IN-PERSON

UK & Ireland CISO Executive Summit

15 October 2024 | Convene 155 Bishopsgate, London

15 October 2024
Convene 155 Bishopsgate, London

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Securing the Supply Chain and Ensuring Business Continuity

Facilitating Secure Decision-Making to Maximise Business Outcomes

Thriving Amidst Complexity and Uncertainty

UK & Ireland CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Mary Haigh

BAE Systems
Global CISO

Paula Kershaw

Barclays
MD CCO, Cyber & Resilience

Sarah Lawson

University College London
CISO & Deputy CIO

Ewa Pilat

FNZ Group
Group CISO

Helen Rabe

BBC
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your UK & Ireland CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


14 October 2024

15 October 2024

18:00 - 21:00  Governing Body Reception

Governing Body Welcome Dinner

Join this exclusive evening hosted by the Governing Body, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

Breaking the Mold — Building a Purpose-Driven Information Security Strategy

Ashish Shrestha headshot

Ashish Shrestha

Group CISO

Jaguar Land Rover

In the rapidly evolving landscape of cyber warfare, where information flows freely and unpredictably, the traditional fortress mentality is no longer enough. As CISOs, we must recognise that the battlefield is neither uniform nor static—it’s constantly diversifying and reshaping. It's time to stop hiding behind excuses of inadequate funding, blaming users, or lamenting organisational silos.

The digital age is driving an unprecedented shift towards consumerisation, intertwining lives and livelihoods with connected experiences. This reality demands that security organisations pivot from merely defending against threats to becoming proactive value creators. To thrive in this new era, CISOs must lead with purpose, transforming their strategies into powerful narratives that build trust and resonate with consumers. We need to get out of our own way!

Join Ash to discuss:

  • Redefining Value — How do you shift your approach and organisation as a driver of business value, not just a gatekeeper
  • Crafting the ‘Why’ — Discovering the steps to develop a compelling purpose that makes Cyber Trust a key differentiator for your brand
  • Stand for Something — Embrace a culture that transcends merely challenging the status quo by creating a security strategy that stands for something meaningful and impactful

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Modern Workforce, Modern Security Strategy

Oliver Madden headshot

Oliver Madden

Chrome Browser Enterprise Lead

Google Chrome Enterprise

Douglas Weekes headshot

Douglas Weekes

CISO and Director of Data Governance

Sainsbury's

Tash Van Den Heever headshot

Tash Van Den Heever

CISO UK

Investec

Remote and hybrid work models open the door to a new wave of browser-based cyber threats. With sensitive data constantly flowing online, businesses face escalating risks and costly attacks. This session explores how to fortify your business against cyberattacks by securing the browser—the gateway to your sensitive data—all without disrupting the flow of work.

Join this session and hear from your peers about:

  • The browser's role in a business's security strategy
  • How the browser can secure your workers and company data on managed or non-managed devices
  • Managing resources for cybersecurity in a time of economic uncertainty

10:00 - 10:45  Executive Boardroom

Securing the Everywhere World — Assessing Your Gaps for Strong Security Posture

Michael Tremante headshot

Michael Tremante

Senior Director, Product

Cloudflare

Steve Moran headshot

Steve Moran

CISO

Sodexo UK

Matt Smith headshot

Matt Smith

Group Head of Cyber Security

St. James’s Place Wealth Management

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, a strong security posture becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimising costs and improving security across diverse cloud environments
  • Spreading risk across a complex ecosystem to mitigate over reliance on specific tools
  • Identifying the right tools while addressing global regulatory and data privacy requirements

10:00 - 10:45  Executive Boardroom

Extending the Identity Security Frontier

Matt Bruun headshot

Matt Bruun

VP, Northern Europe

Delinea

Robust and automated identify security is essential to securing your most critical systems and data.  Given the sensitivity of privileged accounts, unpatched vulnerabilities, and an extensive remote workforce, implementing this is a journey, not a quick fix.

