The Network Group UK Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings & quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 6th October 2025
08:30 - 09:15

Arrival, Registration & Breakfast Networking

09:15 - 09:30

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.

Joseph Ross, Chief Technology & Finance Officer, The Cyber Resilience Centre for the South West

09:30 - 10:00

Emerging Technology: Threat Detection, Investigation & Response Platform Architecture

  • Assessing areas of the business that require enhanced security measures
  • Identifying useful technologies in a saturated market
  • Solution agnostic high-level design for the technology of the future of the SOC

Harry McLaren, Head of Cyber Defence, Tesco

10:00 - 10:50

Panel Discussion: Proven Methods to Achieve & Maintain Operational Resilience

  • Building a resilient cyber framework & ensuring continuous improvement through regular auditing
  • Leveraging threat intelligence & automation to detect & mitigate risks before they escalate
  • Implementing robust risk management, incident response & business continuity strategies to withstand threats

Stephen McPhail, Head of Cyber Security, Arnold Clark
Jia Fu, Head of Cyber Security, British Film Institute
Jig Patel, Cyber Advisory, UK Ministry of Defence
Andrew Brant, Head of IT & Security Operations, Weatherbys Bank
Joseph Ross, Chief Technology & Finance Officer, The Cyber Resilience Centre for the South West

10:50 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

Shifting through the noise: How threat intel can help with proactive mitigation

 

Lance Moraitis-Jones, Senior Presales Engineer, Recorded Future

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

Future-Proofing Cybersecurity: AI’s Impact on Identity Security

Jay Reddy, Head of Growth & Senior Technical Evangelist, ManageEngine by Zoho

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

Harnessing the OODA Loop: Elevating Cyber Defence with Illumio Insights

Andres Yeates, Senior Pre Sales Engineer, Illumio

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Agentic Security
13:05 - 14:00

Networking Lunch hosted by ManageEngine by Zoho

Stream 1 - Future-Proofing Security
14:00 - 14:35

Double Edged Sword? Leveraging AI to Protect from AI

  • Understanding the risks of AI-powered threats including phishing, deepfakes & malware
  • Exploring how AI can enhance threat detection & automated response
  • Addressing the ethical & practical challenges of AI in cyber security

Enis Sahin, Global Head of Security Architecture, Federated Hermes

Stream 2 - Internal Threat
14:00 - 14:35

Zero Trust in 2025: Beyond the Buzzword

  • Unpacking what zero trust really means in 2025 & how it has evolved
  • Implementing lessons learned from large-scale rollouts
  • Considering how a mature zero trust posture enables resilience, agility & secure digital transformation

Richard Moore, CISO, 10X Banking

14:35-15:10

Crafting Incident Response Plans to Build Resiliency

  • Developing comprehensive response plans to mitigate the impact of cyber incidents
  • Integrating cross-functional collaboration to ensure a coordinated & efficient response during a crisis
  • Testing, updating & refining plans as threats evolve

Michelle Grist, Head of Information Security & Resilience, Unite Students

15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

Cloud Transformation – Don’t get caught CNAPPing!

Matthew Quinn, Director Sales Engineering – Northern Europe, XM Cyber

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

Threat Briefing: Inside the CrowdStrike 2025 Threat Hunt Report 

 

Sam Thompson, Sales Engineer, CrowdStrike

 

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Agentic Security
17:05 - 17:50

Panel Discussion: The Importance of Integrating Information Security with Business Strategy

  • Exploring how integrating information security & business strategy ensures that security initiatives drive long-term success
  • Enhancing risk management & decision-making by adopting a unified approach across the business
  • Improving business agility with an integrated approach, allowing a faster response to changing threats

Adam Saunders, Head of Information Security, Mace
Andrew Cooke, Group Head of Information Security, Acacium Group
Kieron Prince, Head of Cloud, Infrastructure & Security Engineering, L&Q

19:00
NETWORKING DINNER & DRINKS RECEPTION HOSTED BY ManageEngine by Zoho
Tuesday 7th October 2025
08:30 - 09:00

Morning Registration & Breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.

