
UK & Ireland CISO Community
Executive Summit
11 June 2024 | Royal Lancaster London
11 June 2024
Royal Lancaster London
Collaborate with your peers
Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Shifting from a Security-Centric Approach to a Resilience-Based Mindset
Exploring Essential Behaviors for CISOs to Influence Leadership Effectively
Positioning Security as a Value-Adding Proposition in Times of Economic Uncertainty
UK & Ireland CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Paula Kershaw
Barclays
MD CCO, Cyber & Resilience

Sarah Lawson
University College London
CISO & Deputy CIO

Ewa Pilat
FNZ Group
Group CISO

Helen Rabe
BBC
CISO
What to Expect
Agenda
08:00 - 09:00 Registration & Breakfast
09:00 - 09:45 Keynote
The Foundations and Scaffolding Behind Effective Cyber Security
Hosted by Akamai Technologies

Mary Haigh
Global CISO
BAE Systems
Geopolitical tensions have escalated cyber threats to BAE Systems, particularly within their strategic defense capabilities, crucial for maintaining our way of life and societal values. In her keynote, Mary Haigh, Global CISO, BAE Systems, will explore what needs to be in place to underpin effective cyber security embedded in the way we do business. She argues that CISOs shouldn't start with the technology, we should focus on developing a clear vision and strategy, governance, transparent reporting, culture and strong moral values within our teams. When conditions are optimal, technology, people, and processes synergies to fortify our cyber resilience against growing threats.
Join Mary to discuss:
- Get exec buy—in to a compelling vision and strategy and communicate ad nauseum until people repeat it back to you!
- Spend time building the right team culture
- Use governance and reporting to keep the focus on the right priorities
09:45 - 10:00 Break
10:00 - 10:45 Breakout Session
Navigating the Quantum Shift — Preparing for a Post-Quantum World

James Frampton
CISO, Managing Director, Head of IT Risk, Security & Controls
MUFG Bank
Join James Frampton, CISO and Managing Director at MUFG Bank, for an interactive session focusing on preparations for a Post-Quantum world. Delve into essential strategies and considerations necessary for readiness in the face of quantum computing advancements. Engage in discussions, share insights, and collaborate on developing robust plans to navigate the challenges of this emerging landscape. You’ll enhance your understanding and preparedness for a Post-Quantum era.
James will discuss:
- When will Quantum Computing (QC) be commercially available?
- What will happen when this epoch-defining time comes (or has it already happened?) potentially undermining the cryptographic algorithms our organisations' security rely on?
- What activities and planning should CISO’s be planning & doing now?
10:00 - 10:45 Breakout Session
Conflicts in Trust — An Exploration of who the CISO can Trust
Hosted by Proofpoint

Kent Breaux
Senior Vice President, Europe, Middle East & Africa
Proofpoint
We trust that trains will run on time and weather forecasts are accurate. But when it comes to cybersecurity, we must navigate conflicts in trust to best secure our organisations. As a CISO, trust comes in many forms, such as the trust you place in your employees to remember their security training, how you trust cybercriminals to return your ransomed data and how you trust your suppliers to care about their security posture as much as you care about yours.
This is no traditional session; this will be a competition, where you’ll be tasked with choosing the right risk mitigation option as our gamemaster takes you from one scenario to the next. Will you choose the option favoured by our gamemaster? Or will you identify the Darwin Award?
Are you putting your trust in the right places? In this session, you'll:
- Identify four key elements of trust in cybersecurity
- Discuss and evaluate risks, implications, and mitigations for each key element
- Develop a Trust Matrix that you can complete for your organisation
10:00 - 10:45 Executive Boardroom
Threat Intelligence and Third-Party Risk — Doubling Down on Critical Vulnerabilities
Hosted by RiskRecon, a Mastercard Company

Peter Allwood
Vice President, Global Cybersecurity Strategy Head
Mastercard

Chris Day
Chief Information Security & Resilience Officer
Royal London

Kieren Marchant-White
Head of Cyber Security
Gymshark

Christine Ford
Head of Information Security
The Economist
The complete entanglement of cyber risk with business risk is becoming increasingly visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organisation. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?
Join this session to discuss:
- Identification of vulnerabilities across your vendor landscape to prioritise response efforts
- Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
- The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem
10:00 - 10:45 Executive Boardroom
Embedding Resiliency with Business Continuity Management
Hosted by Cloudflare

Christian Reilly
Field CTO
Cloudflare

Sarah Self
CISO, UK
Aviva

Matt Smith
Director Cyber and Information Security
St. James’s Place Wealth Management
For many organisations, the question isn't if they'll be attacked, but when and how it will happen. Certain attack types are growing more accessible for a wider variety of attackers, and the risks of distributed work, cloud adoption, and third-party code are impossible to fully contain.
This discussion will focus on strategies security leaders and their teams can use to preserve business operations and protect sensitive data in a world where attacks are inevitable. Specifically, you’ll discuss:
- Understanding your risk profile – what’s your tolerance for downtimes on business-critical systems
- Business continuity management — understanding your minimum viable level
- Organisational strategies for strengthening a culture of security
10:45 - 11:50 Networking Break
10:55 - 11:40 Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:50 - 12:35 Breakout Session
CISO and NED Roles — The Realities, Challenges and Opportunities of Becoming (and Being) a NED

Elaine Bucknor
Strategic Advisor, Non Executive Director and Technology Executive

