling
Senior Penetration Tester & Director
Wolf Network Security

SESSION OVERVIEW:

In this session, we will explore the world of social engineering— one of the most sophisticated and underappreciated methods of cyber attacks. Social engineers exploit human psychology, using manipulation and deception to bypass technical defenses and gain unauthorised access to sensitive information or areas. Through real-world case studies and compelling stories, we’ll uncover common tactics, and examine how attackers exploit trust, fear, and urgency to achieve their goals. Attendees will gain insights into identifying social engineering techniques, learning practical tips on how to defend against them. This session will also emphasise the importance of cultivating a security-aware mindset, reinforcing that even the most advanced technology is vulnerable without human vigilance.

Emma Green
Managing Partner
CD Lawyers

 

SESSION OVERVIEW:

The global cybersecurity landscape is increasingly complex. Whether you’re a founder or established business, it can be tricky navigating a patchwork of laws and regulations that vary significantly across countries. This can create challenges in compliance.

A proactive and informed approach to cybersecurity and compliance can help your business better manage compliance risks in this multifaceted landscape.

In this session we will look at existing and evolving cyber laws and regulations in the UK, EU and USA to help you better understand whether and what your business needs to consider.

As an IT goddess now moved into the legal world, I understand how complex and confusing these areas can be but will leave you with some great tips, advice and takeaways for your business.

Stuart Coulson
Director
HiddenText.

 

SESSION OVERVIEW:

Security Awareness is usually a bunch of posters telling you to not click things. Phishing exercises tell you off like a naughty school child because you did something (or didn’t). But what does that tell you about the security team? In this talk, Stuart will discuss how Security Awareness should be a much different beast than what you are doing right now. Easier to implement and far more fun to run too!

Valeen Oseh-Ovarah
Founder & CEO
TisOva

SESSION OVERVIEW:

This talk will delve into the unique challenges faced by female immigrant founders in the cybersecurity industry, including overcoming biases, navigating cultural and language barriers, and the complexities of building a business in a new environment. Valeen will share personal experiences, lessons learned, and practical strategies for overcoming these obstacles. Attendees will gain insights into key pathways that can pave the way for success in a highly competitive and male-dominated industry.

Purchase your pass

Tickets for our Cyber Security Day are £10 each and include admission to the day conference at DiSH MCR and the evening social. Ticket price also includes refreshments & lunch.

AFTER PARTY

DiSH MCR, Heron House, 47 Lloyd St, Manchester M2 5LE

Following the conference, we will be hosting our inclusive and accessible after party at DiSH MCR, giving you the opportunity to network and forge connections in the community. 

During the evening we will have music, alcoholic and non-alcoholic beverages, and somewhere comfy to sit. There will be positive networking opportunities and the chance to grab a bite to eat.

Take to the MTF Stage

At MTF we are proud of the incredible community we are part of, that’s why at the end of every conference we welcome members of the community to take to the stage and have their say for 99 seconds! 

It doesn’t matter if you are a seasoned speaker or new to the tech scene we want to hear from you! In fact, some of Manchester’s most experienced speakers started with a quick 99 second pitch!

We welcome sign up’s on the day, so make sure you grab a member of the team if you want to take to the stage!

ricardo-sueiras-sueiras

Ricardo Sueiras Sueiras

ABOUT

Principal Advocate for Open Source

I have spent over 30 years working in the technology industry, and have over 20 years experience working with open source. I help customers solve business problems with open source technologies and cloud, at Amazon Web Services. I help increase awareness of great open source projects to developers, and show you how you can run your open source workloads in the Cloud. I have spent the last year understanding and building applications using Cedar, and really love how this provides such a game changing approach to addressing the thorny issue of authorisation.
daniel-prince-llewellyn

Daniel Prince-Llewellyn

ABOUT

Director of Technology at CreateFuture

I am currently the Director of Technology at CreateFuture and currently spend time on improving our technology practices and helping business to adopt AI either for their own business or developing tools and applications using AI

I graduated from university in Computer and Information Security, and spent the first 7 years of my career with BT Security – working across linux, window, QNX and Android.

I have a keen interest in AppSec, particularly mobile appsec and AI security

Emma Green

Emma
Green

ABOUT

Managing Partner of CD Lawyers.