Roundtable 1: Generative AI

Hosted by

Dal Bharath, Head of Digital Edge & Cyber Security, Lloyds Banking Group
Ali Jaffri, Head of IT Infrastructure & Cyber, Diabetes UK

Roundtable 2: Governance & Compliance

Hosted by

Securing DNS: NIST’s DNS Security best practices & the role of DNS in compliance mandates (NIS2)

Craig Sanderson, VP Governance & Compliance, Infoblox

Roundtable 3: Aggressive Defence

Hosted by

Mike Sims, VP IAM R&D, Cyderes
Josh Randle, Solution Architect, Cyderes

Roundtable 4: Vulnerability Management

Hosted by

Asadur Rahman, CISO, Alpha Group

Roundtable 5: Shadow AI

Hosted by

Joseph Ross, Chief Technology & Finance Officer, The Cyber Resilience Centre for the South West

Roundtable 6: Supply Chain Security

Hosted by

Andrew Cooke, Group Head of Information Security, Acacium Group

Roundtable 7: Navigating Compliance

Hosted by

Nick Jackson, Director of Cyber Operations, Bitdefender

Roundtable 8: Cyber Resilience Act

Hosted by

Laure Lydon, VP Security, Flo Health

10:10 - 10:45

Roundtable Wrap-Up

Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

Getting off the CVE Treadmill – Proactively Reducing Risk in Cloud
Environments

Ashley Ward, Principal Solutions Architect, Minimus

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Vulnerability Management in the World of AI

Laurie Mercer, CTO, HackerOne
Josh Neame, CTO, BlueFort Security

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

The AI Arms Race: Good AI vs Bad AI

Mike Morton, Sales Engineering Manager, Abnormal AI

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Agentic Security
13:05 - 14:00

Networking Lunch

Stream 1 - Security Strategy
14:00 - 14:35

Building a Proactive Third-Party Risk Strategy

  • Understanding the evolving threat landscape
  • Exploring best practice frameworks for assessing & mitigating risks across supply chains
  • Constructing a resilient third-party risk management program that aligns with business objectives

Mark LoGalbo, VP Information Security, Fanatics

Stream 2 - Security Maturity
14:00 - 14:35

Fireside Chat: Indexing & Assessing Security Maturity through Governance Frameworks

  • Exploring the benefits of benchmarking maturity
  • Lessons learned from a real-world implementation of NIST guidelines
  • Integrating maturity metrics into board level reporting

Henrik Kiertzner, Head of Cyber Security Operations & Infrastructure, National Trust

Stream 1 - Security Strategy
14:35 - 15:10

First Steps to Resilience: Building Strategy in the Absence of Cyber Foundations

  • Establishing early priorities & securing executive buy-in
  • Raising security awareness & best practice throughout your organisation
  • Crafting a phased, scalable roadmap aligned with business goals & resource constraints

Elizabeth Hankins, Head of IT Security, Osborne Clarke

Stream 2 - Digital Security
14:35 - 15:10

From Smart to Safe: Security First AI Strategy

  • Exploring the unique risks AI systems face & why traditional security models fall short
  • Understanding how to integrate security across the AI lifecycle
  • Operationalising AI security in real-world environments

Laure Lydon, VP Security, Flo Health

15:10 - 15:55

Panel Discussion: Securing the Future with Cyber Security Recruitment & Retention

  • Strategies for sourcing cyber security talent in a competitive market
  • Championing the career development & training of top talent to support retention
  • Attracting diverse talent by creating inclusive hiring practices & fostering a positive working environment

Michelle Grist, Head of Information Security & Resilience, Unite Students
Jig Patel, Cyber Advisory, UK Ministry of Defence
Fauzia Idrees, Deputy Director, Centre of Excellence Cyber Security Education, Royal Holloway, University of London
Dave McClennon, Head of Threat Informed Offense, WTW

15:55 - 16:00
Closing remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

Berkshire, UK
5-6 October, 2026

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
51 Moorgate
London
EC2R 6LL

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy