Menu
Solutions, Strategy & Connection at IT’s Most Powerful Summit
Jason-Maude-headshot
Jason Maude
Chief Technology Advocate
Two ways to experience CISO Summit
In-Person or Virtual
In-Person
Twickenham Stadium,
London, England
27 - 29 March, 2022
Past Event Details
Virtual
BST Time Zone
4 - 8 April, 2022
Past Event Details
Join the UK & EMEA's most effective IT Summit
CISO VISIONS provides senior IT executives a platform to access the exact content, insight and solutions they need to drive their business forward.
1
Hear from Industry Experts
With over 25 captivating speakers on the agenda, learn from leaders driven to inspire.
Solve Your Top Challenges
Meet One2One with solution providers specifically qualified to meet your business needs.
Make Inspired Connections
Share strategic insight with 150+ IT leaders across industry.
It’s All Complimentary
Catering, accommodation and £150 travel reimbursement is covered by us.
Hear from Industry Experts
Learn from thought leaders paving the way in your industry, all from the comfort of your own home.
Solve Your Top Challenges
Meet One2One with solution providers specifically matched to your business needs.
Total Flexibility
Whether you’re at home or in the office, access sessions in real time or on-demand.
Register Now

Experience the Only Solutions-Based Event

Tell us the challenges you’re facing, and we’ll schedule meetings with the right solution providers to solve them. You leave with a plan and the tools you need to move your company forwards.

CODEX Logo
"CISO VISIONS enabled a direct dialog with new and exciting vendors in specific areas of interest, while also reducing the commitment of attending an event in person by spreading meetings over several days."
Head of Information Technology,
Codex
Norfolk County Council
"I found the matching of relevant supplier meeting slots more effective than any other events I have attended (physical or virtual). I like the blend of focused, pre-booked supplier meetings and on demand educational content. I found it to be a really good use of my limited time for supplier related research. Highly recommended!"
Deputy Director of IMT, CTO and Chair,
Norfolk County Council
Sussex, Partnership Logo
"The setup was very slick, and there was little to no effort from my side, and I ended up being partnered with suppliers that most definitely could fit into my Trust's needs in the coming few years. Good organization, customer service and technical setup ensured a great event."
Security Architect,
Sussex, Partnership

Hear From Today’s Most Influential Brands and Voices

Kelvin Cheema
Global ERP Transformation Director
Sarah Lucas
Head of Technology
Ben Ward
Field Technologist UK&I
Ash Hunt
Group Head of Information Security
Jason Maude
Chief Technology Advocate
Nicholas Hodder
Director of Digital Transformation
Dinesh Krishnan
Global Head of Information Technology
Jon Townsend
Chief information Officer
Don Gibson
Head of Warfare
Chris Waynforth
Area Vice President - EMEA North
Duena Blomstrom
Co-Founder, CEO & CPO
Alessandro Bovone
Chief Technology Officer
Karandeep Bansal
Head of Information Security
Jonny Wathen
Chief Information Security Officer
Janne Lautanala
Chief Ecosystem and Technology Officer
Don Gibson
Head of Cyber
Dinesh Krishnan
Global Head of Information Technology
Bridget Kenyon
Chief Information Security Officer
David Talby
Chief Technology Officer
Ben Ward
Field Technologist UK&
Georgina Owens
Chief Technology Officer
Jeff Reichard
Vice President, Public Sector & Compliance Strategy
Victoria Van-Roosmalen
Chief Information Security Officer
Dean Sysman
CEO and Co-Founder
Nicholas Hodder
Director of Digital Transformation
Karandeep Bansal
Head of Information Security
Jason Maude
Chief Technology Advocate
Jitender Aroa
Chief Information Security Officer
Colonel Caroline Woodbridge-Lewin
Head of Warfare
Stefan Blickensdorfer
Chief Technology Officer
Geoff Connell
Chief Digital Officer
Dr Asaad Moosa
Chief Information Security Officer
David Prince
Cyber Security Leader
Greg Wilson
Cyber Security Senior Manager
Katherine Campbell
Chief Digital Officer
Chris Cooper
Chief Information Security Officer
Tony Strows
Head of Digital Learning Strategy and Transformation
John Morris
Global Head of Information Technology
Alberto Asuero
Chief Technology Officer
Craig Hughes
Chief Enterprise Architect
Robin Smith
Head of Cyber and Information Security
Daniel Wu
Head of AI & Machine Learning

Enjoy the Perks of Exclusivity; Everything is on us

As an attendee you’ll receive:

  • One night complimentary accommodation
  • Catering and open bar
  • Travel reimbursement
  • Dedicated Attendee Relations Manager to tailor your experience

Get Rewarded

Since we can’t treat you to accommodation and delicious dining with a virtual event, we’ve designed a brilliant rewards system worthy of your time. Take all 6 solution provider meetings and earn your choice of amazing rewards, including JBL and Amazon products and charitable donations.

