Don’t miss out
07 Oct 2025
County Hall London
Welcome to CISOXUK, the premier event exclusively designed for accomplished CISOs across the UK. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CISOXUK, where visionary CISOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

Secure up to twelve exclusive meetings with relevant leads at CISOXUK maximising your opportunity to forge valuable connections and drive business growth.
Become a sponsor
Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.
Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.
Discover what awaits you at CISOXUK.
In today’s rapidly evolving threat landscape, CISOs face the critical challenge of bridging the gap between complex technical risks and business priorities. This panel will explore how security leaders can overcome communication barriers to effectively engage the boardroom and gain essential sign-off on security initiatives. Panelists will discuss the risks and consequences when security messages fail to resonate, such as delayed decisions, inadequate funding, and increased organizational exposure. Learn how today’s CISOs can develop strategic influence, build trust with C-suite peers, and become indispensable partners driving business growth and resilience.
To defeat the adversary, we must move beyond tracking their tools—we must understand their mind.
The traditional approach to cybersecurity has focused relentlessly on the technical what (malware signatures, TTPs) and the macro why (geopolitical tension, economic drivers). However, the next decisive frontier in intelligence and defence requires a pivot to the who: the personality dynamics that fuel cyber threat actor groups and using autonomous tools to follow in their footsteps.
As geopolitical tensions increasingly shape the cyber threat landscape, CISOs must adapt their strategies to account for political risk and evolving adversarial tactics. In this session, Darren Desmond—drawing on his background in military intelligence and critical infrastructure—will explore how global events influence cyber threats, and how strategic threat intelligence can help organizations stay ahead. He’ll share practical insights on integrating geopolitical awareness into risk governance, preparing for state-linked cyber activity, and leading with resilience in high-stakes environments. This is a must-attend session for security leaders navigating today’s complex, interconnected threat ecosystem.
In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.
Cybersecurity needs more than technical excellence, it needs diverse, empowered leadership. This panel brings together trailblazing women in cyber to explore the real experiences, challenges, and impact of women shaping the future of security. Through honest stories of success and setbacks, our speakers will share how they’ve navigated career-defining moments in a field that’s still evolving in its inclusivity. Expect practical insights and lived experiences from breaking through “all-male” leadership structures, to mentoring others, and advocating for neurodiverse strengths in the workplace. We will also explore the neurodiverse differences observed between male and female leadership – such as emotional intelligence, pattern recognition, and problem-solving under pressure, and how these shape decision-making and team dynamics in high-stakes environments. Whether you’re looking to elevate your own path or champion the next generation, this conversation is a call to action: to give women in cyber a stronger voice, create space for neurodiverse brilliance, and build leadership that reflects the full spectrum of talent our industry needs.
Open source software fuels innovation—but it also introduces increasing security risk. With software supply chain attacks on the rise and regulations tightening globally, engineering and security leaders are under pressure to adopt secure-by-default practices that scale across development environments and teams.
In this session, we’ll explore why traditional, reactive approaches to open source security are no longer enough, and how Chainguard is enabling organizations to shift
left, building security into the software supply chain from the start. From trusted provenance to continuous vulnerability elimination, we’ll show how compiling everything from source daily gives teams unprecedented visibility and control. You’ll get an inside look at how companies like Snowflake leveraged Chainguard to reduce CVE remediation time by 85%, enabling their teams to ship with confidence and stay ahead of compliance requirements. We’ll also explore how Canva integrated Chainguard Images to support rapid product delivery while meeting strict security and governance standards.
Whether you are operating at hyperscale or just beginning your journey toward secure software development, this session will deliver market insights, real-world examples, and practical takeaways to help you build a secure software factory grounded in open source best practices.
Join us to learn why “secure by default” isn’t just a philosophy, it’s now a market expectation.
When a highly targeted phishing email bypassed traditional security filters, the Berkeley Group’s cyber team was faced with a critical challenge: contain the threat before it spread. In this 10-minute session, Ash Hughes, Head of Cyber Security, shares how the team rapidly identified the compromise, initiated a coordinated incident response, to isolate and remediate malicious payloads across mailboxes. He outlines the pressure of real-time decision-making, how Berkeley refined its response workflows, and the role of end-user behavior in threat detection. The outcome? No data loss, improved response time, and a transformed approach to phishing defense. This is a candid look at what it takes to stay ahead of attackers, when seconds matter most.
GenAI is fueling a new era of fraud; fast, adaptive, and eerily human. Agentic AI amplifies the threat by powering autonomous attacks that imitate legitimate behaviour, rendering traditional fraud defenses ineffective, especially as real users increasingly rely on agents themselves. Stopping fraud now requires a different kind of AI. Predictive AI doesn’t react; it continuously learns from real user behaviour, device signals, and identity context to detect subtle signs of fraud before it happens. It’s how leading fraud and identity teams are staying ahead of GenAI and Agentic AI threats.
In this interactive session, we unpack the latest poll findings on the most pressing challenges facing Security Leaders in 2025. From evolving threat landscapes and regulatory pressures to talent shortages and technology shifts, this discussion brings together real-world insights and peer perspectives from across the security community. Join us as we explore the data, identify emerging priorities, and exchange ideas on how today’s security leaders are preparing for what’s next.
