BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//UK Cyber Cluster Collaboration - ECPv6.15.16//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://ukc3.co.uk
X-WR-CALDESC:Events for UK Cyber Cluster Collaboration
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20260224T113000
DTEND;TZID=UTC:20260224T120000
DTSTAMP:20260501T054358
CREATED:20251215T152811Z
LAST-MODIFIED:20251215T152811Z
UID:14329-1771932600-1771934400@ukc3.co.uk
SUMMARY:ScotlandIS: Tech Tidbits: Navigating Supply Chain Risk
DESCRIPTION:Join ScotlandIS Tech Tidbits\, on the first Tuesday of every month!\n\n\n\nThese 30 minute webinars will be short\, informative sessions on a variety of topics\, from exporting to cybersecurity\, cloud computing to procurement\, and many more. \nFor this extra webinar in February to mark Cyber Scotland Week 2025\, guest speaker Debra Cairns\, Managing Director of Net-Defence will talk about Supply Chain Risk.  Over the past two to three years\, supply chain (SC) risk has shifted from an emerging to current risk.  Supply chain risk encompasses a wide range of factors\, including economic uncertainty\, political instability\, natural disasters\, and supplier failures. \nAn attack on a business’s supply chain can cause significant impact on operations – products\, systems\, and services. Equally as damaging is a cybercriminal launching a cyberattack against a business’s supply chain. \nIdentifying these risks can be challenging\, as supply chains are often large\, complex\, and interconnected. Threats can emerge at any point and take many forms\, whether they are inherent\, introduced\, or exploited by cybercriminals looking for vulnerabilities. \nLearn: \n\nWhat is Supply Chain Risk & Types of Risk (Inherent/Introduced/Exploited)\nExploited Risk\nHuman Risk\nRole of email\nSC Risk Management
URL:https://ukc3.co.uk/events/scotlandis-tech-tidbits-navigating-supply-chain-risk/
LOCATION:West Midlands
CATEGORIES:ScotlandIS
ATTACH;FMTTYPE=image/png:https://ukc3.co.uk/wp-content/uploads/2025/04/ScotlandIS-3.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260225T113000
DTEND;TZID=UTC:20260225T120000
DTSTAMP:20260501T054358
CREATED:20251215T153255Z
LAST-MODIFIED:20251215T153255Z
UID:14332-1772019000-1772020800@ukc3.co.uk
SUMMARY:ScotlandIS: Tech Tidbits: Hooked by the Algorithm - A Deep Dive into TikTok
DESCRIPTION:Join ScotlandIS Tech Tidbits\, on the first Tuesday of every month! \nThese 30 minute webinars will be short\, informative sessions on a variety of topics\, from exporting to cybersecurity\, cloud computing to procurement\, and many more. \nFor this second extra webinar in February to mark Cyber Scotland Week 2026\, guest speaker Parven Kaur will share her insights.  She is the founder of Kids N Clicks\, a platform aiming to help parents safeguard their children’s online experience by educating them on latest misinformation\, social media\, and digital trends. \nIn her Tidbit\, Parven will take a deep dive into TikTok and how algorithms shape young users’ behaviour\, thoughts\, and actions.  Ideal for parents\, guardians or those interested in online safety or the psychology behind young user behaviours and trends – book your place to join us in February.