Claire Davies
Partnership CISO
John Lewis Partnership
CISOs have a unique and valuable skill set that makes them excellent candidates to take on NED roles. Taking on such additional responsibilities can also provide additional growth opportunities and professional network expansion. But what does the role of a NED actually entail? How do you know which potential NED role is right for you? What are the realities of juggling a growing plate of priorities alongside your current workload, and how can you make sure you’re set up for success? Join Elaine Bucknor Strategic Advisor, Non Executive Director and Technology Executive and Claire Davies Partnership CISO, John Lewis Partnership as they have an open conversation about the multiple routes CISOs could take after leaving the hot seat, including considering an NED position.
Specifically, they will discuss:
- Identifying what the role of a NED actually is, and what the role entails
- Elaine's story, decision-making process and criteria around becoming a NED
- Open discussion around the benefits, challenges and shared experiences of NED roles for Security leaders
11:50 - 12:35 Breakout Session
Securing the Enterprise — Streamlining Security for 77,000 Daily Devices
Hosted by ThreatAware

Jon Abbott
CEO
ThreatAware UK

Douglas Weekes
CISO and Director of Data Governance
Sainsbury's
In the ever-evolving landscape of cybersecurity, navigating the unknown is a constant challenge, especially for enterprises safeguarding vast numbers of devices. Douglas Weekes, CISO and Director of Data Governance at Sainsbury's, confronted this challenge directly in his mission to bolster the supermarket's security defences, safeguarding 77,000 devices from potential attacks. In an insightful dialogue, Doug sits down with Jon Abbott, CEO of ThreatAware, to share the lessons learned and strategies employed in overcoming these hurdles.
Join and Jon and Doug to discuss:
- Leadership in Integration — Insights into leveraging API connectivity to uncover hidden assets, eliminating the need for additional tools
- Strategic Reporting for Informed Decision-Making — Empowering leaders with concise reports to streamline management of diverse devices
- Operational Excellence — Lessons in efficient device management and providing precise insights for strategic leadership decisions
11:50 - 12:35 Executive Boardroom
Creating Scalable Governance to Future-Proof AI in the Cloud
Hosted by Wiz

Tom Finch
Head of Solution Engineering, UK&I
Wiz

Jon Allen
IT Director (Core infrastructure, Cyber Security, Risk and Compliance)
Halma plc

Simon Goldsmith
Information Security Director (CISO) & Enterprise IT Lead
OVO
In today's dynamic business landscape, AI platforms serve as catalysts for enhanced efficiency and agility. For CISOs, the pivotal question is: how can we harness this transformative power securely? By assessing risks and implementing robust controls, CISOs can facilitate secure advancements in productivity. Successful AI adoption hinges on prioritising resilience and understanding controllable factors. Through fostering dialogue centered on leadership, resilience, and strategic foresight, this session aims to empower CISOs with actionable insights to navigate the complexities of AI governance in the cloud era.
Join us to explore:
- AI guidelines— Design frameworks balancing innovation and security for confident AI integration
- Proactive Risk Mitigation — Implement policies to ensure data availability, integrity and confidentiality in cloud-based AI adoption
- DLP Navigation — Explore proactive strategies to mitigate data leakage, data rights and operational response
11:50 - 12:35 Executive Boardroom
Adopting a Risk-Based Approach to Strengthen SecOps and Compliance
Hosted by BlueVoyant

Matthew Schofield
Solutions Architect
BlueVoyant

Ian Snelling
Senior Security Leader
Skipton Building Society

Kyle Headley
CISO
Phoenix Group
As the attack surface grows, CISOs know they need a holistic view of their security posture to stay safe. Recognised within Gartner’s re-classification of security operations, CISOs must ensure they detect and mitigate third party and internal threats. By adopting a risk-based approach, CISOs can assess cyber maturity, address compliance gaps and ultimately, prioritise how they spend security investment.
Join this Executive Boardroom to discuss how to:
- Implement a risk-based approach to your SecOps process to better monitor vulnerabilities and remain compliant
- Strengthen your security strategy to prioritise spend and controls to optimise your SOC and maximise security investment
- Work towards continual improvement to defend against future threats across the attack surface and prepare for future regulatory obligations
Apply to Participate
Apply to participate in the UK & Ireland CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Royal Lancaster LondonParking and Public Transport
London Underground:
Lancaster Gate: Lancaster Gate (Central Line) tube station is adjacent to the hotel. The line connects with Oxford Circus, Holborn (British Museum) and Liverpool Street among other iconic London locations in less than 15 minutes.
Paddington: Paddington tube and railway stations are a mere 6 minute walk from the hotel. The tube station has access to 4 different lines and the railway station connects London with Heathrow via Heathrow Express as well as with other regional and national lines going to British cities such as Bath, Oxford, Reading, Windsor or Cardiff.
London Buses:
There are many bus routes (94 and 148) passing the hotel that are connect us with some of the most remarkable London places such as Victoria, Soho, Piccadilly or Oxford Street.
Parking: Available onsite for attendee rate - £55 for 24 hours. Limited availability.
A block of rooms has been reserved at the Royal Lancaster London at a reduced conference rate. Reservations should be made online or by calling 020 7551 6000 . Please mention UK CISO Executive Summit to ensure the appropriate room rate.
Deadline to book using the discounted room rate of £432 GBP (plus tax) is 17 May 2024.
Community Programme Manager
For inquiries related to this community, please reach out to your dedicated contact.
Luis Arango Abello
Senior Community Programme Manager
+44 (0)1784 267 880
luis.arangoabello@gartner.com