In-Person

UK & Ireland CISO Community

Executive Summit

9 June 2026 | Royal Lancaster London

9 June 2026
Royal Lancaster London

Collaborate with your peers

Get together with UK & Ireland's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Ensuring Organisational Resilience Amid Turbulent Times

Leading as a CISO and Seeing Cyber as a Business Value Add

Enabling and Protecting AI in Modern Innovative Organisations

UK & Ireland CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your UK & Ireland CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

8 June 2026

9 June 2026

18:00 - 21:00  Governing Body Private Dinner

Governing Body Welcome Reception

Join peers for networking. 

Royal Lancaster London, Lancaster Terrace, London W2 2TY.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

Cybersecurity in an AI World — Accelerating towards 2030

Kristin Moyer headshot

Kristin Moyer

Distinguished VP and Gartner Fellow

Gartner

As AI rapidly transforms the digital landscape, CISOs must evolve cybersecurity strategies to keep pace with business innovation. This session examines the shift from AI-cautious governance to AI-first security operations, helping leaders balance risk, cost, and reward while building resilience. Attendees will learn frameworks for evaluating AI technologies, integrating AI into cybersecurity, and leveraging people and governance for success. The session challenges the idea that more AI is always better, advocating thoughtful, maturity-aligned, and risk-aware adoption of AI tools.

Key Takeaways:

  • How to assess and adopt AI technologies at the right stage for your organisation
  • Balancing speed, complexity, and resilience as AI use grows in cybersecurity
  • Integrating AI with people and process to meet 2030 cybersecurity demands

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Mitie’s Journey to a Password-less Future

John Cruise headshot

John Cruise

CISO

Mitie

Join John Cruise, CISO at Mitie, as he outlines how Mitie has transformed IAM by moving beyond traditional passwords. Discover how secure alternatives—like biometrics, hardware keys, and passkeys—are being implemented to create a safer, more seamless authentication experience. This session will explore the rollout of biometric authentication, the cultural changes needed for a passwordless approach, and the communication strategies that kept employees informed and engaged throughout the transition. Gain practical insights and real-world lessons to help your organisation confidently adopt passwordless authentication.

Key Takeaways:

  • Embracing Change: How to navigate cultural shifts and adopt passwordless access management in large organisations
  • Communication Strategies: Messaging and engagement tactics to support employees as they transition to biometrics and other secure authentication methods
  • Lessons Learned: Firsthand insights, common challenges, and practical tips for implementing passwordless authentication and strengthening security at scale

10:00 - 10:45  Breakout Session

AI Didn’t Create Insider Risk, It Removed the Limits

Matt Cooke headshot

Matt Cooke

Director Cybersecurity Strategy

Proofpoint

Insider risk hasn’t increased because people have become more malicious, it has changed because AI has removed the natural limits on what individuals can do with data. Employees can now summarise, transform and move sensitive information in seconds as part of everyday work, blurring the line between productivity and risk. At the same time, workforce disruption and operational pressure are making behaviour less predictable and more impactful. This session reframes insider risk as a combined human and capability challenge, and outlines how organisations can adapt their data protection strategies to match how work actually happens today.

Key takeaways

  • Why traditional insider risk models no longer hold in AI-enabled environments
  • Where existing controls and monitoring approaches fall short in addressing AI-driven data movement
  • A practical framework for designing data protection strategies that account for both human behaviour and AI-enabled scale

10:00 - 10:45  Executive Boardroom

The Future of Identity Security — Managing Non-Human Identities

Andrew Bushby headshot

Andrew Bushby

VP Sales Engineering

Delinea

Martin Bisiker headshot

Martin Bisiker

Head of Information Security | CISO

Next

The security perimeter now extends beyond people to encompass a vast and rapidly growing population of non-human (agent) identities. For CISOs, this shift introduces new risks and governance challenges, as traditional IAM practices struggle to keep pace with the demands of agent identities. This session will examine the evolving threat landscape, highlight the consequences of inadequate controls, and provide actionable strategies for aligning identity security for human, non-human and agent identities.Join to:

  • Understand the key challenges of governing agentic identities, including lifecycle management, orphaned agents, and accountability as AI evolves
  • Explore practical approaches to bridging the gap between human and agent identity management, emphasising governance, oversight, and risk mitigation
  • Gain insights into effective controls and oversight mechanisms essential for securing the rapidly expanding population of agent identities within your organisation

10:00 - 10:45  Executive Boardroom

Advancing Trust — Strategic Safeguards for Agentic & Generative AI

Matthew O'Neill headshot

Matthew O'Neill

Field CTO

Salesforce

Paul Key headshot

Paul Key

CISO & VP Information Security

Smith & Nephew

Katy Hinchcliffe headshot

Katy Hinchcliffe

Director of Cyber and Information Security

M&G Plc

Dive deep into strategic approaches for embedding trust and security in agentic and generative AI initiatives. Leaders will engage in collaborative dialogue on advanced safeguards, governance frameworks, and the role of executive oversight in driving responsible AI adoption. Learn how to align security measures with organisational goals to maximise positive outcomes and maintain stakeholder trust.
Join us to explore:

  • Advanced best practices for securing agentic and generative AI at scale
  • How zero trust architecture and data governance support organisational objectives and regulatory compliance
  • Executive-level approaches to fostering trust, security, and responsible innovation in AI deployment

10:00 - 10:45  Executive Boardroom

Is Your Enterprise Ready for AI?

