Event Agenda
10th November 2026 // London
10th November 2026 // London
We are currently working on the 2026 agenda and will be updating it soon.
In the meantime, take a look at the topics and themes discussed as part of the 2025 agenda:
| Day 1 // 10th November 2025 08:50 – 17:20 (BST) |
|
![]() |
08:50 Opening Address by Bharat Thakrar, Board Director, ISACA London Chapter |
![]() |
09:00Panel Discussion: AI at the Crossroads: Balancing Innovation with Risk This discussion will explore how to drive innovation whilst securing AI adoption, manage emerging threat vectors and align AI initiatives within regulatory frameworks. . • How is AI currently reshaping industries, and where are we seeing the most impact? • How can we enable the adoption of AI technologies to strengthen threat detection and response techniques while also ensuring good cyber governance? • What steps need to be taken to anticipate the emerging risk of AI being weaponised by threat actors? .– Moderator: Martin Jimmick, Group Head of Information Security, Vue International – Theo Botha, CISO, Dr Martens – Victor Shadare, Global Head of Cyber Security, Conde Nast – Tony Povoas, CISO, Aegon UK – Andy Palanisamy, Lead – Technical Evangelist, ManageEngine . |
![]() |
09:40Presentation: Decluttering the SOC: Focusing on What Truly Matters in the Age of AI In this session, we explore how Security Operations Centers will evolve to prioritise impactful alerts and streamline workflows using AI and automation. Attendees will discuss reducing alert fatigue, leveraging intelligent technologies for rapid threat detection, and enabling analysts to focus on strategic investigations rather than routine tasks. The session will highlight how AI-driven tools can create a resilient, efficient SOC environment, allowing human expertise to address complex cyber threats while automation manages the noise and repetitive processes, shaping the future of security operations. . – Andy Palanisamy, Lead – Technical Evangelist, ManageEngine . |
![]() |
10:20Networking Break |
![]() |
11:00Fireside Chat: Cyber Culture Fundamentals: Why Getting the Basics Right Matters While emerging technologies and new threat vectors demand attention, the cultural foundations within our organisations also play a key role in determining lasting resilience. This fireside chat will give a comprehensive overview of how to embed secure behaviors in your organisation and explore the role of a strong cyber culture in building long-term resilience. . • Understand what the ‘cyber culture fundamentals’ look like, and how they can be embedded within existing organisational practices • Explore how organisations have integrated a resilient culture across every part of their organisation, from employees to leadership and third party partners • Gain insights into how to balance investment between strengthening our foundational controls and developing resilient and secure workforces . – Moderator: Chitra Balakrishna, Professor of Cyber Security & Board Member, UK Cyber Security Council – David Parles, Head of Cyber Security, Biffa |
![]() |
11:30Presentation: Strengthening Digital Resilience: Aligning Digital Forensics and Cyber Security Strategies to Reduce Risk An alert tells you that something happened, but Digital Forensics and Incident Response (DFIR) solutions and methods reveal the full chain of events. To achieve this deeper visibility, DFIR teams require the right capabilities, such as capturing data across endpoints and cloud environments using an integrated approach, often facilitated by hybrid collection methods. In this session, we move from initial security alerts to revealing the truth with rapid triage and comprehensive deep-dive forensic capabilities. . • Uncover the full chain of events – the attack’s origin, spread, and the adversary’s specific actions – to ensure a complete and successful recovery • Capture data from both endpoint and cloud sources and uncover digital artefacts that traditional SIEMs and EDRs often miss • Implement automation to streamline repetitive forensic tasks and enable collections to be triggered instantly from an alert . – Laura Carey, Solutions Consultant, Magnet Forensics . |
![]() |
12:00Presentation: Securing the IT Supply Chain: Navigating Complexity and Emerging Threats This presentation will dive deep into the specific risks facing IT supply chains, discuss how organisations can gain visibility into their digital dependencies, and explore cutting-edge approaches to safeguarding the technology that powers business operations. . • Gain insights into the unique cyber security risks inherent to the IT supply chain • Learn how to prepare for regulatory and compliance demands, such as DORA, and hear strategies for introducing these into your security strategies • Explore the role of emerging technologies in IT supply chain security . – Renata Vincoletto, CISO, Civica . |
