IN-PERSON

UK & Ireland CISO Executive Summit

15 October 2024 | Convene 155 Bishopsgate, London

15 October 2024
Convene 155 Bishopsgate, London

Collaborate with your peers

Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Securing the Supply Chain and Ensuring Business Continuity

Facilitating Secure Decision-Making to Maximise Business Outcomes

Thriving Amidst Complexity and Uncertainty

UK & Ireland CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Mary Haigh

BAE Systems
CISO

Sarah Lawson

University College London
CISO & Deputy CIO

Ewa Pilat

FNZ Group
Group CISO

Helen Rabe

BBC
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your UK & Ireland CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


14 October 2024

15 October 2024

18:00 - 21:00  Governing Body Reception

Governing Body Welcome Dinner

Join this exclusive evening hosted by the Governing Body, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

Breaking the Mold — Building a Purpose-Driven Information Security Strategy

Ashish Shrestha headshot

Ashish Shrestha

Group CISO

Jaguar Land Rover

In the rapidly evolving landscape of cyber warfare, where information flows freely and unpredictably, the traditional fortress mentality is no longer enough. As CISOs, we must recognise that the battlefield is neither uniform nor static—it’s constantly diversifying and reshaping. It's time to stop hiding behind excuses of inadequate funding, blaming users, or lamenting organisational silos.

The digital age is driving an unprecedented shift towards consumerisation, intertwining lives and livelihoods with connected experiences. This reality demands that security organisations pivot from merely defending against threats to becoming proactive value creators. To thrive in this new era, CISOs must lead with purpose, transforming their strategies into powerful narratives that build trust and resonate with consumers. We need to get out of our own way!

Join Ash to discuss:

  • Redefining Value — How do you shift your approach and organisation as a driver of business value, not just a gatekeeper
  • Crafting the ‘Why’ — Discovering the steps to develop a compelling purpose that makes Cyber Trust a key differentiator for your brand
  • Stand for Something — Embrace a culture that transcends merely challenging the status quo by creating a security strategy that stands for something meaningful and impactful

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Modern Workforce, Modern Security Strategy

Oliver Madden headshot

Oliver Madden

Chrome Browser Enterprise Lead

Google Chrome Enterprise

Douglas Weekes headshot

Douglas Weekes

CISO and Director of Data Governance

Sainsbury's

Tash Van Den Heever headshot

Tash Van Den Heever

CISO UK

Investec

Thomas Harvey headshot

Thomas Harvey

CISO

Banco Santander

Remote and hybrid work models open the door to a new wave of browser-based cyber threats. With sensitive data constantly flowing online, businesses face escalating risks and costly attacks. This session explores how to fortify your business against cyberattacks by securing the browser—the gateway to your sensitive data—all without disrupting the flow of work.

Join this session and hear from your peers about:

  • The browser's role in a business's security strategy
  • How the browser can secure your workers and company data on managed or non-managed devices
  • Managing resources for cybersecurity in a time of economic uncertainty

10:00 - 10:45  Executive Boardroom

Securing the Everywhere World — Assessing Your Gaps for Strong Security Posture

Michael Tremante headshot

Michael Tremante

Senior Director, Product

Cloudflare

Steve Moran headshot

Steve Moran

CISO

Sodexo UK

Matt Smith headshot

Matt Smith

Group Head of Cyber Security

St. James’s Place Wealth Management

Dave Lochhead headshot

Dave Lochhead

CISO: Commercial Insurance, Business Technology Solutions, Enterprise Data Analytics & Architecture

Zurich Insurance Company UK

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, a strong security posture becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimising costs and improving security across diverse cloud environments
  • Spreading risk across a complex ecosystem to mitigate over reliance on specific tools
  • Identifying the right tools while addressing global regulatory and data privacy requirements

10:00 - 10:45  Executive Boardroom

Extending the Identity Security Frontier

Matt Bruun headshot

Matt Bruun

VP, Northern Europe

Delinea

Gabriela Ahmadi-Assalemi headshot

Gabriela Ahmadi-Assalemi

CISO Technology Operations, COO Security and Technology

University of Cambridge

Liz Banbury headshot

Liz Banbury

CISO

Thames Water

Robust and automated identify security is essential to securing your most critical systems and data.  Given the sensitivity of privileged accounts, unpatched vulnerabilities, and an extensive remote workforce, implementing this is a journey, not a quick fix.

Join this interactive boardroom to:

  • Discuss the difference between strong identity solutions and simple password management
  • Address different approaches to solving Privilege Access Management
  • Gain executive buy in from legal, HR and IT on effective solutions

10:00 - 10:45  Executive Boardroom

Adapting to Hybrid Attacks and the Rise of GenAI Without Breaking the Budget

Teppo Halonen headshot

Teppo Halonen

SVP, EMEA

Vectra

Andy Piper headshot

Andy Piper

CISO - Investment Bank & Markets

Barclays

Craig Hickmott headshot

Craig Hickmott

Head of Information Security

British Heart Foundation

With expanding attack surfaces and the disruptive potential of GenAI, prevention-based security strategies are becoming increasingly implausible. Organisations must adapt by shifting from a prevention strategy to a detection and response strategy at scale.

