
UK & Ireland CISO Virtual Executive Summit
24 November 2020 | 09:00 - 15:30 GMT
24 November 2020 | 09:00 - 15:30 GMT
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the UK & Ireland CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organisation
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Governing Body Co-Chairs

Elaine Bucknor
Sky Plc
Group Chief Information Security Officer

Jared Carstensen
CRH
CISO

Bobby Ford
Unilever
VP, Global CISO

Matt Gordon-Smith
Gatwick Airport
CISO

Paula Kershaw
Barclays
Chief Controls Officer, Cyber & Resilience

Ewa Pilat
Willis Towers Watson
Global CISO

Yolande Young
BP
CISO
Agenda
24 November 2020
11:00 - 11:45 GMT Virtual Summit Keynote
Building for success - unlocking bottom-up security
Hosted by Snyk

Guy Podjarny
President & Co-founder
Snyk

Simon Maple
Director of Developer Relations
Snyk
Digital transformation is a major change to the way we think about delivering software and the development process. With the migration to containers and cloud, infrastructure is now a part of the application. The transition to DevOps processes and the speed at which software is being introduced is forcing us to evolve our slower, more traditional security practices.
If our security practices are going to keep pace with the digital transformation of our business, we need to empower and trust our developers to be the front-line of our security practices, and employ modern security tools that suit this bottom-up revolution in how we build secure software.
Join this fireside chat between Guy Podjarny and Simon Maple from Snyk as they discuss:
- When do the old ways of security testing fail to mesh with the way we build modern cloud native applications?
- How can developer-owned security practices with developers cut risk without harming agility?
- How can we shift the security mindset and facilitate the adoption of modern tools to support this change?
11:45 - 12:15 GMT Break
12:15 - 13:00 GMT Virtual Summit Keynote
Finding Success with Adopting a SASE Architecture
Hosted by Netskope

Neil Thacker
CISO EMEA
Netskope

Manish Chandela
Group CISO
Unipart Group Limited
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?
In this session, we will discuss:
- Problems SASE can address in the modern enterprise
- Benefits of moving to a SASE architecture
- Insights from organizations adopting SASE today
13:00 - 14:00 GMT Virtual Summit Boardroom
Cloud IAM – Enlightenment or Inferno
Hosted by DivvyCloud by Rapid 7

Jeremy Snyder
VP Business Development and Corporate Development
DivvyCloud

Sarah Lawson
Group CISO
OCS

Benedict Olaoya
CISO
SGN
A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?
In this session, you will discuss:
- Why managing cloud IAM is so complex
- The challenges cloud IAM creates for IT and cybersecurity professionals
- How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach
13:00 - 14:00 GMT Virtual Summit Boardroom
Security Awareness in the Modern Era

Michael Colao
Chief Corporate Security Officer
AXA

Carl McConkey
CISO
MBDA Missile Systems

Jason Ozin
Group Information Security Officer
PIB Group
For many information security leaders, it’s not technology, but people, that form the weakest link in the organisation’s defenses. Even personal social media habits can put a large enterprise at risk, and at a time when more employees are working remote, security awareness training must be top-of-mind more than ever before.
Join this virtual boardroom to discuss:
Effective strategies for security awareness training, including generational differences
How to hold users accountable
Gaining buy-in to roll out robust training programs across the organisation
13:00 - 14:00 GMT Virtual Summit Boardroom
The Next-Generation CISO

Carole Drape
CISO
John Lewis Partnership

Jitender Arora
CISO
Deloitte
While it may be hard to imagine in today’s digital world, the CISO didn’t always exist. Born of necessity amid a growing cyberthreat landscape, this leadership role has matured to a core member of a strong enterprise C-suite. Yet in a fast-evolving global economy where all norms are challenged, what will it take to move the CISO to the next level?
Join this session to learn:
- Leadership lessons from the past years of enterprise cybersecurity
- Variations in reporting structure and scope of responsibility for security executives
- The CISO of 2030, 2040 and beyond – what’s next?
13:00 - 14:00 GMT Virtual Summit Boardroom
Optimizing Security Operations

Dan Biggs
CISO
Network Rail

Sharon Jones
Information Security and Risk Director
Kingfisher

Goher Mohammad
Head of Security, Risk and Compliance
L&Q
Outsource? Insource? A hybrid model? Finding the right design for an effective security operations center is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.
Join this session to learn:
- Models for effective insource, outsource and hybrid SOCs
- Leadership best practices for keeping employees engaged and alert
- The latest workflows for effective incident response
09:00 - 10:00 GMT Virtual Summit Keynote
Defending Your Data in a Remote Working World
Hosted by Proofpoint

Adenike Cosgrove
Cybersecurity Strategist
Proofpoint

Andrew Rose
Resident CISO, EMEA
Proofpoint
It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organisation. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.
Join Andrew & Nikki as they discuss:
- How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
- The ways in which remote work and the move to the cloud has changed the nature of threats to data
- Approaches to better detect and respond to risky user actions with sensitive data
10:00 - 11:00 GMT Virtual Summit Boardroom
Identity, Access and the Strategic Approach to Trust
Hosted by CyberArk

Rich Turner
Vice President - EMEA
CYBERARK

Rahul Colaco
CISO
NSK America

Reza Salari
Business Information Security Officer
Pacific Life Re
As endpoints sprawl and users access systems from across the globe, the challenge of verifying identity has only become more complex. Yet each road block to verify identity is a speed bump in enterprise agility, requiring CISOs to address identity and access management from a strategic risk-management approach.
Join this session to discuss with your peers around their thoughts and approaches to:
- How Digital Transformation is impacting Security Strategies
- Handling the surge in Identities caused by the adoption of Cloud based services
- How the attack surface has shifted with the introduction of modern human and non-human workflows
10:00 - 11:00 GMT Virtual Summit Boardroom
Managing Third-Party Risk with First-Rate Partnership
Hosted by CybelAngel

Phil Lea
Group CISO
Computacenter

Nick Jones
CISO
TUI Group

Simon Tong
Cyber Security Governance Manager
Schlumberger
In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it can feel like every other business process sits in the hands, and systems, of an outside vendor. The key is to bring those partners into lockstep with the organization’s security strategy, a challenge that is both technical and classically human.
Join this session to learn:
- How CISOs are evaluating third-party risk across an ever-growing constellation of vendor services
- How to get off on the right foot, and to maintain strong partnerships with third parties
- Technologies that help manage third-party risk
10:00 - 11:00 GMT Virtual Summit Boardroom
How will IT security adapt to the changing cloud environment ?
Hosted by Cisco Umbrella and Duo Security

Paul D'Cruz
Director Cyber Security EMEAR
Cisco Systems

Richard Archdeacon
Advisory CISO
Cisco Systems

Manish Chandela
Group CISO
Unipart Group Limited
Enterprises have had to deal with more changes in 2020 than ever before. As organisations turn to the cloud in order to reduce complexity and deliver greater flexibility, they must also adapt to, and enact more, through consistent information security enforcement to meet these changes head on.
In this interactive roundtable discussion, we’ll discuss;
- How will cloud adoption effect business challenges and how must organisations adapt their roadmap and vision as we head into 2021 and beyond?
- How organisations are adapting to employees and customers working from home and the added responsibility this has on the CISO and the security team?
- What KPIs should be considered to measure effective cloud security through this ever-changing environment, and what does good actually look like?
10:00 - 11:00 GMT Virtual Summit Boardroom
The New Language of Risk
Hosted by BitSight Technologies

Ross McCulloch
Head of Customer Success
BitSight

Kevin Jones
Group Chief Information Security Officer
Airbus
From front-line employees to top-level directors, CISOs have a big part to play in communicating cyber risk in a way that compels others to act. The CISO must develop a comprehensive strategy for dealing with cyber security and associated risks. But what metrics, measures, methods and messages resonate in today’s risk environment?
Join your peers in this virtual boardroom to discuss:
- How organizations are assessing cybersecurity and risk
- Metrics that matter
- Tips for improving cybersecurity programs using these metrics, and raising executive awareness
14:00 - 14:30 GMT Networking Break
CISO “Live” Networking
An informal and interactive opportunity for you to network with peers in small groups.
14:30 - 15:30 GMT Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.
Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.
- Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow UK CISO Virtual Executive Summit peers.
- All conversations are private and will not be recorded
- Meet up to 3 peers based on your shared interests or priorities
Participant Testimonials
- ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
- ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
- ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes
How to participate
Please contact your Program Manager to participate.
24 November 2020
Community Programme Manager
For inquiries related to this community, please reach out to your dedicated contact.