Emma oversees driving improvements and the implementation of data protection, cyber security and AI global programs for clients and organisations.

Emma has over 25 years’ experience in IT, technical architect, an award-winning technical trainer, speaker & co-author of an IBM Redbook. She has a Post Graduate Certificate in Data Protection Law and Information Governance and is currently training as a solicitor.

Kendrick Curtis

Kendrick Kurtis

ABOUT

VP of Technology | Codacy

* 20 years in software as a PHP/JS developer, agile advocate and engineering leader
* Got into programming modding Quake as a kid in 1996, which has its own DSL with only 5 data types — none of which is “int”.
* Taught adults how to use a mouse in my first paid programming job.
* Wrote C in a project where every function name was a number.
* Wrote ORMs before they were cool.
* Rewrote a hotel chain’s overnight scoring calculator to run in 5 minutes and 100mb instead of 1h+ and 4+gb by using multithreaded PHP on the command line. Because no-one can read Perl anyway.
* Moved a healthcare tech company from releasing <quarterly to every 2 weeks on the dot — process design is cool.
* Now I get to play with tools that analyze source- and actually-executing-code for a living.
* I also design boardgames.
LewisWold

Lewis
Keeling

ABOUT

Senior Penetration Tester & Director at Wolf Network Security

Lewis, Director and Co-Founder of Wolf Network Security, is a highly motivated and client-focused cyber professional with over 7 years of experience in network security. As a CREST Registered Tester, Lewis has performed penetration testing for FTSE companies, helping uncover vulnerabilities and strengthen defenses.
Lewis co-founded Wolf Network Security with his twin brother, Ryan. Wolf Network Security is built on approachability and transparency, specialising in penetration testing and Cyber Essentials certifications. Outside of cybersecurity, Lewis enjoys mountain biking and is a coffee connoisseur.
 
e405e454-a2c0-451d-95f9-33d230a4e9e3

Valeen
Oseh-Ovarah

ABOUT

Founder & CEO, TisOva

Valeen Oseh-Ovarah is the Founder and CEO of TisOva, an AI-driven scam detection and prevention app designed specifically for students. A multiple award-winning cybersecurity professional and ex-Fraud & Cybercrime Investigator, Valeen has collaborated with leading tech companies and financial institutions to combat online fraud. As a Black immigrant tech founder and innovator, she is passionate about diversity and inclusion in tech. Valeen also mentors young people and girls In STEM through her roles as a STEM Learning and CyberFirst Wales Ambassador, driving change and empowering women in cybersecurity.

328A0063

Stuart
Coulson

ABOUT

Cyber Ecosystem Project Manager for the University of Manchester’s DiSH Accelerator

Stuart Coulson is a seasoned business strategist and mentor with over 20 years of experience across diverse industries. Currently, he serves as the Cyber Ecosystem Project Manager for the University of Manchester’s DiSH Accelerator, where he empowers startups and entrepreneurs to thrive, fostering innovation and growth within the Manchester business ecosystem. Stuart’s expertise extends beyond cybersecurity, as he actively guides companies in refining their strategies, enhancing organisational culture, and achieving sustainable success.

In addition to his role at the university, Stuart is the founder of HiddenText, a consultancy that bridges the gap between security awareness and business challenges. With a deep commitment to career development and mentorship, Stuart has successfully built and led teams, driving both individual and organisational excellence. His advisory work spans multiple sectors, providing strategic insights that help businesses navigate complex challenges and seize new opportunities.

As a dynamic speaker, Stuart shares his wealth of experience at conferences and events worldwide. His ability to connect with diverse audiences and offer actionable insights has made him a sought-after voice in both the business and cybersecurity communities. Recognised for his contributions to the industry, Stuart was honoured as the Cyber Mentor of the Year at the 2023 Unsung Heroes Awards. His dedication to mentoring and business growth continues to shape the next generation of leaders and innovators.

nick-evans

Nick Evans

ABOUT

COO Lockular

Nick’s early career started with digital electronics where he designed a motherboard for nuclear submarines and later transitioned his knowledge of data transfer to telecoms on dry land. He worked with many multi-national companies as they expanded into new markets and was a Global Account Manager for companies across North America and Europe, helping them become early adopters of advanced IT and networking technologies for business advantage. Nick is a Chartered Engineer and COO of Lockular Ltd.