Join this session to discuss:

  • Challenges of managing multi-surface, hybrid attacks and the real-world impact of GenAI tools like Copilot
  • Leveraging AI to deliver intelligent, scalable attack detection and response
  • Maximising cost efficiencies of security developments and communicating their effectiveness

10:45 - 11:50  Networking Break

10:55 - 11:40  Peer-to-Peer Meetings

Peer-to-Peer Meetings

11:50 - 12:35  Breakout Session

Transforming Application and Service Delivery for the Modern Security Environment

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Initiatives

Island

Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organisation.

In this session, we will discuss:

  • Revolutionising workspaces by balancing productivity, security, availability and user experience
  • How quickly new technologies like the enterprise browser can be adopted to provide a competitive advantage
  • Strategies for reducing the effort required to deliver applications and enhance organisational operations

11:50 - 12:35  Breakout Session

Rethinking the Relationship Between Cybersecurity Teams and the People They Protect

Jon Parkes headshot

Jon Parkes

Vice President

Proofpoint

Neil Binnie headshot

Neil Binnie

Head Of Information Security and Compliance

Morgan Sindall Group

Andy Piper headshot

Andy Piper

CISO - Investment Bank & Markets

Barclays

You’ve heard it all before: the DBIR tells you people are your biggest risk, your phishing simulations tell you huge numbers of your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest if they happen to interact with someone’s workflow. But what if there were a different way?

Join this session to hear from a panel of CISOs on:

  • How to instil a culture of risk awareness and data protection across all operations and processes
  • New approaches to protecting end users' perception of security controls 
  • How to attract and train a cybersecurity-savvy workforce 

11:50 - 12:35  Executive Boardroom

Illuminating the Shadows — Enhancing Discovery and Visibility for Robust Operational Resilience

Richard Meeus headshot

Richard Meeus

Director, Security Technology & Strategy

Akamai

Jon Segger headshot

Jon Segger

Information Security Manager

Linklaters LLP

Tim Passe headshot

Tim Passe

BISO

King Games

In today’s digital world, operational resilience plays a vital function in supporting business continuity. CISOs must focus on the essential roles of discovery and visibility to strengthen their organisation's defences and ultimately protect against cyber threats that can cause intolerable harm. This session will provide the tools to help organisation's anticipate, withstand, and recover from cyber incidents, ensuring uninterrupted business operations.

Join this session to discuss how to:

  • Identify and inventory all digital assets to eliminate blind spots, enhance compliance and mitigate threats
  • Integrate discovery and visibility to ensure complete and comprehensive monitoring of all IT infrastructure, environments and assets
  • Embed these strategies into your cybersecurity framework for continuous operational resilience

11:50 - 12:35  Executive Boardroom

Securing SaaS — Tackling Key Vulnerabilities Across an Evolving Attack Surface

Brandon Romisher headshot

Brandon Romisher

VP EMEA

AppOmni

Stuart Seymour headshot

Stuart Seymour

Director of Security (Group CISO and CSO)

Virgin Media O2

Shaun Crawford headshot

Shaun Crawford

Business Security Partner - Corporate Centre

AXA

SaaS applications power today’s business, and downtime or compromise will pause operations. Despite the increase in SaaS-first strategies, Security teams continue to rely on perimeter-based SASE and IDP solutions which do not match the complexity of the SaaS-native attack surface. This boardroom will encourage you to look inside your SaaS systems to match secure configuration with advanced detection and response capabilities. Specifically, you will discuss how to:

  • Bypass Zero Trust strategies and the mitigating controls to consider
  • Advance your detection & response programme to maintain a cohesive security posture
  • Ensure your metrics to measure SaaS Security are effective to keep up with attack surface

12:35 - 13:30  Lunch Service

13:30 - 14:15  Keynote

CISOs & Security Posture — How to Stop the Attack Before It Happens

Caroline Paddle headshot

Caroline Paddle

Regional Director UK/I & Nordics

XM Cyber

Stephen Owen headshot

Stephen Owen

CISO

IQUW

The cyber threat landscape continues to grow, and CISOs need to make faster, more confident decisions about which exposures to fix and which to safely ignore. With 82% of security leaders reporting an increasing gap between vulnerabilities/exposures and their ability to address them, what are the strategies CISOs should employ to continually improve their security posture? Join Stephen Owen, CISO at IQUW and Caroline Paddle, Regional Director at XM Cyber as they share how continuous threat exposure management (CTEM) strategies can greatly enhance security posture. Specifically, you’ll hear:

  • Why the disconnect exists and CTEM’s 5-step approach.
  • How to reduce risk and increase efficiency with a comprehensive exposure management approach.
  • How to measure and report security posture gains to the board

14:15 - 14:30  Break

14:30 - 15:15  Breakout Session

Developing a Plan for When Nothing Goes to Plan — Prioritising Cyber Resiliency

Sarah Lawson headshot

Sarah Lawson

CISO & Deputy CIO

University College London

Tony Jowett headshot

Tony Jowett

CISO

ITV

Cybersecurity strategies are constantly having to adapt to match the ever-changing nature of the threat landscape. Whilst maintaining highly responsive security measures remains essential, it is crucial to go beyond such measures; operational resilience must be developed by all CISOs.

