
UK & Ireland CISO Community
Executive Summit
10 June 2025 | Royal Lancaster London
10 June 2025
Royal Lancaster London
Collaborate with your peers
Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Boosting cyber resilience and ensuring the protection of critical assets
Aligning cybersecurity initiatives with business objectives
Proactive strategies for effective cybersecurity leadership
UK & Ireland CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Sarah Lawson
University College London
CISO & Deputy CIO

Ewa Pilat
FNZ Group
Group CISO

Helen Rabe
BBC
CISO
What to Expect
Agenda
08:00 - 09:00 Registration & Breakfast
09:00 - 09:45 Keynote
Strategic Leadership – Navigating an Ocean of Uncertainty

Thomas Harvey
CISO UK
Banco Santander
Today’s leaders are confronted with high expectations and an evolving set of skills necessary to be successful. They are expected to build healthy team cultures, manage high levels of ambiguity, and align with corporate objectives. In this dynamic environment, how can they go beyond the basics to support their business and teams in complex organisations? Join Thomas Harvey, CISO at Santander UK, as he shares some of his personal stories that can inspire all of us when it comes to leading successful teams and being bold in our lives and careers. Thomas will share thoughts on:
- How to achieve success in uncertain landscapes
- The importance of mental health and resilience to our daily work
- Embracing boldness and purpose for a happier life and career
09:45 - 10:00 Break
10:00 - 10:45 Breakout Session
Are we Living in a Cybersecurity Sophistication Paradox?
Hosted by ThreatAware

Jon Abbott
CEO
ThreatAware UK
Organisations are constantly bombarded with news of sophisticated attacks. A deeper analysis reveals a paradox that has persisted in the industry for over a decade: the Sophistication Paradox. This session will delve into the complexities of this paradox, examining how the focus on advanced threats might overshadow the prevalence and impact of basic attacks. By recognising basic attacks and the strategic use of sophisticated techniques by cybercriminals, organisations can create more balanced cybersecurity strategies. This session equips attendees with the knowledge and tools to navigate modern cyber threats and protect digital assets effectively.
Join to discuss:
- Exploring the Sophistication Paradox: The danger of focusing too much on defenses against advanced attacks while potentially overlooking essential security measures.
- The reality of threats and the influence of vendors in pushing "next-gen" solutions.
- Understanding how attackers blend basic entry methods with advanced malware, and how to achieve a strategic balance to enhance security posture and effectively combat these threats.
10:00 - 10:45 Breakout Session
Fortify Your Defences: Mastering Ransomware Detection, Response, and Recovery
Hosted by Akamai

Richard Meeus
Director, Security Technology & Strategy
Akamai Technologies
As ransomware continues to disrupt organisations, cybersecurity leaders must adopt a holistic strategy to counter this growing threat. Annually, businesses incur substantial losses from ransomware attacks, leading to prolonged downtime, hefty recovery costs, and tarnished reputations. Preparing for and responding to such attacks can be daunting. Join this session to explore strategies for bolstering detection, response, and recovery capabilities, ensuring you are well-equipped to tackle future challenges with confidence.
We'll discuss:
- Improving detection and prevention capabilities, from zero-trust principles to threat intelligence.
- Crisis management and containment strategies to ensure resilience and protection of critical assets.
- Recovery strategies that ensure optimal recovery times.
10:00 - 10:45 Executive Boardroom
Mastering the SaaS Surge — Enhancing Security with Improved Threat Detection and Posture
Hosted by AppOmni

Brandon Romisher
VP EMEA
AppOmni

Kyle Headley
CISO
Phoenix Group

George Robertson
Head of Cyber Security
Taylor Wimpey
In a landscape where threats are constantly evolving, CISOs must tackle the increasing complexities of data exposures, SaaS ecosystems and identity management. How can CISOs adopt a proactive strategy for threat detection and posture management that not only safeguards the business but also keeps key stakeholders informed about evolving risks?
Join this boardroom to discuss:
- Understanding your true SaaS attack surface: user accounts, web portals, OAuth Connections, direct logins, back doors, vendor updates and more
- How to achieve risk reduction through App Hardening and SaaS Detection & Response
- How to build a SaaS Security programme: Crawl, Walk, Run
10:00 - 10:45 Executive Boardroom
Taming Third Party Risk with Advanced Technologies
Hosted by Mastercard Cybersecurity

