VIRTUAL

UK & Ireland CISO Virtual Executive Summit

24 November 2020 | 09:00 - 15:30 GMT

24 November 2020 | 09:00 - 15:30 GMT

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the UK & Ireland CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organisation

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Governing Body Co-Chairs

Elaine Bucknor

Sky Plc
Group Chief Information Security Officer

Jared Carstensen

CRH
CISO

Bobby Ford

Unilever
VP, Global CISO

Matt Gordon-Smith

Gatwick Airport
CISO

Paula Kershaw

Barclays
Chief Controls Officer, Cyber & Resilience

Ewa Pilat

Willis Towers Watson
Global CISO

Yolande Young

BP
CISO

Agenda


24 November 2020

11:00 - 11:45  GMT Virtual Summit Keynote

Building for success - unlocking bottom-up security

Guy Podjarny headshot

Guy Podjarny

President & Co-founder

Snyk

Simon Maple headshot

Simon Maple

Director of Developer Relations

Snyk

Digital transformation is a major change to the way we think about delivering software and the development process. With the migration to containers and cloud, infrastructure is now a part of the application. The transition to DevOps processes and the speed at which software is being introduced is forcing us to evolve our slower, more traditional security practices. 

If our security practices are going to keep pace with the digital transformation of our business, we need to empower and trust our developers to be the front-line of our security practices, and employ modern security tools that suit this bottom-up revolution in how we build secure software.

Join this fireside chat between Guy Podjarny and Simon Maple from Snyk as they discuss:

  • When do the old ways of security testing fail to mesh with the way we build modern cloud native applications?
  • How can developer-owned security practices with developers cut risk without harming agility?
  • How can we shift the security mindset and facilitate the adoption of modern tools to support this change?


11:45 - 12:15  GMT Break

12:15 - 13:00  GMT Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

Neil Thacker headshot

Neil Thacker

CISO EMEA

Netskope

Manish Chandela headshot

Manish Chandela

Group CISO

Unipart Group Limited

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

In this session, we will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of moving to a SASE architecture
  • Insights from organizations adopting SASE today


13:00 - 14:00  GMT Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Jeremy Snyder headshot

Jeremy Snyder

VP Business Development and Corporate Development

DivvyCloud

Sarah Lawson headshot

Sarah Lawson

Group CISO

OCS

Benedict Olaoya headshot

Benedict Olaoya

CISO

SGN

A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach


13:00 - 14:00  GMT Virtual Summit Boardroom

Security Awareness in the Modern Era

Michael Colao headshot

Michael Colao

Chief Corporate Security Officer

AXA

Carl McConkey headshot

Carl McConkey

CISO

MBDA Missile Systems

Jason Ozin headshot

Jason Ozin

Group Information Security Officer

PIB Group


For many information security leaders, it’s not technology, but people, that form the weakest link in the organisation’s defenses. Even personal social media habits can put a large enterprise at risk, and at a time when more employees are working remote, security awareness training must be top-of-mind more than ever before.

Join this virtual boardroom to discuss:

  • Effective strategies for security awareness training, including generational differences

  • How to hold users accountable

  • Gaining buy-in to roll out robust training programs across the organisation


13:00 - 14:00  GMT Virtual Summit Boardroom

The Next-Generation CISO

Carole Drape headshot

Carole Drape

CISO

John Lewis Partnership

Jitender Arora headshot

Jitender Arora

CISO

Deloitte

While it may be hard to imagine in today’s digital world, the CISO didn’t always exist. Born of necessity amid a growing cyberthreat landscape, this leadership role has matured to a core member of a strong enterprise C-suite. Yet in a fast-evolving global economy where all norms are challenged, what will it take to move the CISO to the next level?

Join this session to learn:

  • Leadership lessons from the past years of enterprise cybersecurity
  • Variations in reporting structure and scope of responsibility for security executives
  • The CISO of 2030, 2040 and beyond – what’s next?

13:00 - 14:00  GMT Virtual Summit Boardroom

Optimizing Security Operations

Dan Biggs headshot

Dan Biggs

CISO

Network Rail

Sharon Jones headshot

Sharon Jones

Information Security and Risk Director

Kingfisher

Goher Mohammad headshot

Goher Mohammad

Head of Security, Risk and Compliance

L&Q

Outsource? Insource? A hybrid model? Finding the right design for an effective security operations center is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.

