CISO VISIONS UK SPRING | Quartz Network
Menu
Solutions, Strategy & Connection at IT’s Most Powerful Summit
Jason-Maude-headshot
Jason Maude
Chief Technology Advocate
Two ways to experience CISO Summit
In-Person or Virtual
In-Person
Twickenham Stadium,
London, England
March 27 - 29, 2022
Event Details
Virtual
BST Time Zone
April 4 - 8, 2022
Event Details
Join the UK & EMEA's most effective IT Summit
CISO VISIONS provides senior IT executives a platform to access the exact content, insight and solutions they need to drive their business forward.
1
Hear from Industry Experts
With over 25 captivating speakers on the agenda, learn from leaders driven to inspire.
Solve Your Top Challenges
Meet One2One with solution providers specifically qualified to meet your business needs.
Make Inspired Connections
Share strategic insight with 150+ IT leaders across industry.
It’s All Complimentary
Catering, accommodation and up to £150* travel reimbursement is covered by us. *Conditions apply.
Hear from Industry Experts
Learn from thought leaders paving the way in your industry, all from the comfort of your own home.
Solve Your Top Challenges
Meet One2One with solution providers specifically matched to your business needs.
Total Flexibility
Whether you’re at home or in the office, access sessions in real time or on-demand.
Register Now

Experience the Only Solutions-Based Event

Tell us the challenges you’re facing, and we’ll schedule meetings with the right solution providers to solve them. You leave with a plan and the tools you need to move your company forwards.

CODEX Logo
"CISO VISIONS enabled a direct dialog with new and exciting vendors in specific areas of interest, while also reducing the commitment of attending an event in person by spreading meetings over several days."
Head of Information Technology,
Codex
Norfolk County Council
"I found the matching of relevant supplier meeting slots more effective than any other events I have attended (physical or virtual). I like the blend of focused, pre-booked supplier meetings and on demand educational content. I found it to be a really good use of my limited time for supplier related research. Highly recommended!"
Deputy Director of IMT, CTO and Chair,
Norfolk County Council
Sussex, Partnership Logo
"The setup was very slick, and there was little to no effort from my side, and I ended up being partnered with suppliers that most definitely could fit into my Trust's needs in the coming few years. Good organization, customer service and technical setup ensured a great event."
Security Architect,
Sussex, Partnership

Hear From Today’s Most Influential Brands and Voices

Nenad Milisavljevic
Global Chief Information Security Officer
Jason Maude
Chief Technology Advocate
Fraser Brown
Global Head of Information Technology
Patrick Kane
Senior Director of Security
Martyn Booth
Chief Information Security Officer
Andy Wall
Chief Information Security Officer
David Levine
Vice President Corporate and Information Security, CSO CISM
Dr Asaad Moosa
Chief Information Security Officer
John Morris
Global Head of Information Technology
Robert di Schiavi
Cyber Security Engineering Lead / Head of Cyber
Patrick Kane
Senior Director of Security
Fraser Brown
Global Head of Information Technology
Nenad Milisavljevic
Global Chief Information Security Officer
Martyn Booth
Chief Information Security Officer
Andy Wall
Chief Information Security Officer
Jason Maude
Chief Technology Advocate

Enjoy the Perks of Exclusivity; Everything is on us

As an attendee you’ll receive:

  • One night complimentary accommodation
  • Catering and open bar
  • Travel reimbursement*
  • Dedicated Attendee Relations Manager to tailor your experience

*for those travelling over 50 miles to the venue

Get Rewarded

Since we can’t treat you to accommodation and delicious dining with a virtual event, we’ve designed a brilliant rewards system worthy of your time. Take all 6 solution provider meetings and earn your choice of amazing rewards, including JBL and Amazon products and charitable donations.

Register Now

A Tailored Agenda For You

Tune In on Your Time

Choose from 25 Speakers, 6 Networking Opportunities and More
It’s entirely up to you whether to catch the presentations as they come online or watch on-demand.
Sunday27 March
Monday28 March
Tuesday29 March
5:00 - 7:00pm
Welcome Reception and Registration
7:30 - 8:50am
Breakfast
8:00 - 9:00am
Keynote: TBD
9:00 - 10:00am
What Will the Future of 5G Cybersecurity Look Like?

5G implementation across the globe creates new opportunities and efficiencies for many businesses, however its use will also create increased cybersecurity risk. If you are planning to use 5G, as a business you must be prepared. Because 5G is the conversion to a mostly all-software network, future upgrades will be software updates and because of the cyber vulnerabilities of software, the tougher part of the real 5G roll out is to retool how we secure the most important network of the 21st century and the ecosystem of devices and applications that sprout from that network.

