- Information
Cyber Security Leaders Summit
- Information
Leaders Summit
CYBER SECURITY LEADERS SUMMIT
27-28 March 2024 - Hilton Bankside, London
Who's it for?
Chief Information Security Officer, Chief Information Officer, VP/Director/Head of:
• Information Security, Cyber Security, IT, Cyber Defense, Security Operations, Incident Response, Security Architecture, Threat Intelligence, Pen Testing
Speakers
SPONSORS
What our delegates say
What to expect on the day
Day 1 Agenda
09:15
Arrival & Refreshments
09:45 - 09:55
Chair's Opening Remarks
Rob Mukherjee, Director of Transformation, EveryCloud UK
09:55 - 10:40
Panel Discussion: Mapping a changing attack surface: What are the key threats you need to defend against?
Getting to grips with your true supply chain risk profile: How to map, assess and prioritise vulnerabilities across your third party ecosystem
How can you utilise AI to increase your threat hunting capabilities, improve your tool monitoring and enhance your security posture?
Exploring the multifaceted risk of insider threat and how to manage malicious, compromised and negligent individuals
Louise Taggart, Senior Manager - Threat Intelligence, PwCJon Abbott, CEO, Threat AwareGary Osborn, Head of Information, Amnesty InternationalJoe Wainwright, Head of Cyber DLP Security Operations, Capital One
10:40 - 11:10
Sponsored Keynote
Is security resilience a culture problem: How to stop rogue teams leaving back doors open?
Brett Taylor, Senior SE Director, UKI, SentinelOne
Jonny De Silva, Solution Engineer, UKI, SentinelOne
11:10 - 11:40
Keynote
Keynote
Your voice is my password: Can you protect your company from the next generation of attacks in the AI dimension?
• Is AI working for or against you?• How have new AI technologies been benefitting and empowering cybercriminals?• Hear how Jake ethically hacked a business using AI voice cloning technology to steal the voice of the CEO and company money - completely unnoticed
Jake Moore, Global Security Advisor, ESET
11:40 - 11:50
Tea & Coffee Break
11:40 - 13:10
1-2-1 Meetings
12:20 - 13:40
Lunch
13:40 - 14:25
Panel Discussion
What's the secret behind cyber strategies that engage workforces, remain agile to changing threats, and guard sprawling systems?
• Developing and training security teams that are aware, vigilant, and capable of keeping your organisation safe• The importance of aligning business continuity and organisational adaptability within your security strategy• Proactive and predictive: How to stay ahead of the unknown in a ever changing threat landscape
Sharad Sinha, Head of Security Operations, Oxford University PressSamantha Liscio, Chief Information Technology Officer, NIHR Clinical Research NetworkRich Fowler, CISO, The Royal MintIllona Simpson, CIO EMEA, Netskope
Dominic Trott, Director of Strategy and Alliances, Orange CyberDefence
14:25 - 14:55
Fireside Chat
Fireside Chat
Rising premiums, decreasing coverage: How does cyber insurance need to evolve?
• Paying the price: What threats and emerging technologies have caused the changes in cyber insurance?• Redirecting investment: Can you make better use of your cyber insurance budget into new cyber tools and training?• Does the diminished role of cyber insurance present a challenge or an opportunity when you’re looking to reduce your cyber risk exposure
Eleanor Dallaway, Founder and Editor, Assured Intelligence
Gareth Bateman, UK Cyber Growth Leader, Marsh McLennan
Oscar Neill, CISO, Beeks Group
Cheryl Sims-Hancock, Head of InfoSec, Alzheimer’s Society
14:55 - 16:25
1-2-1 Meetings
16:25 - 16:30
Transition Break - Happy Hour
16:30 - 17:20
Peer-to-Peer Roundtables
1. How to collectively manage risk across an expanding third party ecosystem
2. Can you streamline cloud controls and toolsets to reduce complexity?3. How do you master access controls in line with your risk appetite and context?4. Are bad actors reinventing the wheel or just getting better at their old tricks?5. How to guard the mental health of your team in tandem with the health of your organisation6. When dealing with stretched teams, how do you cut through the noise and focus on high-priority risk mitigation?7. Will a shift left approach solve your software supply chain risks?