Register Now

A Tailored Agenda For You

Tune In on Your Time

Choose from 25 Speakers, 6 Networking Opportunities and More
It’s entirely up to you whether to catch the presentations as they come online or watch on-demand.
Sunday27 March
Monday28 March
Tuesday29 March
5:00 - 7:00pm
Welcome Reception and Registration
7:30 - 8:50am
Breakfast
Stream A - 8:00 - 9:00am
The Triple Threat to Secure Any Organisation
+2
MORE
  • How can a collaboration between the CIO, CISO and CFO create a solid foundation to ensure business continuity and performance?
  • What are the benefits of educating a CFO about cyber threats, implications of a breach and how expensive security systems are?
  • How does understanding that security is a business problem and not a technical problem help build a resilient application ecosystem?

Speakers:

Sarah Lucas
Head of Technology
Don Gibson
Head of Cyber
Alessandro Bovone
Chief Technology Officer
Stream A - 9:00 - 10:00am
COMING SOON!
Stream A - 10:00 - 11:00am
Approaches to Digital Transformation: Bottom-Up Vs Top-Down
  • What are the differences between a bottom-up and a top-down approach to DT?
  • What are the benefits and short comings with each approach?
  • Why is it important to empower every internal leader and what are the benefits?
  • What are the benefits for the internal workforce?
  • What are the crucial factors when deciding which route to take?

Speakers:

Kelvin Cheema
Global ERP Transformation Director
Stream A - 11:00 - 12:00pm
Practice What You Preach: A CISOs Guide to Mental Health

The constantly evolving threat landscape isn’t constrained to cyber-attacks. A CISO has a highly stressful job by nature and the implications of the pandemic on a CISOs mental health cannot be ignored. To build a resilient workforce, a CISO needs to be resilient themselves.

Key Takeaways:

  • How have the past two years added to the stress of the role of a CISO?
  • What implications could these have?
  • What can a CISO do to try and minimize these detrimental effects?
  • Why is it important to build a work culture that promotes and supports positive mental health?

Speakers:

Don Gibson
Head of Cyber
Stream A - 12:00 - 1:00pm
Digital Culture: The Key to Survive and Thrive
+2
MORE
  • How can technology teams can be leveraged as a catalyst within your organisation to drive digital thinking, digital culture, and digital business models forward?
  • How can tech teams be utilised to go beyond implementing technology and bridge the skills gap within an organisation?
  • Every part of a business needs to collaborate and move in the same direction, what strategies will allow your organisation to quickly adapt to new demands, ensuring your business survives and thrives in the future?

Speakers:

Dinesh Krishnan
Global Head of Information Technology
Alessandro Bovone
Chief Technology Officer
Jon Townsend
Chief information Officer
1:00pm
Networking Lunch
Stream A - 2:00 - 3:00pm
Sustainability: Tech’s Big Secret

Sustainability is top of the agenda for most organisations in 2022.  Most organisations think that reducing energy consumption is the best way to protect the environment – they’re wrong. There is an even easier, and more cost effective way to reduce our environmental impact that outweighs any power efficiencies. If you want to find out more, come and listen!

Speakers:

Ben Ward
Technologist UK&I
Stream A - 3:00 - 4:00pm
Do Potential Risks of Digital Transformation, Hybrid Working and New Technologies Keep You Up at Night?
  • How have new technologies, hybrid workforce, cloud migration and rapid digital transformation mean that the threat landscape has now exploded?
  • What are the benefits of embedding security at the beginning of a product life cycle?
  • How can you ensure that staff are security aware?
  • What challenges do multi-cloud environments present?
  • Why can malicious insider threats create more damage than external ones?

