UK & Ireland CISO Community
Executive Summit
9 June 2026 | Royal Lancaster London
9 June 2026
Royal Lancaster London
Collaborate with your peers
Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Ensuring Organisational Resilience Amid Turbulent Times
Leading as a CISO and Seeing Cyber as a Business Value Add
Enabling and Protecting AI in Modern Innovative Organisations
UK & Ireland CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Christine Maxwell
SSE
CISO

Clare Patterson
Royal Mail
CISO

Helen Rabe
BBC
CISO
What to Expect
Agenda
08:00 - 09:00 Registration & Breakfast
09:00 - 09:45 Keynote
Cybersecurity in an AI World — Accelerating towards 2030
Kristin Moyer
Distinguished VP and Gartner Fellow
Gartner
As AI rapidly transforms the digital landscape, CISOs must evolve cybersecurity strategies to keep pace with business innovation. This session examines the shift from AI-cautious governance to AI-first security operations, helping leaders balance risk, cost, and reward while building resilience. Attendees will learn frameworks for evaluating AI technologies, integrating AI into cybersecurity, and leveraging people and governance for success. The session challenges the idea that more AI is always better, advocating thoughtful, maturity-aligned, and risk-aware adoption of AI tools.
Key Takeaways:
- How to assess and adopt AI technologies at the right stage for your organisation
- Balancing speed, complexity, and resilience as AI use grows in cybersecurity
- Integrating AI with people and process to meet 2030 cybersecurity demands
09:45 - 10:00 Break
10:00 - 10:45 Breakout Session
Mitie’s Journey to a Password-less Future
John Cruise
CISO
Mitie
Join John Cruise, CISO at Mitie, as he outlines how Mitie has transformed IAM by moving beyond traditional passwords. Discover how secure alternatives—like biometrics, hardware keys, and passkeys—are being implemented to create a safer, more seamless authentication experience. This session will explore the rollout of biometric authentication, the cultural changes needed for a passwordless approach, and the communication strategies that kept employees informed and engaged throughout the transition. Gain practical insights and real-world lessons to help your organisation confidently adopt passwordless authentication.
Key Takeaways:
- Embracing Change: How to navigate cultural shifts and adopt passwordless access management in large organisations
- Communication Strategies: Messaging and engagement tactics to support employees as they transition to biometrics and other secure authentication methods
- Lessons Learned: Firsthand insights, common challenges, and practical tips for implementing passwordless authentication and strengthening security at scale
10:00 - 10:45 Breakout Session
AI Didn’t Create Insider Risk, It Removed the Limits
Hosted by Proofpoint
Matt Cooke
Director Cybersecurity Strategy
Proofpoint
Insider risk hasn’t increased because people have become more malicious, it has changed because AI has removed the natural limits on what individuals can do with data. Employees can now summarise, transform and move sensitive information in seconds as part of everyday work, blurring the line between productivity and risk. At the same time, workforce disruption and operational pressure are making behaviour less predictable and more impactful. This session reframes insider risk as a combined human and capability challenge, and outlines how organisations can adapt their data protection strategies to match how work actually happens today.
Key takeaways
- Why traditional insider risk models no longer hold in AI-enabled environments
- Where existing controls and monitoring approaches fall short in addressing AI-driven data movement
- A practical framework for designing data protection strategies that account for both human behaviour and AI-enabled scale
10:00 - 10:45 Executive Boardroom
The Future of Identity Security — Managing Non-Human Identities
Hosted by Delinea
Andrew Bushby
VP Sales Engineering
Delinea
Martin Bisiker
Head of Information Security | CISO
Next
The security perimeter now extends beyond people to encompass a vast and rapidly growing population of non-human (agent) identities. For CISOs, this shift introduces new risks and governance challenges, as traditional IAM practices struggle to keep pace with the demands of agent identities. This session will examine the evolving threat landscape, highlight the consequences of inadequate controls, and provide actionable strategies for aligning identity security for human, non-human and agent identities.Join to:
- Understand the key challenges of governing agentic identities, including lifecycle management, orphaned agents, and accountability as AI evolves
- Explore practical approaches to bridging the gap between human and agent identity management, emphasising governance, oversight, and risk mitigation
- Gain insights into effective controls and oversight mechanisms essential for securing the rapidly expanding population of agent identities within your organisation
10:00 - 10:45 Executive Boardroom
Advancing Trust — Strategic Safeguards for Agentic & Generative AI
Hosted by Salesforce
Matthew O'Neill
Field CTO
Salesforce
Paul Key
CISO & VP Information Security
Smith & Nephew
Katy Hinchcliffe
Director of Cyber and Information Security
M&G Plc
Dive deep into strategic approaches for embedding trust and security in agentic and generative AI initiatives. Leaders will engage in collaborative dialogue on advanced safeguards, governance frameworks, and the role of executive oversight in driving responsible AI adoption. Learn how to align security measures with organisational goals to maximise positive outcomes and maintain stakeholder trust.
Join us to explore:
- Advanced best practices for securing agentic and generative AI at scale
- How zero trust architecture and data governance support organisational objectives and regulatory compliance
- Executive-level approaches to fostering trust, security, and responsible innovation in AI deployment
10:00 - 10:45 Executive Boardroom
Is Your Enterprise Ready for AI?