17:20 - 17:30
Chair's Closing Remarks & Audience Takeaways
Rob Mukherjee, Director of Transformation, EveryCloud UK
17:30 - 19:00
Networking Drinks Reception
Day 2 Agenda
08:20
Arrival & Refreshments
09:00 - 09:05
Chair's Opening Remarks
Rob Mukherjee, Director of Transformation, EveryCloud UK
09:05 - 09:55
Breakfast Briefings
Breakfast Briefings
Breakfast Briefings
Breakfast Briefings
1. Keeping calm in turbulent times: The makings of a security team who can face crisis head-on2. Are we in a golden era of ransomware? The rise of RaaS, multi-extortion, AI enabled cartels and big game hunting3. Taking a seat at the table: How to make sure cybersecurity is high on the business agenda
09:55 - 10:40
Panel Discussion
Building better lines of defence: Is it time to evolve your security operations?
• Attack me if you can: Why you need to go beyond traditional testing methods to advance your security maturity• How to give your security operations team a complete picture of risk and potential impact of an attack• How quick can you detect, connect and correct malicious activity in your systems?
Geoff Harris, CISO, Clarion Events
David McKenzie, Cyber Security Operations Director, National GasSarah Norman-Clark, Director of Information Security, House of ParliamentAshley Pierre, Senior Security Architect, DeliverooHeather Bedson, Head of Information Security, BPP
10:40 - 11:05
Keynote
Sponsor Presentation
Sponsor Presentation
Data Protection in a Zero Trust World
How controls can be inherited instead of deployed, when you have reversed decades of network centric security architecture based on implicit trust
Evolve your control by changing your security delivery architecture
Data Protection does not need to be Everest
Marc Lueck, EMEA CISO, ZScaler
11:05 - 11:35
Fireside Chat
Fireside Chat
The power of playbooks: How to keep your team breach ready and limit the blast radius
• Predict the unknown and presume the inevitable: Why continuous testing can help you prepare your team for times of crisis• The art of information sharing: Understand the what, why, when and how of revealing information in a rapidly unfolding situation• Back on track: How can you limit the impact of a breach and contain damage
Nick Morgan, Cyber Security Crisis Manager, PwC
Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai
Richard Waine, Head of Technical Security, Easy Jet
11:35 - 13:05
1-2-1 Meetings
12:40 - 13:30
Lunch
13:30 - 14:00
Fireside Chat
Fireside Chat
What is the real impact of geopolitical cyber warfare on your threat levels?
• Hybrid warfare is the new reality: What threats do security leaders need to look out and plan for in this new era of cyber warfare• Exploring the deployment of disruptive geopolitical attacks, including CaddyWiper, HermeticWiper and SwiftSlicer• What can security and risk leaders do to prepare their organisations for the future as geopolitics and cyber continue to intertwine?
Jessica Figueras, CEO, Pionen
Alexandra Godoi, Information Security GRC Lead, Oxfam
Regina Bluman, Cyber Security Advisor, Pinsent Masons
Malcolm Xavier, IT Security Lead, Essar Oil
14:00 - 14:30
Sponsored Interview
Sponsored Interview
Are you stuck playing the blame game? How to reframe your security culture
• What’s the gap between your ideal security culture and your current state of play?• Tools, training, networks: What initiatives make the biggest impact?• Deep dive into how Think Cyber transformed the security culture of Unilever
Sarah Janes, CEO, Layer8Charlie Sinclair, Cyber Security Senior Awareness and Engagement Manager, UnileverTim Ward, CEO and Co-Founder, ThinkCyber
14:30 - 15:00
Fireside Chat
1-2-1 Meetings
15:00 - 15:50
Peer-to-Peer Roundtables
Peer-to-Peer Roundtables
1. What will it take to get users to take ownership of secure behaviours?
2. How to strengthen your cybersecurity posture by aligning endpoint security practices with business objectives
3. How to build a team of first-class breach responders
4. How to better align business and cyber risk to gain buy-in and investment from the board
5 . The big debate on Zero Trust, SASE & DevSecOps: What’s the next platform security evolution?
15:50 - 16:00
Chair's Closing Remarks
Rob Mukherjee, Director of Transformation, EveryCloud UK
Register your interest
REGISTER INTEREST FORM
If you’re interested in attending, simply fill in the below form or send an email to transformers@imagotechmedia.com and a member of the team will be in touch.
sponsor opportunities form
Let us know what technologies you cover below, and we'll put you in touch with your designated account manager to start building your custom package.