Speakers:

Jason Maude
Chief Technology Advocate
Stream A - 4:00 - 5:00pm
Supply Chain Cybersecurity: Reduce Your Risk

Why supply chain attacks affect every business and protecting against them is everyone’s business – not just security. Best practice guide on how to minimise the software supply chain risk, without business impact.

Key Takeaways:

  • Software Supply Chains - how every business is a software business
  • Challenges for the defenders - especially when most of the code isn’t theirs
  • Securing code and APIs at runtime, without business impact

Speakers:

Chris Waynforth
Area Vice President - EMEA North
Stream A - 5:00 - 6:00pm
Managing Digital Transformation in an Exponential Age
  • How do you manage technology change in a landscape where your customers / users expectations and behaviours are so rapidly evolving?
  • How do you account for these risks and plan for a transformation that will work?
  • Clouded thinking: Does blockchain confuse the issue?  Will private / public hybrid become private / public / blockchain hybrid?
  • How can A CIO maximise opportunities and minimise threats?
  • What is the role of a CIO in the exponential age?

Speakers:

Nicholas Hodder
Director of Digital Transformation
6:00 - 9:00pm
Networking Dinner
Explore All Sessions
7:30 - 8:50am
Breakfast
Stream A - 8:00 - 8:50am
Keynote: How Do You Manage Diverse Threats Across Multi-cloud Infrastructure?
  • How to prescient and detect threats across a multi-cloud infrastructure?
  • How do you deploy applications with effective conditional access?
  • How do you implement effective Network Access Control (NAC)/authentication controls
  • What tools and technologies help manage risk?
  • How do you ensure the expectations of third party vendor relationships are met?
  • How do you maintain compliance with industry, governmental and other regulatory requirements?

Speakers:

Ash Hunt
Group Head of Information Security
Stream A - 9:00 - 10:00am
A Business Bootcamp to Build a Cyber Aware Workforce
  • Why does everyone in an organisation need to be aware of potential threats?
  • What information do board members need to know?
  • How does the threat landscape vary for employees across an organisation?
  • What can be done to instil a culture of shared responsibility?
  • How can an entire workforce be educated to be safety conscious?

Speakers:

Karandeep Bansal
Head of Information Security
Stream A - 10:00 - 11:00am
HumanDebt - what is it and why is it more dangerous than Technical Debt?
“HumanDebt™ – what is it and why it’s more dangerous than Technical Debt” – A discussion about the importance of empowered teams doing the people work first even before delivery and operational work so that they can become and stay Psychologically Safe and therefore highly competitive. There are practical things that teams can and should do at their own “bubble level” so that they stimulate positive behaviours and inhibit negative behaviours that hold them back and in this talk, we’ll look at what the science teaches us about Psychological Safety, what those good fearless, speaking-up behaviours are, and what Impression Management is and how it stops us from bringing our best selves with examples of actions and anecdotes from the “People Before Tech” book and from working with tens of teams in the Psychological Safety Dashboard performance work tool

Speakers:

Duena Blomstrom
Co-Founder, CEO & CPO
Stream A - 11:00 - 12:00pm
Digital Transformation through Business Model Innovation

Digital technologies have enabled organisations to innovate to gain competitive advantage throughout history. This presentation explores digital transformation (DT) through business model innovation (BMI), within Multi-Academy Trust (MATs)

Speakers:

Jonny Wathen
Chief Information Security Officer
Monday4 April
Tuesday5 April
Wednesday6 April
Thursday7 April
Friday8 April
Digital Culture: The Key to Survive and Thrive
  • How can technology teams can be leveraged as a catalyst within your organisation to drive digital thinking, digital culture, and digital business models forward?
  • How can tech teams be utilised to go beyond implementing technology and bridge the skills gap within an organisation?
  • Every part of a business needs to collaborate and move in the same direction, what strategies will allow your organisation to quickly adapt to new demands, ensuring your business survives and thrives in the future?

Speakers:

Dinesh Krishnan
Global Head of Information Technology
DevSecOps – How to Introduce security into DevOps Processes
  • How can IT security play a more significant role in DevOps procedures?
  • How can security become a shared responsibility across multiple departments?
  • Can some aspects of security be automated to ensure workflows are not slowed down?
  • How can intelligence-based code be used to automatically build secure infrastructure at scale?

Speakers:

Robin Smith
Head of Cyber and Information Security
The Importance of a Strong Digital Culture for a Successful Digital Transformation
  • Why is it essential for an organisation to overhaul its culture to ensure a successful digital transformation?
  • How can you establish a strong digital culture?
  • What are the benefits of strategically prioritizing hiring and retention efforts?
  • Why is it important to have the right talent, skill sets and attributes when trying to instil a strong digital culture?

Speakers:

Craig Hughes
Chief Enterprise Architect
Sustainability: Tech’s Big Secret

Sustainability is top of the agenda for most organisations in 2022. Most organisations think that reducing energy consumption is the best way to protect the environment – they’re wrong. There is an even easier, and more cost-effective way to reduce our environmental impact that outweighs any power efficiencies. If you want to find out more, come and listen!

Speakers:

Ben Ward
Field Technologist UK&I
From Asset Management to Asset Intelligence: Crossing the CAASM

As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there’s good news: asset management has evolved. Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps. Join this session to learn how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps.

Speakers:

Dean Sysman
CEO and Co-Founder
The Triple Threat to Secure Any Organisation
  • How can a collaboration between the CIO, CISO and CFO create a solid foundation to ensure business continuity and performance
  • What are the benefits of educating a CFO about cyber threats, implications of a breach and how expensive security systems are?
  • How does understanding that security is a business problem and not a technical problem help build a resilient application ecosystem?

Speakers:

Don Gibson
Head of Cyber
Managing Digital Transformation in an Exponential Age
  • How do you manage technology change in a landscape where your customers / users expectations and behaviours are so rapidly evolving?
  • How do you account for these risks and plan for a transformation that will work?
  • Clouded thinking: Does blockchain confuse the issue?  Will private / public hybrid become private / public / blockchain hybrid?
  • How can A CIO maximise opportunities and minimise threats?
  • What is the role of a CIO in the exponential age?

Speakers:

Nicholas Hodder
Director of Digital Transformation
A Business Bootcamp to Build a Cyber Aware Workforce
  • Why does everyone in an organisation need to be aware of potential threats?
  • What information do board members need to know?
  • How does the threat landscape vary for employees across an organisation?
  • What can be done to instil a culture of shared responsibility?
  • How can an entire workforce be educated to be safety conscious?

Speakers:

Karandeep Bansal
Head of Information Security
Real-World NLP Applications in Life Science: What works today? What will work tomorrow?
  • Creating, updating, and querying a knowledge graph
  • Document understanding in large migration projects
  • Information extraction: creating timelines from documents

Speakers:

David Talby
Chief Technology Officer
Technology Isn’t Enough: It’s Time to Turn the Tables
  • Why is ambiguity of identity a problem for security divisions?
  • What issues arise if security is treated as a technology problem and not a business one?
  • Why is it important to steer the direction of attention for threats away from systems and technology and focus on human error?
  • What kind of threats are caused by human error?
  • How can these be avoided?
  • How can fostering a sense of community build a more resilient organisation?

Speakers:

Victoria Van-Roosmalen
Chief Information Security Officer
Challenges For a CISO

The role of a CISO is evolving, as the scope of their responsibility grows, they’re not only in charge of their company’s’ data. They have also become ambassadors to senior leadership and the board as cybersecurity becomes more essential across the organisation.

Key Takeaways:

  • How has the role of a CISO changed?
  • What are the new challenges associated with the change?
  • Given that hackers aren’t going to stop innovating to find new ways to attack, how can a CISO ensure they are constantly ‘on the ball’?
  • How can a CISO overcome the challenge of push back when implementing changes in an entrenched business culture?

Speakers:

Bridget Kenyon
Chief Information Security Officer
Trust Nothing Verify Everything - Zero Trust Ransomware Resiliency

COMING SOON!

Speakers:

Jeff Reichard
Vice President, Public Sector and Compliance Strategy
Gearing Up for Generative AI
Case Study NLP
  • How does generative AI differ from previous traditional models?
  • What are the benefits of using conversational AI?
  • How can NLP be used in business to improve efficiency, ROI and accuracy?
  • What are the worries associated with implementing generative AI?
  • What are the factors that contribute to adoption friction within a workforce?
  • What can be done to ensure transparency when explaining how AI will be used within an organisation?

