ismg summit logo

17th September 2024

Cybersecurity Summit: London

8:30 BST - 17:00 BST | London, EN

Event Overview

The Cybersecurity Summit in London, hosted by ISMG, is the ultimate gathering of elite cybersecurity practitioners, distinguished by its laser focus on the latest industry developments and toughest challenges. This exclusive event offers unparalleled networking opportunities with industry leaders, fostering an exchange of groundbreaking ideas. Dive deep into specialized topics such as the latest NIS2 directives, DORA resilience strategies, AI-driven cybersecurity innovations. and sophisticated ransomware combat techniques. 

The highlight? A hands-on tabletop exercise on deep fakes, equipping you with practical skills to tackle emerging threats head-on. This summit ensures you stay ahead, armed with the knowledge and connections to lead the field. 

View our ISMG 2023 London Summit Experience video to see highlights and what is in store for 2024!

Venue

Andaz, Liverpool Street, London

40 Liverpool Street, London, EN

EC2M 7QN, United Kingdom

 

NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Highlight Topics

  • DORA – The Promise of Cyber Resilience Across the Financial Sector
  • AI Act – Is the EU Putting AI In a Time Out Until it Learns to Share and Play Fair?
  • NIS2 – The Impact on EU Member States
  • Deepfake Drama – An In-Depth Tabletop Simulation 
  • Ransomware – Navigating Threats and Responses

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Ian Thornton Trump

CISO, Cyjax

Surinder Lall

SVP, Global Information Security Risk Management, Paramount

Brian Brackenborough

CISO, Channel 4

Jon Davies

Senior Director- Cyber Defense, News Corp

Victor Murineau

CISO, Chelsea Football Club

Dom Lucas

Head of Security, British International Investment

Jonathan Armstrong

Partner, Punter Southall Law

Martyn Booth

CISO, dunnhumby

Jon Staniforth

CISO, Royal Mail

Martin Peters

Detective Superintendent, City of London Police - NPCC National Cyber Crime Programme

Milos Pesic

Group CISO, Acceleron

Angus Clarke

BSO, Mastercard

Heather Lowrie

Former CISO, University of Manchester

Nathan Swain

CISO, Binance

Jez Reichmann

Deputy CISO, Channel 4

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.

Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Networking Breakfast

You can now view or download a PDF version of the attendee guide.

Opening Remarks

Ian Thornton Trump

CISO, Cyjax

Jon Staniforth

Former CISO, Royal Mail

Heather Lowrie

Former CISO, University of Manchester

Deep Insights from Three CISOs Who Battled Ransomware Attacks and Have the Scars to Prove It

The session will delve into the real-world attaches and the challenges that these CISOs faced during significant ransomware incidents, exploring how they discovered and responded to attacks, managed crises, and communicated with stakeholders.

Key Topics:

  • Discovery and response to ransomware attacks. 
  • Crisis management and stakeholder communication. 
  • Critical decision-making processes, including whether to pay ransoms. 
  • The mental toll on you and your team. 
  • Steps for data recovery and restoring normal operations.
  • Strengthening defenses to prevent future attacks. 

Moderated by Ian Thornton Trump, CISO, Cyjax

Jon Staniforth, Former CISO, Royal Mail

Heather Lowrie, Former CISO, University of Manchester

James Maude

Field Chief Technology Officer, BeyondTrust

Ian Thornton-Trump

CISO, Cyjax

Hackers Don’t Hack in – They Log In. How to Combat the Threat of Identity Compromise

With Identity compromise common to almost every cyber-attack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today this is effectively making identity the new security perimeter.
Join the discussion with James as he shares what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools.

You will hear:

• How the threat landscape is evolving
• Real world examples of identity breaches
• How attackers are exploiting hidden paths to privilege
• How controlling identities and privileges can be your greatest defense

James Maude, Field Chief Technology Officer, BeyondTrust

Ian Thornton-Trump, CISO, Cyjax

London Cybersecurity Summit

Stay tuned for more information on this session!

Milos Pesic, CISO, ABB Accelleron

Adam Wedgbury, Head of Enterprise Security Architecture, Airbus

Ash Hunt, Global CISO, APEX Group

Networking & Exhibition Break

Nathan Swain

CISO, Binance

Martyn Booth

CISO, dunnhumby

Surinder Hall

SVP, Global Information Security Risk Management, Paramount

A Double-Edged Sword: Guarding Against AI’s Expanded Threats

This panel discussion will explore how cybercriminals are leveraging AI to conduct sophisticated attacks, such as automated phishing, deepfake generation, and AI-driven malware. Recent incidents, including the AI-powered spear-phishing attack against Metro Bank and the deepfake fraud targeting German energy firm RWE, highlight the pressing need for advanced defenses. We will examine these real-world cases, discuss their implications for UK organizations, and provide strategies for mitigating these advanced threats.

