Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Hanah Darley, Head of Threat Research at Darktrace, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
The Future of Cybersecurity
CISO Think Tank

UK Visionaries
Leo Cunningham
CISO
Owkin Inc
About Me
Gurinder Singh
Global Head of IT Security & Global Head of Innovation
Deutsche Bank
Sandip Patel
Group Chief Security Officer
APM
Paul Scott
Global CISO
Omnicom Group
Cameron Brown
Director - CyberSecurity - Risk Advisory
Deloitte
About Me
Leo Cunningham
CISO
Flo Health Inc.
About Me
Troy Cunningham
Head of Information Security
IPONWEB
About Me
Balaji Anbil
Lead Enterprise Architect
Ministry of Justice UK
About Me
Phil Lea
Chief Privacy Officer
Tenth Revolution
About Me
William Davies
Head of Information Security and Assurance
Government Shared Services
Martin Medlycott
Group CIO & CISO
Metropolitan Thames Valley
About Me
Adrian Leung
CISO & Data Protection Officer Europe
Equifax
Lyn Webb
CISO
Open University
About Me
Amar Singh
CISO
Cyber Management Alliance Limited
About Me
Hanah Darley
Head of Threat Research
Darktrace Holdings Limited
About Me
EVENT DETAILS
May 10, 2022
Agenda
12:00 PM-12:45 PM
Welcome & Registration
12:55 PM-1:45 PM
Keynote
Fast and Furious Attacks: Using AI to Surgically Respond
Panelists
1:45 PM-2:40 PM
Fireside Chat
Cloud Security
According to Gartner 79% of companies have experienced at least one cloud data breach during the pandemic. Remote work is here to stay, and the concept of securing a perimeter has essentially ended. Traditional application security measures are broken. The need to innovate faster and shift to cloud-native application architectures isn’t just driving complexity, it’s creating significant vulnerability blind spots also.
Under the thumb of the pandemic, enterprises and IT leaders had to look for tech solutions that were resilient and agile to empower the remote workforce. To sustain business continuity plans, organizations shifted workloads to the cloud. As much as cloud adoption offers flexibility and productivity, it also exposes organizations to cyber threats and data breaches. So the question remains if moving to the cloud is the right thing to do and if so how to protect it from the new risks given that most organizations believe that application security should be completely automated to keep pace with dynamic clouds and rapid software development practices.
Panelists
Chair
Cameron Brown
Director - CyberSecurity - Risk Advisory
Deloitte
Speaker
Leo Cunningham
CISO
Flo Health Inc.
2:40 PM-2:50 PM
Networking Break
3:00 PM-3:35 PM
Panel
Guarding the Doors: Navigating 3rd Party Risk
As organizations expand their third-party ecosystem, many are challenged with executing core activities that are critical to operations, risk profiles, and compliance posture without compromising the quality of data collection, evaluation, and mitigation measures increasingly outsourcing business activities to 3rd-party vendors. It is critical for an organization to be vigilant when selecting the right 3rd-party vendor with the appropriate security posture, as many vendors are hosting, processing and transmitting sensitive regulatory information with unrestrained access to our IT assets. At the highest level, third-party incidents can result in reputational damage, non-compliance, or even criminal activity, which can negatively impact earnings and shareholder value. To address this challenge, many organizations are investing in technology to support vendor risk management. Technology isn’t the entire answer to managing third-party risk, however the right technology or collection of technologies, coupled with optimal processes, can enable organizations to bridge the gap.
Panelists
Chair
Cameron Brown
Director - CyberSecurity - Risk Advisory
Deloitte
Speaker
Gurinder Singh
Global Head of IT Security & Global Head of Innovation
Deutsche Bank
Speaker
Sandip Patel
Group Chief Security Officer
APM
Speaker
Phil Lea
Chief Privacy Officer
Tenth Revolution
3:40 PM-4:15 PM
Building security into DevSecOps
Many organizations struggle with how and where to introduce automation and integrations efficiently. Conventional approaches to application security can’t keep pace with cloud-native environments that use agile methodologies and API-driven architectures, microservices, containers, and serverless functions. Application security testing is evolving to meet the speed at which DevOps teams operate. DevSecOps teams are challenged with how to make sense of the noise their AppSec tools generate once they’ve been automated into DevOps pipelines. Processes and tools are more fast-paced and rely on integration and automation to maintain efficiency throughout the software development life cycle. A new approach to DevSecOps is required addressing a change in the security mindset. How do CISOs achieve this without the buy-in from stakeholders?
Panelists
4:15 PM-4:35 PM
Networking Break
4:35 PM-5:30 PM
Panel
The Greatest Fears?
The biggest fear is not the technology, it is the potential of human error that could expose your organization to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. How do we guard against human error without limiting employee efficiency and productivity?
Panelists
Chair
Cameron Brown
Director - CyberSecurity - Risk Advisory
Deloitte
Speaker
Troy Cunningham
Head of Information Security
IPONWEB
Speaker
Balaji Anbil
Lead Enterprise Architect
Ministry of Justice UK
Speaker
Adrian Leung
CISO & Data Protection Officer Europe
Equifax
Speaker
Lyn Webb
CISO
Open University
