Menu
Solutions | Strategy | Connection
The most powerful summit for IT and Information Security Leaders.
Nicholas Cooper
Global Head of Cyber Security & Threat Intelligence
Your CIO & CISO Visions experience is bespoke to you. Connect with the industry In-Person or join us online at our Virtual Summit.
In-Person
Twickenham Stadium,
London, England
9 - 11 October, 2022
Event Details
Virtual
BST Time Zone
17 - 21 October, 2022
Event Details
An event experience curated around you and your business needs
Tailored-to-you meetings, leading speakers and incredible networking opportunities. CIO & CISO VISIONS provides senior IT and information security executives a platform to access the exact content, insight and solutions they need to drive their business forward.
1
Hear from Industry Experts
With over 25 captivating speakers on the agenda, learn from leaders driven to inspire.
Solve Your Top Challenges
Meet One2One with solution providers specifically qualified to meet your business needs.
Make Inspired Connections
Share strategic insight with leaders across industry.
It’s All Complimentary
Catering, accommodation and £150 travel reimbursement is covered by us.
Hear from Industry Experts
Learn from thought leaders paving the way in your industry, all from the comfort of your own home.
Solve Your Top Challenges
Meet One2One with solution providers specifically matched to your business needs.
Total Flexibility
Whether you’re at home or in the office, access sessions in real time or on-demand.
Register Now

Experience the Only Solutions-Based Event

Tell us the challenges you’re facing, and we’ll schedule meetings with the right solution providers to solve them. You leave with a plan and the tools you need to move your company forwards.

Norfolk County Council
"I found the matching of relevant supplier meeting slots more effective than any other events I have attended (physical or virtual). I like the blend of focused, pre-booked supplier meetings and on demand educational content. I found it to be a really good use of my limited time for supplier related research. Highly recommended!"
Deputy Director of IMT, CTO and Chair,
Norfolk County Council
Sussex, Partnership Logo
"The setup was very slick, and there was little to no effort from my side, and I ended up being partnered with suppliers that most definitely could fit into my Trust's needs in the coming few years. Good organization, customer service and technical setup ensured a great event."
Security Architect,
Sussex, Partnership
CODEX Logo
"CIO VISIONS enabled a direct dialog with new and exciting vendors in specific areas of interest, while also reducing the commitment of attending an event in person by spreading meetings over several days."
Head of Information Technology,
Codex

Hear From Today’s Most Influential Brands and Voices

Nicholas Cooper
Global Head of Cyber Security & Threat Intelligence
Victoria Van-Roosmalen
Chief Information Security Officer
Jason Maude
Chief Technology Advocate
Deepa Ramadoss
Head of Security Risk Management
Ash Hunt
Group Head of Information Security
Roxanne Heaton
Chief Information Officer
Tony Strows
Global Lead - Learning Consulting & Design (ai)
Don Gibson
Head of Cyber
Steven Furnell
Professor of Cyber Security
Stuart Golding
Chief Information Security Officer (Interim)
Nicholas Hodder
Director of Digital Transformation
Carl Martin
Global Chief Technology Officer
Robert Kerssies
Chief Information Security Officer
Vince King
Head of DevSecOps
Stephen Owen
Chief Information Security Officer
Sarah Lucas
Head of Technology
Michael Somers
Head of Cyber Security
Anthony Stables
Chief Information Officer
Nicholas Hodder
Director of Digital Transformation
Alessandro Bovone
Chief Technology Officer
Adam Saunders
Chief Information Security Officer
Janne Lautanala
Chief Ecosystem and Technology Officer
Adam Saunders
Chief Information Security Officer
Don Gibson
Head of Cyber
Dinesh Krishnan
Global Head of Information Technology
Bridget Kenyon
Chief Information Security Officer
David Talby
Chief Technology Officer
Ben Ward
Field Technologist UK&I
Georgina Owens
Chief Technology Officer
Jeff Reichard
Vice President, Public Sector & Compliance Strategy
Bejesh Pereira
Group Head of Information Technology
Victoria Van-Roosmalen
Chief Information Security Officer
Dean Sysman
CEO and Co-Founder
Nicholas Hodder
Director of Digital Transformation
Karandeep Bansal
Head of Information Security
Katherine Campbell
Chief Digital Officer
Jason Maude
Chief Technology Advocate
Jitender Aroa
Chief Information Security Officer
Colonel Caroline Woodbrigde-Lewin
Head of Information Warfare
Stefan Blickensdorfer
Chief Technology Officer
Geoff Connell
Chief Digital Officer
Dr Asaad Moosa
Chief Information Security Officer
David Prince
Cyber Security Leader
Greg Wilson
Cyber Security Senior Manager
John Morris
Global Head of IT
Alberto Asuero
Chief Technology Officer
Craig Hughes
Chief Enterprise Architect
Robin Smith
Head of Cyber and Information Security
Daniel Wu
Head of AI & Machine Learning

