Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
DSI Ian Kirby, CEO, National Cyber Resilience Centre Group
Embedding a Holistic Approach to Cyber Security to Answer Regulatory Compliance
- Embedding recommendations from the National Cyber Security Strategy: progress update
- Guidance on securing resources to expand the capabilities of cyber security policies and measures
- Regular reports of security event information to monitor emerging patterns in the cyber threat landscape
Glen Hymers, CISO, Cabinet Office
Fireside Chat: Aligning Information Security Strategies with Business Objectives
- Collaborating with other departments to raise awareness of potential security threats and embed organisation-wide cyber security processes
- Incorporating security requirements into procurement processes to strengthen the cyber resilience of supply chains
- Key advice on demonstrating ROI for security resources to board members
Anaïs Beaucousin, Chief Business Security Officer, ADP
Coffee break & networking
Open Forum Think Tank
Ransomware
DSI Ian Kirby, CEO, National Cyber Resilience Centre Group
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- SIEM
- SOC as a Service
- Data Security
- AI Security
- Network Security
- Ransomware
Networking Lunch
AppSec and AI: On the Brink of a Game-Changing Breakthrough
- Current AI applications in AppSec
- How AI could revolutionise threat modelling and the potential key players in this field
- Limitations and adoption challenges
Petra Vukmirovic, Director of Cyber Security, Jobandtalent
The Changing Landscape of Working in Cyber: From Analysts to the C-Suite
- Developing joined-up responses to safely report potential threats and avoid escalation to becoming major incidents
- Adapting staff training to tackle increasingly sophisticated security threats, including spearfishing emails
- Guidance on integrating cyber security into wider business strategies
Tamlynn Deacon, Director – Cloud, Service & Cyber, Digital, HBK
Implementing Multi-Layered Response Plans to Mitigate the Impact of Cyber Attacks
- How you can adopt a multi-layered, holistic approach that will help you identify threats
- Why you need to go beyond mere technology to include people and processes as part of your security strategy
- How operations should be helped to understand the reasons for governance, risk & compliance
Liam O’Reilly, Group Head of IT Security & Governance, Emeria
Coffee break & networking
Open Forum Think Tank
Vulnerability Management
DSI Ian Kirby, CEO, National Cyber Resilience Centre Group
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- SIEM
- SOC as a Service
- Data Security
- AI Security
- Network Security
- Ransomware
Panel: Tackling Recruitment Challenges in Cyber Security to Broaden Workforce Abilities
- Designing recruitment initiatives to widen workforce skills & diversity
- Widening flexible working opportunities to attract a broader range of applicants & build a more diverse workforce
- Developing individualised onboarding experiences for all employees to improve staff retention rates & create inclusive workplaces
Julie Osborne, VP, WiCyS UKI and Director – Security Control Frameworks, Barclays
Jack Sharpe, Deputy CISO & CIO, UK Ministry of Defence
Steven Furnell, Professor of Cyber Security, University of Nottingham
Petra Vukmirovic, Director of Cyber Security, Jobandtalent
Chairperson’s closing remarks
A reflection on today’s discussions, & thank you to our audience & speakers.
Morning registration & breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.
Valerie Ezinmo, CISO UK & Ireland, L’Oréal
Kam Karaji, Global Head of Information Security, Bibby Financial Services
Jason O’Hare, Northern Europe CISO, L’Oreal
Goher Mohammad, Group Head of Information Security, L&Q
George Andrikopolous, Senior VP – Low Latency Container Security, Citi
Dr Aaron Gracey, Head of Emergency Management & Operational Security, Network Rail
Julie Osborne, VP, WiCyS UKI and Director – Security Control Frameworks, Barclays
David Horn, Managing Director, Global Operations & Technology Audit, BNY
DSI Ian Kirby, CEO, National Cyber Resilience Centre Group
Chris Samuels, ISO, McLaren Construction Group
Roundtable wrap-up by the chairperson
Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.
Coffee break & networking
Open Forum Think Tank
Cloud Security
DSI Ian Kirby, CEO, National Cyber Resilience Centre Group
Open Forum Think Tank
Top Threats & Attacker Trends
DSI Ian Kirby, CEO, National Cyber Resilience Centre Group
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- SIEM
- SOC as a Service
- Data Security
- AI Security
- Network Security
- Ransomware
Networking lunch
Implementing Multi-Factor Approaches to Enhancing Security Systems
- A look at the practical aspects of implementing multi-factor systems in order to address the common challenges organisations face
- Practical and actionable steps on how to implement multi-factor systems safely and effectively within your organisation
Ben Short, Director of Technology & Innovation, Blake Morgan
Viewing Cyber Risk through the Board’s Eyes
- What internal non-IT risks are you using as a benchmark to level-set cyber security risks and build your credibility?
- How can you get away from a binary and opaque view of cyber risk; how can you demonstrate progress when big cyber loss events are rare?
- How can you frame technical work to improve cyber risk in a way that lets non-IT board members effectively engage and challenge you on priorities?
Tom Whipp, Director of Technology Risk, BINS / BISL, Bupa
Utilising Security & Privacy Controls to Protect Application User Identity
- How privacy controls can help prevent unauthorised access to sensitive data and systems
- How security capabilities have matured to support the latest demands of digital transformation
- Utilising security & privacy measures to manage the risk of unauthorised access & data breaches
Laure Lydon, VP of Security, Flo Health
Panel: Embedding Security Governance Strategies to Uphold Accountability for Cyber Risk Decision-Making
- How data governance helps classify data based on sensitivity to inform security decisions
- Defining roles & responsibilities for all staff in reporting and addressing security threats to ensure organisation-wide accountability
- Utilising data governance policies to strengthen security incident response plans
Kam Karaji, Global Head of Information Security, Bibby Financial Services
Rob Lee, Head of Information Security, Cyber & Infrastructure, CH&CO