ismg.events
Open in
urlscan Pro
151.101.2.159
Public Scan
URL:
https://ismg.events/summit/london-2023/
Submission: On July 19 via manual from IN — Scanned from DE
Submission: On July 19 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOMName: New Form — POST
<form class="elementor-form" method="post" name="New Form">
<input type="hidden" name="post_id" value="5731">
<input type="hidden" name="form_id" value="21b9e35">
<input type="hidden" name="referer_title" value="London Summit">
<input type="hidden" name="queried_id" value="3936">
<div class="elementor-form-fields-wrapper elementor-labels-above">
<div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required">
<input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm elementor-field-textual" placeholder="Email" required="required" aria-required="true">
</div>
<div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
<div class="elementor-field" id="form-field-field_4cf4815">
<div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&hl=de&type=v3&v=iZWPJyR27lB0cR4hL_xOX0GC&size=invisible&badge=bottomright&sa=Form&cb=ajiobjldcy6e"
width="256" height="60" role="presentation" name="a-eri5iudwx1yg" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
<button type="submit" class="elementor-button elementor-size-sm">
<span>
<span class=" elementor-button-icon">
</span>
<span class="elementor-button-text">Send</span>
</span>
</button>
</div>
</div>
</form>
Text Content
Skip to content * Events * Summits * Engage * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About Menu * Events * Summits * Engage * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About 19TH SEPTEMBER 2023 LONDON CYBERSECURITY SUMMIT 9:00 AM BST - 5:00 PM BST Register Now View Agenda IN PERSON SUMMIT Overview Topics Agenda Speakers CPE Credits Register Overview Topics Agenda Speakers CPE Credits Register EVENT OVERVIEW ISMG Summits feature carefully curated agendas delivering a Keynote Address from an Industry Luminary, Case-Based Learning, Networking and more. The Summits are geo-targeted, industry-specific, and topic-driven events designed for security leaders. ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers. VENUE LONDON TBA HIGHLIGHT TOPICS * The Art and Science of Translating Cyber Risk and Loss Exposure Into Quantifiable Measures * Future Threat Landscape * Zero Trust Networks = Better Enterprise Security * The Current Threat Landscape * Critical Infrastructure Protection Register KEYNOTE SPEAKER HELEN RABE, CISO, BBC Helen is passionate about aligning security with desired business outcomes, considerate of current state and future business strategies. As an influential and versatile security leader, her ability to clearly communicate strategy to all levels of the organization, including the Board, have resulted in strong and comprehensive programs with high adoption of security behaviors across organizations. Helen has a proven track record of developing, executing & maturing bespoke ISMS strategies and teams to mitigate risk, counter threats and deliver world-class security & data privacy management solutions across varied industry sectors ranging from financial services to media & broadcasting & life sciences. MATT GORDON-SMITH Former CISO, Gatwick Airport ANDREW ROBSON CISO, Bentley Motors MATT BROOMHALL CISO, Lloyds DON GIBSON CISO, Kinley MILOS PESIC CISO, ABB Accelleron DOM LUCAS Head of Security, British International Investment ADAM WEDGBURY Head of Enterprise Security Architecture, Airbus ASH HUNT Global CISO, APEX Group QUENTYN TAYLOR Director, Information Security, Canon EMEA CAMERON BROWN Director- Cyber Security - Risk Advisory, Deliotte MATT GORDON-SMITH Former CISO, Gatwick Airport STEVE FURNELL Professor of Cyber Security, University of Nottingham SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape. View Faculty AGENDA You can now view or download a PDF version of the attendee guide. Download Agenda REGISTRATION & BREAKFAST 8:00 am - 9:00 am 9:00 am – 9:30 aM LONDON SUMMIT THE ART AND SCIENCE OF TRANSLATING CYBER RISK AND LOSS EXPOSURE INTO QUANTIFIABLE MEASURES Because every business is unique, so too are the risks facing each one. Hence the answer to the question “what are the biggest cyber risks we face?” depends on who’s asking. Regardless of the answer, however, it’s up to the cybersecurity team to not only identify cyber risks, but help business leaders understand the operational risks each one poses, to help them quantify the resulting business risks each one poses and to take responsibility for what happens