<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • 8:00

    Registration and Light Breakfast

  • 8:45

    Chair's Opening Remarks

  • 9:00

    OPENING PANEL: 2026 Threat Reality Check: What Actually Keeps UK CISOs Awake?

    Arrow

    •    Insights into the latest threat intelligence from the National Cyber Security Centre and industry reports
    •    How attacker tactics are evolving with AI and automation
    •    The risks UK boards are still underestimating, and how to communicate them effectively
    •    Strengthening Governance, Risk & Compliance (GRC) to align cyber risk with business strategy and regulatory expectations

  • 9:30

    KEYNOTE: AI vs AI: The Cyber Arms Race Has Started

    Arrow

    •    How to deploy AI safely in detection and response
    •    Insights into real attacker use of generative AI and deepfakes
    •    Exploring governance models for AI in enterprise security

  • 10:00

    KEYNOTE: From Security Leader to Business Risk Leader

    Arrow

    •    How to translate cyber risk into financial impact
    •    Insights into what UK boards actually expect from CISOs
    •    What makes a CISO credible at executive committee level
    Kirsty Kelly, Group Chief Information Security Officer, CFC INTERNATIONAL

  • 10:30

    PANEL DISCUSSION: The One Breach That Changes Everything

    Arrow

    •    Exploring real UK breach case studies and leadership lessons
    •    How to prepare executives for crisis decision-making
    •    What separates resilient organisations from reactive ones

  • 11:00am

    Morning Break & Networking

  • Track A - Threat, Detection & Response

  • 11:30

    PRESENTATION: AI-Powered Attacks Are Already Here

    Arrow

    •    Exploring how attackers use generative AI and deepfakes
    •    How to adapt detection for AI-driven phishing and fraud
    •    What defensive AI actually delivers in real SOC environments

  • 12:00

    PANEL DISCUSSION: From Alert Fatigue to Signal Clarity

    Arrow

    •    How to redesign SOC workflows to reduce noise
    •    Insights into detection engineering maturity models
    •    Exploring automation without blind spots

  • 12:30

    PRESENTATION: Threat Intelligence That Drives Decisions

    Arrow

    •    How to integrate intelligence into board-level risk reporting
    •    Insights into collaboration with peers and law enforcement
    •    What actionable intelligence actually looks like

  • Track B - Compliance, Cloud & Critical Controls

  • 11:30

    PRESENTATION: Data Sovereignty, Cloud & Cross-Border Risk

    Arrow

    •    What UK data protection evolution means for cloud strategy
    •    How to manage multi-region storage compliance
    •    Exploring encryption and key management governance

  • 12:00

    PANEL DISCUSSION: Beyond Compliance: Proving You’re Actually Secure

    Arrow

    •    How to move from checkbox audits to control validation
    •    Insights into regulator expectations vs reality
    •    What measurable resilience really looks like

  • 12:30

    PRESENTATION: From Policy to Pipelines: Rebuilding Cyber Teams for an AI-Driven World

    Arrow

    •    Building an engineering-first security function: shifting from reactive defence to proactive, product-led security
    •    The DevSecOps dial: structuring teams, embedding security into development pipelines, and hiring for the right blend of engineering and security skills
    •    GRC as engineering: moving to compliance-as-code and creating a holistic, real-time view of organisational risk and security posture
    •    Leveraging AI in security: understanding how attackers are using AI, and how security teams can operationalise it to enhance detection, response, and efficiency
    Mike Chilvers, Deputy Chief Information Security Officer, ELANCO

  • 1:00

    Lunch Break & Networking

  • 2:00

    EXPERT ASK ME ANYTHING: Deepfakes & Executive Fraud: The Next Social Engineering Wave

    Arrow

    •    Exploring real incidents affecting UK organisations
    •    How to protect finance teams and executives
    •    What detection controls catch impersonation attacks

  • 2:30

    FIRESIDE CHAT: Incident Response in the Real World

    Arrow

    •    How to coordinate legal, comms and technical teams
    •    Insights into lessons from major breach investigations
    •    What to do when containment fails

    Dr. Dipesh Hindocha, Chief Medical Information Officer, HCA HEALTHCARE UK

  • 3:00

    PANEL DISCUSSION: The Insider Risk Nobody Wants to Discuss

    Arrow

    •    How to detect behavioural anomalies ethically
    •    Insights into cultural and HR collaboration
    •    Exploring privacy vs monitoring trade-offs

  • 4:00

    Afternoon Break & Networking Break

  • 4:00

    EXPERT ASK ME ANYTHING: If Attackers Were Your Product Team

    Arrow

    •    How adversaries innovate faster than defenders
    •    Insights into attacker ROI thinking
    •    What defensive teams can learn from them

  • 4:30

    PANEL DISCUSSION: What the Next Five Years Will Break

    Arrow

    •    Shifting from technical expert to business risk leader: framing cyber in terms of revenue, operations, and enterprise risk
    •    Earning board trust and buy-in: communicating clearly, influencing decisions, and aligning with executive priorities
    •    Enabling the business, not blocking it: supporting innovation (AI, cloud, digital) while managing risk pragmatically
    •    Owning resilience and accountability: ensuring the organisation can respond, recover, and maintain stakeholder trust
    •    The evolving CISO role: from technical leader to strategic business partner
    Matt Cockbill, Partner, ODGERS
    Johann van Duyn, Global Chief Information Security Officer, DO & CO AG

  • 5:00

    Closing Remarks & End of Conference

  • 5:00 - 6:00

    Networking Reception

Ticket icon for medium button_white

Join us at CISO UK 2026

Get shoulder to shoulder with your peers and see what's next in InfoSec
#CISOUK