The Network Group UK Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings & quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 6th October 2025
08:30 - 09:00

Arrival, Registration & Breakfast Networking

09:00 - 09:10

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.

Mark Hall, Global CISO, Ontex & Chair, UK Government AI & Technology Board

09:10 - 09:40

Assessing & Enhancing Security Maturity: Strategies for a Stronger Defence

  • Implementing a cyber security maturity framework to assess areas for improvement
  • Securing board support in prioritising security improvements to raise organisational maturity level
  • Adopting automation controls to achieve higher reliability & faster response time

Lee Whatford, CISO, Bettys & Taylors of Harrogate

09:40 - 10:10

Security as a Business Enabler: Rethinking Risk Alignment

  • Looking beyond compliance & positioning security as a value driver
  • Identifying & prioritizing risks that directly impact business outcomes
  • Supporting operational efficiency by enabling secure digital transformation

Stephen Keslake, Director Cyber Security Assurance, Bank of England

10:10 - 10:40

Panel Discussion: Proven Methods to Achieve & Maintain Operational Resilience

  • Building a resilient cyber framework & ensuring continuous improvement through regular auditing
  • Leveraging threat intelligence & automation to detect & mitigate risks before they escalate
  • Implementing robust risk management, incident response & business continuity strategies to withstand threats

Stephen McPhail, CISO, Arnold Clark
Prakhar Chandra, Head of Cyber Security, NHS England
Jia Fu, CISO, British Film Institute

10:40 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

 

 

Hosted by Recorded Future

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

 

 

Hosted by ManageEngine by Zoho

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

 

 

Hosted by Illumio

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
13:05 - 14:00

Networking Lunch

Stream 1 - Future-Proofing Security
14:00 - 14:35

Emerging Technology: Threat Detection & Incident Response Platform Architecture

  • Assessing areas of the business that require enhanced security measures
  • Identifying useful technologies in a saturated market
  • Solution agnostic high-level design for the technology of the future of the SOC

Harry McLaren, Head of Cyber Security Engineering, Tesco

Stream 2 - External Threat
14:00 - 14:35

Malware in 2025: Tactics, Trends & Countermeasures

  • Analysing the latest malware variants, including fileless malware & APTs
  • Exploring evolving attack tactics & techniques
  • Outlining effective countermeasures & defence strategies such as zero-trust security models
Stream 1 - Future-Proofing Security
14:35 - 15:10

Crafting Incident Response Plans to Build Resiliency

  • Developing comprehensive response plans to mitigate the impact of cyber incidents
  • Integrating cross-functional collaboration to ensure a coordinated & efficient response during a crisis
  • Testing, updating & refining plans as threats evolve

Michelle Grist, Head of Information Security & Resilience, Unite Students

Stream 2 - External Threat
14:35 - 15:10

Double Edged Sword? Leveraging AI to Protect from AI

  • Understanding the risks of AI-powered threats including phishing, deepfakes & malware
  • Exploring how AI can enhance threat detection & automated response
  • Addressing the ethical & practical challenges of AI in cyber security
15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4


Hosted by XM Cyber

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

 

 

Hosted by CrowdStrike

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
17:05 - 17:50

Panel Discussion: The Importance of Integrating Information Security with Business Strategy

  • Exploring how integrating information security & business strategy ensures that security initiatives drive long-term success
  • Enhancing risk management & decision-making by adopting a unified approach across the business
  • Improving business agility with an integrated approach, allowing a faster response to changing threats

Goher Mohammad, Group Head of Information Security, L&Q

19:00
NETWORKING DINNER & DRINKS RECEPTION
Tuesday 7th October 2025
08:30 - 09:00

Morning Registration & Breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.

Roundtable 1: Generative AI

Rebecca Herity, CISO, Trainline

Roundtable 2: Application Security
Roundtable 3: Incident Response
Roundtable 4: Vulnerability Management

Asadur Rahman, CISO, Alpha Group

Roundtable 5: Endpoint Security
Roundtable 6: Supply Chain Security
Roundtable 7: SIEM Systems
Roundtable 8: Nation-State Cyber Attacks
10:10 - 10:45

Roundtable Wrap-Up

Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

 

 

Hosted by Minimus

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Monitoring Emerging Privacy Threats

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

Managing Third Party Risks

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
13:05 - 14:00

Networking Lunch

Stream 1 - Security Strategy
14:00 - 14:35

Building a Proactive Third-Party Risk Strategy

  • Understanding the evolving threat landscape
  • Exploring best practice frameworks for assessing & mitigating risks across supply chains
  • Constructing a resilient third-party risk management program that aligns with business objectives

Mark LoGalbo, VP Information Security, Fanatics

Stream 2 - Security Maturity
14:00 - 14:35

Fireside Chat: Indexing & Assessing Security Maturity through Governance Frameworks

  • Exploring the benefits of benchmarking maturity
  • Lessons learned from a real-world implementation of NIST guidelines
  • Integrating maturity metrics into board level reporting

Henrik Kiertzner, Head of Cyber Security Operations & Infrastructure, National Trust
Angela Evans, Information Security Manager, National Trust

Stream 1 - Security Strategy
14:35 - 15:10

First Steps to Resilience: Building Strategy in the Absence of Cyber Foundations

  • Establishing early priorities & securing executive buy-in
  • Raising security awareness & best practice throughout your organisation
  • Crafting a phased, scalable roadmap aligned with business goals & resource constraints

Elizabeth Hankins, Head of IT Security, Osborne Clarke

Stream 2 - Security Maturity
14:35 - 15:10

Zero Trust & Beyond: Enhancing Security with Access Management

  • Evaluating the benefits of implementing zero trust architecture to reduce security risks
  • Strengthening access control with multi-factor authentication
  • Strategies to secure hybrid environments with consistent access policies
15:10 - 15:55

Panel Discussion: Securing the Future with Cyber Security Recruitment & Retention

  • Strategies for sourcing cyber security talent in a competitive market
  • Championing the career development & training of top talent to support retention
  • Attracting diverse talent by creating inclusive hiring practices & fostering a positive working environment

Michelle Grist, Head of Information Security & Resilience, Unite Students
Rebecca Herity, CISO, Trainline
Arinder Badyal, Head of Information Security, Transport UK

15:55 - 16:00
Closing remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

Berkshire, UK
6-7 October, 2025

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
6 Snow Hill
London
EC1A 2AY

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy