Don’t miss out

CISOXUK

07 Oct 2025

County Hall London

Welcome to CISOXUK, the premier event exclusively designed for accomplished CISOs across the UK. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CISOXUK, where visionary CISOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

intro

The Speakers

Accelerate your network growth

Secure up to twelve exclusive meetings with relevant leads at CISOXUK maximising your opportunity to forge valuable connections and drive business growth.

Become a sponsor

Learn from industry titans

Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.

Forge meaningful Connections

Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.

Agenda

Discover what awaits you at CISOXUK.

Registration & Networking Breakfast

Welcome & Opening Remarks From EDS

OPENING PANEL - The Business-Savvy CISO: Mastering Communication, Influence and Impact

  • Florence Kaleta
    Regional CISO - UK & Ireland Deutsche Bank
  • Neil Weller
    Group CISO OCS Group
  • Hammond Reddie
    CISO Spire Healthcare

In today’s rapidly evolving threat landscape, CISOs face the critical challenge of bridging the gap between complex technical risks and business priorities. This panel will explore how security leaders can overcome communication barriers to effectively engage the boardroom and gain essential sign-off on security initiatives. Panelists will discuss the risks and consequences when security messages fail to resonate, such as delayed decisions, inadequate funding, and increased organizational exposure. Learn how today’s CISOs can develop strategic influence, build trust with C-suite peers, and become indispensable partners driving business growth and resilience.

In the Cyber Trenches: War Stories from 180,000

  • AJ Nurcombe
    Field CTO EMEA Horizon3.AI

To defeat the adversary, we must move beyond tracking their tools—we must understand their mind.
The traditional approach to cybersecurity has focused relentlessly on the technical what (malware signatures, TTPs) and the macro why (geopolitical tension, economic drivers). However, the next decisive frontier in intelligence and defence requires a pivot to the who: the personality dynamics that fuel cyber threat actor groups and using autonomous tools to follow in their footsteps.

THE HOT SEAT: What CISOs Need to Know About Political Risk and Threat Intelligence

  • Darren Desmond
    CISO The AA

As geopolitical tensions increasingly shape the cyber threat landscape, CISOs must adapt their strategies to account for political risk and evolving adversarial tactics. In this session, Darren Desmond—drawing on his background in military intelligence and critical infrastructure—will explore how global events influence cyber threats, and how strategic threat intelligence can help organizations stay ahead. He’ll share practical insights on integrating geopolitical awareness into risk governance, preparing for state-linked cyber activity, and leading with resilience in high-stakes environments. This is a must-attend session for security leaders navigating today’s complex, interconnected threat ecosystem.

AM BREAK & 1:1 Xchange

ROUNDTABLE XCHANGES - Discussions on Shared Challenges

  • Jim Simpson
    ML Threat Operations, Intel Specialist HiddenLayer
  • Lee Casey
    Field Chief Technology Officer Nephos Technologies
  • Chris Eves
    Director of Identity Security Evangelism Semperis
  • No Crash, Just Conduct: Security in the Era of Generative AI

    In traditional security, things break and that’s how we know they’re vulnerable. But with Large Language Models, there’s no crash, no exploit chain—just behaviour. Risk isn’t binary anymore; it’s probabilistic, contextual, and unpredictable. So, how do you test something that doesn’t fail the old way? We’ll explore why LLMs break the testing model, how attackers manipulate behaviour instead of code, and what CISOs need to rethink about red teaming, incident response, and trust boundaries in the age of generative AI.
  • Map, Manage, Mitigate: Data Governance for AI Risk

    As organisations accelerate their adoption of AI, the foundation for responsible and secure deployment lies in how effectively they govern their data. In this session, you’ll hear about the critical role of data governance in mitigating AI-specific risks - from model exploitation to data leakage - while ensuring compliance with an increasingly complex regulatory landscape. Key discussion points include: • How data mapping helps identify exposure points across your ecosystem • Why controlling access and usage is key to preventing misuse and leakage • How robust governance frameworks reduce the risk of AI model corruption • What’s emerging in AI regulation - and how to stay ahead of it • Why data governance is the cornerstone of long-term AI resilience
  • Legacy Tech, Modern Threats: Rethinking Identity Infrastructure for Business Resilience

    In today’s digital-first world, identity platforms like Active Directory are more than just IT tools, they are the backbone of business operations. This roundtable explores how identity systems underpin everything from access control to AI functionality, and why their resilience is critical to organizational survival. We’ll discuss the risks of outdated infrastructure, the challenges of hybrid environments, and how identity recovery can make or break your operational continuity.

In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.