Join this session to learn:

  • Models for effective insource, outsource and hybrid SOCs
  • Leadership best practices for keeping employees engaged and alert
  • The latest workflows for effective incident response

09:00 - 10:00  GMT Virtual Summit Keynote

Defending Your Data in a Remote Working World

Adenike Cosgrove headshot

Adenike Cosgrove

Cybersecurity Strategist

Proofpoint

Andrew Rose headshot

Andrew Rose

Resident CISO, EMEA

Proofpoint

It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organisation. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

Join Andrew & Nikki as they discuss:

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data




10:00 - 11:00  GMT Virtual Summit Boardroom

Identity, Access and the Strategic Approach to Trust

Rich Turner headshot

Rich Turner

Vice President - EMEA

CYBERARK

Rahul Colaco headshot

Rahul Colaco

CISO

NSK America

Reza Salari headshot

Reza Salari

Business Information Security Officer

Pacific Life Re

As endpoints sprawl and users access systems from across the globe, the challenge of verifying identity has only become more complex. Yet each road block to verify identity is a speed bump in enterprise agility, requiring CISOs to address identity and access management from a strategic risk-management approach.

Join this session to discuss with your peers around their thoughts and approaches to:

  • How Digital Transformation is impacting Security Strategies
  • Handling the surge in Identities caused by the adoption of Cloud based services
  • How the attack surface has shifted with the introduction of modern human and non-human workflows





10:00 - 11:00  GMT Virtual Summit Boardroom

Managing Third-Party Risk with First-Rate Partnership

Phil Lea headshot

Phil Lea

Group CISO

Computacenter

Nick Jones headshot

Nick Jones

CISO

TUI Group

Simon Tong headshot

Simon Tong

Cyber Security Governance Manager

Schlumberger

In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it can feel like every other business process sits in the hands, and systems, of an outside vendor. The key is to bring those partners into lockstep with the organization’s security strategy, a challenge that is both technical and classically human.

Join this session to learn:

  • How CISOs are evaluating third-party risk across an ever-growing constellation of vendor services
  • How to get off on the right foot, and to maintain strong partnerships with third parties
  • Technologies that help manage third-party risk


10:00 - 11:00  GMT Virtual Summit Boardroom

How will IT security adapt to the changing cloud environment ?

Paul D'Cruz headshot

Paul D'Cruz

Director Cyber Security EMEAR

Cisco Systems

Richard Archdeacon headshot

Richard Archdeacon

Advisory CISO

Cisco Systems

Manish Chandela headshot

Manish Chandela

Group CISO

Unipart Group Limited

Enterprises have had to deal with more changes in 2020 than ever before. As organisations turn to the cloud in order to reduce complexity and deliver greater flexibility, they must also adapt to, and enact more, through consistent information security enforcement to meet these changes head on.

In this interactive roundtable discussion, we’ll discuss;

  • How will cloud adoption effect business challenges and how must organisations adapt their roadmap and vision as we head into 2021 and beyond?
  • How organisations are adapting to employees and customers working from home and the added responsibility this has on the CISO and the security team?
  • What KPIs should be considered to measure effective cloud security through this ever-changing environment, and what does good actually look like?


10:00 - 11:00  GMT Virtual Summit Boardroom

The New Language of Risk

Ross McCulloch headshot

Ross McCulloch

Head of Customer Success

BitSight

Kevin Jones headshot

Kevin Jones

Group Chief Information Security Officer

Airbus

From front-line employees to top-level directors, CISOs have a big part to play in communicating cyber risk in a way that compels others to act. The CISO must develop a comprehensive strategy for dealing with cyber security and associated risks. But what metrics, measures, methods and messages resonate in today’s risk environment?

Join your peers in this virtual boardroom to discuss: 

  • How organizations are assessing cybersecurity and risk 
  • Metrics that matter 
  • Tips for improving cybersecurity programs using these metrics, and raising executive awareness


14:00 - 14:30  GMT Networking Break

CISO “Live” Networking

An informal and interactive opportunity for you to network with peers in small groups. 

14:30 - 15:30  GMT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.

Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.

  • Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow UK CISO Virtual Executive Summit peers.
  • All conversations are private and will not be recorded
  • Meet up to 3 peers based on your shared interests or priorities

Participant Testimonials

  • ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
  • ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
  • ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes

How to participate

Please contact your Program Manager to participate.

24 November 2020

Your Community Partners


CISO Thought Leaders
Key Partners
Program Partners

Community Programme Manager


For inquiries related to this community, please reach out to your dedicated contact.

Luis Arango Abello

Programme Manager

+44 (0)1784 267 880

luis.arangoabello@gartner.com