The Network Group UK Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings & quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 6th October 2025
08:30 - 09:00

Arrival, Registration & Breakfast Networking

09:00 - 09:10

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.

Mark Hall, Global CISO, Ontex & Chair, UK Government AI & Technology Board

09:10 - 09:40

Assessing & Enhancing Security Maturity: Strategies for a Stronger Defence

  • Implementing a cyber security maturity framework to assess areas for improvement
  • Securing board support in prioritising security improvements to raise organisational maturity level
  • Adopting automation controls to achieve higher reliability & faster response time

Lee Whatford, CISO, Bettys & Taylors of Harrogate

09:40 - 10:10

Security as a Business Enabler: Rethinking Risk Alignment

  • Looking beyond compliance & positioning security as a value driver
  • Identifying & prioritizing risks that directly impact business outcomes
  • Supporting operational efficiency by enabling secure digital transformation

Stephen Keslake, Director Cyber Security Assurance, Bank of England

10:10 - 10:40

Panel Discussion: Proven Methods to Achieve & Maintain Operational Resilience

  • Building a resilient cyber framework & ensuring continuous improvement through regular auditing
  • Leveraging threat intelligence & automation to detect & mitigate risks before they escalate
  • Implementing robust risk management, incident response & business continuity strategies to withstand threats

Stephen McPhail, CISO, Arnold Clark
Prakhar Chandra, Head of Cyber Security, NHS England
Jia Fu, Head of Cyber Security, British Film Institute

10:40 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

 

 

Hosted by Recorded Future

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

 

 

Hosted by ManageEngine by Zoho

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

 

 

Hosted by Illumio

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Agentic Security
13:05 - 14:00

Networking Lunch

Stream 1 - Future-Proofing Security
14:00 - 14:35

Emerging Technology: Threat Detection, Investigation & Response Platform Architecture

  • Assessing areas of the business that require enhanced security measures
  • Identifying useful technologies in a saturated market
  • Solution agnostic high-level design for the technology of the future of the SOC

Harry McLaren, Head of Cyber Security Engineering, Tesco

Stream 2 - External Threat
14:00 - 14:35

Malware in 2025: Tactics, Trends & Countermeasures

  • Analysing the latest malware variants, including fileless malware & APTs
  • Exploring evolving attack tactics & techniques
  • Outlining effective countermeasures & defence strategies such as zero-trust security models
Stream 1 - Future-Proofing Security
14:35 - 15:10

Crafting Incident Response Plans to Build Resiliency

  • Developing comprehensive response plans to mitigate the impact of cyber incidents
  • Integrating cross-functional collaboration to ensure a coordinated & efficient response during a crisis
  • Testing, updating & refining plans as threats evolve

Michelle Grist, Head of Information Security & Resilience, Unite Students

Stream 2 - External Threat
14:35 - 15:10

Double Edged Sword? Leveraging AI to Protect from AI

  • Understanding the risks of AI-powered threats including phishing, deepfakes & malware
  • Exploring how AI can enhance threat detection & automated response
  • Addressing the ethical & practical challenges of AI in cyber security

Enis Sahin, Global Head of Security Architecture, Federated Hermes

15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4


Hosted by XM Cyber

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

 

 

Hosted by CrowdStrike

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Agentic Security
17:05 - 17:50

Panel Discussion: The Importance of Integrating Information Security with Business Strategy

  • Exploring how integrating information security & business strategy ensures that security initiatives drive long-term success
  • Enhancing risk management & decision-making by adopting a unified approach across the business
  • Improving business agility with an integrated approach, allowing a faster response to changing threats

Goher Mohammad, Group Head of Information Security, L&Q
Adam Saunders, Head of Information Security, Mace
Steve Davies, Head of Cyber Security, DLA Piper
Andrew Cooke, Group Head of Information Security, Acacium Group

19:00
NETWORKING DINNER & DRINKS RECEPTION
Tuesday 7th October 2025
08:30 - 09:00

Morning Registration & Breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.

Roundtable 1: Generative AI

Rebecca Herity, CISO, Trainline

Roundtable 2: Application Security
Roundtable 3: Incident Response
Roundtable 4: Vulnerability Management

Asadur Rahman, CISO, Alpha Group

Roundtable 5: Endpoint Security
Roundtable 6: Supply Chain Security
Roundtable 7: SIEM Systems
Roundtable 8: Nation-State Cyber Attacks
10:10 - 10:45

Roundtable Wrap-Up

Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

 

 

Hosted by Minimus

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Hosted by BlueFort Security

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

Hosted by Abnormal Security

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Agentic Security
13:05 - 14:00

Networking Lunch

Stream 1 - Security Strategy
14:00 - 14:35

Building a Proactive Third-Party Risk Strategy

  • Understanding the evolving threat landscape
  • Exploring best practice frameworks for assessing & mitigating risks across supply chains
  • Constructing a resilient third-party risk management program that aligns with business objectives

Mark LoGalbo, VP Information Security, Fanatics

Stream 2 - Security Maturity
14:00 - 14:35

Fireside Chat: Indexing & Assessing Security Maturity through Governance Frameworks

  • Exploring the benefits of benchmarking maturity
  • Lessons learned from a real-world implementation of NIST guidelines
  • Integrating maturity metrics into board level reporting

Henrik Kiertzner, Head of Cyber Security Operations & Infrastructure, National Trust

Stream 1 - Security Strategy
14:35 - 15:10

First Steps to Resilience: Building Strategy in the Absence of Cyber Foundations

  • Establishing early priorities & securing executive buy-in
  • Raising security awareness & best practice throughout your organisation
  • Crafting a phased, scalable roadmap aligned with business goals & resource constraints

Elizabeth Hankins, Head of IT Security, Osborne Clarke

Stream 2 - Security Maturity
14:35 - 15:10

Zero Trust & Beyond: Enhancing Security with Access Management

  • Evaluating the benefits of implementing zero trust architecture to reduce security risks
  • Strengthening access control with multi-factor authentication
  • Strategies to secure hybrid environments with consistent access policies
15:10 - 15:55

Panel Discussion: Securing the Future with Cyber Security Recruitment & Retention

  • Strategies for sourcing cyber security talent in a competitive market
  • Championing the career development & training of top talent to support retention
  • Attracting diverse talent by creating inclusive hiring practices & fostering a positive working environment

Michelle Grist, Head of Information Security & Resilience, Unite Students
Rebecca Herity, CISO, Trainline
Arinder Badyal, Head of Information Security, Transport UK
Jig Patel, Cyber Advisory, UK Ministry of Defence
Fauzia Idrees, Deputy Director, Centre of Excellence Cyber Security Education, Royal Holloway, University of London

15:55 - 16:00
Closing remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

Berkshire, UK
6-7 October, 2025

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
6 Snow Hill
London
EC1A 2AY

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy