{"id":3614,"date":"2026-05-18T10:11:25","date_gmt":"2026-05-18T09:11:25","guid":{"rendered":"https:\/\/conscia.com\/uk\/?p=3614"},"modified":"2026-05-18T10:12:40","modified_gmt":"2026-05-18T09:12:40","slug":"what-cyber-security-experts-were-talking-about-at-cyberuk","status":"publish","type":"post","link":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/","title":{"rendered":"CYBERUK brought together the UK\u2019s cyber security experts \u2013 here\u2019s what they were talking about"},"content":{"rendered":"\n<div class=\"wp-block-columns  spacing-before--6 spacing-after--5 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column  spacing-before--5 spacing-after--8 has-green-pale-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"wp-block-heading  background-graphics--none wp-block-paragraph spacing-before--0\" id=\"h-key-takeaways\"><strong>Key takeaways:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list  spacing-after--0\">\n<li>Ongoing geopolitical uncertainty underlines the need for a security baseline<\/li>\n\n\n\n<li>Traditional defences still work against emerging technologies<\/li>\n\n\n\n<li>Anthropic&#8217;s Mythos is impressive \u2013 its marketing even more so<\/li>\n\n\n\n<li>Effective vulnerability management relies on a targeted approach and smart automation<\/li>\n\n\n\n<li>New and existing challenges must be faced head-on to ensure we&#8217;re not burying our heads in the sand<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\" spacing-after--10 wp-block-paragraph\">Attending CYBERUK as one of Conscia\u2019s cyber security specialists, Peter Jones took the opportunity to listen to the keynote sessions and engage in individual conversations with attendees and exhibitors. Over the course of the event,\u00a0 a number of common themes became apparent \u2013 helping to paint a picture of the cyber security industry at large, its concerns in the present, and where our attention should be focused going forwards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-how-geopolitical-uncertainty-is-reshaping-cyber-security-strategies\">How geopolitical uncertainty is reshaping cyber security strategies<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">The event\u2019s keynote sessions focused on the increasing geopolitical uncertainty we\u2019ve been seeing in recent years \u2013 and ramping up again in the past few weeks \u2013 and its effect on the broader cyber security landscape. In order to protect national infrastructure and assets, it was emphasised, certain steps must be taken:<\/p>\n\n\n\n<ul class=\"wp-block-list  wp-block-paragraph\">\n<li>Critical national infrastructure (CNI) and public sector organisations must be required to meet a baseline level of cyber security maturity.<\/li>\n\n\n\n<li>This should be validated by an NCSC-assured assessor, rather than rely on self-reporting.<\/li>\n\n\n\n<li>To ensure adherence, such a baseline would ideally become mandatory for these organisations in the coming months.<\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\">Given the increasing maturity and threat from foreign state actors, such a move is critical \u2013 though the organisations themselves will likely need substantial guidance to be able to meet the requirements.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Data sovereignty was another prominent theme, dovetailing with the concerns around global unrest. Primarily focusing on enabling secure, controlled data sharing capabilities with allied nations, it was a frequent touchstone across both the keynotes and individual exhibitor discussions. The digitisation of our data has already delivered substantial social and economic benefits for areas such as healthcare and government, but without the strong protections that data sovereignty delivers, we increase the likelihood that this same data will be stolen or leaked, leading to its potential exploitation for economic, political, or social gain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-traditional-security-controls-still-work-against-ai-attacks-with-one-key-addition\">Traditional security controls still work against AI attacks \u2013 with one key addition<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">At any cyber security conference, there will naturally be extensive discussion on the nature and scale of attacks that organisations are currently facing. In the last couple of years, AI has enabled attackers to automate large parts of their attack chain, supercharging the number and size of attacks that any one actor can conduct at one time. However, while the increase in size and scale of the attacks is noteworthy compared to what we were seeing just a few years ago, it\u2019s equally important to stress that that nature of the attacks hasn\u2019t changed, and the same traditional defences remain effective.