IN-PERSON

UK & Ireland CISO Executive Summit

11 June 2024 | Royal Lancaster London

11 June 2024
Royal Lancaster London

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Shifting from a Security-Centric Approach to a Resilience-Based Mindset

Exploring Essential Behaviors for CISOs to Influence Leadership Effectively

Positioning Security as a Value-Adding Proposition in Times of Economic Uncertainty

UK & Ireland CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Paula Kershaw

Barclays
MD CCO, Cyber & Resilience

Sarah Lawson

University College London
CISO & Deputy CIO

Ewa Pilat

FNZ Group
Group CISO

Helen Rabe

BBC
CISO

Yolande Young

BUPA
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your UK & Ireland CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


10 June 2024

11 June 2024

18:00 - 21:00  Networking

Governing Body Welcome Reception

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

The Foundations and Scaffolding Behind Effective Cyber Security

Mary Haigh headshot

Mary Haigh

Global CISO

BAE Systems

Geopolitical tensions have escalated cyber threats to BAE Systems, particularly within their strategic defense capabilities, crucial for maintaining our way of life and societal values. In her keynote, Mary Haigh (Global CISO, BAE Systems), will explore what needs to be in place to underpin effective cyber security embedded in the way we do business. She argues that CISOs shouldn't start with the technology, they should focus on developing a clear vision and strategy, the governance, transparent reporting, the culture and the strong moral values within our teams. When conditions are optimal, technology, people, and processes synergies to fortify our cyber resilience against growing threats.

Join Mary to discuss:

  • Get exec buyin to a compelling vision and strategy and communicate ad nauseum until people repeat it back to you!
  • Spend time building the right team culture
  • Use governance and reporting to keep the focus on the right priorities

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Navigating the Quantum Shift — Preparing for a Post-Quantum World

James Frampton headshot

James Frampton

CISO, Managing Director, Head of IT Risk, Security & Controls

MUFG Bank

Join James Frampton, CISO and Managing Director at MUFG Bank, for an interactive session focusing on preparations for a Post-Quantum world. Delve into essential strategies and considerations necessary for readiness in the face of quantum computing advancements. Engage in discussions, share insights, and collaborate on developing robust plans to navigate the challenges of this emerging landscape. You’ll enhance your understanding and preparedness for a post-quantum era.

James will discuss:

  • When will Quantum Computing (QC) be commercially available?
  • What will happen when this epoch-defining time comes (or has it already happened?) potentially undermining the cryptographic algorithms our organisations' security rely on?
  • What activities and planning should CISO’s be planning & doing now?

10:00 - 10:45  Executive Boardroom

Threat Intelligence and Third-Party Risk — Doubling Down on Critical Vulnerabilities

Rigo Van den Broeck headshot

Rigo Van den Broeck

EVP, Cyber Security Product Innovation

Mastercard

Chris Day headshot

Chris Day

Chief Information Security & Resilience Officer

Royal London

The complete entanglement of cyber risk with business risk is becoming increasingly visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organisation. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritise response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

10:00 - 10:45  Executive Boardroom

Embedding Resiliency with Business Continuity Management

John Graham-Cumming headshot

John Graham-Cumming

CTO

Cloudflare

Matt Smith headshot

Matt Smith

Director Cyber and Information Security

St. James’s Place Wealth Management

For many organisations, the question isn't if they'll be attacked, but when and how it will happen. Certain attack types are growing more accessible for a wider variety of attackers, and the risks of distributed work, cloud adoption, and third-party code are impossible to fully contain.

This discussion will focus on strategies security leaders and their teams can use to preserve business operations and protect sensitive data in a world where attacks are inevitable. Specifically, you’ll discuss:

  • Understanding your risk profile – what’s your tolerance for downtimes on business-critical systems
  • Business continuity management — understanding what is your minimum viable level
  • Organisational strategies for strengthening a culture of security

10:45 - 11:50  Networking Break

10:55 - 11:40  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:50 - 12:35  Breakout Session

CISO and NED Roles — The Realities, Challenges and Opportunities of Becoming (and Being) a NED

