The Future of IT & Cybersecurity

CIO & CISO Think Tank

October 5, 2023 - London, UK

VISIONARIES

Lorraine Dryland

Global CISO

First Sentier Investors

Think Tank Speaker

Founded in 1988, First Sentier Investors Services is a company that provides investment management services offering assets management, short-term investment, property security, equities, and fixed income. First Sentier Investors Services is located in New South Whales Australia.

Dorian Skeete

Head, Information Security

Boohoo

Think Tank Speaker

Dorian Skeete is the Head of IT Security at Boohoo Group, where he is responsible for IT Security, Data Protection and Privacy across their 13 brands, including household names like Pretty Little Thing, BoohooMAN and Karen Millen. Day to day, Dorian looks after a team of 10, while delivering on a multi-year cybersecurity strategy including advisory for the Boohoo Risk Committee and Board, increasing IT Security capability and professional development of his staff. Prior to Boohoo, Dorian was the IT Security Lead at Advantage Smollan and an Associate Director at Crossword Cybersecurity, while spending his formative years as an RF and Cyber Engineer for the Ministry of Defence. With more than 10 years IT Security experience, Dorian has worked on several valuable projects including IT transformation, ISO 27001 and Cyber Essentials certification, Security Awareness improvement and improving businesses overall IT Security posture. When not dealing with the fast-paced environment of a world-leading fashion brand, Dorian enjoys sport (especially football and F1), travel, exercise and is a self-proclaimed foodie.

Cornelius Namiluko

Managing Director - Global Co-Head of Security Architecture

Goldman Sachs

Think Tank Speaker

I am an experienced software and systems security engineer with over 15 years experience in various industries including health, consulting and internet services. I am interested in working on challenging software design and implementation problems within the areas of web technologies, mobile computing, big data and general distributed systems. I am proficient in Java, C# and JavaScript (including Node.js) and I can quickly pick up any new technology. I have worked on various implementations of data driven systems that utilise databases such as MySQL, MS SQL Server, MongoDB, Redis and Casandra. My specialities include software architecture design. security analysis, programming, application of agile methodologies and data extraction algorithm design.

Leo Cunningham

CISO

Owkin Inc

Think Tank Speaker

Leo has a successful track record working within different blue-chip companies and industries ranging from Start-ups/Scale-ups, Banking, FinTech, SaaS and eCommerce, providing insight, consultancy and strategy across global remits covering Information Security, Cyber Security, GRC, Auditing, Cloud and a multitude of compliance remits including PCI DSS, SOX and GDPR. At Flo Health, the number one health and wellbeing app. His team protects the data of 250 million users, equating to 300 billion data points. He is currently an advisor to multiple start-ups from the Palta Group. He has been instrumental in leading security efforts within HealthTech and FemTech. In June 2022, Flo Security delivered the industry’s first ISO 27001 certification. Leo is a multi-award winner. A Snyk influencer. A Keynote speaker worldwide and was added to the CISO Platform Top 100

Ash Hunt

Global CISO

Apex Group Ltd

Think Tank Speaker

Established in 1988, Sanne is headquartered in London, United Kingdom. They provide administration, reporting and fiduciary services to alternative asset managers, financial institutions, family offices, and corporates.

Aysara Yusupova

Deployment, & Digital Channels & Data Analytics Regional Head (Europe, Americas)

Standard Chartered Bank

Think Tank Speaker

Standard Chartered plc is a British multinational banking and financial services company. It operates a network of more than 1,200 branches and outlets across more than 70 countries. Founded in 1969, the company is headquartered in London, United Kingdom.

Raj Samani

SVP & Chief Scientist

Rapid7, Inc.

Think Tank Speaker

Raj Samani is a computer security expert responsible for extending the scope and reach of Rapid7’s research initiatives. Immediately prior to Rapid7, Raj was McAfee Fellow and Chief Scientist after serving as the company’s VP and Chief Technical Officer in EMEA. Raj has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3) in The Hague. In addition to speaking at myriad cybersecurity industry events, Raj is sought after for his commentary on breaking news such as major security breaches and emerging threats.

Nina Tatsiy

Regional Transformation Lead

British American Tobacco

Think Tank Speaker

Founded in 1902, British American Tobacco (BAT) is a multinational tobacco and cigarette manufacturing company. BAT has operations in countries worldwide, with its headquarters in London, England.