Key Takeaways:

  • Will we see a mass move towards virtualised cybersecurity?
  • Ensuring endpoint security is fit for purpose
  • Is a move to zero-trust appropriate?
  • What role do the networks have to play in 5G security?

Speakers:

Nenad Milisavljević
Global Chief Information Security Officer
10:00 - 11:00am
Should CIO’s Top Priority be Cyber Security?

Prior to COVID-19, often when IT leaders made budget requests for tools and software (most that would eventually become mission critical during the massive upheaval), they were given little attention. It is no secret amongst IT leaders that in reality the person with the most influence gets what they need and the person describing the realities of a risk that feels the most foreign to the business tends to end up with the least! In 2021 however boards are listening, on the back of a raft of COVID-related business outcomes. So, with an open goal what should CIOs be fighting for? Many would argue the answer to this is clearing technical debt, as it has implications for operating budgets, security, maintenance, creating space for IT upskilling and of course protection against unforeseen events. Others would say that security is the top priority now, given the frequency of attacks seen during lockdown for example. Anything else is a benefit and will likely lead to removal of some tech debt in the process. So, should a CIO’s top priority be Cyber Security?

Key Takeaways:

  • To fight cyber criminals you must adopt their methods
  • Clearing technical debt and improving cyber security are complementary goals, not conflicting ones
  • Transitioning to a more secure method of operating should be done one byte at a time

Speakers:

Jason Maude
Chief Technology Advocate
11:00 - 12:00pm
Bridging the Gap Between OT & IT for Improved Security and Better Managed Risk

As industrial and business systems become more and more connected, they also become more exposed to vulnerabilities. The digital revolution is forcing IT and OT to integrate, meaning that we have seen a rise in destructive malware attacks against manufacturing and energy and utilities organisations, fuelled by this IT/OT convergence and a proliferation of remote access to OT. Convergence of OT and IT is not a new concept, but in the current global climate is as important as ever with a much more distributed and fragmented workforce.

Key Takeaways:

  • Where to start and focus with converged OT and IT systems?
  • What are the common vulnerability points in converged structures?
  • How to mitigate risks in converged structures?
  • The ‘people element’ within converged IT and OT to consider?

Speakers:

Fraser Brown
Global Head of Information Technology
12:00 - 1:00pm
The Physical/Cyber Threat Nexus: Recognising & Mitigating Risk in the Face of the COVID-19 Pandemic

The COVID-19 pandemic has created an environment where, more than ever before security professionals need to consider the total threat landscape. Economic hardship, increased isolation, weakened control systems and other factors have resulted in new threats and increased vulnerabilities.
Threats that arise in the cyberworld can have physical security implications and vice versa. We can no longer allow ourselves to segregate these two disciplines. Insider threats can transcend the physical and digital, threatening online communications can escalate into a physical attack. To mitigate risk, we need to look to our colleagues to share information and collaborate like never before. This session will help you:

  • Recognise new threats and see existing threats in a new, more holistic way.
  • Develop better channels for communication with physical security colleagues.
  • Mitigate risk by utilising a holistic approach.

Speakers:

Patrick Kane
Senior Director of Security
1:00pm
Networking Lunch
2:00 - 3:00pm
COMING SOON!

COMING SOON!

Speakers:

Martyn Booth
Chief Information Security Officer
3:00 - 4:00pm
Is Cloud Security Keeping You Up at Night?

2020 saw an increase in cloud migration for justifiable reasons – the shift to home working, urgent business continuity and the remote provision of services. From a security perspective unplanned or misunderstood cloud adoption has a host of dangers for business and organisation leadership. At the heart of this a potential gap in technology and business expectations from the use of cloud, whatever that really means. How do security, technology and business leadership achieve mutual understanding on meeting business objectives through cloud technologies that provides the services the business wants, through the technology that cloud can provide with the right security to protect assets that the business values? But what about the risk – it’s on the Internet remembers! Without joint buy-in it is a road to disappointment all round, but how do you get this? Learn about the road that ONS has taken to bring security, business, and technology together with joint vision to support its national mission while address risk concerns.

Speakers:

Andy Wall
Chief Information Security Officer
4:00 - 5:00pm
Third Party Risk Management; The Good, The Bad and The Ugly

Please Join the Vice President, Corporate and Information Security, CSO CISM of RICOH USA, Inc., David Levine in this Executive Interview where he will discuss how a third party risk management program is a critical component of an effective cybersecurity plan.

Speakers:

David Levine
Vice President & Chief Information Security Officer
5:00 - 6:00pm
What is the Future of Cybersecurity?

The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses.
During this session, we’ll consider what might be on the horizon and where cybersecurity could be heading.

Key Takeaways:

  • Potential future pathways for cybersecrity (Algorithms, Automation, AI combating AI)
  • The future strategies of Cyber Security versus Cyber Resilience
  • The cyber future of National Security and Defence

Speakers:

Dr Asaad Moosa
Chief Information Security Officer
6:00 - 9:00pm
Networking Dinner
Explore All Sessions
7:30 - 8:50am
Breakfast
8:00 - 8:50am
Keynote: TBD
9:00 - 10:00am
Remote Working Security Best Practices

Key Takeaways:

  • Security concerns for employees working from home.
  • Risk of malware infection for the organisation
  • Mobile phone security concerns.
  • Video conferencing security concerns

Speakers:

John Morris
Global Head of Information Technology
10:00 - 11:00am
Building Containerisation Security Practices

Key Takeaways:

  • Deployment requirements (images).
  • Danger close: the relationship between the host and the container.
  • Assess communication requirements between containers.
  • CAP ADD, CAPP DOP function and privileged flag
  • Secure by Design

Speakers:

Robert di Schiavi
Cyber Security Engineering Lead / Head of Cyber
11:00 - 12:00pm
COMING SOON!
12:00 - 1:00pm
COMING SOON!
Monday4 April
Tuesday5 April
Wednesday6 April
Thursday7 April
Friday8 April
What Will the Future of 5G Cybersecurity Look Like?

5G implementation across the globe creates new opportunities and efficiencies for many businesses, however its use will also create increased cybersecurity risk. If you are planning to use 5G, as a business you must be prepared. Because 5G is the conversion to a mostly all-software network, future upgrades will be software updates and because of the cyber vulnerabilities of software, the tougher part of the real 5G roll out is to retool how we secure the most important network of the 21st century and the ecosystem of devices and applications that sprout from that network.

Key Takeaways:

  • Will we see a mass move towards virtualised cybersecurity?
  • Ensuring endpoint security is fit for purpose
  • Is a move to zero-trust appropriate?
  • What role do the networks have to play in 5G security?

Speakers:

Nenad Milisavljević
Global Chief Information Security Officer
Should CIO’s Top Priority be Cyber Security?

Prior to COVID-19, often when IT leaders made budget requests for tools and software (most that would eventually become mission critical during the massive upheaval), they were given little attention. It is no secret amongst IT leaders that in reality the person with the most influence gets what they need and the person describing the realities of a risk that feels the most foreign to the business tends to end up with the least! In 2021 however boards are listening, on the back of a raft of COVID-related business outcomes. So, with an open goal what should CIOs be fighting for? Many would argue the answer to this is clearing technical debt, as it has implications for operating budgets, security, maintenance, creating space for IT upskilling and of course protection against unforeseen events. Others would say that security is the top priority now, given the frequency of attacks seen during lockdown for example. Anything else is a benefit and will likely lead to removal of some tech debt in the process. So, should a CIO’s top priority be Cyber Security?

Key Takeaways:

  • To fight cyber criminals you must adopt their methods
  • Clearing technical debt and improving cyber security are complementary goals, not conflicting ones
  • Transitioning to a more secure method of operating should be done one byte at a time

Speakers:

Jason Maude
Chief Technology Advocate
Bridging the Gap Between OT & IT for Improved Security and Better Managed Risk

As industrial and business systems become more and more connected, they also become more exposed to vulnerabilities. The digital revolution is forcing IT and OT to integrate, meaning that we have seen a rise in destructive malware attacks against manufacturing and energy and utilities organisations, fuelled by this IT/OT convergence and a proliferation of remote access to OT. Convergence of OT and IT is not a new concept, but in the current global climate is as important as ever with a much more distributed and fragmented workforce.

Key Takeaways:

  • Where to start and focus with converged OT and IT systems?
  • What are the common vulnerability points in converged structures?
  • How to mitigate risks in converged structures?
  • The ‘people element’ within converged IT and OT to consider?

Speakers:

Fraser Brown
Global Head of Information Technology
The Physical/Cyber Threat Nexus: Recognising & Mitigating Risk in the Face of the COVID-19 Pandemic

The COVID-19 pandemic has created an environment where, more than ever before security professionals need to consider the total threat landscape. Economic hardship, increased isolation, weakened control systems and other factors have resulted in new threats and increased vulnerabilities.
Threats that arise in the cyberworld can have physical security implications and vice versa. We can no longer allow ourselves to segregate these two disciplines. Insider threats can transcend the physical and digital, threatening online communications can escalate into a physical attack. To mitigate risk, we need to look to our colleagues to share information and collaborate like never before. This session will help you:

  • Recognise new threats and see existing threats in a new, more holistic way.
  • Develop better channels for communication with physical security colleagues.
  • Mitigate risk by utilising a holistic approach.