Join this interactive boardroom to:

  • Discuss the difference between strong identity solutions and simple password management
  • Address different approaches to solving Privilege Access Management
  • Gain executive buy in from legal, HR and IT on effective solutions

10:45 - 11:50  Networking Break

10:55 - 11:40  Peer-to-Peer Meetings

Peer-to-Peer Meetings

11:50 - 12:35  Breakout Session

Transforming Application and Service Delivery for the Modern Security Environment

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Initiatives

Island

Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organisation.

In this session, we will discuss:

  • Revolutionising workspaces by balancing productivity, security, availability and user experience
  • How quickly new technologies like the enterprise browser can be adopted to provide a competitive advantage
  • Strategies for reducing the effort required to deliver applications and enhance organisational operations

11:50 - 12:35  Breakout Session

Breakout Session led by Proofpoint

More information coming soon!

11:50 - 12:35  Executive Boardroom

Illuminating the Shadows — Enhancing Discovery and Visibility for Robust Operational Resilience

Richard Meeus headshot

Richard Meeus

Director, Security Technology & Strategy

Akamai Technologies

Jon Segger headshot

Jon Segger

Information Security Manager

Linklaters LLP

In today’s digital world, operational resilience plays a vital function in supporting business continuity. CISOs must focus on the essential roles of discovery and visibility to strengthen their organisation's defences and ultimately protect against cyber threats that can cause intolerable harm. This session will provide the tools to help organisation's anticipate, withstand, and recover from cyber incidents, ensuring uninterrupted business operations.

Join this session to discuss how to:

  • Identify and inventory all digital assets to eliminate blind spots, enhance compliance and mitigate threats
  • Integrate discovery and visibility to ensure complete and comprehensive monitoring of all IT infrastructure, environments and assets
  • Embed these strategies into your cybersecurity framework for continuous operational resilience

11:50 - 12:35  Executive Boardroom

Securing SaaS — Tackling Key Vulnerabilities Across an Evolving Attack Surface

SaaS applications power today’s business, and downtime or compromise will bring operations to a standstill. Despite the proliferation of SaaS-first strategies, Security teams continue to rely on perimeter-based SASE and IDP solutions that are blind to the SaaS-native attack surface. This boardroom will dig into the need to look inside of your SaaS systems to ensure a secure configuration paired with advanced detection and response capabilities. Specifically, you will discuss:

  • How users can bypass ZeroTrust strategies and what mitigating controls should be considered
  • The benefits of a cohesive security posture and detection & response program for SaaS
  • Effective metrics for measuring SaaS Security

12:35 - 13:30  Lunch Service

13:30 - 14:15  Keynote

Lunch Comments & Keynote

More information coming soon!

14:15 - 14:30  Break

14:30 - 15:15  Breakout Session

Developing a Plan for When Nothing Goes to Plan — Prioritising Cyber Resiliency

Sarah Lawson headshot

Sarah Lawson

CISO & Deputy CIO

University College London

Matt Broomhall headshot

Matt Broomhall

CISO

Lloyd's of London

Tony Jowett headshot

Tony Jowett

CISO

ITV

Cybersecurity strategies are constantly having to adapt to match the ever-changing nature of the threat landscape. Whilst maintaining highly responsive security measures remains essential, it is crucial to go beyond such measures; operational resilience must be developed by all CISOs.

Join this session to:

  • Understand the range of advantages that instilling cyber resiliency can bring to your organisation
  • Develop increased resiliency and recovery capabilities
  • Learn how to share the responsibility of fostering resilience with the rest of the C-Suite

14:30 - 15:15  Executive Boardroom

Building Foundations for the Future — How CISOs can Shape Organisational Structure

Innovation brings both new opportunities, and new threats, to organisations: as the scope of what technology makes possible expands, so do the responsibilities of technology leaders. Knowing what you want to be responsible for in your role can prevent overloading your plate and limiting your efficiency. 

Join this session to compare:

  • How do you and your peers define your role?
  • How are C-Level digital leaders dividing responsibilities?
  • How does your organisational structure account for the expanding realm of technology?