As threat actors increasingly leverage AI to scale and sharpen their attacks, security teams must evolve beyond reactive defence. In this session, you’ll hear how leading organisations are adopting AI-driven approaches to detect threats earlier, respond with greater precision, and build environments capable of defending themselves.
Elastic CISO Mandy Andress will examine how defenders can rethink detection, decision-making, and response – shifting from traditional playbooks to dynamic, intelligence-led security strategies that keep pace with a rapidly changing threat landscape.
Key Takeaways:
– How AI is transforming detection speed and decision-making at scale across the SOC
– Why generative AI introduces new types of risk – and what strategies help mitigate them
– Ways data quality and accessibility shape the effectiveness of AI-led defence
In an age where data is the most valuable asset, protecting sensitive information from insider threats is more critical than ever. In this fast-paced session, Sarith Chandra shares how GE Healthcare approaches the challenge of safeguarding its “crown jewels” through robust Data Loss Prevention (DLP) strategies and insider risk programs. Learn how to balance security with productivity, detect early warning signs of misuse, and build a culture of trust without compromising control. A sharp, tactical briefing for security leaders facing the human side of cyber risk.
Take a break, engage in meetings and join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.
Enterprise protection isn’t just a technical issue, it’s a cultural one. In this closing panel, leading CISOs share how they’re embedding security awareness across their organisations, turning every employee into an accountable link in cyber resilience. From board-level engagement to frontline behaviour change, we’ll explore what it takes to drive lasting awareness, secure executive buy-in, educate employees and build shared accountability. Expect practical insights on making security real, relevant, and everyone’s responsibility. This is your playbook for leading a more secure, aware, and united enterprise!
Key takeaways include:
• Creating a security-first culture through cross-functional leadership
• Moving beyond tick-box training to real behavioural change
• Communicating risk in language the business understands
• Empowering champions beyond the IT and security team
County Hall, Belvedere Road, London, UK
County Hall, Belvedere Road, London, UK
See what attendees, speakers and sponsors say about our events.
“I attended because the list of speakers was an attraction, and the time of the year also worked for me. It met my expectations. I was planning on leaving earlier, but stayed all through because I did not want to miss anything."
“I enjoyed the people, the interaction, the conversations and insights on what happening currently or near term in the industry, also the exceptional customer service by the team and staff, the intimacy EDS showed me throughout the event, I wasn’t left on an island. "
“I had lots of fun and met a lot of great people there & most importantly I learned a few things as well."
“My overall experience was excellent and very informative, I enjoyed the content of presentations and also discussions. Also interaction with fellow attendees."
“The location, timelines, topics put it above many of the other conferences, I would like to participate next time! "
“I attended last year’s EDS CIO CISO event and thought the speakers and content were excellent. This year was even better with a good mix of topics and some interesting participants."
“I was impressed by all of the speakers and took away some interesting insights from the participants. The EDS team was well organized and made things flow well, and the event location / venue was great."
“This was well worth the trip and would certainly attend again if invited."
“This event is definitely better than others I've attended - service-oriented and really focused on ensuring a lot of dialogue. Both in 1:1 interactions and at the tables. Very well done."
“Interesting agenda, top experts and speakers, expectations were fully met by the participants and presentations. The event was great, vibrant until the end and at a great venue!"
“This is in the Top 5 of my best IT conferences to date, including commercial events. I already recommended EDS to my colleagues."
“It was a real value for me to be part of your event. You did a great job in organizing and performing."
“Attending EDS events as a CTO opened doors to insightful discussions and connections that felt truly genuine. It's not often you find such a perfect blend of knowledge sharing and camaraderie."
“Another great event! The atmosphere is relaxed yet intellectually stimulating, making it easy to connect with peers and exchange real-world insights with real CISOs."
“Thank you EDS. Your gatherings are refreshing and I always leave feeling inspired and armed with actionable ideas for our digital strategy."
“Sponsoring EDS events has been a fantastic opportunity for us. The focus on genuine engagement rather than just promotion allows us to build lasting relationships with industry leaders in a natural, authentic way."
“I've been attending EDS dinners as a CIO for a while now, and they never disappoint. The blend of thought-provoking discussions and genuine connections is unmatched in the industry."
“EDS events provide an invaluable platform for CISOs like myself to exchange ideas and best practices in a relaxed, yet professional setting. The conversations are always real and relevant. Thank you EDS team!"
“We're repeat sponsors of EDS dinners for a reason! Each time, we get unique opportunities to connect with decision-makers on a personal level. It's not just about business; it's about building authentic relationships, every time"
“EDS events have become a staple for me as a CDO"
“Sponsoring EDS events has been a breath of fresh air. The focus on quality over quantity ensures that our brand gets genuine exposure to the right audience in a way that feels natural and human."
Attendance is reserved for C-Suite executives and Senior Executives within Cybersecurity, including Chief Information Security Officers, and other senior security decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.
Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.
These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.
Professional business attire is appropriate.
No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.
Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.
Get in touch here