Elaine Bucknor headshot

Elaine Bucknor

Strategic Advisor, Non Executive Director and Technology Executive

Claire Davies headshot

Claire Davies

Partnership CISO

John Lewis Partnership

CISOs have a unique and valuable skill set that makes them excellent candidates to take on NED roles. Taking on such additional responsibilities can also provide additional growth opportunities and professional network expansion. But what does the role of a NED actually entail? How do you know which potential NED role is right for you? What are the realities of juggling a growing plate of priorities alongside your current workload, and how can you make sure you’re set up for success? Join Elaine Bucknor Strategic Advisor, Non Executive Director and Technology Executive and Claire Davies Partnership CISO, John Lewis Partnership as they have an open conversation about the multiple routes CISOs could take after leaving the hot seat, including considering an NED position.

Specifically, they will discuss:

  • Identifying what the role of a NED actually is, and what the role entails
  • Elaine's story, decision-making process and criteria around becoming a NED
  • Open discussion around the benefits, challenges and shared experiences of NED roles for Security leaders

11:50 - 12:35  Executive Boardroom

Creating Scalable Governance to Future-Proof AI in the Cloud

Tom Finch headshot

Tom Finch

Head of Solution Engineering, UK&I

Wiz

Jon Allen headshot

Jon Allen

IT Director (Core infrastructure, Cyber Security, Risk and Compliance)

Halma plc

CISOs recognise the benefits of AI to stay in the innovation race for their organisations. According to Wiz, although 70% of organisations are using cloud-based managed AI services, many are still in the experimentation phase. CISOs must establish a robust governance programme to better support cloud-based AI tools. Ultimately, ensuring a more secure framework to protect assets within the cloud.

Join this session to discuss:

  • Use cases to prioritise when getting started with cloud-based managed AI services
  • Governance structures which outline AI usage whilst maintaining cloud security
  • Policies which ensure data availability, integrity and confidentiality within the cloud

11:50 - 12:35  Executive Boardroom

Adopting a Risk-Based Approach to Strengthen SecOps and Compliance

Leigh Glasper headshot

Leigh Glasper

Director Cyber Advisory

BlueVoyant

As the attack surface grows, CISOs know they need a holistic view of their security posture to stay safe. Recognised within Gartner’s re-classification of security operations, CISOs must ensure they detect and mitigate third party and internal threats. By adopting a risk-based approach, CISOs can assess cyber maturity, address compliance gaps and ultimately, prioritise how they spend security investment.  

Join this Executive Boardroom to discuss how to:

  • Implement a risk-based approach to your SecOps process to better monitor vulnerabilities and remain compliant
  • Strengthen your security strategy to prioritise spend and controls to optimise your SOC and maximise security investment
  • Work towards continual improvement to defend against future threats across the attack surface and prepare for future regulatory obligations

12:35 - 13:30  Lunch Service

13:30 - 14:15  Keynote

Unlocking Full Cloud Potential — Security Enhancements for Today’s Enterprise

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Accounts

Island

While the vast majority of infrastructure has been upgraded and modernised to secure the shift to the cloud, enterprise IT teams are still missing an equally seamless access method to safely deliver those now cloud-native apps and data. While traditional browsers have become the de facto access point for the majority of business critical applications, they lack the deep inspection capabilities and hyper-granular security controls enterprises need. This results in security teams surrounding their browsers with layers of tech to meet those needs.

Join this keynote session to discover:

  • Why traditional cloud security methods undermine your modernisation efforts and end-user experience
  • Embracing technological momentum to adapt to a "more-with-less" security landscape
  • How enterprise CISOs are using this solution to bolster cloud security

14:15 - 14:30  Break

14:30 - 15:15  Breakout Session

Moving from Cyber Security to Cyber Resilience, an Interactive Discussion

Lindsey Bateman headshot

Lindsey Bateman

CISO

M&G Plc

 More information coming soon!

14:30 - 15:15  Executive Boardroom

SSPM — Best Practices for Securing your Business-Critical SaaS Clouds

Brandon Romisher headshot

Brandon Romisher

VP EMEA

AppOmni

Attacks on SaaS systems are on the rise, and SaaS is increasingly becoming a target of nation-state threat actors (e.g. Midnight Blizzard). However, most often sensitive data from SaaS Systems is simply exposed to the world due to admin-induced misconfigurations.