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Despite the evolution of AI-assisted cyber attacks, the following best-practice principles remain important cornerstones to any effective defence:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/conscia.com\/uk\/videos\/episode-03-zero-trust\/\">Zero trust<\/a> security models<\/li>\n\n\n\n<li>Network segmentation<\/li>\n\n\n\n<li>Security awareness training<\/li>\n\n\n\n<li><a href=\"https:\/\/conscia.com\/uk\/videos\/strengthening-identity-security-achieving-real-results-with-microsoft-tools-webinar\/\">Strong identity and access controls<\/a><\/li>\n\n\n\n<li>Consistent and rapid patch management<\/li>\n\n\n\n<li>Endpoint detection and response (EDR)<\/li>\n\n\n\n<li><a href=\"https:\/\/conscia.com\/uk\/offerings\/cybersecurity\/detect-and-respond\/\">Continuous monitoring and threat detection<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>There is, however, one key addition to note: in the same way that it has supercharged cyber attacks, automation is now also a vital part of an organisation\u2019s defence in order to keep up with the speed of modern threats.<\/strong><\/p>\n\n\n\n<p class=\" wp-block-paragraph\">CYBERUK was also held shortly after the AI startup Anthropic announced its Claude Mythos model would be withheld from public access <a href=\"https:\/\/red.anthropic.com\/2026\/mythos-preview\/\">due to the concerns that its abilities could post a threat to global cyber security<\/a>. Given the international press this announcement was given, Mythos\u2019 reported capabilities were a frequent topic of conversation at the event. That said, the takeaway should perhaps be around the efficacy of Anthropic\u2019s marketing more than its models \u2013 while Mythos has <a href=\"https:\/\/blog.mozilla.org\/en\/privacy-security\/ai-security-zero-day-vulnerabilities\/\">uncovered previously undiscovered vulnerabilities in widely used software<\/a>, in real-world environments there are often more straightforward attack vectors that would be targeted instead. As offensive security specialist <a href=\"https:\/\/www.theguardian.com\/technology\/2026\/apr\/12\/too-powerful-for-the-public-inside-anthropics-bid-to-win-the-ai-publicity-war\">Jameison O\u2019Reilly put it to The Guardian<\/a>, \u201cWe have spent over 10 years gaining authorised access to hundreds of organisations \u2013 banks, governments, critical infrastructure, global enterprises [\u2026] the number of times we needed a zero-day vulnerability to achieve our objective was vanishingly small.\u201d<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The bottom line is that the dangers of AI-aided cyber attacks are very real, but \u2013 for the moment at least \u2013 they continue to follow the same rulebook as traditional attacks, and so can be stopped with the same defences.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-vulnerability-management-is-moving-away-from-blanket-patching\">Vulnerability management is moving away from blanket patching<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">The talk around Mythos\u2019 unearthing of new zero-day vulnerabilities naturally segued into conversations around vulnerability management in general. It\u2019s now more important than ever to maintain a clear and accurate understanding of your entire estate and all connected assets. In addition, it was suggested to move away from blanket patching all CVEs rated 7 and above, in favour of risk-based vulnerability management \u2013 a more targeted approach that prioritises vulnerabilities that are both exposed and exploitable.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">With automation becoming increasingly essential to achieve the speed required for effective patching, a reliance on manual processes means that organisations can be left exposed \u2013 particularly as vulnerabilities can be exploited and backdoors established almost immediately after disclosure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-facing-challenges-head-on\">Facing challenges head-on<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">While the individual concerns were reflective of the fast-paced and evolving nature of the cyber security industry, an overarching theme for the event could be summed up by attendee Margaret Heffernan in her highly regarded 2011 book Wilful Blindness: \u201cYou cannot fix a problem that you refuse to acknowledge.\u201d The specific pressures and priorities of CYBERUK may evolve year on year, but identifying, acknowledging, and confronting an issue is the only sure-fire approach to tackling it effectively.<\/p>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-200-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-frequently-asked-questions\">Frequently asked questions<\/h3>\n\n\n\n<h4 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-what-is-cyberuk\">What is CYBERUK?<\/h4>\n\n\n\n<p class=\" wp-block-paragraph\">Hosted by the NCSC, CYBERUK is the UK government\u2019s flagship cyber security event, with over 2,500 attendees attending each year. This year\u2019s theme was \u2018The next decade accelerating our cyber defence\u2019.<\/p>\n\n\n\n<h4 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-how-are-ai-assisted-attacks-different-to-traditional-ones\">How are AI-assisted attacks different to traditional ones?<\/h4>\n\n\n\n<p class=\" wp-block-paragraph\">While methods of cyber attack constantly evolve \u2013 whether AI-assisted or not \u2013 at present the major differences between the two are a matter of speed and scale, thanks to the automation that AI enables. Underneath the hood, however, the attacks continue to rely on the same weaknesses as most common cyber attacks \u2013 and can be defended against in the same way.