Arrival, Registration & Breakfast Networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Mark Hall, Global CISO, Ontex & Chair, UK Government AI & Technology Board
Assessing & Enhancing Security Maturity: Strategies for a Stronger Defence
- Implementing a cyber security maturity framework to assess areas for improvement
- Securing board support in prioritising security improvements to raise organisational maturity level
- Adopting automation controls to achieve higher reliability & faster response time
Lee Whatford, CISO, Bettys & Taylors of Harrogate
Security as a Business Enabler: Rethinking Risk Alignment
- Looking beyond compliance & positioning security as a value driver
- Identifying & prioritizing risks that directly impact business outcomes
- Supporting operational efficiency by enabling secure digital transformation
Stephen Keslake, Director Cyber Security Assurance, Bank of England
Panel Discussion: Proven Methods to Achieve & Maintain Operational Resilience
- Building a resilient cyber framework & ensuring continuous improvement through regular auditing
- Leveraging threat intelligence & automation to detect & mitigate risks before they escalate
- Implementing robust risk management, incident response & business continuity strategies to withstand threats
Stephen McPhail, CISO, Arnold Clark
Prakhar Chandra, Head of Cyber Security, NHS England
Jia Fu, CISO, British Film Institute
Coffee Break & Networking
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
Networking Lunch
Emerging Technology: Threat Detection & Incident Response Platform Architecture
- Assessing areas of the business that require enhanced security measures
- Identifying useful technologies in a saturated market
- Solution agnostic high-level design for the technology of the future of the SOC
Harry McLaren, Head of Cyber Security Engineering, Tesco
Malware in 2025: Tactics, Trends & Countermeasures
- Analysing the latest malware variants, including fileless malware & APTs
- Exploring evolving attack tactics & techniques
- Outlining effective countermeasures & defence strategies such as zero-trust security models
Crafting Incident Response Plans to Build Resiliency
- Developing comprehensive response plans to mitigate the impact of cyber incidents
- Integrating cross-functional collaboration to ensure a coordinated & efficient response during a crisis
- Testing, updating & refining plans as threats evolve
Michelle Grist, Head of Information Security & Resilience, Unite Students
Double Edged Sword? Leveraging AI to Protect from AI
- Understanding the risks of AI-powered threats including phishing, deepfakes & malware
- Exploring how AI can enhance threat detection & automated response
- Addressing the ethical & practical challenges of AI in cyber security
Coffee Break & Networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
Panel Discussion: The Importance of Integrating Information Security with Business Strategy
- Exploring how integrating information security & business strategy ensures that security initiatives drive long-term success
- Enhancing risk management & decision-making by adopting a unified approach across the business
- Improving business agility with an integrated approach, allowing a faster response to changing threats
Goher Mohammad, Group Head of Information Security, L&Q
Morning Registration & Breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.
Rebecca Herity, CISO, Trainline
Asadur Rahman, CISO, Alpha Group
Roundtable Wrap-Up
Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.
Coffee Break & Networking
Workshop 7
Monitoring Emerging Privacy Threats
Workshop 8
Managing Third Party Risks
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
Networking Lunch
Building a Proactive Third-Party Risk Strategy
- Understanding the evolving threat landscape
- Exploring best practice frameworks for assessing & mitigating risks across supply chains
- Constructing a resilient third-party risk management program that aligns with business objectives
Mark LoGalbo, VP Information Security, Fanatics
Fireside Chat: Indexing & Assessing Security Maturity through Governance Frameworks
- Exploring the benefits of benchmarking maturity
- Lessons learned from a real-world implementation of NIST guidelines
- Integrating maturity metrics into board level reporting
Henrik Kiertzner, Head of Cyber Security Operations & Infrastructure, National Trust
Angela Evans, Information Security Manager, National Trust
First Steps to Resilience: Building Strategy in the Absence of Cyber Foundations
- Establishing early priorities & securing executive buy-in
- Raising security awareness & best practice throughout your organisation
- Crafting a phased, scalable roadmap aligned with business goals & resource constraints
Elizabeth Hankins, Head of IT Security, Osborne Clarke
Zero Trust & Beyond: Enhancing Security with Access Management
- Evaluating the benefits of implementing zero trust architecture to reduce security risks
- Strengthening access control with multi-factor authentication
- Strategies to secure hybrid environments with consistent access policies
Panel Discussion: Securing the Future with Cyber Security Recruitment & Retention
- Strategies for sourcing cyber security talent in a competitive market
- Championing the career development & training of top talent to support retention
- Attracting diverse talent by creating inclusive hiring practices & fostering a positive working environment
Michelle Grist, Head of Information Security & Resilience, Unite Students
Rebecca Herity, CISO, Trainline
Arinder Badyal, Head of Information Security, Transport UK