<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">



2nd Edition

Chief Information Security Officer, UK

Evolving Strategy Through Collaboration:
The UK's Most Exclusive In-Person Event For InfoSec Executives

15-16 March, 2022
155 Bishopsgate | Central London
EXPLORE SPONSORSHIP
GET YOUR TICKET
DOWNLOAD THE AGENDA

DOWNLOAD THE AGENDA

Download a PDF copy of the agenda today

DOWNLOAD THE AGENDA

AGENDA

  • 15th March - Main Conference - Day One
  • 16th March - Main Conference - Day Two
8.00am - 8.50am GMT
Registration & Networking
8.50am - 9.00am GMT
Welcoming remarks from the Chairman

Chairman:

Matt White, Former Global Head of Information Security, Chanel

9:00am - 9.30am GMT
Primary Presentation - A 'Scientific' Approach to Cyber Security
  • An overview of cyber security in the scientific research context
  • Affecting change with knights, Nobel Prize laureates, and where almost everyone has a PhD
  • Reflections on Year 1 as a CISO

Speaker:

Guy Morrell, CISO, The Francis Crick Institute 

9:30am - 10.00am GMT
Presentation - Why SOCs Fail and How You Can Get It Right
  • How to champion a strong SOC team to benefit the wider business
  • Hard learned lessons of implementing Security Operations. Insights into when they work well, when they don’t, and why they don’t.
  • Technology is not strategy: Bringing together tools with in-house engineering to deliver a tailored solution

Speaker:

Brad Freeman, Director of Technology, SenseOn

10.00am – 10.50am GMT
Panel Discussion - Conquering Cloud: How to Achieve Resilience & Unlock the Full Value of Cloud
  • Top tips on developing a successful cloud security strategy
  • Best practices on identifying & managing data risks in your cloud environment 
  • What are the key security considerations when your organisation selects your cloud provider?

Speakers: 

Manish Chandela, Group CISO and Infrastructure Director, Unipart Group 

Tristan Morgan, Global Director Security Advisory & Cyber, BT 

Gaus Rajnovic, Cyber Security Manager, Panasonic 

Manoj Bhatt, Head of Cyber Security, ClubCISO

10.50am – 11.30am GMT
Refreshments & Networking Break
11.30am – 12.15pm GMT
Panel Discussion - How Are You Effectively Managing the Element of Human Error to Reduce Risk?
  • Utilising cultural change & staff training to mitigate human error
  • Driving behaviour change in cyber security
  • Reviewing outdated and unauthorised software to reduce human error

Speakers: 

Moderator: Samuel Barfoot, Security Architect, Checkmarx 

Tom Stoddart, CISO, Manchester Metropolitan University  

Lesley Charteris, Cyber Security Culture and Awareness Lead, ECP Consulting

Matt White, Former Global Head of Information Security, Chanel

Guy Morrell, CISO, The Francis Crick Institute 

12.15pm – 1.30pm GMT
Lunch & Networking Break
1.30pm – 2.00pm GMT
Presentation - The Changing Role of Identity in Security
  • The future of IAM: Examining why and how identity has to change
  • Best practices on how to implement and effectively manage IAM
  • Utilising Zero Trust for your IAM strategy for optimal security

Speaker: 

Martin Ingram, Product Owner, Identity and Access Management, Natwest 

2.00pm – 2.50pm GMT
Panel Discussion - Your Worst Nightmare: How to Detect and Avoid Data Leakage Before It Becomes Detrimental
  • An overview of how to detect and prevent data leakage
  • What are the key challenges in utilising machine learning for data loss prevention?
  • How to create a response plan to prepare your organisation for any eventuality

Speakers: 

Moderator: Manoj Bhatt, Head of Cyber Security, ClubCISO

Lorraine Dryland, Global CISO, First Sentier Investors

Ash Hunt, Group Head of Information Security, Sanne 

Nigel Stanley, Director of Cyber Security/Operational Technology (OT) Cyber Security, Jacobs 

John Skipper, CISO, Metro Bank

2.50pm – 3.30pm GMT
Refreshments & Networking Break
3.30pm - 4.30pm GMT
Discussion Group 1 – Attracting and Maintaining Cyber Talent: Do You Have a Cyber Skill Shortage?
  • What are the best practices in cyber talent recruitment? 
  • Tips on how to diversify your talent
  • Is the concept of a ‘qualified’ candidate hindering your business? 

Speakers: 

Jim Newman, Global VP of Information Security, KidsLoop 

Henrik Kiertzner, Head of IT Operations, The National Trust 

Stephen Owen, CISO, Esure Group 

4.30pm – 6.00pm GMT
Networking Drinks Reception
8.00am - 9.15am GMT
Registration & Networking
9.15am - 9:30am GMT
Welcoming remarks from the Chairman

Chairman:

Matt White, Former Global Head of Information Security, Chanel

9:30am - 10.00am GMT
Presentation - The Human Aspects of Cyber Security
  • What factors influence people to not comply with cyber security best practice?
  •  How can we promote positive behavioural change?
  • How can tech solutions best support change?

Speaker: 

Jonathan Craven, Compliance and Privacy Lead, iRhythmTech 

10.00am – 10.30am GMT
Presentation - Building a Strong Security Culture at Your Organisation: How Not To Get It Wrong
  • What makes a strong security culture?  
  • Why using the mythology of your organisation will help you succeed 
  • Shifting the mindset from compliance to skills acquisition 

Speaker: 

Alison Crockford, Human Risk and Security Awareness Lead, Arrival 

10.30am – 11.30am GMT
Refreshments & Networking Break
11.30am – 12.15pm GMT
Panel Discussion – How Can Businesses Adopt Ransomware Resilience into Continuity Planning?
  • Assessing how to best investigate an attack to aid your legal response
  • Best practices for establishing cyber hygiene & mitigating threats
  • Balancing cost effectiveness and a good ransomware response

Speakers: 

Glen Hymers, Head of Data Privacy and Compliance, Cabinet Office UK 

Milos Pesic, Global Head of Information and Cyber Security, Marken  

12.15pm – 12.45pm GMT
Executive Interview – Dealing with a Data Breach: A Frontline Experience
  • Exploring the data breach frontline and learning from what can go wrong
  • Why are data breaches an ethical battle as well as a legal one?
  • What are the attributes of a good data breach response plan?

Speaker: 

Dominic Newton, Group Data Protection Officer, IQ-EQ 

12.45pm – 2.00pm GMT
Lunch & Networking Break
2.00pm - 3.00pm GMT
Discussion Group 2 – BISO vs CISO: Why the BISO Might Be Your Key Player for Success
  • How do BISOs bridge the gap between corporate boards and cyber security? 
  • What are the key characteristics of an effective BISO? 
  • What should the organisational reporting structure between the BISO and the CISO look like in the future?

Speakers: 

Milos Pesic, Global Head of Information and Cyber Security, Marken 

Marie Bradley, Head of Risk and Compliance, ByMiles 

Alan Jenkins, Advisor, Security Architecture, Vocalink

3.00pm GMT
End of Conference