Steve Tchejeyan headshot

Steve Tchejeyan

President

Island

As generative AI and the enterprise platform transform the workplace, CISOs must protect sensitive data and ensure compliance in an environment where GenAI apps are often used without security oversight. The proliferation of shadow AI introduces new vulnerabilities, including data leakage and loss of investigative visibility. 

Join this boardroom to discuss:

  • Identifying and mitigating risks from shadow tools and unmanaged AI usage
  • Designing policies and controls to safeguard sensitive data and ensure compliance
  • Practical strategies for monitoring AI activity and responding to incidents

10:45 - 11:50  Networking Break

10:55 - 11:40  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:50 - 12:35  Breakout Session

Security and Data Collide — Navigating AI Risk and Innovation

Jason Clark headshot

Jason Clark

Chief Strategy Officer 

Cyera

AI won’t fix broken data. Governance is the key to transforming fragmented, unreliable information into trusted, strategic insight. As AI becomes embedded across the enterprise, the divide between information security and the data and analytics function is collapsing. Security leaders focused on protecting data now intersect with data leaders tasked with leveraging it. AI governance sits at the center of this convergence—where innovation meets accountability. CISOs have a unique opportunity to move from backend defenders to strategic enablers, shaping how AI scales safely across the business.Join this session to learn how to:

  • Build governance models that bridge security and data strategy
  • Mitigate AI risk through cross-functional collaboration
  • Enable trust through unified governance practices

 

11:50 - 12:35  Breakout Session

The Hygiene Gap— How Simple Failures Enable Sophisticated Attacks

Douglas Weekes headshot

Douglas Weekes

CISO & Director of Data Governance

Sainsbury's

Jon Abbott headshot

Jon Abbott

CEO

ThreatAware UK

In an age of AI‑driven phishing, deep fakes, and supply‑chain attacks, it’s easy to chase the most advanced threats. Yet most breaches still succeed because basic controls fail. Join Jon Abbott, CEO of ThreatAware, and Doug Weekes, Group CISO at Sainsbury’s, as they explain why asset visibility and continuous control validation are not outdated fundamentals, but the foundations of resilience, even against highly sophisticated adversaries.

What You’ll Learn:

  • How attackers exploit simple oversights, and why closing visibility gaps removes common entry points
  • Why complete asset visibility strengthens security posture faster than adding new tools
  • How continuous control validation builds confidence and enables decisive response under pressure

11:50 - 12:35  Executive Boardroom

Data Sovereignty and Resilience — Control and Confidence in the Cloud

George Scott headshot

George Scott

CISO

British Foreign, Commonwealth, & Development Office

Guy Batey headshot

Guy Batey

Head of Engineering, EMEA

Rubrik

As organisations accelerate digital transformation and cloud adoption, CISOs face a critical challenge: enabling the agility of hybrid and multi‑cloud environments while maintaining data sovereignty, regulatory compliance, and cyber resilience in a post‑Brexit landscape. With increasing regulatory scrutiny and board‑level accountability, data control and recoverability are no longer purely technical concerns.

Join this boardroom to discuss:

  • Why regulatory requirements and data jurisdiction have become core business issues—and how to address them without limiting innovation
  • How to achieve strong, immutable data protection and coordinated recovery across on‑prem, hybrid, and multi‑cloud environments
  • Strategies to eliminate data blind spots through continuous discovery, classification, and protection of critical structured and unstructured data

11:50 - 12:35  Executive Boardroom

Out of Sight, Out of Mind? Navigating Shadow IT

Dean Paterek headshot

Dean Paterek

Chrome Enterprise Security Lead EMEA

Google

As UK organisations accelerate their adoption of GenAI, CISOs face new challenges  driven by shadow IT —personal AI tools and browser extensions used by employees beyond visibility. These unsanctioned tools introduce significant risks, including data exposure, regulatory non-compliance, and gaps in threat detection that traditional security controls often overlook.

