Go Back
United Kingdom Summit

The CISO Chapter UK

Pennyhill Park , Bagshot

2 Days
-
Pennyhill Park

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

Audience illustration
  • 70+
    Senior Executives
  • 12
    Solution Partners
  • 6:1
    Executive to Solution Partner Ratio
  • 54%
    C-Suite Executives
  • 46%
    SVP, VP, Director & Heads of

Agenda

Day 1

18:30 - 19:00
Welcome Drinks Reception

Kickstart your summit experience and meet new peers with drinks and canapés

19:00 - 21:30
Gala Dinner: A Night of Exclusive Insights & Industry Leadership

The Gala Dinner is the highlight of our Summit’s networking experience—an evening of insightful discussions, industry-leading keynotes, and exceptional company over a three-course meal in a timeless ballroom.

 

Keynote Speakers & Exclusive Insights:

Signature Sponsor Keynote: Tata Communications

We are proud to welcome Tata Communications as the Signature Sponsor of the CISO UK Summit. As a global leader in digital infrastructure, Tata Communications plays a pivotal role in shaping the future of secure and connected enterprises.

 

CISO Community Keynote: Jitender Arora, Partner & Global Deputy CISO, Deloitte

The Evolving CISO: Balancing Pressure, Accountability, and Sanity

The role of the CISO has evolved dramatically, shifting from a purely technical focus to navigating escalating cyber threats, regulatory pressures, and growing organisational demands. With increasing scrutiny and personal liability, the job carries high stakes and constant pressure, often leading to stress and burnout. This session explores the evolving challenges of the CISO role and provides practical strategies for maintaining a fulfilling career while safeguarding well-being.

 

Alongside these discussions, we will also be supporting a fundraising initiative for Head for Change, a charity working to address the long-term impact of head injuries in sport. With Hayley McQueen’s personal connection to this cause, we will also be joined by Alix Popham, former Wales Rugby International and spokesperson for Head for Change - they will be conducting a fireside chat and Q&A.

 

Tata Communications
Name
Tata Communications
Company
Signature Sponsor
Jitender
Name
Jitender Arora
Position
Partner & Global Deputy CISO
Company
Deloitte
Master of Ceremonies
Name
Hayley McQueen
Position
Renowned Sports Presenter
Company
Master of Ceremonies
21:30
Drinks & Networking

Continue conversations and building relationships at the bar

Day 2

06:00 - 08:00
Breakfast

Fuel up for a full day of networking, experiences and content

08:30 - 09:15
Welcome Address

Welcome Address by our Master of Ceremonies

Platinum Keynote: Zscaler

Cyber Resilience: Keeping the Organisation Running Securely

This presentation will explore strategies to ensure business continuity in the face of evolving cyber threats. We will explore effects of zero-trust architecture, continuous security monitoring, and adaptive threat response to safeguard digital assets and operations. The session provides insights into how organisations can proactively mitigate risks while maintaining productivity and agility in an increasingly complex threat landscape.

Key takeaways:

  • Zero Trust mindset is essential to reduce attack surface while ensuring business agility and continuity
  • Cyber resilience requires continuous monitoring and adaptive frameworks to deal with ever-changing threat
Yaroslav Rosomakho
Name
Yaroslav Rosomakho
Position
Field CTO
Company
Zscaler
09:20 - 10:00
Advanced AI Threat Prevention: Harnessing AI-Driven Solutions for Sophisticated Cybersecurity

Join Check Point’s Global CISO, Deryck Mitchelson, for a workshop on why an AI-centric security strategy is now the key to preventing your next major cyber incident. The cyber landscape has been re-shaped by the rise of AI-powered cyber attacks:

  • Over 90% of cyber attacks start with an AI generated phishing email
  • AI DDoS attacks have reached 5.6 terabits per second (Tbps)
  • Social Media attacks are bigger and bolder, threatening business continuity
Deryck Mitchelson
Name
Deryck Mitchelson
Position
Global CISO
Company
Check Point
09:20 - 10:00
Challenging Transformation Goals: The Role of Zero Trust in Building Resilience

True digital transformation is about more than just deploying new technologies—it requires reshaping business processes, evolving security strategies, and embedding resilience to enable long-term success. As organisations navigate continuous transformation, security must be an enabler rather than a constraint.

This workshop will explore how leaders can build future-ready security strategies by embedding Zero Trust principles into their transformation journey. Attendees will gain practical insights into balancing agility and security while ensuring that innovation can scale effectively.

Key Takeaways:

  • Understand the relationship between transformation, security, and Zero Trust, and how they intersect.
  • Explore strategies for integrating Zero Trust to reduce attack surfaces and enhance resilience in a rapidly evolving threat landscape.
  • Identify practical steps to align Zero Trust with cultural and business process transformation, ensuring security enables, rather than restricts, growth.
Marc Lueck
Name
Marc Lueck
Position
CISO In Residence (EMEA)
Company
Zscaler
Martyn Ditchburn
Name
Martyn Ditchburn
Position
CTO In Residence (EMEA)
Company
Zscaler
09:20 - 10:00
Enhancing Cloud Security: Strengthening Security in Multi-Cloud Environments

As organisations increasingly adopt multi-cloud strategies, robust security measures become essential to protect sensitive data across diverse platforms. This workshop will explore the unique challenges of securing multi-cloud environments and provide practical strategies for implementing effective security protocols. Participants will learn about best practices for data protection, identity management, and compliance across different cloud services.