Hosted by Island
Steve Tchejeyan
President
Island
As generative AI and the enterprise platform transform the workplace, CISOs must protect sensitive data and ensure compliance in an environment where GenAI apps are often used without security oversight. The proliferation of shadow AI introduces new vulnerabilities, including data leakage and loss of investigative visibility.
Join this boardroom to discuss:
- Identifying and mitigating risks from shadow tools and unmanaged AI usage
- Designing policies and controls to safeguard sensitive data and ensure compliance
- Practical strategies for monitoring AI activity and responding to incidents
10:45 - 11:50 Networking Break
10:55 - 11:40 Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:50 - 12:35 Breakout Session
Security and Data Collide — Navigating AI Risk and Innovation
Hosted by Cyera
Jason Clark
Chief Strategy Officer
Cyera
AI won’t fix broken data. Governance is the key to transforming fragmented, unreliable information into trusted, strategic insight. As AI becomes embedded across the enterprise, the divide between information security and the data and analytics function is collapsing. Security leaders focused on protecting data now intersect with data leaders tasked with leveraging it. AI governance sits at the center of this convergence—where innovation meets accountability. CISOs have a unique opportunity to move from backend defenders to strategic enablers, shaping how AI scales safely across the business.Join this session to learn how to:
- Build governance models that bridge security and data strategy
- Mitigate AI risk through cross-functional collaboration
- Enable trust through unified governance practices
11:50 - 12:35 Breakout Session
The Hygiene Gap— How Simple Failures Enable Sophisticated Attacks
Hosted by ThreatAware UK
Douglas Weekes
CISO & Director of Data Governance
Sainsbury's
Jon Abbott
CEO
ThreatAware UK
In an age of AI‑driven phishing, deep fakes, and supply‑chain attacks, it’s easy to chase the most advanced threats. Yet most breaches still succeed because basic controls fail. Join Jon Abbott, CEO of ThreatAware, and Doug Weekes, Group CISO at Sainsbury’s, as they explain why asset visibility and continuous control validation are not outdated fundamentals, but the foundations of resilience, even against highly sophisticated adversaries.
What You’ll Learn:
- How attackers exploit simple oversights, and why closing visibility gaps removes common entry points
- Why complete asset visibility strengthens security posture faster than adding new tools
- How continuous control validation builds confidence and enables decisive response under pressure
11:50 - 12:35 Executive Boardroom
Data Sovereignty and Resilience — Control and Confidence in the Cloud
Hosted by Rubrik
George Scott
CISO
British Foreign, Commonwealth, & Development Office
Guy Batey
Head of Engineering, EMEA
Rubrik
As organisations accelerate digital transformation and cloud adoption, CISOs face a critical challenge: enabling the agility of hybrid and multi‑cloud environments while maintaining data sovereignty, regulatory compliance, and cyber resilience in a post‑Brexit landscape. With increasing regulatory scrutiny and board‑level accountability, data control and recoverability are no longer purely technical concerns.
Join this boardroom to discuss:
- Why regulatory requirements and data jurisdiction have become core business issues—and how to address them without limiting innovation
- How to achieve strong, immutable data protection and coordinated recovery across on‑prem, hybrid, and multi‑cloud environments
- Strategies to eliminate data blind spots through continuous discovery, classification, and protection of critical structured and unstructured data
11:50 - 12:35 Executive Boardroom
Out of Sight, Out of Mind? Navigating Shadow IT
Hosted by Google Chrome Enterprise
Dean Paterek
Chrome Enterprise Security Lead EMEA
As UK organisations accelerate their adoption of GenAI, CISOs face new challenges driven by shadow IT —personal AI tools and browser extensions used by employees beyond visibility. These unsanctioned tools introduce significant risks, including data exposure, regulatory non-compliance, and gaps in threat detection that traditional security controls often overlook.
Join Google Chrome Enterprise in this boardroom to discuss:
- The evolving threat landscape of shadow AI in browsers and its impact on enterprise security posture
- Limitations of legacy security frameworks in identifying and mitigating AI-driven risks
- How to ensure productivity whilst securing your organisation's data
11:50 - 12:35 Executive Boardroom
Securing the Workforce — Empowering Modern Security Operations
Hosted by Cisco
Ian Snelling
Senior Security Leader
Skipton Building Society
As AI agents transition from passive tools to active workforce members, security operations teams face new governance and operational challenges. The risks of rapid, autonomous action are real—but so are the opportunities for transformation. In today’s threat landscape, vulnerabilities are exploited at machine speed, often by agentic AI, making it essential for the SOC to evolve from reactive to proactive.
Join this session to discuss:
- Reining in shadow agents with visibility across assets and users
- Unlocking the value of agentic AI within the SOC
- Safeguarding your business from rogue agents
Apply to Participate
Apply to participate in the UK & Ireland CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Royal Lancaster LondonA block of rooms has been reserved at the Royal Lancaster London at a reduced conference rate. Reservations should be made online or by calling 020 7551 6000 .
Deadline to book using the discounted room rate of £405 GBP (plus tax) is 17 May 2026.
Community Programme Manager
For inquiries related to this community, please reach out to your dedicated contact.
Chloe Stevenson
Senior Community Programme Manager, Territory Specialist
+44 (0)7701 308 236
chloe.stevenson@gartner.com
