Kevin Lockhart is the Founder and CEO of Couno IT Solutions, a UK-based Managed Service Provider specialising in financial services and legal firms. With over 20 years of experience in IT.
Kevin has built a reputation for combining enterprise-grade cybersecurity with practical solutions tailored to ambitious SMBs. As an ethical hacker and cybersecurity strategist, Kevin has helped countless organisations identify vulnerabilities, strengthen defences, and build resilience against modern threats like ransomware, phishing, and AI-powered attacks. His mission is simple: to bring enterprise-level IT security and strategy to the SMB market, in a way that’s engaging, effective, and easy to understand.
Kevin is a regular speaker on cybersecurity and IT leadership, known for his engaging demos, practical insights, and a touch of humour that helps decision-makers see cyber risks in a whole new light.
it’s a business survival issue. In this opening, Kevin Lockhart will set the stage with the latest stats, stories, and threats that every IT decision-maker needs to know about. Expect a wake-up call that makes it clear: no business is “too small” or “too boring” to be a target.
This isn’t a doom-and-gloom lecture. Kevin brings a mix of real-world experience, humour, and practical advice that makes cybersecurity engaging and easy to understand. You’ll walk away already thinking differently about the risks facing your business.
but hackers see things differently. This session takes you inside the attacker’s mindset — how they identify targets, scan for weaknesses, and exploit the smallest crack in the armour.
You’ll see how simple information like staff emails, open ports, or weak passwords can be the keys to a full-scale breach. By understanding how hackers view your business, you’ll be better prepared to shut the doors before they even try.
Can a hacker really break into a business in five minutes? In this live demo, Kevin will show you just how quickly and easily it can happen. Using real ethical hacking tools, you’ll see how attackers bypass basic defences and get to the data that matters.
This isn’t theory — it’s practical, real, and a little scary. But most importantly, it will give you a new appreciation for why layered defences and modern protection are essential for every organisation.
but it’s also supercharging the bad guys. In this section, you’ll see how hackers are using AI to create deepfake videos, clone voices, and write phishing emails that are almost impossible to spot.
Kevin will share jaw-dropping examples that prove AI isn’t just a productivity tool — it’s a weapon in the wrong hands. You’ll learn how to prepare your staff to spot these new threats before they cause financial or reputational damage.
In this session, Kevin breaks down what a modern, layered cybersecurity stack looks like — without the jargon or vendor spin. From MFA and endpoint detection to dark web monitoring and cyber awareness, you’ll see how all the pieces fit together.
The focus is on practical steps for SMBs: affordable, scalable solutions that protect your people and your data. Whether you’re in legal, finance, or professional services, you’ll leave knowing exactly what good cyber hygiene should look like in 2025.
and this is your chance to get answers tailored to your business. Kevin will take live questions, cutting through the confusion and giving practical, no-nonsense advice.
It’s also an opportunity to dig deeper into any of the demos or case studies you’ve just seen. Whether you’re curious about AI threats, ransomware resilience, or where to start with Cyber Essentials, this is your chance to get straight answers from an ethical hacker.
Very likely. Hackers don’t go after size — they go after opportunity. Automated tools scan the internet constantly, looking for weak passwords, unpatched systems, or exposed email addresses. Small firms are hit just as often as large ones, but usually with fewer resources to respond.
Email. Over 80% of breaches start with phishing. Whether it’s a fake invoice, a spoofed CEO email, or a malicious attachment, one click can hand over your credentials. That’s why layered email security, phishing training, and MFA are non-negotiable.
Cyber Essentials is a great baseline, but it’s just the start. Think of it like locking your front door — useful, but it won’t stop someone determined. Attackers today use AI-driven scams, deepfakes, and ransomware tactics that require more advanced layers of protection.
It’s not hype. AI has lowered the barrier for attackers. Tools exist right now that can generate convincing phishing emails, clone voices, or create fake videos in minutes. That means even unsophisticated criminals can launch sophisticated attacks.
Enable MFA on every critical system — email, remote access, and finance apps. It blocks most credential theft attacks and takes minutes to set up. Combine that with regular backup tests and you’re already way ahead of the curve.
It’s about layers, not silver bullets. At a minimum: MFA, endpoint detection and response, advanced email security, backup with regular testing, dark web monitoring, and user awareness training. That’s how you build resilience without enterprise-level budgets.
19 Station Road
Southend-on-Sea
Essex SS13JY
Copyright © 2025 Couno.