Join us to gain a deeper understanding of the evolving threat landscape and to equip your organization with the knowledge to stay ahead of AI-powered cyber threats. We will dissect specific AI-driven attacks, analyzing the methodologies used by cybercriminals and offering insights on how to bolster your cybersecurity posture against such advanced tactics.

Key Takeaways:

  • Understanding AI-Enhanced Threats: Gain insights into how AI is being utilized by cybercriminals to execute more sophisticated and harder-to-detect attacks, including phishing and malware.
  • Real-World Case Studies: Learn from real-world examples of AI-driven cyberattacks, such as the AI-powered spear-phishing attack on Metro Bank and the deepfake fraud case targeting RWE.
  • Mitigation Strategies: Explore effective strategies and best practices for defending against AI-powered threats, including enhancing threat detection capabilities and improving incident response protocols.

Nathan Swain, CISO, Binance 

Martyn Booth, CISO, dunnhumby

Surinder Lall, SVP, Global Information Security Risk Management, Paramount 

London Cybersecurity Summit

Cybersecurity and Cyber Insurance Essentials for the Ransomware Era

 So it’s no surprise they’re increasingly embracing practices and approaches to help them better lock down their networks to minimize the impact of a successful attack. Cyber insurance is also part of many organizations’ risk-mitigation strategy. But the continuing success of ransomware as a criminal business model has led to a surge in premiums and insurers demanding more robust defenses from prospective policyholders. Accordingly, how can CISOs ensure they employ the right defenses? What “must have” capabilities are cyber insurers demanding? What is the role of multi-factor authentication, microsegmentation, secure web gateways and zero trust network access? This session will provide answers to these and other critical questions.

DISCUSSION POINTS

  • How are cybersecurity risks changing in the ransomware era?
  • What are essential cybersecurity defenses?
  • What is the role of cyber insurance in prevention as well as response?

Steve Jackson

Senior Vice President of Growth, Binalyze

Resolving Incident Response Challenges in Your SOC with Automation

In this presentation we will explore the specific challenges around operational security, SOC resources and welfare and the regulatory landscape, and how these challenges can be met head on through automation, collaboration and greater speed of investigation.

Steve Jackson, Senior Vice President of Growth, Binalyze

 

Lunch & Exhibition Break

London Cybersecurity Summit

London Cybersecurity Summit

London Cybersecurity Summit

Every Link Counts: Third- Party Risk and Emerging Supply Chain Threats

Recent incidents such as the 2024 breach of the UK Ministry of Defence, which involved a third-party payroll system managed by SSCL, highlight the significant risks posed by third-party software providers. This breach exposed personal data of nearly 270,000 current and former staff, underscoring the necessity for rigorous supply chain security and the adoption of comprehensive risk management frameworks. In joining the discussion, attendees will acquire actionable strategies to fortify their supply chains against emerging threats and ensure no stone is left unturned in their risk management strategy.

Key Points:

  • Proactive Risk Management: Learn how to integrate comprehensive threat intelligence and adopt best practices for evaluating third-party vendors, drawing lessons from recent high-profile breaches.
  • Advanced Security Controls: Discover best practices for deploying security controls such as code signing, software integrity verification, and secure boot mechanisms to safeguard supply chain components.
  • Continuous Monitoring and Incident Response: Gain insights into setting up effective monitoring systems to detect signs of compromise or suspicious activity in the supply chain, and develop robust incident response plans to mitigate the impact of breaches.

Brian Brackenborough, CISO, Channel 4

Richard Cassidy

EMEA CISO, Rubrik

Achieving “Predictive Resilience” with AI: Safeguarding Critical Business Operations

Organisations must adapt their cyber resilience and cyber security strategies to ensure their critical business operations remain uninterrupted when the worst-case scenario occurs.
This session, “Predictive Resilience with AI: Safeguarding Critical Business Operations,” will explore how businesses can leverage the very latest technology capabilities (many of which are already embedded into existing operations and services eco-systems) to not only respond to threats in real-time but also predict and mitigate operational risks proactively.
Join us as we delve into the transformative role of artificial intelligence in enhancing cyber resilience. Discover how AI-driven insights can help organisations understand their current resilience posture, predict likely points of failure, and integrate seamlessly with existing security platforms to combat the threats we’re now facing to our critical business operations.