![]() |
12:30Presentation: Simplify. Secure. Scale: The Power of Consolidation with SASE The enterprise security stack has become fragmented—ZTNA here, SWG there, CASB somewhere in between. The result? Complexity, cost, and inconsistency. It’s time to simplify. Join our subject matter expert in this session to learn how to: . • Unify ZTNA, SWG, CASB, FWaaS, and SD-WAN into a single Secure Access Service Edge (SASE) architecture. • Simplify management and policy enforcement while enhancing protection from branch to cloud to hybrid workforce. • Transform your security posture with an identity-driven, adaptive trust framework that improves visibility, performance, and user experience. Leave this session with insights on how ZTNA becomes a key building block in your journey toward full SASE consolidation—and how simplification can be your strongest defense. . – John Volkering, Technical Director EMEA, Versa Networks |
![]() |
13:00Lunch hosted by ManageEngine |
![]() |
14:00Case Study: Spear Phishing Case Study Led by PC Andy Robinson, a policing expert from the Cyber Griffin team, this case study will provide a behind-the-scenes look into the inner workings of an offender’s criminal activity and the subsequent police investigation. . • Learn first hand the importance of good cyber practices and how they directly help to mitigate attacks • Gain a renewed sense of the importance of good cyber hygiene • Understand the positive impact policing can have during the initial phases of an investigation . – PC Andy Robinson, Police Constable, Cyber Griffin (City of London Police) . |
![]() |
14:40Spotlight: Key findings from The Annual Cyber Security Attitudes and Behaviours Report 2024/25 Join us for a review of the key findings of the latest (fifth, to be exact) ‘Oh, Behave!’ report. Attendees will learn: . • Global snapshot: We’ll present a global snapshot of people’s cyber security attitudes and behaviours • Mindsets & motivations: What do people really think about cyber security, and what keeps them up at night? We’ll explore who they rely on for protection and where they place the responsibility • The AI challenge: AI use has exploded, but training hasn’t. People are more confident, but also more vulnerable. In a world of shadow AI and deepfake scams, we’ll discuss how to bridge the knowing-doing gap . – James Beary, Sales Director, CybSafe . |
![]() |
14:50Presentation: The AI Promised Land: How Security Leaders Can Accelerate AI Without Losing Control The AI era is here, and every organisation is racing to harness its potential. Yet as proprietary data becomes the fuel for innovation, it also amplifies risk. Shadow AI, ungoverned data use, and emerging AI threats can derail progress before it starts. In this session, discover how leading enterprises are embedding data security and AI guardrails at the core of their strategies. Learn proven best practices to protect sensitive data, mitigate AI security and compliance risks at scale, and confidently accelerate your journey to the AI Promised Land. . – Vijay Sagar, VP Customer Success, Securiti |
![]() |
15:20Networking Break |
![]() |
15:50Roundtables: Choose 1 of 4 Discussions Below T1: From Standing Privilege to Zero Standing Privilege: A Practical Discussion – Gemma Hanna, Cybersecurity Expert, Delinea – James Chuka, Cybersecurity Expert, Delinea . T2: How Should We Govern Data in the Age of AI? – Aarti Ajay, Board Director, Events, ISACA London Chapter . T3: How Do You Sustain A Strong Cyber Culture? – Don Gibson, CISO, Kinly . T4: Are We Ignoring Critical Insider Risks? – Sue Milton, SheLeadsTech Ambassador, ISACA London Chapter . |
![]() |
16:30Panel Discussion: Supply Chain Security: Managing and Mitigating Third Party Risks This session will look at the importance of maintaining the security of physical and digital supply chains, with a particular focus on securing third party risk, and explore strategies to help build resilience against supply chain threats in your organisation. . • How do we effectively measure third party risk at scale? • What is the impact of rising geopolitical tensions and third-party supplier risks on supply chain security? • How can we better understand and implement the regulatory frameworks that shape how we strengthen our third-party security? . – Moderator: Don Gibson, CISO, Kinly – Natasha Lalovic, Head of Cyber Security and Compliance, TATE – Geeta Sriskanthan, Head of Technology Risk, Compliance and Assurance (Exec Director), Mizuho – Gavin Whatrup, BISO, Interpublic Group (IPG) . |
![]() |
17:10Closing Remarks |
![]() |
17:20 Drinks Reception |
![]() |
17:20End of Conference |