next. This expert panel discusses: * Creating a common risk language across the organization * Building a playbook that helps the business identify actual exposure * Strategies for making cyber everyone’s responsibility Watch brief video on this topic 9:30 am – 10:00 aM DON GIBSON CISO, Kinley HEALTH HELD TO RANSOM: PROTECTING THE HEALTH OF OUR CYBERSECURITY TEAMS Late last year, the UK government announced its National Cyber Strategy for 2022, a comprehensive plan that aims to establish “a more secure and resilient nation, better prepared for evolving threats and risks.But what about the personal resilience of our security leaders and their teams? A constantly shifting threat landscape, long work hours, a lack of resources, high staff turnover are all factors that can lead to burnout. How can a more secure and resilient nation be achieved if we don’t look after our people? This expert panel will share insights and strategies, including: • How stress and burnout are emerging in the workplace today; • The importance of showing vulnerability as a leader; • Tools to build personal resilience and prevent burnout; • How organizations can protect the wellbeing of their people. Don Gibson, CISO, Kinley 10:00 am – 10:30 aM MILOS PESIC CISO, ABB Accelleron ADAM WEDGBURY Head of Enterprise Security Architecture, Airbus ASH HUNT Global CISO, APEX Group AWARENESS AND BEHAVIOR CHANGE- IS THIS THE TRUE DRIVER OF RISK REDUCTION IN INFORMATION SECURITY? Running user awareness programs continues to be a cornerstone of many corporate information security programs, often driven in part by regulatory requirements. But can, and should, user training be relied on to better secure organizations? Should organizations instead focus their efforts more broadly, for example, by attempting not to train users, but to more effectively influence their behavior? Join this session to hear three leading cybersecurity executives share their experiences regarding: • The use, abuse and limits of user training • Working with behavioral psychologists and marketing professionals • The role of user behavior in risk reduction Milos Pesic, CISO, ABB Accelleron Adam Wedgbury, Head of Enterprise Security Architecture, Airbus Ash Hunt, Global CISO, APEX Group 10:30 am – 11:00 aM MILOS PESIC CISO, ABB Accelleron THE ART AND SCIENCE OF TRANSLATING CYBER RISK AND LOSS EXPOSURE INTO QUANTIFIABLE MEASURES Because every business is unique, so too are the risks facing each one. Hence the answer to the question "what are the biggest cyber risks we face?" depends on who's asking. Regardless of the answer, however, it's up to the cybersecurity team to not only identify cyber risks, but help business leaders understand the operational risks each one poses, to help them quantify the resulting business risks each one poses and to take responsibility for what happens next. This expert panel discusses: • Creating a common risk language across the organization • Building a playbook that helps the business identify actual exposure • Strategies for making cyber everyone’s responsibility Milos Pesic, CISO, ABB Accelleron 11:00 am – 11:30 aM LONDON SUMMIT LONDON SUMMIT ZERO TRUST NETWORKS = BETTER ENTERPRISE SECURITY Finding a balance between a pleasant user experience and stringent security requirements is challenging, but if you don't do it, users may revolt. Adobe learned this when it was faced with the major shift toward remote and hybrid work as a result of the COVID-19 pandemic. We had to move our more than 22,000 global employees to remote work over a single weekend, and the massive change required network security controls that could readily adapt. Adobe invested in Project ZEN – an internal initiative based on zero trust principles. ZEN consists of pioneering technology and policies to make the path to zero trust more efficient and attainable. It enabled us to take a new approach to managing our user encounters and authentication across the company and increase security while improving the overall user experience. In this session, Eric Anderson will discuss the benefits of a zero trust approach to network security, our path to Project ZEN and its benefits, including how it helped us better navigate the work changes precipitated by the pandemic. He will show how Adobe’s experience in building and deploying zero trust networking can help you improve your organization’s approach to hybrid and remote work. To learn more about Adobe, click here to visit our booth to chat with a representative. Watch brief video on this topic NETWORKING & EXHIBITION