In the past year AppOmni has witnessed far-reaching events impacting thousands of customers. How can CSO organisations secure and monitor highly-dynamic and highly-abstract SaaS systems that are managed outside of the IT function, when tools like SASE have proven ineffective and network-centric?

Join this boardroom to discuss:

  • The inherent complexities of effectively securing large-scale SaaS deployments
  • How the traditional kill chain applies to SaaS, and why SecOps monitoring is necessary
  • How SaaS Security Posture Management (SSPM) can be incorporated into existing security programs like CTEM and Vulnerability Management

14:30 - 15:15  Executive Boardroom

Thriving Through Economic Uncertainty with Effective Cost Optimisation

Amir Ofek headshot

Amir Ofek

CEO, AxoniusX

Axonius

Lorraine Dryland headshot

Lorraine Dryland

Global CISO

First Sentier Investors

In an era of economic uncertainty, organisations are facing intensified scrutiny over budgets across all departments, including security. As CISOs reassess technology investments, cybersecurity teams are challenged to achieve more with less. This necessitates a strategic approach to cost optimisation and resource allocation. To navigate these challenges, CISOs must prioritise the automation of manual tasks and leverage existing tools and assets effectively.

Join this session to discuss:

  • Identifying the types of cost inefficiencies in your security team
  • Develop strategies to optimise costs and showcase ROI during financial challenges
  • Embrace modern cybersecurity asset inventory for cost optimisation and enhanced protection

15:15 - 15:45  Networking Break

15:45 - 16:30  Breakout Session

Defend Your Cybersecurity Investments with Executives Through Outcome Driven Metrics

Eduardo Mastranza headshot

Eduardo Mastranza

VP, TM EMEA SRM Executive Partners

Gartner

Elevate your cybersecurity discourse to the executive level with Outcome Driven Metrics (ODMs). Join this workshop to deepen your understanding of how ODMs can enhance critical conversations about cybersecurity with key stakeholders. Through engaging role-playing, gamification, and hands-on practice, participants will harness the power of ODMs to navigate crucial discussions effectively, ultimately safeguarding their cybersecurity initiatives and investments.

You'll leave this workshop with:

  • ODM Mastery: Gain expertise in ODM frameworks for clearer communication and alignment with executives in cybersecurity discussions
  • Presentation Proficiency: Enhance your ability to craft compelling presentations using ODMs, effectively articulating cybersecurity needs and demonstrating value to decision-makers
  • Investment Defense: Equip yourself with tools to defend cybersecurity investments with concrete outcomes and metrics, fostering confidence and support from executive leadership

16:30 - 16:45  Break

16:45 - 17:30  Keynote

How Adaptability Will Help You Drive Multi-Year Cyber Maturity

Nigel Richardson headshot

Nigel Richardson

Managing Director

Adapt and Exceed Limited

Enhancing your business's cyber capability is a multi-year journey towards ever-evolving maturity, transcending daily threat management and business support. It competes with other organisational transformations while contending with the innovative strategies of cybercriminals. As a CISO, your strategic plan must anticipate frequent and significant changes, requiring constant adaptation. The psychological demands on CISOs and their teams in navigating this dynamic, chaotic landscape extend beyond keeping your organisation secure.

In this session, we will explore the CISO world through the psychological lens of Adaptability, focusing on some of the critical Ability, Character, and Environmental factors that you can understand and develop to grow:

  • The skills of you and your team for the journey ahead
  • The mindset of your stakeholders as advocates of the journey required
  • Your business inherent “Changeability” as the journey reveals unexpected hazards and course corrections

17:30 - 18:00  Closing Comments and Prize Drawing

10 June 2024

11 June 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Royal Lancaster London
MORE INFORMATION

A block of rooms has been reserved at the Royal Lancaster London at a reduced conference rate. Reservations should be made online or by calling 020 7551 6000 . Please mention UK CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of £432 GBP (plus tax) is 17 May 2024.

Your Community Partners


Global Thought Leader
CISO Thought Leaders
Key Partners
Community Partner
Program Partners

Community Programme Manager


For inquiries related to this community, please reach out to your dedicated contact.

Luis Arango Abello

Senior Community Programme Manager

+44 (0)1784 267 880

luis.arangoabello@gartner.com