Shaun Crawford
Business Security Partner
AXA

John Chisum
VP, Solutions Consulting
Mastercard Cybersecurity

Alan Bambury
CISO
Kerry Group
Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.
Join this session to discuss:
- Practical strategies for leveraging threat intelligence in TPRM
- Critical alignment of people and process elements with advanced technologies
- Acting on useful insights and data to manage supply chain risk
10:45 - 11:50 Networking Break
10:55 - 11:40 Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:50 - 12:35 Breakout Session
Reducing Application Delivery Tech Debt from the Inside Out
Hosted by Island

Michael Leland
VP, Field CTO
Island
As high volumes of sensitive data flow through web browsers, three in five organisations believe their current IT and security infrastructure makes the risk of data leakage likely or highly likely. This reflects the growing complexities of keeping data secure while dealing with legacy systems, inefficient application delivery methods, and outdated security controls. What is a modern approach to enterprise operations that simplifies IT while strengthening security?
Join this session to learn:
- Why disparate IT and security solutions accumulate technical debt and bog down operations
- How to articulate the business impacts of technology operations and security challenges beyond IT
- New approaches to enterprise application delivery that enhance end-user productivity
11:50 - 12:35 Breakout Session
The Evolution of AI in Cybersecurity — Cutting Through The Hype
Hosted by Proofpoint

Kevin Leusing
EMEA Chief Technologist
Proofpoint
Artificial Intelligence (AI) is often heralded as the ultimate solution to today’s cybersecurity challenges. However, the reality is that whilst AI holds immense potential, it is also surrounded by a lot of hype. CISOs need to cut through the noise to separate fact from fiction in the world of AI-powered cybersecurity.
Join this session to learn more on:
- Debunking the hype on AI and discover what actually works in enhancing security
- Real-world examples of how AI has been used for years to protect organisations from sophisticated threats.
- The value of safe AI adoption and strategies for cybersecurity professionals.
11:50 - 12:35 Executive Boardroom
Collaboration into Action — Cloud Security Approaches to Secure Business Growth
Hosted by Wiz

Julia Weimer
Head of Solutions Engineering, UK&I
Wiz

John Williams
Head of Cyber Security
Korn Ferry
As organizations grow and adapt, the importance of cloud security's role in transforming strategic collaboration into actionable outcomes becomes even more critical. By fostering a culture of collaboration, businesses can ensure that security becomes an integral part of the operational fabric rather than a standalone function. Effective cloud security strategies are essential for protecting sensitive data and maintaining trust in digital operations.
Join us as we delve into:
- The role of AI and cloud security measures in safeguarding data and infrastructure
- Meeting developers where they are when approaching security integration across the business
- Implementing security metrics that directly correlate with business goals and establishing feedback loops between security, IT, and business teams to enhance cloud security posture
11:50 - 12:35 Executive Boardroom
Harnessing AI for Effortless Data Security
Hosted by Cyera

Ash Hunt
VP EMEA Strategy
Cyera

Gareth Packham
Director of Information Security & Data Protection
Save the Children

Valerie Ezinmo
CISO, UK & Ireland
L'Oréal
As leaders, you’re asked to find ways to securely enable your business and use data to drive innovation. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. This interactive discussion will cover the challenges and solutions CISOs use to discover their data attack surface, monitor, detect and respond to data threats and ensure data compliance.
Join this session to explore:
Gaining data visibility as a foundation for data governance
Managing data security’s landscape of laws, regulations, and industry standards
Aligning tools and teams across a shared responsibility model to ensure compliance
Apply to Participate
Apply to participate in the UK & Ireland CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Royal Lancaster LondonA block of rooms has been reserved at the Royal Lancaster London at a reduced conference rate. Reservations should be made online or by calling 020 7551 6000.
Deadline to book using the discounted room rate of £390 GBP (plus tax) is 18 May 2025.
Community Programme Manager
For inquiries related to this community, please reach out to your dedicated contact.
Luis Arango Abello
Senior Community Programme Manager
+44 (0)1784 267 880
luis.arangoabello@gartner.com