BREAK 11:30 am - 11:45 am 11:45 am – 12:30 pm LONDON SUMMIT THE CURRENT DATA BREACH LANDSCAPE Rapid digital acceleration seen since the start of the pandemic has transformed the way businesses operate as they adapt to changing consumer behaviors and consumers' expectations of both customer experience and security. Recent world events have increased the risk of cyberthreats and elevated the importance of having a strategic incident response plan in place to deal with a data breach, should it happen. TransUnion’s data breach solutions can help you take a proactive approach to dealing with data breaches and better protect consumers while helping to reduce financial losses. We do this by developing an efficient and effective response strategy that can help your organization equip customers with tools for combating identity theft, mitigate impacts to reputation and credibility and rebuild trust. Mark Read, head of data breach solutions for TransUnion in the U.K. and part of TransUnion’s award-winning consumer solutions team, will share his insights into the current data breach landscape, covering the pressing issues faced by businesses across the U.K. and the role TransUnion’s data breach support services can play in helping businesses to reduce the impact of a data breach. Watch brief video on this topic NETWORKING & EXHIBITION BREAK 11:10 am - 11:29 am et Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? LUNCH & EXHIBITION BREAK 12:30 pm – 1:00 pM 1:00 pm – 2:00 pM LONDON SUMMIT CRITICAL INFRASTRUCTURE PROTECTION: IMPROVING RESILIENCE As part of its remit, the U.K.'s National Cyber Security Center, or NCSC, safeguards the nation's critical infrastructure - much of which is controlled within the private sector. Marsha Quallo-Wright, an NCSC deputy director, is responsible for improving critical infrastructure resilience, and in this exclusive session she discusses: * The state of critical infrastructure security; * The heightened cyberthreat resulting from Russia’s invasion of Ukraine; * Public/private sector partnerships that can improve critical infrastructure security and resilience. Watch brief video on this topic 2:00 pm – 3:00 pM LONDON SUMMIT WHY WAFS ARE RUNNING ON EMPTY Modern WAFs are powerful, but they can be complex to manage and operate. Modern WAFs are powerful, but they can be complex to manage and operate. From deciding on deployment architecture and requirement mapping to DEVOPs (CI/CD) integration and finalizing the myriad of other considerations before moving to the tuning and operationalization phase, all this creates complexity and confusion. As a result, modern WAFs can be costly to implement in both commercial and staffing terms. Join Jay Coley, lead of security strategy at Fastly, as he demonstrates how you can reduce these issues to ensure your WAF deployments are as flexible and as simple as possible, all the while maintaining rule accuracy and WAF usability. Watch brief video on this topic CLOSING COMMENTS 3:00 pm – 3:15 pM ET DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT Register #ISMGSummit @ISMG_News OUR SPONSORS SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty THE SUMMIT EXPERIENCE Previous Next Previous Next CPE CREDITS Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals. Claim Credits REGISTER RSVP here to attend our events. You can select for multiple or individual tickets. LONDON CYBERSECURITY SUMMIT Sep 19, 2023 RSVP Available till Sep 19, 2023 (05:00 PM) Add Please enter your email to continue I agree to the Terms and Conditions and Privacy Policy. Proceed Upcoming ISMG Events AUGUST 8, 2023 The State of Cybersecurity: What 2022 Tells us about 2023 and Beyond See Event AUGUST 22, 2023 Building an Effective Cloud Security Strategy See Event AUGUST 16, 2023 The Cloud Journey: How to Gain Maturity to Grow Securely in the Cloud See Event SEPTEMBER 19, 2023 London Cybersecurity Summit See Event AUGUST 23 - 24, 2023 New Delhi Summit See Event Upcoming ISMG Events AUGUST 8, 2023 The State of Cybersecurity: What 2022 Tells us about 2023 and Beyond See Event AUGUST 22, 2023 Building an Effective Cloud Security Strategy See Event AUGUST 16, 2023 The Cloud Journey: How to Gain Maturity to Grow Securely in the Cloud See Event ISMG Publications EVENT * Summits * Engage * Roundtables * Custom Events * Summits * Engage * Roundtables * Custom Events ABOUT * Sponsorship * Leadership * Company * Privacy Policy * Sponsorship * Leadership * Company * Privacy Policy @ISMG_News #ISMGEngage SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS Send