The CISO Chapter UK
Pennyhill Park , Bagshot

A bit about our summit
What we're known for
Industry Analysis
Glean the knowledge of your peers to shape your organisation's future
Peer-Led
Workshops, Fireside Chats & Keynote Addresses
1 on 1 Meetings
Strategic BANT-qualified meetings based on project alignment
Custom Agenda
Be in control of your own agenda. Maximise your experience.
The Technology Chapter
Audience
We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

-
70+Senior Executives
-
12Solution Partners
-
6:1Executive to Solution Partner Ratio
-
54%C-Suite Executives
-
46%SVP, VP, Director & Heads of
Agenda
Day 1
Welcome Drinks Reception
Kickstart your summit experience and meet new peers with drinks and canapés
Gala Dinner: A Night of Exclusive Insights & Industry Leadership
The Gala Dinner is the highlight of our Summit’s networking experience—an evening of insightful discussions, industry-leading keynotes, and exceptional company over a three-course meal in a timeless ballroom.
Keynote Speakers & Exclusive Insights:
Signature Sponsor Keynote: Tata Communications
We are proud to welcome Tata Communications as the Signature Sponsor of the CISO UK Summit. As a global leader in digital infrastructure, Tata Communications plays a pivotal role in shaping the future of secure and connected enterprises.
CISO Community Keynote: Jitender Arora, Partner & Global Deputy CISO, Deloitte
The Evolving CISO: Balancing Pressure, Accountability, and Sanity
The role of the CISO has evolved dramatically, shifting from a purely technical focus to navigating escalating cyber threats, regulatory pressures, and growing organisational demands. With increasing scrutiny and personal liability, the job carries high stakes and constant pressure, often leading to stress and burnout. This session explores the evolving challenges of the CISO role and provides practical strategies for maintaining a fulfilling career while safeguarding well-being.
Alongside these discussions, we will also be supporting a fundraising initiative for Head for Change, a charity working to address the long-term impact of head injuries in sport. With Hayley McQueen’s personal connection to this cause, we will also be joined by Alix Popham, former Wales Rugby International and spokesperson for Head for Change - they will be conducting a fireside chat and Q&A.



Drinks & Networking
Continue conversations and building relationships at the bar
Day 2
Breakfast
Fuel up for a full day of networking, experiences and content
Welcome Address
Welcome Address by our Master of Ceremonies
Platinum Keynote: Zscaler
Cyber Resilience: Keeping the Organisation Running Securely
This presentation will explore strategies to ensure business continuity in the face of evolving cyber threats. We will explore effects of zero-trust architecture, continuous security monitoring, and adaptive threat response to safeguard digital assets and operations. The session provides insights into how organisations can proactively mitigate risks while maintaining productivity and agility in an increasingly complex threat landscape.
Key takeaways:
- Zero Trust mindset is essential to reduce attack surface while ensuring business agility and continuity
- Cyber resilience requires continuous monitoring and adaptive frameworks to deal with ever-changing threat

Advanced AI Threat Prevention: Harnessing AI-Driven Solutions for Sophisticated Cybersecurity
Join Check Point’s Global CISO, Deryck Mitchelson, for a workshop on why an AI-centric security strategy is now the key to preventing your next major cyber incident. The cyber landscape has been re-shaped by the rise of AI-powered cyber attacks:
- Over 90% of cyber attacks start with an AI generated phishing email
- AI DDoS attacks have reached 5.6 terabits per second (Tbps)
- Social Media attacks are bigger and bolder, threatening business continuity

Challenging Transformation Goals: The Role of Zero Trust in Building Resilience
True digital transformation is about more than just deploying new technologies—it requires reshaping business processes, evolving security strategies, and embedding resilience to enable long-term success. As organisations navigate continuous transformation, security must be an enabler rather than a constraint.
This workshop will explore how leaders can build future-ready security strategies by embedding Zero Trust principles into their transformation journey. Attendees will gain practical insights into balancing agility and security while ensuring that innovation can scale effectively.
Key Takeaways:
- Understand the relationship between transformation, security, and Zero Trust, and how they intersect.
- Explore strategies for integrating Zero Trust to reduce attack surfaces and enhance resilience in a rapidly evolving threat landscape.
- Identify practical steps to align Zero Trust with cultural and business process transformation, ensuring security enables, rather than restricts, growth.


