• Skip to primary navigation
  • Skip to main content
  • Skip to footer
UK Cyber Cluster Collaboration

UK Cyber Cluster Collaboration

UK Cyber Cluster Collaboration

  • Home
  • About
    • Meet the Team
  • Latest News
  • Cyber Clusters
    • UKC3 Working Groups
      • Ecosystem Development
      • Cyber Skills Growth
      • Innovation Working Group
  • Events
  • Contact Us
    • Partner with UKC3
    • Sign up to Newsletter
  • Cluster Login

CyberUK 2025: Women in Cyber Breakfast by Dr Clare Johnson, WiC Founder

May 21, 2025 by UKC3

Summary

Overview of CyberUK 2025: Women in Cyber Breakfast

A room full of women chatting, plotting, laughing and discussing cyber security. That’s not something we see very often, but at the Women in Cyber Networking Breakfast at CyberUK it’s exactly what we got. On day two of the National Cyber Security Centre’s flagship conference, this year held in Manchester, around 180 women and allies got together to join the growing communities that are helping women to connect with others, find mentors and friends, and progress their careers.

The event first took place in the ICC Wales. As founder of the Women in Cyber Wales network, I took the plunge and asked a representative of the NCSC whether I could possibly run one of my networking events as a fringe event at CyberUK 2022. I can remember taking the call confirming that a breakfast slot had been allocated to me, all I needed to do was provide a bit of narrative and our logo for the online programme. I was absolutely delighted.

That first event had around 65 attendees, and has grown year on year, and it is now established as a core part of CyberUK. As the Women in Cyber Wales network has grown into ‘Women in Cyber Unlimited’ so has the event grown, indicating that there isn’t just a desire for communities like this, there is a definite need. Women still make up just 17% of the cyber security workforce, so it’s important to provide opportunities for us to meet and build our networks. Not only that, it demonstrates the breadth of skills and experience women have in this space, and amplifies the importance of having a diverse workforce.

The theme of CyberUK this year was ‘Transforming Resilience, Countering Threats”and we can do that by being a more inclusive industry. I think organisations are much more aware of the importance of diversity now, but that still isn’t reflected in the numbers, particularly at senior levels.

The event itself was uplifting, warm and full of talent. After a couple of short presentations from Clare T, NCSC, Kirsty Miller from our sponsors, Lockheed Martin and myself, the room erupted into a buzz of noise. I was also thrilled that we were joined by Richard Horne, CEO and Felicity Oswald of the NCSC, and Anne Keast-Butler, Director of GCHQ. A number of people came up to me afterwards saying they had come to the conference alone, and now felt less isolated, that they had made a new connection, or that they had hatched some business collaboration, and that’s what it’s all about. Bringing people together, celebrating their contribution to the sector, whatever that might be, growing friendships and ultimately building a more resilient nation. It was a wonderful way to start the day.

Filed Under: Blog

Stay in Touch

Sign up to receive the latest news, events, and announcements from UKC3
Sign Up

Footer

Logo

Email

info@ukc3.org
  • Home
  • About
  • Clusters
  • Events
  • Latest News
  • Cookie Policy
  • Privacy Notice
  • Contact Us

Copyright © 2026 · UKC3

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Sponsorship Page Pop-Up