Jamf at Infosecurity Europe 2026

Join our security experts at ExCel London, 2–4 June 2026 | Stand E120

Register Here

Someone just cloned your colleague's voice using six minutes of audio from a public podcast. They have already called the helpdesk. Your MFA did not stop them.

AI has not just changed the threat landscape. It has handed attackers a toolkit your current security training was never designed to deal with. Mobile devices are at the centre of it and the gap between what is possible and what most organisations are protected against is widening fast.

We are back at Infosecurity Europe this year and we would love to see you. Visit our experts at stand E120, near the AI & Cloud Security Theatre, to discuss AI-powered threats and the broader security challenges keeping your team up at night. Get hands-on at the stand and find out how Jamf helps organisations manage and secure Apple at work with an experience end users love and IT teams trust.

Play Tech Trek and win

Think you know your security? Put it to the test at the Jamf stand.

Tech Trek is our take on a classic quiz format; ten questions on Jamf and cybersecurity, ranging from the straightforward to the seriously tricky. Answer them all correctly and you will walk away with some well-earned swag.

Tech Trek logo.

How it works:

  • Take your position at the plinth and face the screen
  • You have got 30 seconds per question - no pressure
  • Stuck? You have got two lifelines:
    • 50/50: cuts the options down to two
    • Ask a Jamf Expert: ask a Jamf friend at the stand (they might know the answer)
  • Get through all ten and choose your prize from the available swag, while stocks last

And if all that thinking makes you peckish, swing by our sweet dispenser for a little reward along the way.

Session: The Voice in Your Pocket: How AI Voice Cloning is Rewriting the Rules of Enterprise Security 

Resilience & Cyber Risk Stage | Wednesday, 3 June 2026 | 13:30–14:00

AI voice cloning has changed the game for social engineering. Attackers can now replicate a colleague's voice from just minutes of public audio and use it to bypass helpdesk verification, harvest credentials and defeat MFA in under 60 seconds.

Join Adam Boynton, Senior Enterprise Strategy Manager, EMEIA at Jamf, for a session that gets straight to the point. Adam will examine why mobile devices sit at the centre of this threat, what the latest research from Google, Verizon, NCC Group and Jamf tells us and what layered defences actually work in practice. The session includes a live demonstration of an AI voice cloning attack.

You will leave knowing exactly why you can't train your way out of this and what to do instead.

What you will take away:

  • A first-hand look at how an AI voice cloning attack bypasses traditional security controls

  • Why mobile devices are the primary target in today's most sophisticated exploit chains

  • A practical three-layer defence framework you can apply to your mobile fleet straight away

  • What the NCSC, NCC Group and CISA recommend for hardening helpdesk verification

  • Why security awareness training alone cannot address this class of threat and what technical controls fill the gap

20 minutes. Your fleet. Real answers.

Book a live demo at Infosecurity Europe

Meet Jamf at the Infosecurity Europe event for a hands-on walkthrough of endpoint security for Mac and mobile. See real-time compliance monitoring, mobile threat detection, and conditional access enforcement across your full Apple or Mobile fleet in action.

Reserve Your Time Slot

Get to know us – online discovery call

Book a 1:1 session to review your fleet, pinpoint security or compliance gaps across Mac and mobile, or learn about Jamf's solutions.

Book a Call

Ready, set, go!