Key topics include:
• The integration of AI with data-at-rest solutions to provide deeper insights and predictive capabilities.
• Strategies for maintaining continuous business operations amidst rising cyber threats.
• Approaches for the successful application of AI in predicting and mitigating cyber risks.
• Collaborative approaches to building a resilient security ecosystem that leverages the strengths of AI and existing cybersecurity tools.

By attending this event, you will gain valuable knowledge on leveraging AI for predictive resilience, ensuring that your organisation can withstand and quickly recover from cyber incidents, to maintain operational continuity in an increasingly hostile digital landscape.

Richard Cassidy, EMEA CISO, Rubrik

Serge Palladino

Principal Consultant in Intelligence Advisory Services EMEA, Recorded Future

Reducing Risk Through Automated Threat Profiling

This session will delve into the benefits of automated threat profiling, exploring why it is crucial and the challenges it presents. Attendees will learn how to prioritize threat actors and malware more dynamically and in real-time, and discover methods to operationalize the output to further protect their organizations. Join us for an in-depth discussion with experts who will share their insights and strategies for leveraging automated threat profiling to enhance cybersecurity defenses.

Key Discussion Points:

– Benefits of Automated Threat Profiling: Understanding why automated threat profiling is crucial for modern cybersecurity and the challenges it presents.

– Dynamic Prioritization: Exploring methods to prioritize threat actors and malware dynamically and in real-time to stay ahead of evolving threats.

– Operationalizing Threat Profiling: Discussing how to effectively operationalize the output of automated threat profiling to enhance organizational protection and response strategies.

Serge Palladino, Principal Consultant in Intelligence Advisory Services EMEA,

Recorded Future

Afternoon Break

London Cybersecurity Summit

Navigating Executive Liability: Safeguarding CISOs in the Age of Accountability

This session will provide an in-depth exploration of the evolving landscape of executive liability for CISOs, focusing on the implications of recent legal cases and regulatory developments. Drawing insights from recent incidents and expert recommendations, this session aims to equip CISOs with the knowledge and strategies needed to protect themselves while effectively managing their organization’s cybersecurity posture.

Key Takeaways:

  • Understanding the Current Legal Landscape: Explore the implications of recent cases and regulatory changes that have increased the personal liability of CISOs, including the impact of GDPR and other data protection laws.
  • Proactive Measures to Mitigate Liability: Learn practical steps to safeguard against personal liability, such as maintaining thorough documentation, ensuring timely breach disclosures, and implementing robust security measures.
  • Building a Culture of Accountability: Discover how fostering a culture of transparency and accountability within your organization can help mitigate risks and protect both the CISO and the company.
  • The Role of Insurance and Legal Counsel: Understand the importance of cyber insurance and regular consultations with legal counsel to ensure you are adequately protected.

 

Deborah Haworth, Director of Information Security, Penguin Random House UK

London Cybersecurity Summit

London Cybersecurity Summit

London Cybersecurity Summit

Deep Fakes, Real Stakes: Unmasking Cyber Deception in a High-Stakes Tabletop Simulation

The focal point of this exercise is a strategically crafted deep fake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud, and the challenges posed by emerging technological threats.

What You Will Gain From This Experience

  • Enhanced Organizational Readiness: To critically assess and improve organizational preparedness in responding to intricate cyber incidents involving deep fake technology and social engineering.
  • Interagency Collaboration and Knowledge Exchange: To strengthen the partnership and information sharing between the sponsor and leaders in the private sector cybersecurity community.
  • Strategic Response Development: To create all-encompassing incident response strategies that cover legal, technical, and communicational facets, while also identifying and rectifying weaknesses in existing cybersecurity policies and governance.

Deborah Haworth, Director of Information Security, Penguin Random House UK

Closing Comments

Networking Reception

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Our Sponsors

Recorded Future logo

Our Partners

CyberTech logo
Women in Cybersecurity logo
Water ISAC logo
Information Systems Security Association International logo
Swiss Cyber Institute logo

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Upcoming ISMG Events

July 26, 2024

Building Agility and Resilience With Digital First, Next-Gen Connectivity, Secure by Design

July 30, 2024

Cyber Security Readiness with Splunk, Boston

August 8, 2024

Cybersecurity Summit: New Delhi

August 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities

September 17, 2024

Cybersecurity Summit: London

Upcoming ISMG Events

July 26, 2024

Building Agility and Resilience With Digital First, Next-Gen Connectivity, Secure by Design

July 30, 2024

Cyber Security Readiness with Splunk, Boston

August 8, 2024

Cybersecurity Summit: New Delhi