ismg summit logo

13 November 2025

Financial Services Summit: London

12TH EDITION | London, EN

Event Overview

The Financial Services Cybersecurity Summit in London, hosted by ISMG, is the ultimate gathering of elite cybersecurity practitioners, distinguished by its laser focus on the latest industry developments and toughest challenges. This exclusive event offers unparalleled networking opportunities with industry leaders, fostering an exchange of groundbreaking ideas. 

The highlight? A hands-on tabletop exercise on deepfakes, equipping you with practical skills to tackle emerging threats head-on. This summit ensures you stay ahead, armed with the knowledge and connections to lead the field. 

View our ISMG Event Experience Video to see what your peers are saying about their participation. 

Venue

Andaz, Liverpool Street, London

40 Liverpool Street, London, EN

EC2M 7QN, United Kingdom

NOTE: All requests to attend will be reviewed by event staff and

approved based on and event capacity.

Highlight Topics

  • DORA – The Promise of Cyber Resilience Across the Financial Sector
  • AI Act – Is the EU Putting AI in a Time Out Until It Learns to Share and Play Fair?
  • NIS2 – The Impact on EU Member States
  • Deepfake Drama – An In-Depth Tabletop Simulation 
  • Ransomware – Navigating Threats and Responses

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Ian Thornton-Trump

CISO, Cyjax

Surinder Lall

SVP, Global Information Security Risk Management, Paramount

Brian Brackenborough

CISO, Channel 4

Heather Lowrie

Former CISO, University of Manchester

Jon Davies

Senior Director, Media Company - Confidential

Victor Murineanu

Information Security Manager, Chelsea Football Club

Dom Lucas

Head of Security, British International Investment

Angus Clarke

VP, BSO, Mastercard

Jonathan Armstrong

Partner, Punter Southall Law

Martyn Booth

CISO, dunnhumby

Jon Staniforth

fmr. CISO, Royal Mail

Rory Alsop

Head of Information Security & Cyber Risk, Tesco Bank

Past Speakers

Thought Leaders on Stage and Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage for knowledge-sharing discussions. Know what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

You can now view or download a PDF version of the attendee guide.

Registration & Networking Breakfast

You can now view or download a PDF version of the attendee guide.

Opening Remarks

Financial Services Summit: London

Financial Services Summit: London

Financial Services Summit: London

Deep Insights From Three CISOs Who Battled Ransomware Attacks and Have the Scars to Prove It

Discover how to strengthen your organization’s resilience by learning directly from those who have navigated these intense challenges, offering you practical strategies and invaluable lessons for future preparedness. 

This session will:

  • Explore the speaker’s firsthand experience in managing a significant ransomware attack compared to prior training.
  • Highlight the importance of communication and showing empathy in incident response.
  • Discuss the personal and financial implications of a cyber incident for CISOs, their organizations and customers.
  • Emphasize the need for collaboration among legal, compliance and communication stakeholders.

Moderated by Ian Thornton-Trump, CISO, Cyjax

Jon Staniforth, Former CISO, Royal Mail

Heather Lowrie, Former CISO, University of Manchester

Financial Services Summit: London

Financial Services Summit: London

Financial Services Summit: London

Hackers Don’t Hack in – They Log In. How to Combat the Threat of Identity Compromise

With identity compromise common to almost every cyberattack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today, this is effectively making identity the new security perimeter.

Join the discussion with our esteemed panel of experts as they share what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools.

This session will cover:

  • How the threat landscape is evolving.
  • Real-world examples of identity breaches.
  •  How attackers are exploiting hidden paths to privilege.
  • How controlling identities and privileges can be your greatest defense.

James Maude, Field Chief Technology Officer, BeyondTrust

Ian Thornton-Trump, CISO, Cyjax

Victor Murineanu, Information Security Manager, Chelsea Football Club

Financial Services Summit: London

The Shifting Responsibilities of InfoSec Leaders Across Financial Services

Although all employees share the responsibility for cybersecurity, Chief Information Security Officers, Chief Risk Officers, and other senior security leaders are at the forefront, confronting cyber threats directly. Simply put, these essential responsibilities can no longer be regarded as back-office functions; these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake.

Key Discussion Points:

  • Strengthening Multifactor Authentication: Proactively implement robust authentication methods to prevent high-risk data breaches.
  • Mitigating API Security Risks: Integrate real-time monitoring and threat detection to secure APIs against emerging vulnerabilities.
  • Enhancing Cloud Security Protocols: Identify and address gaps in SaaS deployments to ensure comprehensive cloud protection.
  • Managing Vendor Risks Proactively: Develop and enforce stringent risk management frameworks for third- and fourth-party vendors to minimize exposure.

Steve Jackson, Senior Vice President of Growth, Binalyze

 

Networking & Exhibition Break

Financial Services Summit: London

Financial Services Summit: London

Financial Services Summit: London

SecOps Transportation - Cybersecurity at Scale

These failures impacted organization’s ability to scale to meet business demands and reduced stability of the security architecture as environments and data volumes grew. The use of AI driven detections, automation, endpoint security, attack surface management and real-time threat intelligence application were the moonshot achievements for security solutions like SIEM, but were never achieved.
 
Join this session to discuss:
 
  • Scaling to meet business demands and stabilizing your security architecture
  • Reimagining organizational  security operations programs based on standardization
  • Achieving the impossible with security information and event management

Nathan Swain, CISO, Binance 

Max Kington, CISO, Global Markets, BNP Paribas

Surinder Lall, SVP, Global Information Security Risk Management, Paramount 

Financial Services Summit: London

Reducing Risk Through Automated Threat Profiling

This session will delve into the benefits of automated threat profiling, exploring why it is crucial and the challenges it presents. Attendees will learn how to prioritize threat actors and malware more dynamically and in real time, and discover methods to operationalize the output to further protect their organizations. Join us for an in-depth discussion with experts who will share their insights and strategies for leveraging automated threat profiling to enhance cybersecurity defenses.

This session will cover:

  • Benefits of automated threat profiling: Understanding why automated threat profiling is crucial for modern cybersecurity and the challenges it presents.
  • Dynamic prioritization: Exploring methods to prioritize threat actors and malware dynamically and in real-time to stay ahead of evolving threats.
  • Operationalizing threat profiling: Discussing how to effectively operationalize the output of automated threat profiling to enhance organizational protection and response strategies.

Lance Moraitis-Jones, Senior Presales Engineer, Recorded Future 

Financial Services Summit: London

New Age of Payment Fraud: Hackers vs. Heroes

Join us as we delve into payment fraud prevention, examining rising threats such as account takeovers and synthetic identity fraud. Our expert will explore critical topics, including authentication techniques, data security practices, and adherence to regulatory standards. Additionally, we will address the growing risks associated with social engineering and the specific challenges faced in securing mobile payments.
 
Key topics include:
  • The Evolving Face of Payment Fraud: Unpacking New Trends and Their Industry Impact
  • Uncovering Weaknesses in Digital Payments: Lessons from Real-World Exploits
  • Harnessing AI for Fraud Prevention: The Transformative Role of Machine Learning
  • Mastering the Maze of International Fraud: Tackling Cross-Border Payment Challenges

Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai

Lunch & Exhibition Break

Financial Services Summit: London

Financial Services Summit: London

Protecting Digital Identity: Combatting Account Takeovers in Financial Services

This session will delve into the mechanics of account takeovers, highlighting how attackers pose as legitimate users to gain prolonged, undetected access to accounts. It will explore:

  • Methods employed by cybercriminals, such as brute force attacks, phishing, and malware.
  • The importance of implementing MFA and robust identity and access management frameworks to protect private data.
  • The broader implications of account takeovers beyond individual consumers, including risks to supply chains and vendors.
  • Preventing illegitimate access to cloud applications and ensuring continuous authentication and authorization of all users and devices.