Enjoy the Perks of Exclusivity; Everything is on us

As an attendee you’ll receive:

  • One night complimentary accommodation
  • Catering and open bar
  • Travel reimbursement
  • Dedicated Attendee Relations Manager to tailor your experience

Get Rewarded

Since we can’t treat you to accommodation and delicious dining with a virtual event, we’ve designed a brilliant rewards system worthy of your time. Take all 6 solution provider meetings and earn your choice of amazing rewards, including JBL and Amazon products and charitable donations.

Register Now

A Tailored Agenda For You

Tune In on Your Time

Choose from 25 Speakers, 6 Networking Opportunities and More
It’s entirely up to you whether to catch the presentations as they come online or watch on-demand.
Sunday9 October
Monday10 October
Tuesday11 October
5:00 - 7:00pm
Welcome Reception and Registration
7:30 - 8:50am
Breakfast
8:00 - 9:00am
Keynote: The Triple Threat to Secure Any Organisation
+2
MORE
  • How can a collaboration between the CIO, CISO and CFO create a solid foundation to ensure business continuity and performance?
  • What are the benefits of educating a CFO about cyber threats, implications of a breach and how expensive security systems are?
  • How does understanding that security is a business problem and not a technical problem help build a resilient application ecosystem?

Speakers:

Don Gibson
Head of Cyber
Sarah Lucas
Head of Technology
Alessandro Bovone
Chief Technology Officer
9:00 - 10:00am
Innovate With Caution: Ethical AI
• What are the market expectations for responsible AI use?
• How do you decide which data is essential and worth the challenge of trying to consolidate and cleanse?
• How can you ensure that the data you feed your algorithms won’t contain any bias?
• What are the implications of creating an algorithm with poor quality data?
• In the event of unavoidable bias in your data, how will you actively ensure that other teams are aware of these limitations and thus apply the knowledge with caution?
• Why is it essential to have a team to tackle ethical problems associated with the widespread collection, analysis and use of data, especially when it is used to train AI?
• What are the costs of failure to operationalise data and AI ethics?

Speakers:

Roxanne Heaton
Chief Information Officer
Develop Your Security Posture With a Diverse Defence Team
• The cybersecurity industry is still a male dominated profession, what are the contributing factors to this and what needs to be done to change?
• How can establishing a diverse and inclusive workforce representative of gender, demographics, ethnicity, neurodiversity and educational background create a more effective security posture?
• In what way can having a diverse workforce contribute to bridging the skills gap?
• What are the benefits of having a diverse workforce?
• What can a CISO do to ensure a company wide push towards reaching diversity?

Speakers:

Nicholas Cooper
Global Head of Cyber Security & Threat Intelligence
10:00 - 11:00am
Technology Isn’t Enough: It’s Time To Turn The Tables
+1
MORE
• What issues arise if security is treated as a technology problem and not a business one?
• Why is it important to steer the direction of attention for threats away from systems and technology and focus on human error?
• What kind of threats are caused by human error?
• How can these be avoided?
• How can fostering a sense of community build a more resilient organisation?
• What are some tips for communicating cyber security best practises?

Speakers:

Stuart Golding
Chief Information Security Officer (Interim)
Robert Kerssies
Chief Information Security Officer
11:00 - 12:00pm
How to Embrace a DevOps Culture to Accelerate Your Digital Transformation
  • How can implementing a DevOps culture solve issues involved in a disappointing digital transformation experience?
  • What does it take to build a culture of DevOps?
  • What does a DevOps culture look like?
  • How can it support wider transformation efforts?
  • How can you extend these efforts by adding security into DevOps?

