The Network Group UK Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2021 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Tuesday 1st June 2021
08:30 - 09:00

Arrival, registration and breakfast networking

09:00 - 09:05

Introduction from The Network Group

An overview: how you can make the most of our networking software, today. Our SNS software, unique to the industry, guarantees the most effective use of your time. Use our software to design a personalised agenda and arrange quality one-to-one meetings.

09:05 - 09:10

Chairperson’s opening remarks

An overview of the changing role of the CISO and your welcome address from the chairperson

09:10 - 09:35

Keynote case study: The impact of COVID 19 on information security, and the NHS’s response

  • How the implementation of home-working practices played out, and how were the security gaps plugged?
  • Enhancement and rationalisation of data security, and human and technical defences
  • Consequences and management of third party risks in times of transformation

Neil Bennet, CISO, NHS Digital

09:35 - 10:00

How to align and simplify your security strategy to make it fit for business purposes

  • How simplifying your information security strategy can enable business sustainability
  • How to go back and rectify decisions against encumbering legacies
  • Engrain business goals into security measures and efficiencies

Mick Ebsworth, CISO, The Co-operative Group

10:00 - 10:45

Business metamorphosis: How our workplaces and corresponding technical needs will change going forward

  • Trials and triumphs from a time of seismic change
  • How have we streamlined operations and bettered efficiencies, and what more can be done?
  • What is the new norm? The information security technology roadmap for years to come

Neil Bennet, CISO, NHS Digital
Craig McEwen, CISO, Anglo American
Khadir Fayaz, VP of Cyber Security, CBRE

10:45 - 11:00

Coffee break and networking

11:00 - 11:25

Workshop 1

Demystifying threat hunting: Five myths, five predictions

Tim Orchard, Executive VP for Managed Detection & Response Business, F-Secure

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

The next step: Re-appraising the security risk associated with a growing remote workforce

Richard Davis, Cyber Security Specialist, EMEA, Proofpoint

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

Hosted by Skybox Security

11:00 - 13:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
13:05 - 14:00

Networking Lunch hosted by F-Secure Countercept

Stream 1 - Optimising systems
14:00 - 14:30

How to mitigate third party risks throughout your supply-chain

  • How to create cohesion and flexibility throughout your security ecosystem
  • How to keep ongoing effective security controls as the nature of a third-party contracts evolve and replace
  • How third parties affect your internal corporate security infrastructure

2 perspectives addressing these themes to be delivered by:
14:00 – 14:15 Paula Kershaw, CISO, HSBC
14:15 – 14:30 Ian Parker, CISO, Menzies Distribution

Stream 2 - Taking it case by case
14:00 - 14:30

Gap-plugging during cloud integration and how to navigate the risks

  • Assessment and resolutions of risks posed by cloud technology
  • Best practice in the secure storage and handling of data
  • The future of cloud and consequences for your security set-up

Adam Mallach, Head of Cyber Advisory, Post Office

Stream 1 - Optimising systems
14:30 - 14:50

Joint questions and answers

Paula Kershaw, CISO, HSBC
Ian Parker, CISO, Menzies Distribution

Stream 2 - Taking it case by case
14:30 - 14:50

Innovations in the use of AI and automation in information security

  • What parts of information security should we automate?
  • Successes and best use of available technology
  • What to watch: the future of technology in information security

Quentyn Taylor, Global Head of Information Security, Canon

Stream 1 - Optimising systems
14:50 - 15:15

Best practice and security considerations in data governance

  • How to know who is knocking at the door?
  • How do we categorise data?
  • How we can keep devices healthy and patched?

Jacqui Spencer-Sim, Divisional Head of Cyber, Hamilton Group

Stream 2 - Taking it case by case
14:50 - 15:15

Case Study: Challenges in the introduction of new technology in information security

  • Barriers when implementing a new strategy and new technologies
  • Top methods in new ways of working to deliver results
  • How to enhance and maintain agility in technology transformation

Bontle Senne, Executive Director, Transformation, Virgin Media

15:15 - 15:25

Coffee break and networking

15:25 - 15:50

Workshop 4

The future of endpoint detection and response

Hosted by SentinelOne

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

Hosted by SailPoint

16:40 - 17:05
Networking

15:25 - 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
17:05 - 17:45

How to optimise resilience against security incidents and how to handle a breach

  • Best practice in building resilience and continunuous monitoring
  • What level of cyber risk is acceptable?
  • Repercussions and resolutions to cyber incidents

  • Lionel Fernandes, CISO, GlaxoSmithKline
    Mark Osborne, CISO, JLL
    Lee Whatford, CISO, Domino's
    Ashish Shrestha, Director of Information Security, Clear Channel International

    17:45 - 17:50

    Chairperson's closing remarks

    A reflection on today’s discussions, and thank you to our audience and speakers.

