Arrival, registration and breakfast networking
Introduction from The Network Group
An overview: how you can make the most of our networking software, today. Our SNS software, unique to the industry, guarantees the most effective use of your time. Use our software to design a personalised agenda and arrange quality one-to-one meetings.
Chairperson’s opening remarks
An overview of the changing role of the CISO and your welcome address from the chairperson
Keynote case study: The impact of COVID 19 on information security, and the NHS’s response
- How the implementation of home-working practices played out, and how were the security gaps plugged?
- Enhancement and rationalisation of data security, and human and technical defences
- Consequences and management of third party risks in times of transformation
Neil Bennet, CISO, NHS Digital
How to align and simplify your security strategy to make it fit for business purposes
- How simplifying your information security strategy can enable business sustainability
- How to go back and rectify decisions against encumbering legacies
- Engrain business goals into security measures and efficiencies
Mick Ebsworth, CISO, The Co-operative Group
Business metamorphosis: How our workplaces and corresponding technical needs will change going forward
- Trials and triumphs from a time of seismic change
- How have we streamlined operations and bettered efficiencies, and what more can be done?
- What is the new norm? The information security technology roadmap for years to come
Neil Bennet, CISO, NHS Digital
Craig McEwen, CISO, Anglo American
Khadir Fayaz, VP of Cyber Security, CBRE
Coffee break and networking
11:00 - 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
Networking Lunch hosted by F-Secure Countercept

How to mitigate third party risks throughout your supply-chain
- How to create cohesion and flexibility throughout your security ecosystem
- How to keep ongoing effective security controls as the nature of a third-party contracts evolve and replace
- How third parties affect your internal corporate security infrastructure
2 perspectives addressing these themes to be delivered by:
14:00 – 14:15 Paula Kershaw, CISO, HSBC
14:15 – 14:30 Ian Parker, CISO, Menzies Distribution
Gap-plugging during cloud integration and how to navigate the risks
- Assessment and resolutions of risks posed by cloud technology
- Best practice in the secure storage and handling of data
- The future of cloud and consequences for your security set-up
Adam Mallach, Head of Cyber Advisory, Post Office
Joint questions and answers
Paula Kershaw, CISO, HSBC
Ian Parker, CISO, Menzies Distribution
Innovations in the use of AI and automation in information security
- What parts of information security should we automate?
- Successes and best use of available technology
- What to watch: the future of technology in information security
Quentyn Taylor, Global Head of Information Security, Canon
Best practice and security considerations in data governance
- How to know who is knocking at the door?
- How do we categorise data?
- How we can keep devices healthy and patched?
Jacqui Spencer-Sim, Divisional Head of Cyber, Hamilton Group
Case Study: Challenges in the introduction of new technology in information security
- Barriers when implementing a new strategy and new technologies
- Top methods in new ways of working to deliver results
- How to enhance and maintain agility in technology transformation
Bontle Senne, Executive Director, Transformation, Virgin Media
Coffee break and networking
15:25 - 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
How to optimise resilience against security incidents and how to handle a breach
Lionel Fernandes, CISO, GlaxoSmithKline
Mark Osborne, CISO, JLL
Lee Whatford, CISO, Domino's
Ashish Shrestha, Director of Information Security, Clear Channel International
Chairperson's closing remarks
A reflection on today’s discussions, and thank you to our audience and speakers.
Morning registration and breakfast
Informal networking over breakfast
Opening remarks from the chairperson
A welcome from the chairperson
IT leadership: Coordinating expertise with your fellow Chiefs
- Who’s in charge? When to decision-make and when to support
- Best practice in information exchange and simplifying communication
- What makes the best IT leader?
Adam Breese, CISO, Synthomer
Education and awareness: Innovation to strengthen the human defence
- How to increase the engagement of staff with security awareness
- How to navigate the variability in the skills and personal traits of individuals
- Tasks and methods in improving understanding of cyber security issues
John Scott, Head of Education, Cyber Security Division, Bank of England
Security culture: De-coding your cyber security awareness programme
- How to use language in a clear and digestible sense for stakeholders
- Best methods and largest hurdles in building a strong security culture
- How to act creatively to bring cyber awareness to the forefront of your colleagues practices
Mick Ebsworth, CISO, The Co-operative Group
Lyn Webb, CISO, Open University
John Scott, Head of Education, Cyber Security Division, Bank of England
Ian Brownhill, Information Security Director, TI Media
Coffee break and networking
Workshop 8
Vendor risk management
11:00 - 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
Networking lunch hosted by XM Cyber

How to reinforce and nurture IT and cyber security skills in your organisation
- Inspiring the next generation of security professionals: Recruitment and development of cyber security skills
- Making your IT guy security-minded
- The future of the cyber security expert: What to skills to watch
Roundtable discussions
Join group discussions with your peers on some of the most challenging and significant topics of today —please confirm attendance prior to the session beginning. Each host will facilitate the discussion and give a short roundup of key findings during the wrap up session.
Andy Powell, CISO, Maersk
Milos Pesic, Global Head of Information and Cyber Security, Marken a UPS company
Mike Pitman, Head of Security Response & Continuity, British American Tobacco
Roundtable wrap-up by the chairperson
Work Zone
All your conference areas will be available or catch-up with your emails or finish any interesting discussions you had. Refreshments will be provided, as well as private seating areas.