In-Person

UK & Ireland CISO Community

Executive Summit

14 October 2025 | Convene 155 Bishopsgate

14 October 2025
Convene 155 Bishopsgate

Collaborate with your peers

Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening Cybersecurity Posture through Adaptive Threat Management

Enhancing Data Privacy and Compliance in a Globalized Digital Economy

Building Resilient Cybersecurity Ecosystems for Sustainable Growth

UK & Ireland CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your UK & Ireland CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

13 October 2025

14 October 2025

18:00 - 21:00  Governing Body Private Dinner

Governing Body Welcome Reception

 

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

Powering Trusted Digital Transformation — Resilient by Design

Sam Rhea headshot

Sam Rhea

VP, Strategic Advisor & Chief of Staff

Cloudflare

Martyn Booth headshot

Martyn Booth

CISO

dunnhumby

Organisations are finding it increasingly challenging to keep pace with rapid technological change in a secure manner, and are turning to the CISO to prioritise safety and ensure secure innovation. However, securing the digital future requires more than just establishing guardrails. There is also mounting pressure to enable a cyber-resilient approach—one that fosters innovation while achieving more with less.

In this fireside chat, we will explore:

  • How integrating AI into cybersecurity can enhance risk management
  • The importance of collaboration and co-ownership in driving digital innovation
  • Strategy for striking the right balance between innovation and resilience


09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Future-Proofing Modern Security Posture for the Enterprise

As organisations embrace cloud-first and remote work models, the web browser has become the primary gateway to critical business applications and data. Solidifying your browser as the frontline of defense is essential in today’s evolving threat landscape. Join this session to learn more on: 

  • Browser-focused security strategies, including isolation technologies, zero trust principles, and real-world policy enforcement
  • Mitigating threats such as phishing, credential theft, and malicious downloads—while empowering end users with seamless, secure access to essential tools
  • how a modern security approach can strengthen your organization’s overall cybersecurity posture

 

10:00 - 10:45  Executive Boardroom

Remote Access isn’t the Problem — Execution is

Rob Allen headshot

Rob Allen

Chief Product Officer

ThreatLocker

Modern threats no longer require breaching the network perimeter; they take advantage of the trust placed in users, vendors, and even software that appears secure. As CISOs, our responsibilities have shifted beyond addressing known risks—we must also address the unknown, the unauthorised, and the unmanageable. At this point, trust can become a vulnerability. Control is essential.We’ll explore:

  • Endpoint strategies that assume compromise and minimize impact by design
  • Technologies that give CISOs greater oversight—even in environments with vendors, partners, and unmanaged assets
  • Approaches to enforce policy, contain incidents, and address trust-related gaps—without disrupting business operations

10:45 - 11:50  Networking Break

10:55 - 11:40  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:50 - 12:35  Breakout Session

Turning Human Risk into Resilient Security

Adenike Cosgrove headshot

Adenike Cosgrove

CMO

Mimecast

Gary Osborn headshot

Gary Osborn

Head of Information Security

Amnesty International

Andy Piper headshot

Andy Piper

CISO, Investment Bank & Markets

Barclays

Whether it’s a seemingly harmless email, trusted collaboration tool, innocent user error via shadow AI, or malicious exfiltration of sensitive information, employees can function as an asset but also a potential security risk.

Join this session to discover:

  • Strategies to transform human risk into organisational resilience
  • Approaches for quantifying and managing human-centric cybersecurity risks
  • Ways to empower your security teams to connect the dots between humans and technology

11:50 - 12:35  Breakout Session

From Complexity to Clarity — Solving Real-World Observability Challenges

Tony Lauro headshot

Tony Lauro

Senior Director of Security Strategy

Akamai Technologies

Few things embody complexity like APIs and the multi-cloud environments that CISOs and security teams manage daily. Identifying the real problem can make these challenges even more daunting. For global organizations, having a consistent set of tools and strategies is essential to streamline operational processes. In this session, we’ll take a deeper dive into real-world examples from global enterprises, highlighting their observability and security success stories.

Join this session to learn:

  • Normalizing alert, risk identification, and response processes
  • Leveraging collective intelligence to solve real-world observability challenges
  • How API’s fit into the picture for growing AI based application environments


11:50 - 12:35  Executive Boardroom

The Art of Data Security — Extracting Value From Your Most Important Asset

Ash Hunt headshot

Ash Hunt

VP EMEA Strategy

Cyera

Tobi Patterson-Jones headshot

Tobi Patterson-Jones

Group Deputy CISO

Compass Group PLC

Gaynor Rich headshot

Gaynor Rich

CISO, Capita Experience

Capita

Ian Snelling headshot

Ian Snelling

Senior Security Leader

Skipton Building Society

As a security leader, you’re asked to find ways to securely enable your business to use data to drive innovation and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used.

Join this session to discuss:

  • The importance of knowing your data in an AI era
  • Becoming a security hero by knowing your dataverse (and saying yes to AI)
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

12:35 - 13:20  Lunch Service

13:20 - 14:00  Keynote

Securing Data Flow in the AI-Quantum Era

Sensitive data movement can be risky but restricting it outright can create operational and security challenges. In an era of agentic AI, generative AI, and emerging quantum computing, organizations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases and prepare for the post-quantum encryption (PQE) shift.

