Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
DSI Ian Kirby, CEO, National Cyber Resilience Centre Group
Embedding a Holistic Approach to Cyber Security to Answer Regulatory Compliance
- Embedding recommendations from the National Cyber Security Strategy: progress update
- Guidance on securing resources to expand the capabilities of cyber security policies and measures
- Regular reports of security event information to monitor emerging patterns in the cyber threat landscape
Glen Hymers, CISO, Cabinet Office
A Look at the Current State of Generative AI & How it Can Be Safely Deployed within the Business
- How Generative AI can be developed and deployed responsibly at every level
- How you can reduce the risks of increasingly sophisticated cyber attacks, including deepfake scams
Victor Murineanu, CISO, Chelsea F.C.
Aligning Information Security Strategies with Business Objectives
- Collaborating with other departments to raise awareness of potential security threats and embed organisation-wide cyber security processes
- Incorporating security requirements into procurement processes to strengthen the cyber resilience of supply chains
- Key advice on demonstrating ROI for security resources to board members
Anaïs Beaucousin, Chief Business Security Officer, ADP
Coffee break & networking
Workshop 1
Ransomware
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- SIEM
- SOC as a Service
- Data Security
- AI Security
- Network Security
- Ransomware
Networking Lunch
How AI can Help you Optimise Processes, Drive Profitable Growth, Unlock Data & Insights & Deliver New Value
- A look at strategies for working closely with the business to reveal transformative AI solutions
- Examination of strategies for retaining and attracting diverse talent in the field of AI/ML
- Discussion of the ethical considerations and best practices for implementing AI
How Can You Safeguard Your Cloud? Tips on Mitigating Risks & Addressing Common Concerns
- Techniques for safeguarding information, ensuring regulatory compliance & a robust security posture
- A look at the shifting network requirements of cloud workloads and remote workspaces
- Analysing the evolving landscape of infrastructure security solutions
Richard Frost, Group CISO, esure
Implementing Multi-Layered Response Plans to Mitigate the Impact of Cyber Attacks
- How you can adopt a multi-layered, holistic approach that will help you identify threats
- Why you need to go beyond mere technology to include people and processes as part of your security strategy
- How operations should be helped to understand the reasons for governance, risk & compliance
Liam O’Reilly, Group Head of IT Security and Governance, Emeria
Working with Security Operations Centres (SOCs) to Build a More Secure Organisation
- Key advice on determining security priorities when establishing partnerships with cyber security providers
- Engaging with security operations centres to develop internal cyber strategies
- Tips on communicating with SOCs to appropriately raise security concerns
Coffee break & networking
Workshop 5
Vulnerability Management
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- SIEM
- SOC as a Service
- Data Security
- AI Security
- Network Security
- Ransomware
Panel Discussion: Implementing Recruitment Schemes to Broaden Workforce Skills & Abilities
- Designing recruitment initiatives to address workforce skills gaps & respond to industry challenges
- Widening flexible working opportunities to attract a broader range of applicants & build a more diverse workforce
- Developing individualised onboarding experiences for all employees to improve staff retention rates & create inclusive workplaces
Julie Osborne, Director – Security Control Frameworks, Barclays
Jack Sharpe, Deputy CISO & CIO, UK Ministry of Defence
Sunil Patel, ISO, River Island
Steven Furnell, Professor of Cyber Security, University of Nottingham
Chairperson’s closing remarks
A reflection on today’s discussions, & thank you to our audience & speakers.
Morning registration & breakfast
Opening remarks from the chairperson
A welcome from the chairperson
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.
Andrew Brant, Head of IT & Security Operations, Weatherbys Bank
Lida Rragami, Head of Cyber Security (CISO), Sonnedix
George Andrikopolous, Senior VP – Low Latency Container Security, Citi
Dr Aaron Gracey, Head of Emergency Management & Operational Security, Network Rail
David Horn, Managing Director, Global Operations & Technology Audit, BNY Mellon
Fauzia Idrees Abro, Director of Information Security, Royal Holloway – University of London
Roundtable wrap-up by the chairperson
Each host will provide a short overview of the key findings from their discussion to the room. This is an opportunity for everyone to gain a perspective from each roundtable discussion.
Coffee break & networking
Workshop 6
AI
Workshop 7
Cloud Security
Workshop 8
Top Threats & Attacker Trends
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- SIEM
- SOC as a Service
- Data Security
- AI Security
- Network Security
- Ransomware
Networking lunch
Implementing Multi-Factor Approaches to Enhancing Security Systems
- A look at the practical aspects of implementing multi-factor systems in order to address the common challenges organisations face
- Practical and actionable steps on how to implement multi-factor systems safely and effectively within your organisation
Ben Short, Director of Technology & Innovation, Blake Morgan
Viewing Cyber Risk through the Board’s Eyes
- What internal non-IT risks are you using as a benchmark to level-set cyber security risks and build your credibility?
- How can you get away from a binary and opaque view of cyber risk; how can you demonstrate progress when big cyber loss events are rare?
- How can you frame technical work to improve cyber risk in a way that lets non-IT board members effectively engage and challenge you on priorities?
Tom Whipp, Director of Technology Risk, BINS / BISL, Bupa
Utilising Security & Privacy Controls to Protect Application User Identity
- How privacy controls can help prevent unauthorised access to sensitive data and systems
- How security capabilities have matured to support the latest demands of digital transformation
- Utilising security & privacy measures to manage the risk of unauthorised access & data breaches
Laure Lydon, VP of Security, Flo Health
Leadership Approaches to Expand Security Team Capabilities
- Key tips on engaging with board members to secure additional resources for security controls
- Creating KPIs to monitor progress in achieving team goals
- Engaging with teams to support workload management and improve operational efficiency
Lee Whatford, CISO, Bettys & Taylors of Harrogate
Panel Discussion: Embedding Security Governance Strategies to Uphold Accountability for Cyber Risk Decision-Making
- How data governance helps classify data based on sensitivity to inform security decisions
- Defining roles & responsibilities for all staff in reporting and addressing security threats to ensure organisation-wide accountability
- Utilising data governance policies to strengthen security incident response plans
Kam Karaji, Global Head of Information Security, Bibby Financial Services
Lee Whatford, CISO, Bettys & Taylors of Harrogate
Sunil Patel, ISO, River Island
Chris Hall, CISO, Smiths News