Infosec Europe 2025: we’re live at the show, and here’s everything we’ve seen

Refresh

2025-06-03T13:07:17.228Z

Rubrik is next up, showcasing its data resilience and data security solutions for cyber recovery. Rubrik talks me through the devastating effects of ransomware on companies, particularly recently for retail organisations, and the importance of cyber recovery. A robust cyber recovery plan can mean a firm goes from a thirty day recovery, to just a 48 hour bounce back, Rubrik explains.

2025-06-03T13:02:49.768Z

Okta at infosec europe

(Image credit: Future)

First, we’re headed to Okta, who are talking us through their AI-driven identity threat protection. Okta are keen to tell us about the shared risk signals, which allow a security event provider to transmit risk signals to Okta, enabling customers to use these to uncover potential identity threats in their ecosystem. “Years ago, attackers used to hack systems, now they log in”, Okta warns.

2025-06-03T12:49:10.549Z

Now, a little break from the keynote stage and on to exhibition floor for some showcases and introductions!

2025-06-03T11:57:10.174Z

So what’s the takeaway? Well, it’s that geopolitics should inform your cyber strategies as security team – so make sure to integrate this conversation into your risk management and global footprint landscapes.

2025-06-03T11:45:38.651Z

Beyond state sponsored attacks and espionage, states are using cyber capabilities for sabotage and coercion. Real world sabotage used cyber as a tool to inform operations. Volt Typhoon, Chichester points out, is a perfect example of how geopolitics threatens critical infrastructure. States are understanding that penetrating critical infrastructure will likely form the basis of conflict in the future.

2025-06-03T11:43:13.265Z

Good cybersecurity has helped Ukraine, namely in the recent drone attack, which seemingly took Russia entirely by surprise. This shows the importance of great cybersecurity, Chichester argues. Defence, when done right, can be a vital weapon.

2025-06-03T11:36:04.673Z

As everyone knows, geopolitics is key to the cyber landscape. Cyber operations are now one of the go-to tools for covert state campaigns. Conflicts today are powered by cyber capabilities. Chichester points to the Viasat offensive in the Russian war in Ukraine as a prime example, and he explains that targeted attacks are increasingly disruptive, especially in the case of Russia, which are focusing on the logistical supply chain of materials into Ukraine.

2025-06-03T11:27:23.056Z

Paul Chichester at Infosec europe 2025

(Image credit: Future)

Next up – we’re listening to Paul Chichester and his take on the ‘Cyber Cold War’ and the geopolitics of cyber threats. Paul is the Director of Operations at the NCSC – so investigating cyber threats is his bread and butter.

2025-06-03T10:18:46.389Z

“Harvest now, decrypt later” is a huge talking point. The industries most at risk (unsurprisingly) are the ‘critical national’ warns Daniel Cuthbert – panel participant and cybersecurity expert. That means healthcare, finance, and telecoms could face serious difficulties in a PQC (post-quantum cryptography) world.

2025-06-03T10:14:23.743Z

There’s a myth, panel expert and Lastwall CEO Karl Holmqvist explains, that quantum computers can break any encryption. But really, at the moment, quantum computers can decrypt several commonly used encryptions – encryption will look different in the age of quantum, but it could still be effective. Cryptography will remain an important facet of cybersecurity for a long, long time – he argues.

2025-06-03T10:07:13.540Z

cybersecurity panel at infosec europe

(Image credit: Future)

Next, it’s ‘Quantum computing v Cybersecurity’ – chaired by BBC News’ Joe Tidy. Here, cybersecurity is described as an ‘Arms Race’ – although not everyone think that terminology is helpful!

2025-06-03T09:26:37.281Z

Brian Cox's keynote at InfoSec 2025

(Image credit: Future)

Now, we’re listening to Professor Brian Cox who’s talking us through the link between cosmology and cybersecurity and computing. General relativity, the theory of space and time, and cosmology all link closely to quantum computing – with complex mathematics, data sets, and quantum mechanics.

2025-06-03T09:15:46.942Z

There’s a quick look back to how far cybersecurity has come in the last 30 years before Cluley explains that hackers aren’t girlfriend-less men in garages anymore (his words!), but are serious, state sponsored actors – outlining an almost unrecognisable evolution in that InfoSec has helped to guide security experts through.

2025-06-03T09:01:37.995Z

Infosec Europe 2025 Keynote 1

(Image credit: Future)

We’re now seated for a super packed keynote, plenty of people are standing – so this is clearly a popular one! We’re about to hear from Graham Cluley, host of the Smashing Security Podcast who’ll introduce us all to Infosec’s 30th year!

2025-06-03T08:35:46.792Z

We’re heading in to the show now!

As you can see from our pictures, the theme of Infosec 2025 is “Building a Safer Cyber World” – something you can bet we’ll hear more about over the next few days.

Infosecurity Europe 2025

(Image credit: Future / Ellen Jennings-Trace)
2025-06-03T08:21:22.505Z

Despite it being June, it’s a cloudy and blustery day here – let’s hope things are warmer inside…

Excel London

(Image credit: Future / Ellen Jennings-Trace)
2025-06-02T15:43:22.266Z

Good morning from InfoSecurity Europe 2025! We’re here at the Excel, and off to collect our badge before heading in.


Source

Refresh 2025-06-03T13:07:17.228Z Rubrik is next up, showcasing its data resilience and data security solutions for cyber recovery. Rubrik talks me through the devastating effects of ransomware on companies, particularly recently for retail organisations, and the importance of cyber recovery. A robust cyber recovery plan can mean a firm goes from…

Leave a Reply

Your email address will not be published. Required fields are marked *