Speakers:

Daniel Wu
Head of AI & Machine Learning
Do Potential Risks of Digital Transformation, Hybrid Working and New Technologies Keep You Up at Night?
  • How have new technologies, hybrid workforce, cloud migration and rapid digital transformation mean that the threat landscape has now exploded?
  • What are the benefits of embedding security at the beginning of a product life cycle?
  • How can you ensure that staff are security aware?
  • What challenges do multi-cloud environments present?
  • Why can malicious insider threats create more damage than external ones?

Speakers:

Jason Maude
Chief Technology Advocate
Emerging Capabilities That Are Really Delivering Competitive Advantage
Learn how and why competitive advantages are vital in todays technology driven world.

Speakers:

Katherine Campbell
Chief Digital Officer
CISOs Aren’t Superheroes, They Need Protecting Too!

CISOs are often championed as the ultimate superhero, shielding their organisations from an ever-evolving array of cyber threats and attacks. Reports show that existing security capabilities help up well over the course of the pandemic, despite an unprecedented increase in the quantity and sophistication of cyber-attacks. Whilst it is well known that CISOs are some of the most resilient people, their fortitude can’t come at the expense of their mental health.

Key Takeaways:

  • Why has the pandemic fuelled unbearable levels of stress for a CISO?
  • How does this impact their performance?
  • Being a CISO may sound fancy but what are downsides to having so much responsibility?
  • What is burnout and how can you identify it and what are the implications?
  • What practical measures can you do to prevent burnout and alleviate stress?

Speakers:

Jitender Aroa
Chief Information Security Officer
Creating a Truly Neurodiverse Security Team Should Be A CISOs Top Priorit
As the security threat landscape continues to evolve, advance, and diversify so too must security teams to be able to effectively defend against them. Today, the majority of attacks businesses face tend to target their people across a variety of different channels. But how can an organisation hope to defend itself if its security team is largely homogenous in its makeup, thinking and decision-making to guard employees that span a wide range of ages, genders, cultures and differing social and ethnic backgrounds?

Speakers:

Chris Cooper
Chief Information Security Officer
Leading Transformation From Start Up To Scaling Up

An in depth interview looking into scaling up transformation, building motivated teams to increase employee enablement and engagement using a collaborative and empowering approach.

Speakers:

Georgina Owens
Chief Technology Officer
Digital Transformation in Traffic With the Help of Data

Traffic will be going through a major Digital Transformation over the next few years. Data will be a key enabler of Digital Transformation. Data can be used to analyse, optimize, automate business processes, and create new business models. In traffic, can enable safer, smoother and eco-friendlier traffic for all of us.

Speakers:

Janne Lautanala
Chief Ecosystem and Technology Officer
Remote Working Security Best Practices
  • Security concerns for employees working from home
  • Risk of malware infection for the organisation
  • Mobile phone security concerns
  • Video conferencing security concerns

Speakers:

John Morris
Global Head of IT
The Impact of Next-Generation Data Warehouses
Main cloud vendors are making a huge bet on products like Google BigQuery, Amazon Redshift, Snowflake, Azure DataBricks, etc. They’re changing the way organisations deal with their data and it’ll change how we build the next generation of digital products.
Connecting your product with customer data is becoming mandatory in enterprise products.
During this talk I’ll explain how we’re evolving CARTO to deal with this new reality and how our customers love this new approach in which they don’t need to move their data outside of their data warehouse

Speakers:

Alberto Asuero
Chief Technology Officer
The Cyber Profession – Growing skills in Defence and Security – The Challenges and Opportunities ahead
  • What they look for in new talent
  • Where the problems lie
  • Methods to improve skills
  • The importance of improving neurodiversity

Speakers:

Colonel Caroline Woodbridge-Lewin
Head of Warfare
Ineffective Security Operating Models are Leaving Businesses Vulnerable
+1
MORE

In this talk David Prince and Greg Wilson from Baringa Partners will share their experience supporting organisations to develop effective and strategically aligned operating models for security. They will talk about the common symptoms of poor operating models, and their suggested approach and lessons learnt that security leaders can consider when designing the future of their security functions.

Speakers:

David Prince
Cyber Security Leader
Greg Wilson Cyber Security Senior Manager
Cyber Security Senior Manager
Software Development in the Time of As-a-Service and Integration

The idea of the session will be to outline and discuss, how software development has changed/is changing from a bespoke, custom development process towards integrating existing components and services. What is the impact for suppliers? What does this change in the skills needed

Speakers:

Stefan Blickensdorfer
Chief Technology Officer
Feeling Left Out in the COVID-19 Cold?