Speakers:

Jason Maude
Chief Technology Advocate
Better Safe than Sorry: Putting Security at the Heart of DevOps
• How does implementing a DevSecOps framework play a significant role in reducing security risks?
• In the absence of a DevOps team, how can development and operations teams be convinced to work together and adopt a DevSecOps mindset?
• Why is it important to shift security left on the development pipeline?
• Why is it important that security teams change their practises to align with development teams and use these to meet requirements rather than changing their requirements?
• How can visibility and monitoring help any push back associated with new DevSecOps initiatives?
• Why is it important to have Security Champions to advocate for security tools and best practices?

Speakers:

Vince King
Head of DevSecOps
12:00 - 1:00pm
Mastering Migration: The Factors to Consider When Choosing Your Public Provider
Ensuring you consider the capability, accessibility, visibility, resiliency, security, and support that is associated with the service providers along with any indirect or intangible costs that may occur from the switch ask yourself:

Key Takeaways:

  • What are the benefits of the public cloud?
  • Why are some public clouds more suitable for certain businesses?
  • Why is it important for a CIO to know their organisations requirements when choosing a public cloud?
  • How do different providers differ?
  • Does the provider have options to support third-party networking capabilities?
  • How are cloud capabilities rapidly evolving to meet the needs of a diverse, hybrid workforce?
  • What are the methods when choosing which applications to prioritise migrating from legacy to cloud?
  • Is there built-in security to reduce efforts to implement security, compliance, and governance?
  • How can an organisation accommodate for threats associated with the public cloud?

Speakers:

Anthony Stables
Chief Information Officer
Zero Trust, Not Just a Buzzword, a Necessity
• With the shift from a remote working environment to hybrid, what are the new host of issues organisations now face?
• With a growing number of devices and people why is it essential to never trust and always verify?
• What are the core principles of zero trust?
• How can you design a zero trust model that is secure and user friendly?
• How does zero trust significantly improve security, operational effectiveness, resiliency and efficiency?

Speakers:

Stephen Owen
Chief Information Security Officer
1:00pm
Networking Lunch
2:00 - 3:00pm
COMING SOON!
3:00 - 4:00pm
Get a Grip! The Growing Skills Gap
+2
MORE
• Given there is already a substantial workforce skills gap, what will happen if your organisation doesn’t get a grip and start trying to bridge this gap?
• How can it be determined which employees need upskilling or reskilling?
• What needs and objectives need to be met in order to create a sustainable and flourishing workforce?
• What methods and resources can be utilized to train staff?
• How can you attract and retain the best talent?

Speakers:

Tony Strows
Global Lead - Learning Consulting & Design (ai)
Victoria Van-Roosmalen
Chief Information Security Officer
Adam Saunders
Chief Information Security Officer
CISOs Aren’t Superheroes, They Need Protecting Too!
  •  How can a CISO balance the resilience of their organisation with their own mental health and resilience?
  • What are the signs of burnout?
  • Why is it important to create an open and safe working environment?
  • What can a CISO do to champion mental health and wellbeing in their organisation?
  • What are some healthy methods to alleviate stress in a high-pressure environment?

Speakers:

Don Gibson
Head of Cyber
4:00 - 5:00pm
Multi Cloud: The Best of Both Worlds
+1
MORE
  • What are the benefits of a multi cloud environment?
  • Why do multi-cloud strategies provide better flexibility while avoiding over-reliance on a single provider?
  • What are the challenges of a multi-cloud environment from a security perspective?
  • How can the risks of a multi-cloud strategy be reduced?
  • How can the hybrid cloud be secured?
  • How can the costs of the cloud be optimised to gain true value and ROI?

Speakers:

Ash Hunt
Head of Information Security
Deepa Ramadoss
Head of Security Risk Management
5:00 - 6:00pm
Culture-Led Disruption- Integrating Tech and People
  • What role can technology play in developing a culture of disruption?
  • What does the future of technology leadership look like?
  • How can employees be empowered to develop technology leadership skills for a diverse, multigenerational workforce that will drive responsible and ethical innovation now and in the future?
  • Why is it important to have a diverse workforce?
  • What are the benefits of a diverse workforce?
  • How can technology be used to empower employees and what are the benefits?

Speakers:

Nicholas Hodder
Director of Digital Transformation
Hybrid Working: the good, the bad and the ugly
+1
MORE
• What are the associated risks with a hybrid work environment?
• What are the social implications and how can these be considered in strategy?
• How can an organisation stay secure long-term in an uncontrolled environment?
• What are some methods to build a solid and reliable hybrid team?
• How can an organisation accommodate for threats associated with the public cloud?

