
UK & Ireland CISO Community
Executive Summit
15 October 2024 | Convene 155 Bishopsgate, London
15 October 2024
Convene 155 Bishopsgate, London
Collaborate with your peers
Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Securing the Supply Chain and Ensuring Business Continuity
Facilitating Secure Decision-Making to Maximise Business Outcomes
Thriving Amidst Complexity and Uncertainty
UK & Ireland CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Mary Haigh
BAE Systems
CISO

Sarah Lawson
University College London
CISO & Deputy CIO

Ewa Pilat
FNZ Group
Group CISO

Helen Rabe
BBC
CISO
What to Expect
Agenda
08:00 - 09:00 Registration & Breakfast
09:00 - 09:45 Keynote
Breaking the Mold — Building a Purpose-Driven Information Security Strategy

Ashish Shrestha
Group CISO
Jaguar Land Rover
In the rapidly evolving landscape of cyber warfare, where information flows freely and unpredictably, the traditional fortress mentality is no longer enough. As CISOs, we must recognise that the battlefield is neither uniform nor static—it’s constantly diversifying and reshaping. It's time to stop hiding behind excuses of inadequate funding, blaming users, or lamenting organisational silos.
The digital age is driving an unprecedented shift towards consumerisation, intertwining lives and livelihoods with connected experiences. This reality demands that security organisations pivot from merely defending against threats to becoming proactive value creators. To thrive in this new era, CISOs must lead with purpose, transforming their strategies into powerful narratives that build trust and resonate with consumers. We need to get out of our own way!
Join Ash to discuss:
- Redefining Value — How do you shift your approach and organisation as a driver of business value, not just a gatekeeper
- Crafting the ‘Why’ — Discovering the steps to develop a compelling purpose that makes Cyber Trust a key differentiator for your brand
- Stand for Something — Embrace a culture that transcends merely challenging the status quo by creating a security strategy that stands for something meaningful and impactful
09:45 - 10:00 Break
10:00 - 10:45 Breakout Session
Modern Workforce, Modern Security Strategy
Hosted by Google Chrome

Oliver Madden
Chrome Browser Enterprise Lead
Google Chrome Enterprise

Douglas Weekes
CISO and Director of Data Governance
Sainsbury's

Tash Van Den Heever
CISO UK
Investec

Thomas Harvey
CISO
Banco Santander
Remote and hybrid work models open the door to a new wave of browser-based cyber threats. With sensitive data constantly flowing online, businesses face escalating risks and costly attacks. This session explores how to fortify your business against cyberattacks by securing the browser—the gateway to your sensitive data—all without disrupting the flow of work.
Join this session and hear from your peers about:
- The browser's role in a business's security strategy
- How the browser can secure your workers and company data on managed or non-managed devices
- Managing resources for cybersecurity in a time of economic uncertainty
10:00 - 10:45 Executive Boardroom
Securing the Everywhere World — Assessing Your Gaps for Strong Security Posture
Hosted by Cloudflare

Michael Tremante
Senior Director, Product
Cloudflare

Steve Moran
CISO
Sodexo UK

Matt Smith
Group Head of Cyber Security
St. James’s Place Wealth Management

Dave Lochhead
CISO: Commercial Insurance, Business Technology Solutions, Enterprise Data Analytics & Architecture
Zurich Insurance Company UK
When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, a strong security posture becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.
Join this interactive roundtable to discuss:
- Optimising costs and improving security across diverse cloud environments
- Spreading risk across a complex ecosystem to mitigate over reliance on specific tools
- Identifying the right tools while addressing global regulatory and data privacy requirements
10:00 - 10:45 Executive Boardroom
Extending the Identity Security Frontier
Hosted by Delinea

Matt Bruun
VP, Northern Europe
Delinea

Gabriela Ahmadi-Assalemi
CISO Technology Operations, COO Security and Technology
University of Cambridge

Liz Banbury
CISO
Thames Water
Robust and automated identify security is essential to securing your most critical systems and data. Given the sensitivity of privileged accounts, unpatched vulnerabilities, and an extensive remote workforce, implementing this is a journey, not a quick fix.
Join this interactive boardroom to:
- Discuss the difference between strong identity solutions and simple password management
- Address different approaches to solving Privilege Access Management
- Gain executive buy in from legal, HR and IT on effective solutions
10:00 - 10:45 Executive Boardroom
Adapting to Hybrid Attacks and the Rise of GenAI Without Breaking the Budget
Hosted by Vectra