Join this keynote to learn:

  • How to choose the right secure access method for each use case
  • Why security must be adaptive to risk, user behavior and AI-driven interactions
  • How to prepare for post-quantum encryption and its enterprise security impact

14:00 - 14:15  Break

14:15 - 15:00  Breakout Session

Building Cyber Resilience — Lloyd’s of London’s Journey to Faster Recovery

Matt Broomhall headshot

Matt Broomhall

CISO

Lloyd's of London

Richard Broughton headshot

Richard Broughton

Head of Operational Resilience & Market Service Oversight

Lloyd's of London

Today’s ever-evolving threat landscape means organisations must be ready to bounce back swiftly and effectively from any cyber incident. Join us for an inside look at how Lloyd’s of London has gone beyond traditional business continuity, pioneering a comprehensive cyber resilience strategy that has dramatically reduced response times. 

  • Discover how Lloyd’s have transitioned from conventional business continuity planning to a mature, organisation-wide approach to cyber resilience
  • Find out how Lloyd’s measured their recovery capabilities against strict timeframes, and how they put the “minimal viable company” concept to the test to guarantee critical operations could continue in the aftermath of a cyber attack
  • Walk away with practical strategies and real-world insights to empower your teams, minimise operational downtime, and ensure your organisation is truly prepared to respond to and recover from cyber threats with confidence

14:15 - 15:00  Breakout Session

Rethinking Risk at NHS England — The Risk Exposure Model

Mark Logsdon headshot

Mark Logsdon

CISO

NHS Digital

Focusing on crown-jewels over everything else only leads to bad things. While it’s tempting to put all your defences around your most critical systems, most cyber attacks don’t start there. Attackers are opportunists—they go after the forgotten, “low-risk” systems that are left unguarded, using them as stepping stones to reach bigger targets. NHS England’s Risk Exposure Model flips the script by helping organisations find and prioritise hidden risks across all their systems. Join this session to discover how this model works, why it matters, and what it looks like in action.

  • Learn why attackers often start with “unimportant” systems and how this can lead to major breaches.
  • See how the Security Exposure Model calculates risk and helps you focus your efforts where they matter most.
  • Hear real-world stories and results from NHS England’s experience using the model to strengthen security across the board.

15:00 - 15:30  Networking Break

15:30 - 16:15  Breakout Session

Security as a Team Sport: Fostering Accountability and Resilience Across Your Organisation

Simon Goldsmith headshot

Simon Goldsmith

CISO

OVO

Preventing cyber vulnerabilities and attacks demands a truly collaborative approach, where every business function and employee plays a vital role. Achieving cybersecurity success hinges on embedding a secure culture that positions responsibility as a shared value, rather than the sole domain of the CISO or security team.

By nurturing a culture of collective accountability, organisations can ease the pressure on CISOs, helping to prevent burnout and support their ongoing wellbeing. The CISO should be recognised as a trusted partner, not the lone guardian of the organisation’s security.

Join us to explore:

  • The risks of CISOs being perceived—and perceiving themselves—as the single individual accountable for defending the organisation against cyber threats
  • Practical strategies for building an effective secure culture throughout your organisation
  • The positive impact of shared accountability and responsibility on organisational wellbeing and cybersecurity resilience

15:30 - 16:15  Breakout Session

Building Diverse Teams to Strengthen Cyber Security

Sarah Harvie headshot

Sarah Harvie

CISO

Kingfisher

Bridging the cyber security skills gap takes more than recruitment—it calls for building and retaining diverse teams. Leaders who foster inclusive cultures, broaden hiring, and support everyone’s growth drive stronger business results and more effective teams. Learn how to make the case for diverse hiring, set clear goals, and implement practical steps to attract and develop talent through early pipelines and upskilling.

  • Assess and enhance team culture by benchmarking diversity, addressing barriers, and reducing burnout.
  • Build a compelling case for diverse hiring with clear goals and measurable outcomes.
  • Gain practical strategies for attracting and retaining diverse cyber security talent through early pipelines and upskilling

16:15 - 16:30  Break

16:30 - 17:15  Keynote

What's Next for you?

Jules Gascoigne headshot

Jules Gascoigne

CISO

Transport for London

Philomena Lavery headshot

Philomena Lavery

SVP Digital Security

AVEVA

Imran Ali headshot

Imran Ali

Group CIO

Aptia Group

John White headshot

John White

Leader, Information and Cyber Security

Virgin Atlantic

Christine Ford headshot

Christine Ford

Head of Information Security

The Economist

As the CISO role evolves, many are considering their next steps, whether that is a board seat, a NED role, moving towards CIO, or continuing to grow where they are. The panel will share practical advice and real-world experiences on professional development and planning what comes next.

Questions we'll ask:

  • How did you know it was time for a new challenge?
  • How do you keep learning in your current role?
  • What advice would you give for ongoing professional development?

17:15 - 18:00  Closing Comments and Prize Drawing

13 October 2025

14 October 2025

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Convene 155 Bishopsgate
More Information

Your Community Sponsors

CISO Thought Leaders

Key Sponsors

Program Sponsors

Community Programme Manager

For inquiries related to this community, please reach out to your dedicated contact.

Luis Arango Abello

Senior Community Programme Manager

+44 (0)1784 267 880

luis.arangoabello@gartner.com