Join Google Chrome Enterprise in this boardroom to discuss:

  • The evolving threat landscape of shadow AI in browsers and its impact on enterprise security posture
  • Limitations of legacy security frameworks in identifying and mitigating AI-driven risks
  • How to ensure productivity whilst securing your organisation's data


11:50 - 12:35  Executive Boardroom

Securing the Workforce — Empowering Modern Security Operations

Ian Snelling headshot

Ian Snelling

Senior Security Leader

Skipton Building Society

As AI agents transition from passive tools to active workforce members, security operations teams face new governance and operational challenges. The risks of rapid, autonomous action are real—but so are the opportunities for transformation. In today’s threat landscape, vulnerabilities are exploited at machine speed, often by agentic AI, making it essential for the SOC to evolve from reactive to proactive. 

Join this session to discuss: 

  • Reining in shadow agents with visibility across assets and users
  • Unlocking the value of agentic AI within the SOC
  • Safeguarding your business from rogue agents

12:35 - 13:20  Lunch Service

13:20 - 14:00  Keynote

From Shadow Tools to the Human Layer— Securing the AI Attack Surface

Adenike Cosgrove headshot

Adenike Cosgrove

CMO

Mimecast

AI has expanded the enterprise attack surface faster than any technology in a generation, and most security programs are still addressing it one risk at a time. From shadow AI and embedded copilots to MCP servers and autonomous agents, the existing security stack wasn’t built for this shift. The human behind every AI system adds critical context that changes everything. This session provides CISOs with a unified framework for managing AI risk and guidance on where to start.

Key takeaways:

  • How AI rapidly expands the attack surface beyond traditional security models
  • Why the human layer is now the most critical control point
  • A unified AI risk framework and a practical starting point for CISOs

14:00 - 14:15  Break

14:15 - 15:00  Breakout Session

What Cyber‑Attacks Teach Us: Lessons from Research and Real‑World Incidents

Clare Patterson headshot

Clare Patterson

CISO

Royal Mail

Based on PhD research this session examines the lessons organisations often learn only after experiencing a cyber‑attack

14:15 - 15:00  Breakout Session

Cyber Resilience in the AI Era — Securing What You Can’t Yet See

Richard Meeus headshot

Richard Meeus

Director, Security Technology & Strategy

Akamai Technologies

 As AI adoption accelerates, it is reshaping the threat landscape. AI-driven applications expand the attack surface through APIs, introduce new data flows, and increase machine-to-machine interactions - often faster than security teams can secure them. For security leaders, the challenge is enabling AI innovation while maintaining resilience, visibility, and control.

Join this session to learn more on:

  • Securing AI applications while limiting lateral movement
  • Gaining visibility into AI-driven APIs and data flows
  • Maintain compliance and auditability as AI interacts with regulated data


14:15 - 15:00  Executive Boardroom

Building the Foundations of Data Protection to Accelerate AI Adoption

Dana Simberkoff headshot

Dana Simberkoff

Chief Risk, Privacy, and Information Security Officer

AvePoint

Dave Lochhead headshot

Dave Lochhead

CISO, Commercial Insurance, Business Technology Solutions, Enterprise Data Analytics & Architecture

Zurich Insurance

Mike Heritage headshot

Mike Heritage

VP, Cyber Security

Financial Times

As AI and agentic AI become integral to every business function, organisations are discovering that the biggest constraint is no longer ambition—it’s confidence. A rapidly expanding attack surface, stricter regulations, and heightened geopolitical tensions are colliding with familiar data challenges like legacy and fragmented data, digital sprawl, and overexposed information. In fact, more than 75% of organisations have already faced AI-related security breaches, creating faster and more severe consequences than ever before. This session will define modern data protection in the AI era and outline the foundational strategies that allow CISOs to enable faster AI adoption by replacing fragmented controls with a more unified approach to protecting the organisation’s data, even when planning for worst case operational scenarios.  

Key takeaways:

  • Understand what modern data protection means for AI-powered organisations  
  • Explore foundational strategies to prevent data breaches, compliance failures, and reputational harm while reducing friction in AI adoption  
  • Learn how to establish secure, high quality, and well governed data frameworks so AI initiatives can scale faster and more safely

14:15 - 15:00  Executive Boardroom

Empowering People — Building Secure and Resilient Organisations Through Smart Behaviours

Benjamin Netter headshot

Benjamin Netter

Founder & CEO

Riot Security

Matt Broomhall headshot

Matt Broomhall

CISO

Lloyd's of London

In today’s world, cybercrime has become one of the largest global economies. With threats like AI-powered deepfakes, instant messaging scams, and advanced phishing attacks on the rise, CIOs and CISOs must make security awareness a top priority. The key to resilience is cultivating a culture where every employee can spot and respond to both traditional and emerging threats—minimising the risks of social engineering and strengthening your organisation’s overall security.
Join this boardroom discussion to explore:

