Webinar

Cybersecurity a year in review: What happened in 2025, and what it means for your 2026 security strategy

calendar icon

Date

  • 3 December 2025
event-icon-clock-black-bold

Time

  • 11:00 – 12:00
map pin icon

Location

  • Microsoft Teams
Butterfly overlay image

Cyber-attacks have increased by 50% in the past year for UK businesses.

National Cyber Security Centre, 14 October 2025

This year saw a fundamental shift in cybersecurity. Deepfakes became scarily convincing and accessible. While Hackers played the long game. Squatting in plain sight, moving laterally with legitimate credentials, with an understanding that the weakest link isn’t your firewall – it’s every identity in your environment.

Hackers no longer break in. They log in.

In this webinar, we move beyond the year-end charts and statistics. This is a tactical briefing on the attacks that worked, the defences that failed, and the strategies you need to implement before 2026’s threats arrive.

What we’ll cover:

  • Walk through the anatomy of a 2025 attack on a major UK business.

  • Revisit our scarily good deepfake demo that will make you rethink identity verification.

  • Unpack the official advice from NCSC.GOV.UK, and how to apply it to your business.

  • How to counter the new wave of AI-powered attacks set to exploit your insecure AI adoption.

The sophisticated attacks of 2025 exploited trust, identity, and the expanding complexity of AI-enabled environments.

Join us for straight talk on identity-driven security, the AI revolution in both attack and defence, and the practical steps that separate protected organisations from compromised ones.

Butterfly overlay image
Anna Webb profile headshot

Presenter

Anna Webb

Head of Global Security Operations, Kocho

Anna has over 20 years’ experience in operations management, major incident management, and cyber security. CISSP qualified, Anna is officially a Security Changemaker (Microsoft Security Excellence Awards).

Presenter

Jack Fisher

Threat Detection Engineer, Kocho

Jack is passionate about offensive and defensive security. His background in the IT industry ranges from roles across network engineering and cyber security, which has given him an excellent foothold in the cyber security sector.