Arrival, Registration & Breakfast Networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Mark Hall, Global CISO, Ontex & Chair, UK Government AI & Technology Board
Assessing & Enhancing Security Maturity: Strategies for a Stronger Defence
- Implementing a cyber security maturity framework to assess areas for improvement
- Securing board support in prioritising security improvements to raise organisational maturity level
- Adopting automation controls to achieve higher reliability & faster response time
Lee Whatford, CISO, Bettys & Taylors of Harrogate
Security as a Business Enabler: Rethinking Risk Alignment
- Looking beyond compliance & positioning security as a value driver
- Identifying & prioritizing risks that directly impact business outcomes
- Supporting operational efficiency by enabling secure digital transformation
Stephen Keslake, Director Cyber Security Assurance, Bank of England
Panel Discussion: Proven Methods to Achieve & Maintain Operational Resilience
- Building a resilient cyber framework & ensuring continuous improvement through regular auditing
- Leveraging threat intelligence & automation to detect & mitigate risks before they escalate
- Implementing robust risk management, incident response & business continuity strategies to withstand threats
Stephen McPhail, CISO, Arnold Clark
Prakhar Chandra, Head of Cyber Security, NHS England
Jia Fu, Head of Cyber Security, British Film Institute
Coffee Break & Networking
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Agentic Security
Networking Lunch
Emerging Technology: Threat Detection, Investigation & Response Platform Architecture
- Assessing areas of the business that require enhanced security measures
- Identifying useful technologies in a saturated market
- Solution agnostic high-level design for the technology of the future of the SOC
Harry McLaren, Head of Cyber Security Engineering, Tesco
Malware in 2025: Tactics, Trends & Countermeasures
- Analysing the latest malware variants, including fileless malware & APTs
- Exploring evolving attack tactics & techniques
- Outlining effective countermeasures & defence strategies such as zero-trust security models
Crafting Incident Response Plans to Build Resiliency
- Developing comprehensive response plans to mitigate the impact of cyber incidents
- Integrating cross-functional collaboration to ensure a coordinated & efficient response during a crisis
- Testing, updating & refining plans as threats evolve
Michelle Grist, Head of Information Security & Resilience, Unite Students
Double Edged Sword? Leveraging AI to Protect from AI
- Understanding the risks of AI-powered threats including phishing, deepfakes & malware
- Exploring how AI can enhance threat detection & automated response
- Addressing the ethical & practical challenges of AI in cyber security
Enis Sahin, Global Head of Security Architecture, Federated Hermes
Coffee Break & Networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Agentic Security
Panel Discussion: The Importance of Integrating Information Security with Business Strategy
- Exploring how integrating information security & business strategy ensures that security initiatives drive long-term success
- Enhancing risk management & decision-making by adopting a unified approach across the business
- Improving business agility with an integrated approach, allowing a faster response to changing threats
Goher Mohammad, Group Head of Information Security, L&Q
Adam Saunders, Head of Information Security, Mace
Steve Davies, Head of Cyber Security, DLA Piper
Andrew Cooke, Group Head of Information Security, Acacium Group
Morning Registration & Breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.
Rebecca Herity, CISO, Trainline
Asadur Rahman, CISO, Alpha Group
Roundtable Wrap-Up
Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.
Coffee Break & Networking
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Agentic Security
Networking Lunch
Building a Proactive Third-Party Risk Strategy
- Understanding the evolving threat landscape
- Exploring best practice frameworks for assessing & mitigating risks across supply chains
- Constructing a resilient third-party risk management program that aligns with business objectives
Mark LoGalbo, VP Information Security, Fanatics
Fireside Chat: Indexing & Assessing Security Maturity through Governance Frameworks
- Exploring the benefits of benchmarking maturity
- Lessons learned from a real-world implementation of NIST guidelines
- Integrating maturity metrics into board level reporting
Henrik Kiertzner, Head of Cyber Security Operations & Infrastructure, National Trust
First Steps to Resilience: Building Strategy in the Absence of Cyber Foundations
- Establishing early priorities & securing executive buy-in
- Raising security awareness & best practice throughout your organisation
- Crafting a phased, scalable roadmap aligned with business goals & resource constraints
Elizabeth Hankins, Head of IT Security, Osborne Clarke
Zero Trust & Beyond: Enhancing Security with Access Management
- Evaluating the benefits of implementing zero trust architecture to reduce security risks
- Strengthening access control with multi-factor authentication
- Strategies to secure hybrid environments with consistent access policies
Panel Discussion: Securing the Future with Cyber Security Recruitment & Retention
- Strategies for sourcing cyber security talent in a competitive market
- Championing the career development & training of top talent to support retention
- Attracting diverse talent by creating inclusive hiring practices & fostering a positive working environment
Michelle Grist, Head of Information Security & Resilience, Unite Students
Rebecca Herity, CISO, Trainline
Arinder Badyal, Head of Information Security, Transport UK
Jig Patel, Cyber Advisory, UK Ministry of Defence
Fauzia Idrees, Deputy Director, Centre of Excellence Cyber Security Education, Royal Holloway, University of London