Speakers:

Adam Saunders
Chief Information Security Officer
Michael Somers
Head of Cyber Security
6:00 - 9:00pm
Networking Dinner
Explore All Sessions
7:30 - 8:50am
Breakfast
8:00 - 8:50am
COMING SOON!
9:00 - 10:00am
Follow the Leader
• What does it take to be a successful leader in the new normal of remote and hybrid working?
• Why is it essential to create a culture putting inclusion first?
• As a leader, how do you put together and support happy, high performing and diverse teams?
• Why is it essential to have a diverse workforce and how can they be leveraged to improve business operations?
• How much time should be spent focusing on culture?
• What are the most important factors a CIO needs to consider when leading a digital transformation?

Speakers:

Carl Martin
Global Chief Technology Officer
10:00 - 11:00am
Looking Into the Future, How Will AI Improve Business Processes?
+1
MORE
  • How will AI be leveraged to compliment cloud computing?
  • How does generative AI differ from previous traditional models?
  • How does NLP enhance and accelerate content processing, content enrichment, data analytics and data creation?
  • How can NLP be used in business to improve efficiency, ROI and accuracy?
  • How can AI contribute to ESG efforts?
  • What are some approaches to deliver AI for good that help accelerate a path towards a sustainable and thriving AI-enabled future?

Speakers:

Robin Smith
Chief Information Security Officer
Carl Martin
Global Chief Technology Officer
We Demand a Seat at the Table: How to get the Board to take Security Seriously
• What methods have been successful in encouraging change with stakeholders about safety?
• Why is it important to create a culture of transparency and communication?
• Why despite years of well publicised cybersecurity breaches do C-suite executives continue to dismiss cybersecurity as someone else’s problem?
• What are some tactics for communicating with the board and business leaders about cybersecurity issues?
• How can you explain the evolving threat landscape to the board?
• In the event of a breach, how can a CISO work with stakeholders to minimise impact and protect the reputation of the organisation?

Speakers:

Ash Hunt
Head of Information Security
11:00 - 12:00pm
A Dive Into Real Incidents, the Impact, Response and Lessons Learnt
• A look into real cyber breaches, the types of attack, the size of the organisation, industry and incident response.
• What types of incidents are organisations encountering and how prepared are they to face them?
• Is cyber security being given sufficient attention and are different aspects receiving necessary priority?
• Are organisations appropriately positioned to handle incidents and provide the required responses?
• What do organisations learn from cyber breaches? Does the experience provide a basis for making improvements and learning lessons for the future?

Speakers:

Steven Furnell
Professor of Cyber Security
Monday17 October
Tuesday18 October
Wednesday19 October
Thursday20 October
Friday21 October
Digital Culture: The Key to Survive and Thrive
  • How can technology teams can be leveraged as a catalyst within your organisation to drive digital thinking, digital culture, and digital business models forward?
  • How can tech teams be utilised to go beyond implementing technology and bridge the skills gap within an organisation?
  • Every part of a business needs to collaborate and move in the same direction, what strategies will allow your organisation to quickly adapt to new demands, ensuring your business survives and thrives in the future?

Speakers:

Dinesh Krishnan
Global Head of Information Technology
DevSecOps – How to Introduce security into DevOps Processes
  • How can IT security play a more significant role in DevOps procedures?
  • How can security become a shared responsibility across multiple departments?
  • Can some aspects of security be automated to ensure workflows are not slowed down?
  • How can intelligence-based code be used to automatically build secure infrastructure at scale?

Speakers:

Robin Smith
Head of Cyber and Information Security
The Importance of a Strong Digital Culture for a Successful Digital
  • Why is it essential for an organisation to overhaul its culture to ensure a successful digital transformation?
  • How can you establish a strong digital culture?
  • What are the benefits of strategically prioritizing hiring and retention efforts?
  • Why is it important to have the right talent, skill sets and attributes when trying to instil a strong digital culture?

Speakers:

Craig Hughes
Chief Enterprise Architect
Sustainability: Tech’s Big Secret

Sustainability is top of the agenda for most organisations in 2022. Most organisations think that reducing energy consumption is the best way to protect the environment – they’re wrong. There is an even easier, and more cost-effective way to reduce our environmental impact that outweighs any power efficiencies. If you want to find out more, come and listen!

Speakers:

Ben Ward
Field Technologist UK&I
From Asset Management to Asset Intelligence: Crossing the Caasm

As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there’s good news: asset management has evolved. Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps. Join this session to learn how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps.