Enhancing Cloud Security: Strengthening Security in Multi-Cloud Environments
As organisations increasingly adopt multi-cloud strategies, robust security measures become essential to protect sensitive data across diverse platforms. This workshop will explore the unique challenges of securing multi-cloud environments and provide practical strategies for implementing effective security protocols. Participants will learn about best practices for data protection, identity management, and compliance across different cloud services.
Key Takeaways:
- Identify key security challenges and risks associated with multi-cloud environments.
- Develop actionable strategies to enhance data protection and compliance in a multi-cloud strategy.

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Demos & Collaboration Sessions
See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.
Networking Break
Future-Proofing Compliance: Building Agile Cybersecurity Frameworks for an Evolving Regulatory Landscape
This interactive roundtable session focuses on preparing organisations for a rapidly evolving regulatory environment by building flexible, agile GRC frameworks. It will help CISOs understand how to design compliance programs that not only meet today’s requirements but also adapt to future regulatory changes.
Key Takeaways:
-
Building flexible GRC frameworks is critical to quickly adapt to evolving regulatory landscapes, supported by common control sets.
-
Leveraging integrated platforms and automation transforms compliance from a reactive process into a proactive, continuous discipline.
-
Continuous risk assessment and adaptable compliance strategies not only address emerging regulatory challenges but also strengthen overall business resilience.

Strengthening Cyber Resilience: How Merlin Entertainments Leverages Automated Security Validation
In this session, Andrew Lord, Global Cyber Security Manager at Merlin Entertainments, will share his firsthand experience implementing Automated Security Validation. Learn how he tackled key cybersecurity challenges, reduced risk exposure, and leveraged proactive validation to enhance his organization’s security posture.
Key Takeaways:
- Real-world insights into implementing Automated Security Validation and its impact on risk reduction.
- Practical strategies for continuously testing and improving security controls.
- Lessons learned from integrating proactive validation into a broader cybersecurity strategy.


Cutting Through Complexity: Fast and Effective Third-Party Risk Management
Struggling with slow and complex third-party risk management (TPRM) processes? Join this interactive session to explore how leading organisations streamline onboarding, monitoring, and offboarding without compromising security. Expect real-world insights, live benchmarking, and actionable strategies to make TPRM faster and more efficient.
Key Takeaways:
- Learn strategies to accelerate onboarding assessments, streamline continuous monitoring, and implement secure and efficient vendor offboarding.
- The session will provide practical insights into reducing complexity while maintaining robust risk management practices, ensuring TPRM becomes a seamless and business-friendly process.

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Panel Discussion
Humanising Security: Navigating Burnout and the Evolving Role of the CISO
Industry leading CISOs will discuss the importance of integrating the human element into cybersecurity strategies while addressing the growing issue of burnout among security teams. The panel will explore how to foster a supportive culture, prioritise mental health, and ensure that cybersecurity initiatives engage employees effectively, ultimately strengthening the organisation’s overall security posture.




Lunch
Platinum Keynote: Proofpoint
Rethinking the Relationship Between Cybersecurity Teams and the People They Protect
You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?
Gain a fresh perspective on:
- Moving security alerts from the SOC to where users work
- Protecting end users’ perception of security controls
- Transforming security teams’ interactions with end users

Fighting for Funding: The CISO’s Challenge in Budget Allocation for Cybersecurity
Securing cybersecurity funding isn’t just about protection—it’s about strategic investment. In this session, we’ll explore how CISOs can position cybersecurity as a business enabler, making the case for smarter, more efficient spending.
We’ll discuss emerging technologies like AI/ML that improve security operations, the need to divest from legacy solutions, and the benefits of converging investments into unified frameworks like SASE. Attendees will gain insights on maximizing budgets, demonstrating ROI, and driving cybersecurity as a key pillar of business success.


