Arrival, registration & breakfast networking
Introduction from The Network Group & chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Beyond Prevention: Building True Cyber Resilience Within your Organisation
- Understanding resilience & incident response readiness—Importance of cyber resilience over pure prevention
- Crisis management & a look at some of the most effective communication strategies
- The importance of continuous testing through red-teaming and simulations
Data Privacy as a Trust Imperative in Financial Services
- With customer expectations rising, why data protection is now a brand differentiator
- Regulatory Penalties: Mishandling sensitive data leads to costly fines and reputational damage.
- Privacy by Design: Embedding privacy into products and services builds lasting trust
Jialiang Zhang, Director, Privacy Engineering, Mastercard
Panel Discussion: The State of Cybersecurity in Financial Services in 2026 & Beyond — Managing AI-Driven Threats, Geopolitical Risk, & Enterprise Resilience
- Insights from the panel on the evolving threat landscape targeting banks, insurers, and financial institutions
- A look at escalating geopolitical risks and cyber warfare as threats to systemic financial stability
- Preparing your organisation for the next decade of cyber risk!
Andrew Brant, Head of IT & Security Operations, Weatherbys Bank
Anton Yunussov, Head of Cyber Security, Forvis Mazars
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- SOC
- Zero Trust
AI in Security: Friend, Foe, or Frenemy?
- Why smarter detection equals a faster response
- Deepfakes and adversarial AI — the dark side!
- Governance is the new gold standard
Christian D’Amico, Head of Information Security, American Express Global Business Travel
What CISO’s Should Understand, and Usually Don’t, About Cyber Insurance
- What factors go into pricing insurance? And what can you insure for?
- What role can CISOs can play in controlling business’ cyber insurance premiums?
- How does a CISO help its business position itself to take advantage of cyber insurance?
- What happens when something happens. How are cyber insurance claims handled?
Michael Colao, Global Chief Underwriting Officer – Direct & Indirect Cyber Risks, AXA XL
The Human Firewall: Turning Insider Risk into Insider Strength
- A look at why your employees are both the weakest link and strongest defence
- Monitoring privileged access without eroding trust
- Tips on embedding security culture through training and awareness
Andrew Brant, Head of IT & Security Operations, Weatherbys Bank
Implementing Blockchain Application Security Tools to Strengthen Organisation-Wide Defences
- Engaging with senior leaders to secure resources to invest in blockchain applications
- Key advice on selecting applications that meet organisational security needs
- Training staff to incorporate blockchain applications into working processes
Anoop Vayalil, Global Head of Payments Risk, BNP Paribas
Coffee break & networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- SOC
- Zero Trust
Panel Discussion: Cyber Geopolitics: Nation-State Threats to Financial Stability in the UK in 2026 and Beyond
- Analysing the potential state sponsored attacks targeting financial stability & how to counter them
- A look at the cyber warfare spillover into banking systems
- Tips on implementing a coordinated defence with government & industry partners
Morning registration & breakfast
Chairperson’s opening remarks
Roundtable discussions
Join group roundtable discussions with your peers on some of the most challenging & significant security topics—please confirm attendance prior to the session. Each host will facilitate the discussion & deliver a short roundup of key findings during the wrap up session.
Anthony Faucher, Head of Enterprise Architecture – Infrastructure Security, Aviva
Clare Reynolds, Senior Counsel, Taylor Wessing
Roundtable discussion wrap-up
Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain an perspective from each roundtable discussion.
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- SOC
- Zero Trust
Networking Lunch
Compliance Chaos: Changing Regulation into Resilience!
- Evolving compliance frameworks (GDPR, DORA, SEC rules) – What do you need to be aware of
- Cross-border data privacy complexities & how to navigate them effectively
- Building agile compliance programmes that adapt quickly
Digital Transformation in Financial Services: Securing Innovation at the Speed of Change
- Tailoring innovation strategies to outpace defence challenges
- Key tips on balancing opportunities for agility with risk management policies
- Selecting security systems to establish continuous monitoring and ensure transformation strengthens resilience
Kiran Shah, Head of Infrastructure & IT Operations, Edenred
Third-Party Risk: Securing the Financial Supply Chain
- Vendors as Weak Links: Why outsourced services can introduce systemic vulnerabilities
- Continuous Monitoring: Why an ongoing assessment of partner security posture is essential
- Accountability Contracts: Understanding why regulatory & contractual obligations demand stronger oversight
Steve McGowan, CISO, Allpay
Why Zero Trust Has to be a Business Imperative for Financial Institutions
- Moving from perimeter-based security to continuous verification
- Implementing Zero Trust across legacy and cloud environments
- Measuring Zero Trust maturity and business outcomes
Panel Discussion: Implementing Leadership Approaches to Strengthen Cyber Security Teams
- The role of senior leaders in fostering collaborative working environments & increasing team productivity
- Developing individual progression plans to support staff achieve their professional goals
- Implementing tailored interventions to support staff improve their workload management
Anthony Ayanleke, Head of IT Security, MUFG Securities
Amrit Pal Chopra, Head of IT Resilience, AXA XL