14:30 - 15:15  Executive Boardroom

From “No” to “Know-How” — Enabling a Collaborative and Secure Environment

Don Gibson headshot

Don Gibson

CISO

Kinly

Whilst security leaders are an integral part of pushing organisations forward, the safest answers to questions of progress can be ‘no’ or ‘not yet’. Communicating this without making security requirements seem like impediments to progress can be a difficult task to navigate. 

Join this session to discuss:

  • Communicating an unpopular, yet informed, decision clearly
  • Managing other C-Level leaders and the board’s expectations of Cybersecurity concerns
  • Embedding a security first mindset to achieve greater leadership buy-in

15:15 - 15:45  Networking Break

15:45 - 16:30  Breakout Session

How CISO Must Harness Diversity and an Inclusive Mindset to Build Cohesive and Successful Teams

Sarah Self headshot

Sarah Self

Interim Group CISO, UK CISO

Aviva

As part of their leadership responsibilities, CISOs should leverage their influence and technology resources to take an active role in advancing diversity, equity and inclusion (DEI) initiatives. CISOs have a responsibility to use their position as a business leader to support underrepresented groups and meet executive commitments with action. A commitment to diversity and inclusion has got to infuse everything you do as a leader and will drive better outcomes as a result. In this session, we will have an open discussion with aspiring CISOs as they share their input into what will make for future success for the Infosec organisation.

Join this Discussion to understand how to better:

  • Challenge existing thinking and mindsets on DEI programs and identify those areas where security can directly influence
  • Understand what the next generation of security leaders are saying about future teams and strategy, and how to build amazing cultures
  • Balance the push for organisational speed versus focus on your DEI goals and initiatives within the security team

15:45 - 16:30  Executive Boardroom

Securing the Supply — An Open Supply Chain Deep Dive

Roy Shiromani headshot

Roy Shiromani

Group CISO

Legal & General

It's no surprise that supply chain risk remains a major concern for CISOs, keeping them awake at night. Numerous organisations heavily depend on a limited number of companies, leaving them without control over their own fate. In this open discussion, we invite CISOs to delve into the obstacles and possibilities of securing the supply chain. We will explore various challenges, such as comprehending the diverse security approaches of suppliers, fostering strong relationships, and complying with regulations. Gain valuable insights and strategies, empowering CISOs to enhance their organisation's supply chain security.

Join this session to discuss:

  • Navigating the varying security postures within the supply chain and embedding security into procurement contracts
  • Strengthening business relationships by investing time and money in suppliers' security posture
  • Overcoming cultural barriers and navigating complex regulations

15:45 - 16:30  Executive Boardroom

Harnessing Quantitative Information — Using Key Performance Indicators to Enhance Leadership Buy-in

Christine Ford headshot

Christine Ford

Head of Information Security

The Economist

Investing in Cybersecurity is crucial to the success of organisations. However once the investment is made, the application integrated, and the strategy implemented, the value added by new threads of strategy can often fade into the overall tapestry of organisational security.

Join this session to discuss:

  • Measuring the value of investments through quantitative models and techniques
  • Leveraging information to pick out what is and isn’t providing value
  • Enhancing accountability to ensure transparency and leadership buy-in

16:30 - 16:45  Break

16:45 - 17:30  Keynote

Closing Keynote with Rupal Patel, Author of 'From CIA to CEO'

Rupal Patel headshot

Rupal Patel

Corporate Strategist & Executive Advisor

Guest Speaker

More information coming soon!

17:30 - 18:00  Closing Comments and Prize Drawing

14 October 2024

15 October 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Convene 155 Bishopsgate, London
MORE INFORMATION

Your Community Partners


Global Thought Leaders
CISO Thought Leader
Key Partners
Program Partners

Community Programme Manager


For inquiries related to this community, please reach out to your dedicated contact.

Luis Arango Abello

Senior Community Programme Manager

+44 (0)1784 267 880

luis.arangoabello@gartner.com