Speakers:

Dean Sysman
CEO and Co-Founder
The Triple Threat to Secure Any Organisation
  • How can a collaboration between the CIO, CISO and CFO create a solid foundation to ensure business continuity and performance
  • What are the benefits of educating a CFO about cyber threats, implications of a breach and how expensive security systems are?
  • How does understanding that security is a business problem and not a technical problem help build a resilient application ecosystem?

Speakers:

Don Gibson
Head of Cyber
Managing Digital Transformation in an Exponential Age
  • How has the need to rapidly migrate to the cloud caused a large increase in cybersecurity attacks?
  • How do you incorporate these risks and plan for a smooth and rapid transformation?
  • Avoid feeling clouded over: when is it best to update, replace or invest in hybrid?
  • How do you manage technology change in a landscape where your customers / users expectations and behaviours are so rapidly evolving?
  • With can A CIO maximise AI and blockchain capabilities and minimise threat?
  • What is the role of a CIO in this?

Speakers:

Nicholas Hodder
Director of Digital Transformation
A Business Bootcamp to Build a Cyber Aware Workforce
  • Why does everyone in an organisation need to be aware of potential threats?
  • What information do board members need to know?
  • How does the threat landscape vary for employees across an organisation?
  • What can be done to instil a culture of shared responsibility?
  • How can an entire workforce be educated to be safety conscious?

Speakers:

Karandeep Bansal
Head of Information Security
Real-World NLP Applications in Life Science: What works today? What will work tomorrow?
  • Creating, updating, and querying a knowledge graph
  • Document understanding in large migration projects
  • Information extraction: creating timelines from documents

Speakers:

David Talby
Chief Technology Officer
Technology Isn’t Enough: It’s Time to Turn the Tables
  • Why is ambiguity of identity a problem for security divisions?
  • What issues arise if security is treated as a technology problem and not a business one?
  • Why is it important to steer the direction of attention for threats away from systems and technology and focus on human error?
  • What kind of threats are caused by human error?
  • How can these be avoided?
  • How can fostering a sense of community build a more resilient organisation?

Speakers:

Victoria Van-Roosmalen
Chief Information Security Officer
Challenges For a CISO

The role of a CISO is evolving, as the scope of their responsibility grows, they’re not only in charge of their company’s’ data. They have also become ambassadors to senior leadership and the board as cybersecurity becomes more essential across the organisation.

Key Takeaways:

  • How has the role of a CISO changed?
  • What are the new challenges associated with the change?
  • Given that hackers aren’t going to stop innovating to find new ways to attack, how can a CISO ensure they are constantly ‘on the ball’?
  • How can a CISO overcome the challenge of push back when implementing changes in an entrenched business culture?

Speakers:

Bridget Kenyon
Chief Information Security Officer
Trust Nothing Verify Everything - Zero Trust Ransomware Resilience

Speakers:

Jeff Reichard
Vice President, Public Sector and Compliance Strategy
Gearing Up for Generative AI
Case Study NLP
  • How does generative AI differ from previous traditional models?
  • What are the benefits of using conversational AI?
  • How can NLP be used in business to improve efficiency, ROI and accuracy?
  • What are the worries associated with implementing generative AI?
  • What are the factors that contribute to adoption friction within a workforce?
  • What can be done to ensure transparency when explaining how AI will be used within an organisation?

Speakers:

Daniel Wu
Head of AI & Machine Learning
Do Potential Risks of Digital Transformation, Hybrid Working and New Technologies Keep You Up at Night?
  • How have new technologies, hybrid workforce, cloud migration and rapid digital transformation mean that the threat landscape has now exploded?
  • What are the benefits of embedding security at the beginning of a product life cycle?
  • How can you ensure that staff are security aware?
  • What challenges do multi-cloud environments present?
  • Why can malicious insider threats create more damage than external ones?

Speakers:

Jason Maude
Chief Technology Advocate
Scaling Intelligence: How to Ride the Next Wave in Your Digital Transformation
  • How can you optimize transformational potential by implementing AI at the beginning of the value chain?
  • What are the benefits of integrating ML in the development phase of a product life cycle?
  • How can this be utilised this to build a resilient and agile solution?
  • How will the adoption of AI benefit your employees?
  • What are some best practises to develop AI systems collaboratively with staff to optimize benefits?
  • Why is it important to alleviate anxiety among staff who may think AI is going to replace their jobs?
  • What can you do to ensure that AI empowers your organisation by supporting growth internally and externally?

