Full Capacity
Registrations Closed

Limited Availability
Register soon to avoid disappointment


Registration & Networking

Securing Government Services:
Identifying Threats, Mitigating Risk and Building Resiliency

2 Dates  |  2 Cities



In today's digitally connected world, government organisations are constantly facing a growing number of cyber security threats. To safeguard their sensitive data and critical infrastructure, it's essential to adopt robust cyber security measures and improve their posture.

This workshop is designed to provide attendees with a comprehensive understanding of the Cyber Assessment Framework and equip organisations with the knowledge and skills to effectively assess and enhance their strategies and resiliency solutions.

Welcome from GovNews & Bytes


Locations & Dates

23rd January 2024
Cloud 23
The Hilton, Beetham Tower, 
303 Deansgate, Manchester M3 4LQ

25th January 2024
RSA House Auditorium
8 John Adam St, London WC2N 6EZ

Keynote - Central Government Speaker

Keynote - Local Government Speaker

Keynote Q&A Hangout

Managing Security Risk

  • Ensuring you have the appropriate management policies and processes in place.
  • How to take appropriate steps to identify, assess and understand security risks.
  • Prioritising your assets including data, people and systems.
  • Understanding your supply chain and building appropriate measures where third party services are used.

Protecting Against Cyber Attack

  • Proportionate security measures and resilience policies are in place to protect the networks and information systems.
  • Verify, authenticate and authorise access, including how to know and have trust in the devices that are used.
  • Understand your data, its importance, where it is stored, where it travels and how unavailability or unauthorised access, modification or deletion would adversely impact the organisation.

Lunch & Networking

Detecting Cyber Security Events

  • How to monitor the security status of the networks and systems, detect potential security problems and track the ongoing effectiveness of protective security measures.
  • Identify malicious activity affecting, or with the potential to affect, the operation of essential functions.

Minimising The Impact of Incidents

  • Develop an up-to-date incident response plan and enact it.
  • Carry out exercises to test your plans, using past incidents and scenarios.
  • How to understand root causes and ensure appropriate remediating action is taken.
  • Drive Improvements and use lessons learned from scenarios and incidents to improve your security measures.

Panel Discussion

Wrap Up from Bytes

Drinks, Refreshments and Networking



Geoff Connell
Director of IMT and Chief Digital Officer - Norfolk County Council

Stuart Frost
Head of Enterprise Security and Risk Management within the UK Civil Service

Paul Crawford
Director Public Sector - Proofpoint

Tom Watson
UK Local Government Lead - Tenable

John Keegan
Head of Digital Security -
Department for Work and Pensions (DWP)

Richard Archdeacon
Advisory CISO EMEA - Cisco

Daniel Patefield
Head of Programme, Cyber and National Security - techUK

Paul D’Cruz
Head of Public Sector for Security - Microsoft

Adam McCaig
Head of Cyber Security - Bytes

Jamal Lawrence
Cyber Security Evangelist - Bytes

Ellen Hallam
Senior Threat Intelligence Analyst - Bytes

Limited Availability
Register soon to avoid disappointment

Full Capacity
Registrations Closed

** Speakers and agenda topics/times may be subject to change

** Speakers and agenda topics/times may be subject to change