Vinita Ramtri

IT Tech Moderator/Speaker

Vinitaramtri

Think Tank Speaker

If you had to sum me up in two words, those would be intensity and intentionality. Having thrived in the corporate world for over 23 years across four industries and three countries besides continually fulfilling my passions such as publishing books, running marathons, coaching, writing and speaking, my single biggest learning is that life isn’t as binary as we perceive it to be and that fulfilling dreams does not have to be at odds with rocking a career. So I choose to give life my all and encourage anyone who cares to listen. I believe a life without passion and purpose is a life half-lived - so I make it my business to show up and do what it takes. It's the only way I know and want. I’m currently working on API Standards and Governance at HSBC and over the course of a very fulfilling career, I’ve covered various role ranging from technology and automation through to learning and leadership development. Enjoying a career where my roles evolve continually, some of the themes that I gravitate towards are sustainability, client outcomes and the strategic evolution of firms (& people!) trying to rediscover and redefine their d’etre. My core expertise is my agility between themes and my ability to triangulate seemingly uncorrelated information thereby taking something from a small idea through to a fully functioning solution that can run itself. I believe solutions are only as good as the people behind them and focus relentlessly both people and process. I have a deeply intuitive and curious mind with an extremely high IQ and an abstract aptitude of 99 percentile. Besides being a certified coach, prolific writer, public speaker, keen investor and a single parent, I’m also an autodidactic, an obsessive thinker and an emerging erudite.

Pam Balsam

Snr. Regional Enterprise Account Manager (International)

KnowBe4

Think Tank Speaker

Pam heads up the UK&I Enterprise team, with over six years of expertise in the intricate realms of SaaS, PaaS, RPA and Cybersecurity. With a profound understanding of the ever evolving cyber landscape, Pam has honed her skills to deliver tailored advice that empower organisations to proactively strengthen their human firewall, mitigate risks and foster a culture of security awareness. She excels at demystifying complex technical concepts, making them accessible and understandable to associates from various backgrounds.

Daniel Shiu

Chief Cryptographer

Arqit Ltd

Think Tank Speaker

Daniel Shiu is the Chief Cryptographer at Arqit. Daniel worked for GCHQ, the UK’s intelligence, cyber, and security agency for 20 years. He was the UK’s Head of Cryptographic Design and Quantum Information Processing, part of the initial National Technical Authority function assumed by the new National Cyber Security Centre (NCSC). Daniel also served as Head of the Heilbronn Institute for Mathematical Research (HIMR), which is a linchpin of the government’s “Advanced Mathematics” strategy. Daniel represented GCHQ in helping to found and direct the National Quantum Technologies Programme.

Leo Cunningham

CISO

Owkin Inc

Think Tank Speaker

Leo has a successful track record working within different blue-chip companies and industries ranging from Start-ups/Scale-ups, Banking, FinTech, SaaS and eCommerce, providing insight, consultancy and strategy across global remits covering Information Security, Cyber Security, GRC, Auditing, Cloud and a multitude of compliance remits including PCI DSS, SOX and GDPR. At Flo Health, the number one health and wellbeing app. His team protects the data of 250 million users, equating to 300 billion data points. He is currently an advisor to multiple start-ups from the Palta Group. He has been instrumental in leading security efforts within HealthTech and FemTech. In June 2022, Flo Security delivered the industry’s first ISO 27001 certification. Leo is a multi-award winner. A Snyk influencer. A Keynote speaker worldwide and was added to the CISO Platform Top 100

October 5, 2023

Agenda

All times United Kingdom Time

9:00 AM-10:15 AM

Registration & Morning Networking


10:15 AM-10:20 AM

Opening Remarks


10:20 AM-10:40 AM

Digital Transformation

CIOs play a crucial role in driving their organization's digital transformation efforts. The COVID-19 pandemic has accelerated the adoption of digital technologies, and CIOs must continue to lead the way to stay competitive and meet the evolving needs of customers and employees. This requires a deep understanding of the organization's goals, processes, and IT infrastructure, as well as collaboration with other business leaders. By successfully leading digital transformation, CIOs can position their company for long-term success in a digital world.


10:45 AM-11:30 AM
Vision Keynote Panel

Bridging the Gap Between IT & the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


11:35 AM-11:50 AM

Navigating the Interplay between UK and EU Data and proposed AI Regulation in the Digital Age

This session explores the intricate relationship of the UK and EU regulatory compliance in data protection, privacy concerns, artificial intelligence (AI), and ethical considerations in the contemporary digital landscape. It delves into how organizations and their partners must adhere to UK and EU regulations while leveraging AI-driven data insights and upholding ethical standards and individual privacy rights. The discussion will encompass the challenges, strategies, and emerging trends in this complex domain within the context of the UK and the European Union's regulatory landscape.