    19:00
    Gala dinner featuring the after-dinner speaker
    Wednesday 2nd June 2021
    08:30 - 09:00

    Morning registration and breakfast

    Informal networking over breakfast

    09:00 - 09:10

    Opening remarks from the chairperson

    A welcome from the chairperson

    09:10 - 09:40

    IT leadership: Coordinating expertise with your fellow Chiefs

    • Who’s in charge? When to decision-make and when to support
    • Best practice in information exchange and simplifying communication
    • What makes the best IT leader?

    Adam Breese, CISO, Synthomer

    09:40 - 10:00

    Education and awareness: Innovation to strengthen the human defence

    • How to increase the engagement of staff with security awareness
    • How to navigate the variability in the skills and personal traits of individuals
    • Tasks and methods in improving understanding of cyber security issues

    John Scott, Head of Education, Cyber Security Division, Bank of England

    10:00 - 10:40

    Security culture: De-coding your cyber security awareness programme

    • How to use language in a clear and digestible sense for stakeholders
    • Best methods and largest hurdles in building a strong security culture
    • How to act creatively to bring cyber awareness to the forefront of your colleagues practices

    Mick Ebsworth, CISO, The Co-operative Group
    Lyn Webb, CISO, Open University
    John Scott, Head of Education, Cyber Security Division, Bank of England
    Ian Brownhill, Information Security Director, TI Media

    10:40 - 11:00

    Coffee break and networking

    11:00 - 11:25

    Workshop 6

     

     
    Hosted by Cybereason

    11:25 - 11:50
    Networking
    11:50 - 12:15

    Workshop 7

     

     
    Hosted by XM Cyber

    12:15 - 12:40
    Networking
    12:40 - 13:05

    Workshop 8

    Vendor risk management

     
     
     
     

    11:00 - 13:05

    One-to-One meetings

    Intelligently matched one-to-one meetings:

    • Vulnerability Management
    • Security Awareness
    • Data Governance & DLP
    • Threat Intelligence
    • PUM & Authentication
    • Cloud Security
    • Third Party Risk Management
    • GRC
    • Malware Protection
    • Identity & Access Management
    • Application Security
    • Mobile Security
    13:05 - 14:00

    Networking lunch hosted by XM Cyber

    14:00 - 14:20

    How to reinforce and nurture IT and cyber security skills in your organisation

    • Inspiring the next generation of security professionals: Recruitment and development of cyber security skills
    • Making your IT guy security-minded
    • The future of the cyber security expert: What to skills to watch
    14:20 - 15:00

    Roundtable discussions

    Join group discussions with your peers on some of the most challenging and significant topics of today —please confirm attendance prior to the session beginning. Each host will facilitate the discussion and give a short roundup of key findings during the wrap up session.

    Roundtable 1: Staying ahead of regulation and standards
    Roundtable 3: Lessons in building resilience

    Andy Powell, CISO, Maersk

    Roundtable 2: Training and awareness

    Milos Pesic, Global Head of Information and Cyber Security, Marken a UPS company

    Roundtable 4: Incident response

    Mike Pitman, Head of Security Response & Continuity, British American Tobacco

    15:00 - 15:10

    Roundtable wrap-up by the chairperson

    15:10 - 16:30

    Work Zone

    All your conference areas will be available or catch-up with your emails or finish any interesting discussions you had. Refreshments will be provided, as well as private seating areas.

    16:30
    Event close

    Request an invitation
    or book your place now

    Request an invitation Book now

    WINDSOR, UK
    1-2 JUNE, 2021

    This site
    • Home
    • Agenda
    • Delegates
    • Solution Partners
    • Venue
    • Packages
    • Testimonials
    • Request an invitation
    • Book now
    Events
    • Home
    • Agenda
    • Delegates
    • Solution Partners
    • Venue
    • Packages
    • Testimonials
    • Request an invitation
    • Book now

    The Network Group
    45 Moorfields
    Moorgate
    London
    EC2Y 9AE

    info@thenetwork-group.com

    +44 (0)203 828 7430

    © Network Group Events Ltd. All rights reserved. Cookies, Privacy