Join this session to:

  • Understand the range of advantages that instilling cyber resiliency can bring to your organisation
  • Develop increased resiliency and recovery capabilities
  • Learn how to share the responsibility of fostering resilience with the rest of the C-Suite

14:30 - 15:15  Executive Boardroom

Building Foundations for the Future — How CISOs can Shape Organisational Structure

Bruna Stradiotto headshot

Bruna Stradiotto

Information Security Manager

Canary Wharf Group

Innovation brings both new opportunities, and new threats, to organisations: as the scope of what technology makes possible expands, so do the responsibilities of technology leaders. Knowing what you want to be responsible for in your role can prevent overloading your plate and limiting your efficiency. 

Join this session to compare:

  • How do you and your peers define your role?
  • How are C-Level digital leaders dividing responsibilities?
  • How does your organisational structure account for the expanding realm of technology?

14:30 - 15:15  Executive Boardroom

From “No” to “Know-How” — Enabling a Collaborative and Secure Environment

Don Gibson headshot

Don Gibson

CISO

Kinly

Nick Jones headshot

Nick Jones

CISO

International Personal Finance

Whilst security leaders are an integral part of pushing organisations forward, the safest answers to questions of progress can be ‘no’ or ‘not yet’. Communicating this without making security requirements seem like impediments to progress can be a difficult task to navigate. 

Join this session to discuss:

  • Communicating an unpopular, yet informed, decision clearly
  • Managing other C-Level leaders and the board’s expectations of Cybersecurity concerns
  • Embedding a security first mindset to achieve greater leadership buy-in

15:15 - 15:45  Networking Break

15:45 - 16:30  Breakout Session

Post-Cyber Attack, What Now?

Chris Gould headshot

Chris Gould

Executive Partner, Gartner for CISO Executive Programs

Gartner

Join this workshop to walk through step by step the analysis and actions a CISO should take in the aftermath of a cyber attack. Be prepared to hear case studies, discuss in small groups and report out on your own experiences. 

15:45 - 16:30  Executive Boardroom

Securing the Supply — An Open Supply Chain Deep Dive

Roy Shiromani headshot

Roy Shiromani

Group CISO

Legal & General

It's no surprise that supply chain risk remains a major concern for CISOs, keeping them awake at night. Numerous organisations heavily depend on a limited number of companies, leaving them without control over their own fate. In this open discussion, we invite CISOs to delve into the obstacles and possibilities of securing the supply chain. We will explore various challenges, such as comprehending the diverse security approaches of suppliers, fostering strong relationships, and complying with regulations. Gain valuable insights and strategies, empowering CISOs to enhance their organisation's supply chain security.

Join this session to discuss:

  • Navigating the varying security postures within the supply chain and embedding security into procurement contracts
  • Strengthening business relationships by investing time and money in suppliers' security posture
  • Overcoming cultural barriers and navigating complex regulations

15:45 - 16:30  Executive Boardroom

Harnessing Quantitative Information — Using Key Performance Indicators to Enhance Leadership Buy-in

Christine Ford headshot

Christine Ford

Head of Information Security

The Economist

Simon Tong headshot

Simon Tong

Cyber Security Governance Manager

SLB

Investing in Cybersecurity is crucial to the success of organisations. However once the investment is made, the application integrated, and the strategy implemented, the value added by new threads of strategy can often fade into the overall tapestry of organisational security.

Join this session to discuss:

  • Measuring the value of investments through quantitative models and techniques
  • Leveraging information to pick out what is and isn’t providing value
  • Enhancing accountability to ensure transparency and leadership buy-in

16:30 - 16:45  Break

16:45 - 17:30  Keynote

A CIA Toolkit for Leveraging Ambiguity, Driving Excellence, and Leading with Agility

Rupal Patel headshot

Rupal Patel

Corporate Strategist & Executive Advisor

Guest Speaker

In this dynamic session, Rupal Patel will share thought-provoking insights from her CIA to CEO journey on leveraging ambiguity and uncertainty in pursuit of organizational excellence. Through case studies and stories from the field, Rupal will demystify how to put “agility” into action, and transform the concept from an overused buzzword to an actionable toolkit. 

The audience will leave armed with:

  • Concrete methods for embedding agility into their organisational structure 
  • Tools for developing personal resilience and becoming more agile decision makers
  • An adaptable framework for becoming change-agents and driving organizational excellence

17:30 - 18:00  Closing Comments and Prize Drawing

14 October 2024

15 October 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Convene 155 Bishopsgate, London
MORE INFORMATION

Your Community Partners


Global Thought Leaders
CISO Thought Leaders
Key Partners
Program Partners

Community Programme Manager


For inquiries related to this community, please reach out to your dedicated contact.

Luis Arango Abello

Senior Community Programme Manager

+44 (0)1784 267 880

luis.arangoabello@gartner.com