Dom Lucas, Head of Security, British International Investment

Brian Brackenborough, CISO, Channel 4

 

Financial Services Summit: London

Achieving Predictive Resilience With AI: Safeguarding Critical Business Operations

Organizations must adapt their cyber resilience and cybersecurity strategies to ensure their critical business operations remain uninterrupted in case of worst-case scenarios.

This session will explore how businesses can leverage latest technology capabilities – many of which are already embedded into existing operations and services ecosystems – to not only respond to threats in real time, but also predict and mitigate operational risks proactively.


Join us as we delve into the transformative role of artificial intelligence in enhancing cyber resilience. Discover how AI-driven insights can help organisations understand their current resilience posture, predict likely points of failure, and integrate seamlessly with existing security platforms to combat the threats we’re now facing to our critical business operations.

This session will cover:
• The integration of AI with data-at-rest solutions to provide deeper insights and predictive capabilities.
• Strategies for maintaining continuous business operations amidst rising cyberthreats.
• Approaches for the successful application of AI in predicting and mitigating cyber risks.
• Collaborative approaches to building a resilient security ecosystem that leverages the strengths of AI and existing cybersecurity tools.

By attending this event, you will gain valuable knowledge on leveraging AI for predictive resilience, ensuring that your organisation can withstand and quickly recover from cyber incidents to maintain operational continuity in an increasingly hostile digital landscape.

Richard Cassidy, Field CISO, Rubrik

Afternoon Break

Financial Services Summit: London

Financial Services Summit: London

Financial Services Summit: London

Financial Fortification: The Power of Interdisciplinary Risk Management

The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective threat response, aligning different departments under a unified risk management objective.

Discussion Highlights:

  • Collaborative Frameworks: Examine how CISOs and IT teams in financial services can seamlessly integrate security measures with everyday IT operations.
  • Success Stories: Highlight case studies from the financial sector that showcase the benefits of partnerships between risk functions, emphasizing efficient risk mitigation and the development of a robust cybersecurity culture.
  • Shared Language and Interdisciplinary Teams: Offer insights on establishing a common language for risk communication, forming interdisciplinary teams, and the importance of vigilant monitoring and rapid response systems in financial institutions.
  • Championing Security Investments: Discuss the critical role of CISOs in advocating for security investments and the necessity of executive support to foster an organizational environment that prioritizes cybersecurity awareness in financial services.

Jonathan Armstrong, Partner, Punter Southall Law

Declan Burke, CISO, NorthStandard

Rory Alsop, Head of Information Security & Cyber Risk, Tesco Bank

Financial Services Summit: London

Financial Services Summit: London

Deepfakes, Real Stakes: Unmasking Cyber Deception in a High-Stakes Tabletop Simulation

It aims to bolster strategic response capabilities and enhance operational readiness against the backdrop of advanced cyberthreats.The focal point of this exercise is a strategically crafted deepfake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud and the challenges posed by emerging technological threats.

This session will cover:

  • Enhanced organizational readiness: To critically assess and improve organizational preparedness in responding to intricate cyber incidents involving deepfake technology and social engineering
  • Interagency collaboration and knowledge exchange: To strengthen the partnership and information sharing between the sponsor and leaders in the private sector cybersecurity community.
  • Strategic response development: To create all-encompassing incident response strategies that cover legal, technical and communicational facets, while also identifying and rectifying weaknesses in existing cybersecurity policies and governance.

Martin Peters, Detective Superintendent, City of London Police – NPCC National

Cybercrime Programme

Phillip Davies, CISO, Equifax UK

Closing Comments

Networking Reception

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Past Sponsors

Recorded Future logo

Our Partners

CyberTech logo
Women in Cybersecurity logo
Water ISAC logo
Information Systems Security Association International logo
Swiss Cyber Institute logo

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

The Summit Experience

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025