<\/p>\n\n\n\n<h4 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-what-is-risk-based-vulnerability-management\">What is risk-based vulnerability management?<\/h4>\n\n\n\n<p class=\" wp-block-paragraph\">Because the Common Vulnerability Scoring System (CVSS) is based solely on the technical characteristics of the vulnerability, basing decisions solely on these scores can lead to an overwhelming number of vulnerabilities \u2013 many of which may not present a direct business risk to the individual organisation.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Rather than patching based on the CVSS score, risk-based vulnerability management prioritises instances where vulnerabilities are exposed, exploitable, and would have a direct business impact.<\/p>\n\n\n\n<h4 class=\"wp-block-heading  wp-block-paragraph\" id=\"h-why-is-data-sovereignty-important-in-cyber-security\">Why is data sovereignty important in cyber security?<\/h4>\n\n\n\n<p class=\" wp-block-paragraph\">Where data is created, processed, and stored ultimately dictates which nation\u2019s rules and regulations it is subject to \u2013 an important consideration as systems are increasingly based in the cloud. By maintaining data sovereignty, organisations can ensure that their data remains subject to that country\u2019s laws around cyber security, data privacy, and more.<\/p>\n<\/div>\n\n\n\n<div id=\"block_acf-block-6a0ad7bd11c57\" class=\"profile \">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/peter-300x300.jpeg\" class=\"profile__thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/peter-300x300.jpeg 300w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/peter-150x150.jpeg 150w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/peter.jpeg 394w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t<div class=\"profile__info\">\n\t\t<a href=\"https:\/\/conscia.com\/uk\/profile\/peter-jones\/\" class=\"profile__meta\">\n\t\t\t<p class=\"profile__name\">Peter Jones<\/p>\n\t\t\t\t\t\t\t<p class=\"profile__title\">Cyber Security Specialist, CISSP, CISM, CCSP<\/p>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t<p class=\"profile__excerpt\">\n\t\t\t\tPeter Jones is a Cyber Security Specialist at Conscia UK.\u00a0 He has been in the IT industry for over 30 years, providing consulting and advisory services to both Commercial and Public Sector Accounts throughout Europe.\u00a0Having previously worked for both Cisco and Microsoft, Peter combines professional and academic achievements with real world experience to support our UK business. He currently holds CISSP, CISM and CCSP certifications.\u00a0\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The end of April saw NCSC mark its 10th anniversary with its hosting CYBERUK \u2013 a major cyber security conference that draws together over 2,500 leaders and professionals in the space. As one of the flagship events of its type in the UK, it presents a valuable opportunity to gain insight into the topics and discussions that are top of mind for those at the forefront of cyber security.<\/p>\n","protected":false},"author":15,"featured_media":3630,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-3614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What the UK&#039;s security experts were talking about at CYBERUK - Conscia UK<\/title>\n<meta name=\"description\" content=\"CYBERUK presents a valuable opportunity to gain insight into the pressing topics and discussions in cyber security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERUK brought together the UK\u2019s cyber security experts \u2013 here\u2019s what they were talking about\" \/>\n<meta property=\"og:description\" content=\"CYBERUK presents a valuable opportunity to gain insight into the pressing topics and discussions in cyber security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia UK\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-18T09:11:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-18T09:12:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joe Russell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joe Russell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/\"},\"author\":{\"name\":\"Joe Russell\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/5b8fcff8ac86d7f270cf1f4366cdde0f\"},\"headline\":\"CYBERUK brought together the UK\u2019s cyber security experts \u2013 here\u2019s what they were talking about\",\"datePublished\":\"2026-05-18T09:11:25+00:00\",\"dateModified\":\"2026-05-18T09:12:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/\"},\"wordCount\":1207,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/\",\"url\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/\",\"name\":\"What the UK's security experts were talking about at CYBERUK - Conscia UK\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg\",\"datePublished\":\"2026-05-18T09:11:25+00:00\",\"dateModified\":\"2026-05-18T09:12:40+00:00\",\"description\":\"CYBERUK presents a valuable opportunity to gain insight into the pressing topics and discussions in cyber security.