Key Takeaways:

  • Identify key security challenges and risks associated with multi-cloud environments.
  • Develop actionable strategies to enhance data protection and compliance in a multi-cloud strategy.
Richard Frost, Group CISO at esure Group
Name
Richard Frost
Position
Group CISO
Company
esure Group
09:20 - 10:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
10:05 - 10:45
Demos & Collaboration Sessions

See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.

10:45 - 11:00
Networking Break
11:00 - 11:40
Future-Proofing Compliance: Building Agile Cybersecurity Frameworks for an Evolving Regulatory Landscape

This interactive roundtable session focuses on preparing organisations for a rapidly evolving regulatory environment by building flexible, agile GRC frameworks. It will help CISOs understand how to design compliance programs that not only meet today’s requirements but also adapt to future regulatory changes.

Key Takeaways:

  • Building flexible GRC frameworks is critical to quickly adapt to evolving regulatory landscapes, supported by common control sets. 

  • Leveraging integrated platforms and automation transforms compliance from a reactive process into a proactive, continuous discipline. 

  • Continuous risk assessment and adaptable compliance strategies not only address emerging regulatory challenges but also strengthen overall business resilience.

Hyperproof Speaker
Name
Charles Calovich
Position
Channel Business Development Manager
Company
Hyperproof
11:00 - 11:40
Strengthening Cyber Resilience: How Merlin Entertainments Leverages Automated Security Validation

In this session, Andrew Lord, Global Cyber Security Manager at Merlin Entertainments, will share his firsthand experience implementing Automated Security Validation. Learn how he tackled key cybersecurity challenges, reduced risk exposure, and leveraged proactive validation to enhance his organization’s security posture.

Key Takeaways:

  • Real-world insights into implementing Automated Security Validation and its impact on risk reduction.
  • Practical strategies for continuously testing and improving security controls.
  • Lessons learned from integrating proactive validation into a broader cybersecurity strategy.
Andrew Lord
Name
Andrew Lord
Position
Global Cyber Security Manager
Company
Merlin Entertainments
Oren Kaplan
Name
Oren Kaplan
Position
AVP
Company
Pentera
11:00 - 11:40
Cutting Through Complexity: Fast and Effective Third-Party Risk Management

Struggling with slow and complex third-party risk management (TPRM) processes? Join this interactive session to explore how leading organisations streamline onboarding, monitoring, and offboarding without compromising security. Expect real-world insights, live benchmarking, and actionable strategies to make TPRM faster and more efficient.

Key Takeaways:

  • Learn strategies to accelerate onboarding assessments, streamline continuous monitoring, and implement secure and efficient vendor offboarding.
  • The session will provide practical insights into reducing complexity while maintaining robust risk management practices, ensuring TPRM becomes a seamless and business-friendly process.
VP InfoSec GRC - Finnatics
Name
Mark LoGalbo
Position
VP Information Security (GRC)
Company
Fanatics
11:00 - 11:40
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
11:45 - 12:30
Panel Discussion

Humanising Security: Navigating Burnout and the Evolving Role of the CISO

Industry leading CISOs will discuss the importance of integrating the human element into cybersecurity strategies while addressing the growing issue of burnout among security teams. The panel will explore how to foster a supportive culture, prioritise mental health, and ensure that cybersecurity initiatives engage employees effectively, ultimately strengthening the organisation’s overall security posture.

Gaynor Rich, CISO Capita Experience at Capita
Name
Gaynor Rich
Position
CISO Capita Experience
Company
Capita
Douglas Weekes, CISO and Director of Data Governance
Name
Douglas Weekes
Position
CISO and Director of Data Governance
Company
Sainsbury's
Ben Morris, Group Head of Cyber Security at World Rugby
Name
Ben Morris
Position
Group Head of Cyber Security
Company
World Rugby
Zahra Zohoor, BISO at Nationwide
Name
Zahra Zohoor
Position
BISO
Company
Nationwide
12:30 - 13:30
Lunch
13:30 - 14:00
Platinum Keynote: Proofpoint

Rethinking the Relationship Between Cybersecurity Teams and the People They Protect

You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?

Gain a fresh perspective on:

  • Moving security alerts from the SOC to where users work
  • Protecting end users’ perception of security controls
  • Transforming security teams’ interactions with end users

 

Ryan - Proofpoint
Name
Ryan Kalember
Position
EVP Cybersecurity Strategy
Company
Proofpoint
14:05 - 14:45
Fighting for Funding: The CISO’s Challenge in Budget Allocation for Cybersecurity

Securing cybersecurity funding isn’t just about protection—it’s about strategic investment. In this session, we’ll explore how CISOs can position cybersecurity as a business enabler, making the case for smarter, more efficient spending.