Quantum Cybersecurity: Preparing for the Future Amidst a Growing Skill Gap
Quantum computing is advancing at a rapid pace and poses a significant threat to current cybersecurity practices; it has the potential to break many widely used encryption methods, rendering sensitive data vulnerable and is no longer the stuff of science fiction. Governments and organisations are already investing heavily in post-quantum cryptography, and cybersecurity leaders must begin preparing for this shift now. However, the industry faces a significant skill gap—quantum security expertise is scarce, and many organisations are unsure where to begin.
This open-format workshop is designed to spark discussion among security leaders about the future impact of quantum computing on cybersecurity. Rather than a deep technical dive, this session will explore the strategic considerations for CISOs, the evolving regulatory landscape, and practical steps organisations can take to avoid being caught off guard in the coming years.
Key Takeaways:
- Understand why quantum cybersecurity is expected to be a critical concern within the next few years.
- Explore the current skill gap in quantum security and discuss strategies for upskilling teams.
- Join an open discussion on how CISOs can start laying the groundwork today to mitigate future risks.

Unified Human Risk Management: Connecting the Dots Between Technology, People, and Data
In today’s evolving threat landscape, CISOs and security leaders face a dual challenge—external attackers targeting employees as the weakest link and internal risks stemming from human error or malicious intent. This forward-looking session will explore how a unified Human Risk Management (HRM) strategy can bridge the gap between external threats and internal vulnerabilities. Discover actionable insights to strengthen your organisation’s cyber resilience by leveraging cutting-edge AI, automation, and contextual education to reduce risks and streamline security operations.
Dr. Malcolm Murphy will demonstrate how security leaders can integrate email security with insider risk management to protect sensitive data, ensure compliance across collaboration platforms, and proactively educate employees to foster a culture of cyber awareness. Walk away with strategies to simplify operations, minimise incident response times, and stay ahead of emerging threats.

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Demos & Collaboration Sessions
See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.
Networking Break
Supply Chain Security: Mitigating Vulnerabilities in Today’s Ecosystem
As organisations increasingly rely on complex supply chains, safeguarding against vulnerabilities is more critical than ever. CISOs need to address the unique security challenges faced in supply chain management and have effective strategies for identifying, assessing, and mitigating risks. Attendees will learn how to strengthen their security posture by collaborating with suppliers, implementing best practices, and leveraging technology to enhance supply chain resilience.
Key Takeaways:
- Understand the key vulnerabilities within supply chains and their potential impact on organisational security.
- Learn actionable strategies for creating a secure supply chain framework that protects against evolving threats.
Automation in Security Operations: Enhancing Efficiency and Responsiveness
In the fast-paced world of cybersecurity, automation has become essential for improving efficiency and responsiveness in security operations. This workshop will explore how organisations can leverage automation tools to streamline incident response, reduce manual workloads, and enhance overall security posture. Participants will gain insights into practical applications of automation in threat detection, monitoring, and remediation, enabling them to respond more effectively to emerging threats.
Key Takeaways:
- Discover key automation tools and techniques that can enhance security operations and reduce response times.
- Learn how to implement automation strategies that improve efficiency and bolster your organisation’s cybersecurity defences.
Empowering Employees: The CISO’s Role in Cybersecurity Training
In a landscape where cyber threats are ever-evolving, fostering a culture of cybersecurity awareness is essential. This workshop will equip CISOs with the strategies to lead effective employee training programs that enhance awareness and prepare teams to recognise and respond to security threats. Participants will explore best practices for designing engaging training modules and fostering a proactive security mindset across the organisation.
Key Takeaways:
- Discover effective techniques for developing impactful cybersecurity awareness training programs.
- Learn how to measure training effectiveness and ensure continuous improvement in employee engagement with security practices.
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Closing Remarks
Drink & Nibbles
Join Us
Register Interest
Meet with fellow industry leaders and solve today’s greatest business
challenges.
Join Our Partner Network
Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.
Join the Executive Community
Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.