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg\",\"width\":1800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERUK brought together the UK\u2019s cyber security experts \u2013 here\u2019s what they were talking about\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/uk\/#website\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"name\":\"Conscia UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/uk\/#organization\",\"name\":\"Conscia UK\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"width\":628,\"height\":628,\"caption\":\"Conscia UK\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/itglconscia-uk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/5b8fcff8ac86d7f270cf1f4366cdde0f\",\"name\":\"Joe Russell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/659453cdbffd93ddebf99bcbf43fb517bc307b77d13eefbb62413661c0a0fa37?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/659453cdbffd93ddebf99bcbf43fb517bc307b77d13eefbb62413661c0a0fa37?s=96&d=mm&r=g\",\"caption\":\"Joe Russell\"},\"url\":\"https:\/\/conscia.com\/uk\/blog\/author\/joe-russellconscia-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What the UK's security experts were talking about at CYBERUK - Conscia UK","description":"CYBERUK presents a valuable opportunity to gain insight into the pressing topics and discussions in cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/","og_locale":"en_GB","og_type":"article","og_title":"CYBERUK brought together the UK\u2019s cyber security experts \u2013 here\u2019s what they were talking about","og_description":"CYBERUK presents a valuable opportunity to gain insight into the pressing topics and discussions in cyber security.","og_url":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/","og_site_name":"Conscia UK","article_published_time":"2026-05-18T09:11:25+00:00","article_modified_time":"2026-05-18T09:12:40+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg","type":"image\/jpeg"}],"author":"Joe Russell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Joe Russell","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/"},"author":{"name":"Joe Russell","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/5b8fcff8ac86d7f270cf1f4366cdde0f"},"headline":"CYBERUK brought together the UK\u2019s cyber security experts \u2013 here\u2019s what they were talking about","datePublished":"2026-05-18T09:11:25+00:00","dateModified":"2026-05-18T09:12:40+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/"},"wordCount":1207,"publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg","articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/","url":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/","name":"What the UK's security experts were talking about at CYBERUK - Conscia UK","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg","datePublished":"2026-05-18T09:11:25+00:00","dateModified":"2026-05-18T09:12:40+00:00","description":"CYBERUK presents a valuable opportunity to gain insight into the pressing topics and discussions in cyber security.","breadcrumb":{"@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#primaryimage","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/05\/cyberuk.jpg","width":1800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/uk\/blog\/what-cyber-security-experts-were-talking-about-at-cyberuk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/uk\/"},{"@type":"ListItem","position":2,"name":"CYBERUK brought together the UK\u2019s cyber security experts \u2013 here\u2019s what they were talking about"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/uk\/#website","url":"https:\/\/conscia.com\/uk\/","name":"Conscia UK","description":"","publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conscia.com\/uk\/#organization","name":"Conscia UK","url":"https:\/\/conscia.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","width":628,"height":628,"caption":"Conscia UK"},"image":{"@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itglconscia-uk\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/5b8fcff8ac86d7f270cf1f4366cdde0f","name":"Joe Russell","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/659453cdbffd93ddebf99bcbf43fb517bc307b77d13eefbb62413661c0a0fa37?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/659453cdbffd93ddebf99bcbf43fb517bc307b77d13eefbb62413661c0a0fa37?s=96&d=mm&r=g","caption":"Joe Russell"},"url":"https:\/\/conscia.com\/uk\/blog\/author\/joe-russellconscia-com\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/3614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/comments?post=3614"}],"version-history":[{"count":10,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/3614\/revisions"}],"predecessor-version":[{"id":3791,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/3614\/revisions\/3791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media\/3630"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media?parent=3614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/categories?post=3614"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_solutions?post=3614"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_partners?post=3614"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_industries?post=3614"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_business_outcome?post=3614"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_types?post=3614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}