Speakers:

Katherine Campbell
Chief Digital Officer
CISOs Aren’t Superheroes, They Need Protecting Too!
CISOs are often championed as the ultimate superhero, shielding their organisations from an ever-evolving array of cyber threats and attacks. Reports show that existing security capabilities help up well over the course of the pandemic, despite an unprecedented increase in the quantity and sophistication of cyber-attacks. Whilst it is well known that CISOs are some of the most resilient people, their fortitude can’t come at the expense of their mental health.

Key Takeaways:

  • Why has the pandemic fuelled unbearable levels of stress for a CISO?
  • How does this impact their performance?
  • Being a CISO may sound fancy but what are downsides to having so much responsibility?
  • What is burnout and how can you identify it and what are the implications?
  • What practical measures can you do to prevent burnout and alleviate stress?

Speakers:

Jitender Aroa
Chief Information Security Officer
Creating a Truly Neurodiverse Security Team Should Be A CISOs Top Priority
As the security threat landscape continues to evolve, advance, and diversify so too must security teams to be able to effectively defend against them. Today, the majority of attacks businesses face tend to target their people across a variety of different channels. But how can an organisation hope to defend itself if its security team is largely homogenous in its makeup, thinking and decision-making to guard employees that span a wide range of ages, genders, cultures and differing social and ethnic backgrounds?

Speakers:

Chris Cooper
Chief Information Security Officer
Leading Transformation From Start Up To Scaling Up
An in depth interview looking into scaling up transformation, building motivated teams to increase employee enablement and engagement using a collaborative and empowering approach.

Speakers:

Georgina Owens
Chief Technology Officer
Digital Transformation in Traffic With the Help of Data

Traffic will be going through a major Digital Transformation over the next few years. Data will be a key enabler of Digital Transformation. Data can be used to analyze, optimize, automate business processes, and create new business models. In traffic , can enable safer, smoother and eco-friendlier traffic for all of us.

Speakers:

Janne Lautanala
Chief Ecosystem and Technology Officer
Remote Working Security Best Practices
  • Security concerns for employees working from home
  • Risk of malware infection for the organisation
  • Mobile phone security concerns
  • Video conferencing security concerns

Speakers:

John Morris
Global Head of IT
The Impact of Next-Generation Data Warehouses
Main cloud vendors are making a huge bet on products like Google BigQuery, Amazon Redshift, Snowflake, Azure DataBricks, etc. They’re changing the way organisations deal with their data and it’ll change how we build the next generation of digital products.
Connecting your product with customer data is becoming mandatory in enterprise products.
During this talk I’ll explain how we’re evolving CARTO to deal with this new reality and how our customers love this new approach in which they don’t need to move their data outside of their data warehouse

Speakers:

Alberto Asuero
Chief Technology Officer
The Cyber Profession – Growing skills in Defence and Security – The Challenges and Opportunities ahead
  • What they look for in new talent
  • Where the problems lie
  • Methods to improve skills
  • The importance of improving neurodiversity

Speakers:

Colonel Caroline Woodbrigde-Lewin
Head of Information Warfare
Ineffective Security Operating Models are Leaving Businesses Vulnerable
+1
MORE
In this talk David Prince and Greg Wilson from Baringa Partners will share their experience supporting organisations to develop effective and strategically aligned operating models for security. They will talk about the common symptoms of poor operating models, and their suggested approach and lessons learnt that security leaders can consider when designing the future of their security functions.

Speakers:

David Prince
Cyber Security Leader
Greg Wilson
Cyber Security Senior Manager
Software Development in the Time of As-a-Service and Integration
The idea of the session will be to outline and discuss, how software development has changed/is changing from a bespoke, custom development process towards integrating existing components and services. What is the impact for suppliers? What does this change in the skills needed

Speakers:

Stefan Blickensdorfer
Chief Technology Officer
Feeling Left Out in the COVID-19 Cold?
Many CIO’s (IT Managers/Digital Leaders) have found themselves with a new voice since the outset of the global pandemic. For others though, it feels like not much has changed, and for these leaders it is a question of why – what is different in their organisation compared to others? During this session, I will discuss how to take advantage of what is a unique opportunity to grow influence for the benefit of your organisation.

