The CISO Chapter UK
St George's Park , Burton Upon Trent
A bit about our summit
What we're known for
Industry Analysis
Glean the knowledge of your peers to shape your organisation's future
Peer-Led
Workshops, Fireside Chats & Keynote Addresses
1 on 1 Meetings
Strategic BANT-qualified meetings based on project alignment
Custom Agenda
Be in control of your own agenda. Maximise your experience.
The Technology Chapter
Audience
We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.
-
70+Senior Executives
-
12Solution Partners
-
6:1Executive to Solution Partner Ratio
-
54%C-Suite Executives
-
46%SVP, VP, Director & Heads of
Agenda
Day 1
Welcome Drinks Reception -
Kickstart your summit experience and meet new peers with drinks and canapés
Gala Dinner
Enjoy a 3 course silver service dinner in the ballroom and hear from some special guest speakers
Signature Partner Keynote: Island
"Scrapping Tradition to Improve Security, Transparency, and Trust in Today’s Workplace"
Bolstering productivity and efficiencies across the enterprise is a primary function in the role of today’s IT leader, which increases reliance on emerging technologies, such as the enterprise browser. According to recent Gartner research, "Enterprise browsers will evolve to become the core platform for almost all of the day-to-day enterprise productivity and security software used by the workforce."
Join this session to discuss:
- Introduction of innovative possibilities for critical application protection
- Creating a secure employee experience centered on transparency and trust
- Reimagining how IT leaders can enable users while creating unique business value
Executive Community Keynote: Andre Kurlovic, CISO at Home Bargains
Drinks & Networking
Continue conversations and building relationships at the bar
Day 2
Breakfast
Fuel up for a full day of networking, experiences and content
Welcome Address
Welcome Address
Welcome Address by our Master of Ceremonies
Opening Keynote with Q&A - Zscaler
"The New Gravity of Security: Identity and Data in a Hyperconnected World"
Perimeters didn’t disappear—they became irrelevant. In a world where AI accelerates decisions, 5G connects everything, and data outruns infrastructure, security’s center of mass has shifted to two things: identity and data. This keynote challenges yesterday’s assumptions: networks don’t confer trust; connectivity is just a utility; and “detect, then react” is too slow for machine‑speed threats. We’ll confront the hard truths of OT fragility, shadow AI, and executive mobility—and argue for a living trust fabric that follows people, machines, and models everywhere. Imagine access that is earned every moment, data that carries its own protections, and cellular edges treated as untrusted pipes with first‑class policy at the service layer. If your controls can’t travel with your users and your data, they’re already obsolete.
The Future of TPRM: Agentic AI, Faster Decisions, Smarter Risk
Third-party risk programs are under pressure to move faster without compromising security. In this forward-looking session, we’ll explore how Agentic AI is set to transform TPRM - from automating assessments and triage to enabling real-time, risk-informed decisions. Join us for practical insights into streamlining vendor reviews, reducing friction, and building trust through intelligent automation.
Key Takeaways:
-
Learn how agentic AI can automate vendor assessments and risk triage, accelerating third-party risk management without sacrificing accuracy.
-
Discover strategies for enabling real-time, risk-informed decision-making that improves both security outcomes and business agility.
-
Understand how intelligent automation can streamline reviews, reduce operational friction, and strengthen trust with stakeholders and vendors.
Future of Work, Connected Without Constraints
"Redefining work by removing traditional barriers and embracing digital freedom"
- The reality behind supporting BYOD
- Applying the traditional approach to a modern workspace
- Expectations for the next generation
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Building a Security-First Culture: Effective Security Awareness and Training
Technology can only go so far—people remain a critical line of defence. This session looks at how to embed security-first thinking across your organisation, designing training that is engaging, role-specific, and aligned to real-world threats.
Key Takeaways:
-
Discover proven methods for shifting employee behaviour from compliance to active risk reduction.
-
Learn how to measure and improve the effectiveness of security awareness programmes.
Trust Exploited: Stopping Vendor Email Compromise Before the Wire Moves
A focused deep dive into VEC (Vendor Email Compromise) - how adversaries compromise trusted partners, pivot through payment workflows, and exploit implicit trust. We show why static controls lag and how behavioural identity modelling and partner‑graph context stop vendor‑originated fraud without slowing the business.
Takeaways:
- The VEC lifecycle: from vendor account breach to invoice tampering and payment diversion - tactics, high‑risk signals, and the critical intervention points.
- Why SEG falls behind: limits of rules, reputation, and content filtering against trusted‑sender fraud - and the added value of behavioural baselines and relationship history.
- An actionable playbook: supplier verification steps, finance approval guardrails, vendor‑risk monitoring, and incident response patterns for the partner ecosystem.
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Networking Break
Unified SASE: The CISO's Blueprint for Modern Cyber Resilience
Discover how Aryaka Unified SASE as a Service helps enterprises reduce their attack surface and simplify secure networking by converging networking and security into a unified platform. With integrated Zero Trust architecture, consistent policy enforcement and support for both onsite and remote users, Aryaka delivers a seamless solution that enhances performance, agility, simplicity and security. Join our session to explore how we’re transforming global secure networking by integrating WAN, security and observability into a single, cloud-delivered service and how to stay future ready in the era of hybrid work and AI transformation.
Key Takeaways:
- Unified Networking and Security Everywhere: Converges networking and security into one platform, enforcing consistent zero trust policies across all users and locations.
- Full Visibility, Less Complexity: Delivers a single view of network and security operations, simplifying management and accelerating threat response.
- Performance with Compliance: Optimizes user experience while centralizing data protection to meet regulatory requirements efficiently.
Countering the AI-Powered Adversary: Defending Against Automated Threat Campaigns
Attackers are increasingly using AI to scale, personalise, and automate cyberattacks. From deepfake-enabled social engineering to AI-driven malware, the threat landscape is shifting fast. We’ll explore the tools, tactics, and intelligence needed to defend against this new class of adversary.
Key Takeaways:
- Identify the latest AI-powered attack vectors and their potential impact on enterprise security.
- Gain actionable defence strategies, from detection to proactive disruption of automated threats.
Data at the Heart of Cyber Resilience: Seeing Clearly, Responding Confidently
Downtime is today’s greatest threat, and prevention alone isn’t enough. True cyber resilience comes from the ability to act with clarity and confidence - powered by data and visibility. This keynote explores how organisations can turn insight into action, detect threats faster, and respond decisively, even in a chaotic cyber landscape.
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Fireside Chat
Behind the Inbox: How One Enterprise Stopped Modern Email Fraud
A candid Fireside Chat with Abnormal AI and its Customer on closing gaps left by legacy SEG tools, cutting fraud exposure, and reducing operational friction. We follow real attack journeys, the decision criteria that mattered, and how outcomes were translated into executive‑level metrics and durable operational change.
Takeaways:
- Real attack journeys and missed signals: what slipped past SEG and which behavioural and contextual indicators changed the outcome.
- Business impact that resonates with leadership: fraud loss prevented, analyst hours saved, and false‑positive reductions—how to baseline and report credibly.
- From pilot to program: rollout strategy, change management, end‑user experience, and cross‑functional alignment.
Lunch
Mastering Data Privacy and Compliance: Strategies for Securing Sensitive Data
With regulations tightening and data volumes growing, privacy is a moving target. This session covers the strategies and tools CISOs need to ensure sensitive data remains protected while meeting evolving compliance obligations.
Key Takeaways:
-
Learn how to operationalise privacy across hybrid and multi-cloud environments.
-
Gain insights into emerging regulatory trends and their security implications.
The AI Promised Land: How Security Leaders Can Accelerate AI Without Losing Control
The AI era is here, and every organization is racing to harness its potential. Yet as proprietary data becomes the fuel for innovation, it also amplifies risk. Shadow AI, ungoverned data use, and emerging AI threats can derail progress before it starts. In this session, discover how leading enterprises are embedding data security and AI guardrails at the core of their strategies. Learn proven best practices to protect sensitive data, mitigate AI security and compliance risks at scale, and confidently accelerate your journey to the AI Promised Land.
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
A Practical Approach to Securing Revolutionary Technology Advances with Evolutionary Security Principles
As organisations race to adopt revolutionary technologies, from generative AI and quantum computing to autonomous systems, security strategies must evolve without losing the proven principles that underpin resilience. This session explores how to apply timeless, “evolutionary” security fundamentals to cutting-edge innovations. Attendees will learn how to balance agility with control, enabling innovation without exposing critical vulnerabilities. Real-world examples will demonstrate how tried-and-tested frameworks can adapt to modern architectures to deliver secure progress at scale.
Key Takeaways:
- Discover how traditional security principles, such as least privilege, defence in depth, and secure-by-design, can be extended to protect emerging technologies.
- Learn practical steps to integrate innovation and security, ensuring governance keeps pace with rapid technological advancement.
Fire Side Chat
Step away from passive listening and into active problem-solving. In this highly interactive session, you’ll work alongside your peers to explore some of the most pressing challenges and exciting opportunities facing your role today. Share experiences, exchange fresh perspectives, and leave with practical ideas you can take back to your organisation.
Partner Demo
Discover innovative solutions in action. Our partners will showcase their latest tools, technologies, and strategies designed to address real-world challenges and unlock new opportunities. This is your chance to see the possibilities first-hand, ask questions, and explore how these solutions could drive results for your organisation.
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Networking Break
Keynote - "Surfing the Chaos"
Panel Discussion
"Balancing Innovation and Risk: Building Resilient Security Strategies in a Complex Threat Landscape"
This panel brings together leading CISOs and cybersecurity experts to discuss the delicate balance between driving innovation and maintaining robust security. As organisations adopt cutting-edge technologies like AI, IoT, and cloud computing, they face an ever-expanding attack surface. Panelists will share insights on how to align security initiatives with business goals, ensure compliance, and build a culture of security at every level of the organisation. Topics include emerging threats, regulatory challenges, and the role of collaboration in building resilient and adaptive security strategies.
Drink & Nibbles
Join Us
Register Interest
Meet with fellow industry leaders and solve today’s greatest business
challenges.
Join Our Partner Network
Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.
Join the Executive Community
Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.