  • How to embed secure mindsets and behaviors into your organisational culture, staying ahead of ever-evolving social engineering tactics
  • Practical strategies for empowering teams across all business functions to recognise and respond to threats before they escalate
  • Ways to leverage awareness programs and training to achieve measurable improvements in your security posture


14:15 - 15:00  Executive Boardroom

Tackling Complexity — Back to Basics with Zero Trust

Rob Allen headshot

Rob Allen

Chief Product Officer

ThreatLocker

Joe Da Silva headshot

Joe Da Silva

CISO

Johnson Matthey

Zero Trust is often presented as a product strategy or a multi‑year transformation, but in practice it is a security philosophy built on fundamentals. For CISOs under pressure to reduce risk, demonstrate progress, and justify spend, the real challenge is knowing where to start and how to deliver value quickly. This session cuts through the hype to refocus on the basics of Zero Trust, taking a pragmatic view of the capabilities that matter most. We’ll explore how prioritising identity enables measurable risk reduction today, while establishing a foundation that can scale with the business.

Join us to discuss

  • Aligning Zero Trust to board‑level risks and outcomes
  • The fastest path to demonstrable Zero Trust value
  • How to prioritise core capabilities and achieve incremental wins

15:00 - 15:20  Networking Break

15:20 - 16:05  Executive Boardroom

Rethinking SaaS Security for Agentic AI

Josh Cho headshot

Josh Cho

VP of Solution Engineering

Obsidian Security

The future of enterprise AI isn’t just about capability, it’s about confidence. The confidence to give an AI agent access to your most sensitive systems, your most critical workflows, your most valuable data. And know that there are guardrails, visibility, and intelligence wrapped around every action it takes. That’s not a nice to have. That’s the price of admission for enterprise AI adoption at scale. And that’s precisely where Obsidian Security becomes a game changer. CISOs need to rethink their SaaS supply chain security which are now going to be accessed by AI agents. The modern SaaS supply chain is a double-edged sword—both a catalyst for AI and a labyrinth of hidden vulnerabilities. And as enterprise ecosystems become an increasingly complex web of interconnected tools, it's all-too-easy for attackers to leverage a single misconfiguration or compromised app to travel rapidly and invisibly across environments.

Join this boardroom to discuss:

  • How CISOs can champion AI with a security-first mindset
  • Strategies for achieving deep visibility into SaaS-to-SaaS connections, user activity, and third-party integrations for effective AI management
  • Best practices in AI security from financial services, healthcare, manufacturing sectors

15:20 - 16:05  Breakout Session

The CISO’s Playbook for 2030— Preparing for the Threats We Know Are Coming

Claire Van Den Broecke headshot

Claire Van Den Broecke

Group Head of Information Security

Mott MacDonald Group

Tash Van Den Heever headshot

Tash Van Den Heever

CISO, UK

Investec


The next decade in cybersecurity will not be defined by surprise attacks but by whether organisations acted early enough on the risks they already understood. This session invites CISOs to step a few years into the future and work backwards, using realistic scenarios to explore how today’s decisions shape security outcomes in 2030. Expect practical discussion, uncomfortable questions, and plenty of peer insight.

What We’ll Tackle:

  • Quantum Cryptography— What to do now if you know today’s encryption has an expiry date
  • Agentic AI— How to stay in control when autonomous systems start acting on your behalf
  • Data Sovereignty— Designing security that still works for organisations operating across borders


15:20 - 16:05  Gartner Boardroom

Boardroom Confidence And Addressing the Power Imbalance

Chris Gould headshot

Chris Gould

Executive Partner, Gartner for CISO Executive Programs

Gartner

As board‑level scrutiny of cybersecurity intensifies, a CISO’s ability to influence, challenge and engage senior leaders has become critical. Technical expertise alone is no longer enough—but how do you build confidence, hold your ground and close the communication gap with the board?

Join this interactive workshop to gain practical insights on:

  • Debunking the perceived power imbalance and learning how to level the playing field with senior stakeholders
  • Developing essential soft skills to communicate risk, strategy and security priorities with clarity and credibility
  • Navigating difficult and controversial conversations with confidence, composure and influence

16:05 - 16:15  Break

17:00 - 18:00  Closing Comments and Prize Drawing

8 June 2026

9 June 2026

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Royal Lancaster London

A block of rooms has been reserved at the Royal Lancaster London at a reduced conference rate. Reservations should be made online or by calling 020 7551 6000 .

Deadline to book using the discounted room rate of £405 GBP (plus tax) is 17 May 2026.

Your Community Sponsors

Global Thought Leaders

CISO Thought Leader

Key Sponsor

Program Sponsors

Community Programme Manager

For inquiries related to this community, please reach out to your dedicated contact.

Chloe Stevenson

Senior Community Programme Manager, Territory Specialist

+44 (0)7701 308 236

chloe.stevenson@gartner.com