Speakers:

Patrick Kane
Senior Director of Security
COMING SOON!

COMING SOON!

Speakers:

Martyn Booth
Chief Information Security Officer
Is Cloud Security Keeping You Up at Night?

2020 saw an increase in cloud migration for justifiable reasons – the shift to home working, urgent business continuity and the remote provision of services. From a security perspective unplanned or misunderstood cloud adoption has a host of dangers for business and organisation leadership. At the heart of this a potential gap in technology and business expectations from the use of cloud, whatever that really means. How do security, technology and business leadership achieve mutual understanding on meeting business objectives through cloud technologies that provides the services the business wants, through the technology that cloud can provide with the right security to protect assets that the business values? But what about the risk – it’s on the Internet remembers! Without joint buy-in it is a road to disappointment all round, but how do you get this? Learn about the road that ONS has taken to bring security, business, and technology together with joint vision to support its national mission while address risk concerns.

Speakers:

Andy Wall
Chief Information Security Officer
COMING SOON!
COMING SOON!

KEY THEMES

Challenges for a CISO

The Evolving Threat Landscape

DevSecOps Implementation and Strategy

Diversity and Inclusion

Preventative Security Measures

Digital Culture and Educating the Workforce

Zero Trust

Artificial Intelligence in Cyber Security

Future Threats

An Exclusive Community for Senior Executives

Connect with the thought leaders of your industry at six different networking events.

The Prince's Trust logo
ABF plc logo
Pensionfund Rail & OV logo
Tata Steel
IMPACT-BT
Travelopia logo

Meet Our Solution Providers

We attract the best in the business. By learning about your projects, we match you for One2One meetings with those best-suited to tackle the challenge.

See More

Accommodation on Us

Enjoy one of rugby's most renowned stadiums, The Cabbage Patch, just a stone's throw from where you'll be staying. Take in the views of the pitch, or venture through the town and along the River Thames in your spare time.

Inspiration, in Your Own Time

Customise the ideal experience to fit your busy schedule and connect from the comfort of your own home or office. All presentations are available to watch long after the event has ended.
Register Now
Marriott London Twickenham

Still Have Questions?

We've answered a few FAQs to get you started. But please don't hesitate to reach out with more.

In-Person Event Questions

The cost of producing CISO VISIONS is underwritten by our solution providers, who are more than willing to make the investment in such an exclusive audience. Your pass includes:

  • Dedicated Attendee Relations Manager and custom schedule
  • Access to speaker content
  • Face-to-face industry networking opportunities
  • One2One meetings with vetted solution providers, specifically matched to your business needs
  • One night accommodation, travel reimbursement*, incredible catering throughout the event, and an open bar.

*for those travelling more than 50 miles to the venue

Based on the details of your registration, we carefully select only the most suitable solution providers for you to meet with. Each meeting is 30 minutes and focused on solving a specific priority you have listed.

We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Senior Managers within all IT functions.

There are many reasons to attend! For starters, CIO VISIONS is the only event tailored to help you with your current challenges. You’ll learn from the experts and connect to the solutions you need. Your time is valuable, and sticking to your budget is more important than ever. CISO VISIONS is designed to help you maximize your time and money for the best possible results.

Virtual Event Questions

CISO VISIONS Virtual Summit is unique in its ability to connect you to qualified solution providers. They’re more than willing to underwrite the cost of your attendance in exchange for access to such an exclusive audience.

Your virtual pass includes:

  • All sessions and recordings
  • Six or eight One2One meetings with vetted solution providers, specifically matched to you
  • £200 or £300 in rewards upon completing all meetings

Based on the details of your registration, we carefully select solution providers for you to meet with. Each meeting is 30 minutes and focused on solving a specific priority you have listed. Once completed, you’re eligible to receive a rewards package. All meetings will take place on Zoom and we handle the logistics.

We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Senior Managers within all IT Functions.

Yes, but only for your One2One meetings, which are scheduled for a date and time you prefer. The presentations do not expire and will all be available on-demand to watch at your leisure—anytime, any place.

There are many reasons to attend! CISO VISIONS Virtual Summit is the only online event customised to help you with your current challenges. You’ll learn from the industry and connect to the solutions you need. Your time is valuable, and sticking to your budget is more important than ever. CISO VISIONS is designed to help you maximise your time and money for the best possible results.

Become an Exhibitor

Tell us a little about yourself