Women Leading Cyber: Breaking Barriers, Shaping the Future and Embracing Neurodiversity

  • Anaïs Beaucousin
    CBSO ADP International
  • Nisha Patel
    CISO Ocorian
  • Florence Kaleta
    Regional CISO - UK & Ireland Deutsche Bank

Cybersecurity needs more than technical excellence, it needs diverse, empowered leadership. This panel brings together trailblazing women in cyber to explore the real experiences, challenges, and impact of women shaping the future of security. Through honest stories of success and setbacks, our speakers will share how they’ve navigated career-defining moments in a field that’s still evolving in its inclusivity. Expect practical insights and lived experiences from breaking through “all-male” leadership structures, to mentoring others, and advocating for neurodiverse strengths in the workplace. We will also explore the neurodiverse differences observed between male and female leadership – such as emotional intelligence, pattern recognition, and problem-solving under pressure, and how these shape decision-making and team dynamics in high-stakes environments. Whether you’re looking to elevate your own path or champion the next generation, this conversation is a call to action: to give women in cyber a stronger voice, create space for neurodiverse brilliance, and build leadership that reflects the full spectrum of talent our industry needs.

Secure by Default: What Every CISO Should Demand from Open Source

  • Ryan Sheldrake
    Field CTO, EMEA Chainguard

Open source software fuels innovation—but it also introduces increasing security risk. With software supply chain attacks on the rise and regulations tightening globally, engineering and security leaders are under pressure to adopt secure-by-default practices that scale across development environments and teams.

In this session, we’ll explore why traditional, reactive approaches to open source security are no longer enough, and how Chainguard is enabling organizations to shift
left, building security into the software supply chain from the start. From trusted provenance to continuous vulnerability elimination, we’ll show how compiling everything from source daily gives teams unprecedented visibility and control. You’ll get an inside look at how companies like Snowflake leveraged Chainguard to reduce CVE remediation time by 85%, enabling their teams to ship with confidence and stay ahead of compliance requirements. We’ll also explore how Canva integrated Chainguard Images to support rapid product delivery while meeting strict security and governance standards.
Whether you are operating at hyperscale or just beginning your journey toward secure software development, this session will deliver market insights, real-world examples, and practical takeaways to help you build a secure software factory grounded in open source best practices.

Join us to learn why “secure by default” isn’t just a philosophy, it’s now a market expectation.

LUNCH & 1:1 Xchange

QUICK TECH TALE: Seconds to Respond: Navigating the Chaos of a Live Phishing Attack

  • Ash Hughes
    Head of Cyber Security Berkeley Group

When a highly targeted phishing email bypassed traditional security filters, the Berkeley Group’s cyber team was faced with a critical challenge: contain the threat before it spread. In this 10-minute session, Ash Hughes, Head of Cyber Security, shares how the team rapidly identified the compromise, initiated a coordinated incident response, to isolate and remediate malicious payloads across mailboxes. He outlines the pressure of real-time decision-making, how Berkeley refined its response workflows, and the role of end-user behavior in threat detection. The outcome? No data loss, improved response time, and a transformed approach to phishing defense. This is a candid look at what it takes to stay ahead of attackers, when seconds matter most.

QUICK TECH TALE: Beyond Bots: Tackling Modern Fraud in the Age of Agentic AI

  • Adam Desmond
    VP UK&I Transmit Security

GenAI is fueling a new era of fraud; fast, adaptive, and eerily human. Agentic AI amplifies the threat by powering autonomous attacks that imitate legitimate behaviour, rendering traditional fraud defenses ineffective, especially as real users increasingly rely on agents themselves. Stopping fraud now requires a different kind of AI. Predictive AI doesn’t react; it continuously learns from real user behaviour, device signals, and identity context to detect subtle signs of fraud before it happens. It’s how leading fraud and identity teams are staying ahead of GenAI and Agentic AI threats.

EDS INSIGHTS: What Are Security Leaders Saying? Challenges and Priorities

  • David McClelland
    XSeries Host & Moderator EDS

In this interactive session, we unpack the latest poll findings on the most pressing challenges facing Security Leaders in 2025. From evolving threat landscapes and regulatory pressures to talent shortages and technology shifts, this discussion brings together real-world insights and peer perspectives from across the security community. Join us as we explore the data, identify emerging priorities, and exchange ideas on how today’s security leaders are preparing for what’s next.

AI-Powered Security: Staying Ahead in an Autonomous Threat Landscape

  • Mandy Andress
    Chief Information Security Officer Elastic

As threat actors increasingly leverage AI to scale and sharpen their attacks, security teams must evolve beyond reactive defence. In this session, you’ll hear how leading organisations are adopting AI-driven approaches to detect threats earlier, respond with greater precision, and build environments capable of defending themselves.
Elastic CISO Mandy Andress will examine how defenders can rethink detection, decision-making, and response – shifting from traditional playbooks to dynamic, intelligence-led security strategies that keep pace with a rapidly changing threat landscape.