URL:https://ukc3.co.uk/events/scotlandis-tech-tidbits-hooked-by-the-algorithm-a-deep-dive-into-tiktok/
LOCATION:West Midlands
CATEGORIES:ScotlandIS
ATTACH;FMTTYPE=image/png:https://ukc3.co.uk/wp-content/uploads/2025/04/ScotlandIS-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260226T130000
DTEND;TZID=UTC:20260226T133000
DTSTAMP:20260501T054358
CREATED:20251215T155609Z
LAST-MODIFIED:20251215T155609Z
UID:14334-1772110800-1772112600@ukc3.co.uk
SUMMARY:ScotlandIS: Tech Tidbits: From Local Shop to Mega Corp\, Everyone Can Use Threat Intel
DESCRIPTION:Join ScotlandIS Tech Tidbits\, on the first Tuesday of every month! \nThese 30 minute webinars will be short\, informative sessions on a variety of topics\, from exporting to cybersecurity\, cloud computing to procurement\, and many more. \nEach event will feature a ScotlandIS member offering their expert insights and advice on the topic in hand\, however you do not need to be a member to attend these talks. \nFor this third webinar in February to mark Cyber Scotland Week 2026\, guest speaker Cian Heasley\, Principle Consultant and Threat Function Lead at Acumen Cyber will be presenting on the steps that a typical organisation with limited security resources could take to integrate threat intelligence and knowledge of the threat landscape for their industry sector into operational and strategic security planning. \nThe focus will be on practical examples that attendees can take away and adapt for their own organisations – book your place to join us in February.
URL:https://ukc3.co.uk/events/scotlandis-tech-tidbits-from-local-shop-to-mega-corp-everyone-can-use-threat-intel/
LOCATION:West Midlands
CATEGORIES:ScotlandIS
ATTACH;FMTTYPE=image/png:https://ukc3.co.uk/wp-content/uploads/2025/04/ScotlandIS-2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260323T090000
DTEND;TZID=UTC:20260323T170000
DTSTAMP:20260501T054358
CREATED:20251215T133634Z
LAST-MODIFIED:20251215T133634Z
UID:14299-1774256400-1774285200@ukc3.co.uk
SUMMARY:Women in Cyber Unlimited: Defending the Future: Women in Cyber
DESCRIPTION:This is Women in Cyber Wales third national conference showcasing and celebrating the work of women in the cyber security sector.  This event is hosted by Dr Clare Johnson\, Founder of Women in Cyber Unlimited and Cyber Capability Lead at ITSUS Consulting.\n\n\n\nFollowing the success of Securing the Future: Women in Cyber in 2024 and Resilient Futures: Women in Cyber in 2025\, the cluster is hosting it’s third national cyber security conference for women and allies on 23rd March at the ICC Wales. \nThe event will celebrate the work that women are doing in the sector\, showcasing their talent across a breadth of different roles and demonstrating the importance of an inclusive workforce. Sessions will include current cyber security threats and challenges\, skills development\, growing your network\, and an interactive cyber security activity\, suitable for all levels. \nThere will be presentations from women working across different industries\, talking about a range of subjects – further details will be released over the coming weeks. In addition\, there will be opportunities to meet with a variety of organisations from across the UK including industry\, government funded bodies and training providers. \nSponsors \nThis event has been funded by the generous support of a number of sponsors and which will be revealed in the coming weeks. Those businesses interested in supporting this important and highly regarded event\, please get in touch at hello@womenincyber.wales \nADS and ITSUS Consulting are current sponsors and a number of individuals who have kindly donated their time and knowledge to help shape the programme. \nTickets \nEarly bird tickets are available for £30 each\, and once these have all been sold\, there will be the option to purchase a full price ticket. Alongside these General Admission tickets\, there is the option to Buy one Donate one\, giving individuals the option of paying for two tickets and releasing one of those to someone who cannot buy one. For those that would like a donated ticket\, please add your name to the Free Ticket waitlist and if a ticket becomes available you will be sent details of how to register. \nIf you are a public sector worker and would like to attend but cannot release the funds\, please get it touch with us on hello@womenincyber.wales
URL:https://ukc3.co.uk/events/women-in-cyber-unlimited-defending-the-future-women-in-cyber/
LOCATION:ICC Wales\, Newport\, United Kingdom
CATEGORIES:Cyber Wales
ATTACH;FMTTYPE=image/png:https://ukc3.co.uk/wp-content/uploads/2025/03/Cyber-Wales-3.png
END:VEVENT
END:VCALENDAR