NISC brings together professionals, researchers, and cyber security enthusiasts for a two-day information-sharing and collaboration event. It features presentations, workshops, panel discussions, and networking opportunities to discuss the latest developments, challenges, and solutions within the cyber security and information protection industry.
The conference is a unique opportunity to make new contacts, expand your knowledge, and it gives you full access to thought-provoking and actionable content on the latest cyber security trends.
The National Information Security Conference (NISC) is a gathering designed by cyber security experts, packed with practical insights. Esteemed security pros share their experiences while top experts delve into the latest threats and trends. At NISC, we aim to help delegates boost their security skills. It’s all about collaboration, networking, and sharing key info. Attendees leave equipped to stay ahead in security and strengthen their strategies.
Explore the latest trends in cyber security over two information-packed days at NISC 2025. Join us for in-depth talks, roundtable discussions with leading experts, and relaxed networking opportunities where you can make valuable connections with industry peers.
Discover new perspectives from keynote speeches and get hands-on with the latest technology at our exhibition arena.
In an era where cyber threats are evolving at an unprecedented pace, traditional defence mechanisms are no longer sufficient. This roundtable will delve into the latest innovations and strategies in cyber security, offering you a unique opportunity to learn from industry leaders and network with peers.
Discover how to stay ahead of cyber adversaries and safeguard your organisation's digital assets and your customers.
Let’s not mitigate the risk of cyber threats, let's eradicate them.
Panellists:
Our transport network, operators, and infrastructure are vital to the prosperity of the UK and requires a whole of society response to the threats we face.
This workgroup will share information on threat actor tradecraft, provide opportunities to collaborate across the UK's transport network both public and private entities, operators, suppliers and bodies and explore practical solutions to strengthen resilience and implement effect countermeasures.
Join Sapphire and our partners for an in-depth technical session on OT ransomware.
See the latest research on how industrial control systems can be compromised and ransomed, learn how attacks occur, plus mitigation techniques, strategies and the latest technologies to avoid operational impact.
Are you confident your organisation is prepared for a ransomware attack? The National Cyber Security Centre (NCSC) stresses the importance of preparation: “As there is little an organisation can do once ransomware has hit, preparation is essential.”
Our live-play Ransomware Simulation exercise is vital for ensuring your readiness. Join us for this engaging session, during which we will simulate a ransomware attack, providing a safe environment for you to hone your skills. Attendees will navigate a real-life ransomware attack simulation, allowing you to:
Experience next-generation cybersecurity live. Take part in our Capture The Flag.
Join Graham as he welcomes you to NISC 2025.
Join Matt for a spot of future gazing as we consider the complexity of evolving cyber threats and how we all play a role in building a secure future.
Digital transformation isn’t just about adopting new technology — it’s about reshaping how organisations operate. Security transformation must do the same: updating governance, risk prioritisation, and defences so they can run at machine speed, not human speed.
In this panel session, security expert, Rois Ni Thuama set the scene with why assets should be the centre of your strategy and how to strengthen your defences. Rois will then be joined by fellow panellists while they debate the pros and cons of AI leaving delegates with practical, actionable insights to strengthen their defences.
Ransomware has evolved into a highly organised, profit-driven economy — one that continues to outpace traditional security measures. In this session, Halcyon unpacks the inner workings of the ransomware ecosystem, from the monetisation models driving attacks to the growing sophistication of ransomware-as-a-service (RaaS) groups.
Attendees will gain a deeper understanding of:
- The current state of the ransomware economy and emerging trends - Why conventional defenses often fall short against modern ransomware throughout the attack lifecycle - How Halcyon’s multilayered prevention, containment, and recovery capabilities are purpose-built to stop ransomware at every stage of the attack lifecycle
This session will provide actionable insights and introduce a protection-first approach that goes beyond detection — helping your organisation stay operational, even under ransomware attack.
.
Public key cryptography (PKC) provides the foundation of trust and security on the Internet. Unfortunately, Shor's algorithm breaks all of our existing public-key encryption methods, such as those used for key exchange and digital signatures. For this, NIST has defined that we need to migrate critical national infrastructure applications to a quantum-robust form by 2030, and for other applications by 2035. It is thus important for organisations to understand their migration strategy over the next few years. This presentation will outline the current status of PQC, and define the steps that organisations need to take to become quantum robust, and will also outline the evolving standards for Post Quantum Cryptography along with the usage of GenAI within the migration process.
Told through a series of real-life case studies and first-hand experiences from the frontier of compliance, Ben will be sharing how the battle between innovation and compliance can be won through focusing on the human quotient.
Join Graham Cluley as he interviews Matt Griffin and Professor Bill Buchanan.
Drinks reception sponsored by Glasgow City Council and the Lord Provost
In an age where artificial intelligence is becoming not just a tool but an agent, we are beginning to outsource more and more of our decisions, interactions, and even trust to systems that act on our behalf. These AI agents can send messages, make purchases, negotiate, and even mimic our voices and personalities. But with this new power comes a dangerous shift—when we hand them agency, we also hand over the risks that come with it.
Unlike humans, these digital agents don’t carry intuition, context, or moral hesitation. They can be deceived, manipulated, or repurposed with frightening ease. The same protections that would stop you from being tricked or coerced don’t exist in the same way for the algorithms acting in your name. And that gap creates a perfect opening for exploitation.
So when we talk about “the most dangerous person on the internet,” we’re not pointing to a criminal mastermind lurking in the shadows, we aren’t even asking each of you to look in the mirror —it’s something far more elusive. It’s the invisible, tireless, agentic AI, capable of acting, or being exploited to act as anyone and everyone. The real danger isn’t in the technology itself, but in what happens when we give it the keys to our identity, our judgment, and our actions.
NISC 2025 will attract a wide range of IT and security experts from leading businesses, service providers, global research groups, and consultancy firms.
Attendees will include CISOs, CTOs, IT Security/Network Managers, Compliance/Risk Managers, and IT Directors. Together, we’ll create a vibrant and collaborative atmosphere where you can network and share ideas with the industry’s top minds and most exciting innovators.
Why do they attend?
All prices exclude 20% VAT
All prices exclude 20% VAT
All prices exclude 20% VAT
All prices exclude 20% VAT
NISC 2025
Date: 3-5 November, 2025
Time: 08:30 AM – 06:00 PM
Location: Radisson Blu, Glasgow
On foot from Glasgow Central Station: the hotel is located on Argyle St just a few steps away from Glasgow Central station.
On foot from Buchanan Bus Station: the hotel is only a 1.1-kilometer walk from Buchanan Bus Station, via W Nile St.
On foot from Glasgow Queen Street Station: it’s only a 900-meter walk from Glasgow Queen Street to the hotel. The easiest route is typically Buchanan St to Argyle St.
By bus: take the Airport Express to the Hope Street stop on Bothwell Street. You’ll be just 350 meters from the hotel.
By taxi: travel to the hotel by taxi takes about 20 minutes. The airport is about 14km from the hotel via M8.
By car: from the airport, merge onto M8 before taking the A739 exit towards Clyde Tunnel. On the A739, take the A814 exit towards the city center. Keep right on A814 before continuing onto Argyle St to reach the hotel.