Key Takeaways:
– How AI is transforming detection speed and decision-making at scale across the SOC
– Why generative AI introduces new types of risk – and what strategies help mitigate them
– Ways data quality and accessibility shape the effectiveness of AI-led defence

QUICK TECH TALE: Cyber Data Protection - Know Your Data to Protect It

  • Sarith Chandra
    Director - Security, Risk & Compliance GE Healthcare

In an age where data is the most valuable asset, protecting sensitive information from insider threats is more critical than ever. In this fast-paced session, Sarith Chandra shares how GE Healthcare approaches the challenge of safeguarding its “crown jewels” through robust Data Loss Prevention (DLP) strategies and insider risk programs. Learn how to balance security with productivity, detect early warning signs of misuse, and build a culture of trust without compromising control. A sharp, tactical briefing for security leaders facing the human side of cyber risk.

PM BREAK - 1:1 Xchange + Community Conversations

  • Shintaro Takeda
    CISO KDDI Europe
  • Nisha Patel
    CISO Ocorian
  • Martin Covill
    CISO IPSL
  • Executive Accountability and Operational Readiness Under NIS2: Bridging Compliance and Cyber Resilience

    With the NIS2 Directive setting a new bar for cybersecurity governance across critical sectors, executive accountability is no longer optional, it's a legal obligation. This roundtable brings together senior security, risk, and compliance leaders to explore how organizations can meet the directive’s heightened demands while driving meaningful cyber resilience. Key discussion points will include operational readiness, board-level oversight, incident reporting, supply chain risk, and aligning compliance efforts with strategic risk management. Join us for an interactive, off-the-record conversation on what readiness really looks like in a NIS2 world, and how to bridge the gap between policy and practice.
  • How Security is Impacted By AI in the Business

    As AI adoption accelerates across every business function, from operations and customer service to software development, CISOs are under growing pressure to secure systems they may not fully control or understand. This roundtable brings together senior security leaders for a candid conversation on the evolving security implications of enterprise AI. Topics include securing AI models and data pipelines, detecting AI-generated threats, managing shadow AI initiatives, and aligning governance with innovation. Join your peers to explore how CISOs can enable responsible AI use while maintaining visibility, control, and trust in a fast-moving landscape.
  • Leading Through Burnout: Prioritizing Wellbeing for Yourself and Your Security Teams

    As cyber threats escalate and the pressure on security teams intensifies, burnout is becoming a critical leadership challenge. This roundtable invites senior security leaders to candidly discuss the human cost of constant vigilance, and the strategies needed to foster resilience at both personal and team levels. From managing stress and workload to building a culture of psychological safety and sustainable performance, this session explores how to lead with empathy, prioritize wellbeing, and retain top talent in high-stakes environments. Join us for a thoughtful conversation on how strong leadership starts with taking care of your people and yourself.

Take a break, engage in meetings and join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.

The United Front: Driving Security Awareness, Education and Responsibility Across the Enterprise

  • Reza Salari
    CISO Pacific LifeRe
  • Milena Maneva
    Head of Business Continuity & Resilience EMEA Cantor Fitzgerald
  • Stuart Evans
    Global Director of Internal Audit Travelex
  • Mousa Hayadri
    Group Head of Cyber Security - Europe Metroline

Enterprise protection isn’t just a technical issue, it’s a cultural one. In this closing panel, leading CISOs share how they’re embedding security awareness across their organisations, turning every employee into an accountable link in cyber resilience. From board-level engagement to frontline behaviour change, we’ll explore what it takes to drive lasting awareness, secure executive buy-in, educate employees and build shared accountability. Expect practical insights on making security real, relevant, and everyone’s responsibility. This is your playbook for leading a more secure, aware, and united enterprise!

Key takeaways include:
• Creating a security-first culture through cross-functional leadership
• Moving beyond tick-box training to real behavioural change
• Communicating risk in language the business understands
• Empowering champions beyond the IT and security team

Closing Remarks

Drinks Reception

Apply to Attend

Location

County Hall, Belvedere Road, London, UK

County Hall, Belvedere Road, London, UK

Past Events

Testimonials

See what attendees, speakers and sponsors say about our events.

FAQs

Who attends?

Attendance is reserved for C-Suite executives and Senior Executives within Cybersecurity, including Chief Information Security Officers, and other senior security decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.

What does my delegate pass include?

Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.

What are the one-on-one meetings?

These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.

What is the dress code?

Professional business attire is appropriate.

Do I need to prepare anything?

No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.

Why attend?

Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.

Have any more questions?

Get in touch here

Have any more questions?

Get in touch