Teppo Halonen
SVP, EMEA
Vectra

Andy Piper
CISO - Investment Bank & Markets
Barclays

Craig Hickmott
Head of Information Security
British Heart Foundation
With expanding attack surfaces and the disruptive potential of GenAI, prevention-based security strategies are becoming increasingly implausible. Organisations must adapt by shifting from a prevention strategy to a detection and response strategy at scale.
Join this session to discuss:
- Challenges of managing multi-surface, hybrid attacks and the real-world impact of GenAI tools like Copilot
- Leveraging AI to deliver intelligent, scalable attack detection and response
- Maximising cost efficiencies of security developments and communicating their effectiveness
10:45 - 11:50 Networking Break
10:55 - 11:40 Peer-to-Peer Meetings
Peer-to-Peer Meetings
11:50 - 12:35 Breakout Session
Transforming Application and Service Delivery for the Modern Security Environment
Hosted by Island

Scott Montgomery
VP, Strategic Initiatives
Island
Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organisation.
In this session, we will discuss:
- Revolutionising workspaces by balancing productivity, security, availability and user experience
- How quickly new technologies like the enterprise browser can be adopted to provide a competitive advantage
- Strategies for reducing the effort required to deliver applications and enhance organisational operations
11:50 - 12:35 Breakout Session
Rethinking the Relationship Between Cybersecurity Teams and the People They Protect
Hosted by Proofpoint

Jon Parkes
Vice President
Proofpoint

Neil Binnie
Head Of Information Security and Compliance
Morgan Sindall Group

Andy Piper
CISO - Investment Bank & Markets
Barclays
You’ve heard it all before: the DBIR tells you people are your biggest risk, your phishing simulations tell you huge numbers of your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest if they happen to interact with someone’s workflow. But what if there were a different way?
Join this session to hear from a panel of CISOs on:
- How to instil a culture of risk awareness and data protection across all operations and processes
- New approaches to protecting end users' perception of security controls
- How to attract and train a cybersecurity-savvy workforce
11:50 - 12:35 Executive Boardroom
Illuminating the Shadows — Enhancing Discovery and Visibility for Robust Operational Resilience
Hosted by Akamai

Richard Meeus
Director, Security Technology & Strategy
Akamai

Jon Segger
Information Security Manager
Linklaters LLP

Tim Passe
BISO
King Games
In today’s digital world, operational resilience plays a vital function in supporting business continuity. CISOs must focus on the essential roles of discovery and visibility to strengthen their organisation's defences and ultimately protect against cyber threats that can cause intolerable harm. This session will provide the tools to help organisation's anticipate, withstand, and recover from cyber incidents, ensuring uninterrupted business operations.
Join this session to discuss how to:
- Identify and inventory all digital assets to eliminate blind spots, enhance compliance and mitigate threats
- Integrate discovery and visibility to ensure complete and comprehensive monitoring of all IT infrastructure, environments and assets
- Embed these strategies into your cybersecurity framework for continuous operational resilience
11:50 - 12:35 Executive Boardroom
Securing SaaS — Tackling Key Vulnerabilities Across an Evolving Attack Surface
Hosted by AppOmni

Brandon Romisher
VP EMEA
AppOmni

Stuart Seymour
Director of Security (Group CISO and CSO)
Virgin Media O2

Shaun Crawford
Business Security Partner - Corporate Centre
AXA
SaaS applications power today’s business, and downtime or compromise will pause operations. Despite the increase in SaaS-first strategies, Security teams continue to rely on perimeter-based SASE and IDP solutions which do not match the complexity of the SaaS-native attack surface. This boardroom will encourage you to look inside your SaaS systems to match secure configuration with advanced detection and response capabilities. Specifically, you will discuss how to:
- Bypass Zero Trust strategies and the mitigating controls to consider
- Advance your detection & response programme to maintain a cohesive security posture
- Ensure your metrics to measure SaaS Security are effective to keep up with attack surface
Apply to Participate
Apply to participate in the UK & Ireland CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Convene 155 Bishopsgate, LondonHotels Nearby
45 Curtain Rd
Shoreditch
London EC2A 3PT
0.4 Miles
12-20 Osborn Street
London E1 6TE
0.6 Miles
Andaz, London Liverpool Street
40 Liverpool St
London EC2M 7QN
0.1 Miles
Evanta does not have any affiliation with the suggested hotels listed. The list above is solely for informational purposes.
Community Programme Manager
For inquiries related to this community, please reach out to your dedicated contact.
Luis Arango Abello
Senior Community Programme Manager
+44 (0)1784 267 880
luis.arangoabello@gartner.com