11:55 AM-12:10 PM

The Greatest Fears?

The biggest fear is not the technology, it is the potential of human error that could expose your organization to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. How do we guard against human error without limiting employee efficiency and productivity?


12:10 PM-1:10 PM

Lunch & Disruptor Showcase


1:00 PM-1:15 PM
Lunch & Disruptor Showcase

Enhancing the Resilience of Your Organization's Final Barrier: The Human Firewall

In today's digital landscape, social engineering attacks like phishing, Business Email Compromise (BEC), and Ransomware are increasingly prevalent. These cunning tactics rely on manipulating humans to gain unauthorized access to protected systems and sensitive data. As the frequency of such cyber-attacks rises, it is crucial to fortify your organization's last line of defense: the human firewall.

In this session we will look into case studies around:

  • Regular, tailored security awareness training to educate employees about social engineering threats.
  • Foster a reporting culture for prompt identification of suspicious activities.
  • Strengthen password policies and use multi-factor authentication (MFA) to reduce risks.
In partnership with:

1:20 PM-1:55 PM
Fireside Chat

Threat Intelligence

Threat intelligence is vital for Cloud detection and response, particularly in modern threat-hunting. To address the business need for robust security, the CISO must focus on obtaining actionable intelligence. This entails gathering real-time information on emerging threats, vulnerabilities, and attack methods specific to the Cloud. Such intelligence can be acquired from various sources, including security vendors, threat feeds, and incident response teams. By leveraging actionable intelligence, the CISO can enhance their organization's defense strategies, enabling proactive identification and mitigation of threats in Cloud environments

In partnership with:

2:00 PM-2:45 PM
Panel

Cloud Security

Cloud computing services have revolutionized business operations, but the threat of cloud vulnerabilities is increasing. To mitigate risks, businesses must implement robust security measures like multi-factor authentication and encryption. Automated detection systems like Cloud Security Posture Management (CSPM) are crucial for real-time monitoring. Regular training and adaptable defences are necessary due to the rapidly changing cloud landscape. Comprehensive incident response plans tailored to cloud environments are essential. By embracing these measures, organizations can protect themselves and their customers, ensuring a secure cloud environment and leveraging the benefits of cloud computing.


2:45 PM-3:05 PM

Networking Break


3:05 PM-3:40 PM
Fireside Chat

Building Security into DevSecOps

Many organizations struggle with how and where to introduce automation and integrations efficiently. Conventional approaches to application security can’t keep pace with cloud-native environments that use agile methodologies and API-driven architectures, microservices, containers, and serverless functions. Application security testing is evolving to meet the speed at which DevOps teams operate. DevSecOps teams are challenged with how to make sense of the noise their AppSec tools generate once they’ve been automated into DevOps pipelines.

Processes and tools are more fast-paced and rely on integration and automation to maintain efficiency throughout the software development life cycle. A new approach to DevSecOps is required addressing a change in the security mindset. How do CISOs achieve this without the buy-in from stakeholders?


3:45 PM-4:00 PM

Quality in Quantity: Decision Science in Technology Risk

Quantitative risk space is the realm where numbers meet uncertainty, providing organizations with the tools to assess and manage risks with precision. In this dynamic landscape, data-driven models and mathematical analyses take center stage, enabling businesses to quantify potential threats, evaluate probabilities, and make informed decisions. Whether it's in the realms of finance, cybersecurity, or supply chain management, the quantitative risk space empowers organizations to understand, mitigate, and even capitalize on risks, ensuring a more resilient and strategic approach to uncertainty in an increasingly complex world.

In the context of a CISO, quantitative risk assessment offers several substantial benefits to the business:
  • Informed Decision-Making
  • Resource Optimization
  • Alignment with Business Objectives
  • Effective Communication
  • Reputation Protection
  • Adaptation to a Changing Landscape
This approach equips CISOs with the quantitative insights needed to make informed choices to protect the organization's digital assets and reputation in a rapidly evolving threat landscape

4:05 PM-4:20 PM

Simple and Effective Steps to Achieve Quantum-Safety Today

Headlines this year regularly report on breakthroughs in quantum computing, the predicted growth of which is exponential. In this session, Dr. Shiu will discuss the cryptanalytic threat of quantum computing, particularly the “store now; decrypt later” approach that is drawing ever nearer. He will also outline simple and effective steps that governments, enterprises and citizens can take to achieve quantum-safety today.

In partnership with:

4:20 PM-4:25 PM

Closing Remarks & Raffle Giveaway


4:25 PM-5:00 PM

Cocktail Hour


IN PARTNERSHIP WITH