Skip to content

Before SolarWinds, in July 2020, an Atlantic Council feature stated: “Software supply chain attacks are a regular feature of cybersecurity but remain understudied as a tactic of malicious actors and a tool of cyber statecraft”. 

Statecraft happens but, the fact remains that non-malicious actors cause the most frequent incidents (91% of breached start with phishing to an unsuspecting person – Deloitte. Jan 2020). With COVID the threat landscape has exponentially increased the opportunity for non-malicious actors to cause breaches, while hackers are using the soft-touch gateways to gain access to supply chains and corporate infrastructure

A panel of experts will discuss vital topics including:

1. The most common sources of attacks, referring to incidents, their implications and lessons learned.
2. Everyone has a role to play, because people are the first line of defence.
3. Economic training not only up-skills competency but develops a culture of cyber awareness and protection.
4. Standards, frameworks and taxonomy are the common foundations in building resilience.
5. Better communication via a common lexicon and cultural interaction between IT and Operations reduces risk and accidents.

Moderator: Peter Meehan, Co-Founder, Cybersecurity Workforce Alliance (CWA), SVP iQ4 Corp.


  • Tim Harwood, Founder and CEO, Siker Ltd
  • Carol Brooks, Managing Director, Platinum 3P Ltd
  • Richard Stevens, Director of Education ASIS UK
  • Eamonn Keane, Head of Cyber & Innovation, SBRC