Arrival, Registration & Breakfast Networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Joseph Ross, Chief Technology & Finance Officer, The Cyber Resilience Centre for the South West
Emerging Technology: Threat Detection, Investigation & Response Platform Architecture
- Assessing areas of the business that require enhanced security measures
- Identifying useful technologies in a saturated market
- Solution agnostic high-level design for the technology of the future of the SOC
Harry McLaren, Head of Cyber Defence, Tesco
Panel Discussion: Proven Methods to Achieve & Maintain Operational Resilience
- Building a resilient cyber framework & ensuring continuous improvement through regular auditing
- Leveraging threat intelligence & automation to detect & mitigate risks before they escalate
- Implementing robust risk management, incident response & business continuity strategies to withstand threats
Stephen McPhail, Head of Cyber Security, Arnold Clark
Jia Fu, Head of Cyber Security, British Film Institute
Jig Patel, Cyber Advisory, UK Ministry of Defence
Andrew Brant, Head of IT & Security Operations, Weatherbys Bank
Joseph Ross, Chief Technology & Finance Officer, The Cyber Resilience Centre for the South West
Coffee Break & Networking
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Agentic Security
Double Edged Sword? Leveraging AI to Protect from AI
- Understanding the risks of AI-powered threats including phishing, deepfakes & malware
- Exploring how AI can enhance threat detection & automated response
- Addressing the ethical & practical challenges of AI in cyber security
Enis Sahin, Global Head of Security Architecture, Federated Hermes
Zero Trust in 2025: Beyond the Buzzword
- Unpacking what zero trust really means in 2025 & how it has evolved
- Implementing lessons learned from large-scale rollouts
- Considering how a mature zero trust posture enables resilience, agility & secure digital transformation
Richard Moore, CISO, 10X Banking
Crafting Incident Response Plans to Build Resiliency
- Developing comprehensive response plans to mitigate the impact of cyber incidents
- Integrating cross-functional collaboration to ensure a coordinated & efficient response during a crisis
- Testing, updating & refining plans as threats evolve
Michelle Grist, Head of Information Security & Resilience, Unite Students
Coffee Break & Networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Agentic Security
Panel Discussion: The Importance of Integrating Information Security with Business Strategy
- Exploring how integrating information security & business strategy ensures that security initiatives drive long-term success
- Enhancing risk management & decision-making by adopting a unified approach across the business
- Improving business agility with an integrated approach, allowing a faster response to changing threats
Adam Saunders, Head of Information Security, Mace
Andrew Cooke, Group Head of Information Security, Acacium Group
Kieron Prince, Head of Cloud, Infrastructure & Security Engineering, L&Q
Morning Registration & Breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.
Hosted by
Dal Bharath, Head of Digital Edge & Cyber Security, Lloyds Banking Group
Ali Jaffri, Head of IT Infrastructure & Cyber, Diabetes UK
Hosted by
Asadur Rahman, CISO, Alpha Group
Hosted by
Joseph Ross, Chief Technology & Finance Officer, The Cyber Resilience Centre for the South West
Hosted by
Andrew Cooke, Group Head of Information Security, Acacium Group
Hosted by
Laure Lydon, VP Security, Flo Health
Roundtable Wrap-Up
Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.
Coffee Break & Networking
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Agentic Security
Networking Lunch
Building a Proactive Third-Party Risk Strategy
- Understanding the evolving threat landscape
- Exploring best practice frameworks for assessing & mitigating risks across supply chains
- Constructing a resilient third-party risk management program that aligns with business objectives
Mark LoGalbo, VP Information Security, Fanatics
Fireside Chat: Indexing & Assessing Security Maturity through Governance Frameworks
- Exploring the benefits of benchmarking maturity
- Lessons learned from a real-world implementation of NIST guidelines
- Integrating maturity metrics into board level reporting
Henrik Kiertzner, Head of Cyber Security Operations & Infrastructure, National Trust
First Steps to Resilience: Building Strategy in the Absence of Cyber Foundations
- Establishing early priorities & securing executive buy-in
- Raising security awareness & best practice throughout your organisation
- Crafting a phased, scalable roadmap aligned with business goals & resource constraints
Elizabeth Hankins, Head of IT Security, Osborne Clarke
From Smart to Safe: Security First AI Strategy
- Exploring the unique risks AI systems face & why traditional security models fall short
- Understanding how to integrate security across the AI lifecycle
- Operationalising AI security in real-world environments
Laure Lydon, VP Security, Flo Health
Panel Discussion: Securing the Future with Cyber Security Recruitment & Retention
- Strategies for sourcing cyber security talent in a competitive market
- Championing the career development & training of top talent to support retention
- Attracting diverse talent by creating inclusive hiring practices & fostering a positive working environment
Michelle Grist, Head of Information Security & Resilience, Unite Students
Jig Patel, Cyber Advisory, UK Ministry of Defence
Fauzia Idrees, Deputy Director, Centre of Excellence Cyber Security Education, Royal Holloway, University of London
Dave McClennon, Head of Threat Informed Offense, WTW