Speakers:

Geoff Connell
Chief Digital Officer
What is the Future of Cybersecurity?
The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses.
During this session, we’ll consider what might be on the horizon and where cybersecurity could be heading.

Key Takeaways:

  • Potential future pathways for cybersecurity (Algorithms, Automation, AI combating AI)
  • The future strategies of Cyber Security versus Cyber Resilience
  • The cyber future of National Security and Defence

Speakers:

Dr Asaad Moosa
Chief Information Security Officer
Get a Grip! Innovating the Future of Work
• Given there is already a substantial workforce skills gap, what will happen if your organisation doesn’t get a grip and start trying to bridge this gap?
• How can it be determined which employees need upskilling or reskilling?
• What needs and objectives need to be met in order to create a sustainable and flourishing workforce?
• What methods and resources can be utilized to train staff?

Speakers:

Tony Strows
Head of Digital Learning Strategy and Transformation
COMING SOON!

Speakers:

Adam Saunders
Chief Information Security Officer
Explore All Sessions

KEY THEMES

Digital Transformation

Cloud Migration Strategy and Challenges

Digital Culture and Workforce

Artificial Intelligence & Automation

Cyber Security

The Evolving Role of a CIO

IT Strategy

Education & Training

How to Maximise Artificial Intelligence and Machine Learning

An Exclusive Community for Senior Executives

Connect with the thought leaders of your industry at six different networking events.

The Gym Limited logo
BrewDog
co-op logo
HSBC-logo
Sightsavers logo
Transportes Mazo logo
CAE Technology Services Ltd logo

Our Partners

Meet Our Solution Providers

We attract the best in the business. By learning about your projects, we match you for One2One meetings with those best-suited to tackle the challenge.

See More

Accommodation on Us

Enjoy one of rugby's most renowned stadiums, The Cabbage Patch, just a stone's throw from where you'll be staying. Take in the views of the pitch, or venture through the town and along the River Thames in your spare time.

Inspiration, in Your Own Time

Customise the ideal experience to fit your busy schedule and connect from the comfort of your own home or office. All presentations are available to watch long after the event has ended.
Register Now
Marriott London Twickenham

Still Have Questions?

We've answered a few FAQs to get you started. But please don't hesitate to reach out with more.

In-Person Event Questions

The cost of producing CIO & CISO VISIONS is underwritten by our solution providers, who are more than willing to make the investment in such an exclusive audience. Your pass includes:

  • Dedicated Attendee Relations Manager and custom schedule
  • Access to speaker content
  • Face-to-face industry networking opportunities
  • One2One meetings with vetted solution providers, specifically matched to your business needs
  • One night accommodation, travel reimbursement, incredible catering throughout the event, and an open bar.

Based on the details of your registration, we carefully select only the most suitable solution providers for you to meet with. Each meeting is 30 minutes and focused on solving a specific priority you have listed.

We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Senior Managers within all IT and Information Security functions.

There are many reasons to attend! For starters, CIO & CISO VISIONS is the only event tailored to help you with your current challenges. You’ll learn from the experts and connect to the solutions you need. Your time is valuable, and sticking to your budget is more important than ever. CIO & CISO VISIONS is designed to help you maximize your time and money for the best possible results.

Virtual Event Questions

CIO & CISO VISIONS Virtual Summit is unique in its ability to connect you to qualified solution providers. They’re more than willing to underwrite the cost of your attendance in exchange for access to such an exclusive audience.

Your virtual pass includes:

  • All sessions and recordings
  • Six or eight One2One meetings with vetted solution providers, specifically matched to you
  • £200 or £300 in rewards upon completing all meetings

Based on the details of your registration, we carefully select solution providers for you to meet with. Each meeting is 30 minutes and focused on solving a specific priority you have listed. Once completed, you’re eligible to receive a rewards package. All meetings will take place on Zoom and we handle the logistics.

We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Senior Managers within all IT and Information Security functions.

Yes, but only for your One2One meetings, which are scheduled for a date and time you prefer. The presentations do not expire and will all be available on-demand to watch at your leisure—anytime, any place.

There are many reasons to attend! CIO & CISO VISIONS Virtual Summit is the only online event customised to help you with your current challenges. You’ll learn from the industry and connect to the solutions you need. Your time is valuable, and sticking to your budget is more important than ever. CIO & CISO VISIONS is designed to help you maximise your time and money for the best possible results.

Become an Exhibitor

Tell us a little about yourself