We’ll discuss emerging technologies like AI/ML that improve security operations, the need to divest from legacy solutions, and the benefits of converging investments into unified frameworks like SASE. Attendees will gain insights on maximizing budgets, demonstrating ROI, and driving cybersecurity as a key pillar of business success.

Doug - Tata
Name
Dougie Cooper Kelly
Position
Director, Strategic Products Group
Company
Tata Communications
Tata Communications
Name
Tata Communications
Company
Signature Sponsors
14:05 - 14:45
Quantum Cybersecurity: Preparing for the Future Amidst a Growing Skill Gap

Quantum computing is advancing at a rapid pace and poses a significant threat to current cybersecurity practices; it has the potential to break many widely used encryption methods, rendering sensitive data vulnerable and is no longer the stuff of science fiction. Governments and organisations are already investing heavily in post-quantum cryptography, and cybersecurity leaders must begin preparing for this shift now. However, the industry faces a significant skill gap—quantum security expertise is scarce, and many organisations are unsure where to begin.

This open-format workshop is designed to spark discussion among security leaders about the future impact of quantum computing on cybersecurity. Rather than a deep technical dive, this session will explore the strategic considerations for CISOs, the evolving regulatory landscape, and practical steps organisations can take to avoid being caught off guard in the coming years.

Key Takeaways:

  • Understand why quantum cybersecurity is expected to be a critical concern within the next few years.
  • Explore the current skill gap in quantum security and discuss strategies for upskilling teams.
  • Join an open discussion on how CISOs can start laying the groundwork today to mitigate future risks.
Channel 4 - Deputy CISO
Name
Jez Reichmann
Position
Deputy CISO
Company
Channel 4
14:05 - 14:45
Unified Human Risk Management: Connecting the Dots Between Technology, People, and Data

In today’s evolving threat landscape, CISOs and security leaders face a dual challenge—external attackers targeting employees as the weakest link and internal risks stemming from human error or malicious intent. This forward-looking session will explore how a unified Human Risk Management (HRM) strategy can bridge the gap between external threats and internal vulnerabilities. Discover actionable insights to strengthen your organisation’s cyber resilience by leveraging cutting-edge AI, automation, and contextual education to reduce risks and streamline security operations.

Dr. Malcolm Murphy will demonstrate how security leaders can integrate email security with insider risk management to protect sensitive data, ensure compliance across collaboration platforms, and proactively educate employees to foster a culture of cyber awareness. Walk away with strategies to simplify operations, minimise incident response times, and stay ahead of emerging threats.

Dr. Malcolm Murphy
Name
Dr. Malcolm Murphy
Position
Director of Engineering
Company
Mimecast
14:05 - 14:45
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
14:50 - 15:30
Demos & Collaboration Sessions

See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.

15:30 - 15:45
Networking Break
15:45 - 16:25
Supply Chain Security: Mitigating Vulnerabilities in Today’s Ecosystem

As organisations increasingly rely on complex supply chains, safeguarding against vulnerabilities is more critical than ever. CISOs need to address the unique security challenges faced in supply chain management and have effective strategies for identifying, assessing, and mitigating risks. Attendees will learn how to strengthen their security posture by collaborating with suppliers, implementing best practices, and leveraging technology to enhance supply chain resilience.

Key Takeaways:

  • Understand the key vulnerabilities within supply chains and their potential impact on organisational security.
  • Learn actionable strategies for creating a secure supply chain framework that protects against evolving threats.
15:45 - 16:25
Automation in Security Operations: Enhancing Efficiency and Responsiveness

In the fast-paced world of cybersecurity, automation has become essential for improving efficiency and responsiveness in security operations. This workshop will explore how organisations can leverage automation tools to streamline incident response, reduce manual workloads, and enhance overall security posture. Participants will gain insights into practical applications of automation in threat detection, monitoring, and remediation, enabling them to respond more effectively to emerging threats.

Key Takeaways:

  • Discover key automation tools and techniques that can enhance security operations and reduce response times.
  • Learn how to implement automation strategies that improve efficiency and bolster your organisation’s cybersecurity defences.
15:45 - 16:25
Empowering Employees: The CISO’s Role in Cybersecurity Training

In a landscape where cyber threats are ever-evolving, fostering a culture of cybersecurity awareness is essential. This workshop will equip CISOs with the strategies to lead effective employee training programs that enhance awareness and prepare teams to recognise and respond to security threats. Participants will explore best practices for designing engaging training modules and fostering a proactive security mindset across the organisation.

Key Takeaways:

  • Discover effective techniques for developing impactful cybersecurity awareness training programs.
  • Learn how to measure training effectiveness and ensure continuous improvement in employee engagement with security practices.
15:45 - 16:25
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
16:30 - 16:45
Closing Remarks
16:45 - 17:30
Drink & Nibbles

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.