Many CIO’s (IT Managers/Digital Leaders) have found themselves with a new voice since the outset of the global pandemic. For others though, it feels like not much has changed, and for these leaders it is a question of why – what is different in their organisation compared to others? During this session, I will discuss how to take advantage of what is a unique opportunity to grow influence for the benefit of your organisation.

Speakers:

Geoff Connell
Chief Digital Officer
What is the Future of Cybersecurity?
The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses.
During this session, we’ll consider what might be on the horizon and where cybersecurity could be heading.

Key Takeaways:

  • Potential future pathways for cybersecurity (Algorithms, Automation, AI combating AI)
  • The future strategies of Cyber Security versus Cyber Resilience
  • The cyber future of National Security and Defence

Speakers:

Dr Asaad Moosa
Chief Information Security Officer
Get a Grip! Innovating the Future of Work
  • Given there is already a substantial workforce skills gap, what will happen if your organisation doesn’t get a grip and start trying to bridge this gap?
  • How can it be determined which employees need upskilling or reskilling?
  • What needs and objectives need to be met in order to create a sustainable and flourishing workforce?
  • What methods and resources can be utilized to train staff?

Speakers:

Tony Strows
Head of Digital Learning Strategy and Transformation

KEY THEMES

Challenges for a CISO

The Evolving Threat Landscape

DevSecOps Implementation and Strategy

Diversity and Inclusion

Preventative Security Measures

Digital Culture and Educating the Workforce

Zero Trust

Artificial Intelligence in Cyber Security

Future Threats

An Exclusive Community for Senior Executives

Connect with the thought leaders of your industry at six different networking events.

The Prince's Trust logo
ABF plc logo
Pensionfund Rail & OV logo
Tata Steel
IMPACT-BT
Travelopia logo

Meet Our Solution Providers

We attract the best in the business. By learning about your projects, we match you for One2One meetings with those best-suited to tackle the challenge.

See More

Accommodation on Us

Enjoy one of rugby's most renowned stadiums, The Cabbage Patch, just a stone's throw from where you'll be staying. Take in the views of the pitch, or venture through the town and along the River Thames in your spare time.

Inspiration, in Your Own Time

Customise the ideal experience to fit your busy schedule and connect from the comfort of your own home or office. All presentations are available to watch long after the event has ended.
Register Now
Marriott London Twickenham

Still Have Questions?

We've answered a few FAQs to get you started. But please don't hesitate to reach out with more.

In-Person Event Questions

The cost of producing CISO VISIONS is underwritten by our solution providers, who are more than willing to make the investment in such an exclusive audience. Your pass includes:

  • Dedicated Attendee Relations Manager and custom schedule
  • Access to speaker content
  • Face-to-face industry networking opportunities
  • One2One meetings with vetted solution providers, specifically matched to your business needs
  • One night accommodation, travel reimbursement, incredible catering throughout the event, and an open bar.

Based on the details of your registration, we carefully select only the most suitable solution providers for you to meet with. Each meeting is 30 minutes and focused on solving a specific priority you have listed.

We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Senior Managers within all IT functions.

There are many reasons to attend! For starters, CIO VISIONS is the only event tailored to help you with your current challenges. You’ll learn from the experts and connect to the solutions you need. Your time is valuable, and sticking to your budget is more important than ever. CISO VISIONS is designed to help you maximize your time and money for the best possible results.

Virtual Event Questions

CISO VISIONS Virtual Summit is unique in its ability to connect you to qualified solution providers. They’re more than willing to underwrite the cost of your attendance in exchange for access to such an exclusive audience.

Your virtual pass includes:

  • All sessions and recordings
  • Six or eight One2One meetings with vetted solution providers, specifically matched to you
  • £200 or £300 in rewards upon completing all meetings

Based on the details of your registration, we carefully select solution providers for you to meet with. Each meeting is 30 minutes and focused on solving a specific priority you have listed. Once completed, you’re eligible to receive a rewards package. All meetings will take place on Zoom and we handle the logistics.

We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Senior Managers within all IT Functions.

Yes, but only for your One2One meetings, which are scheduled for a date and time you prefer. The presentations do not expire and will all be available on-demand to watch at your leisure—anytime, any place.

There are many reasons to attend! CISO VISIONS Virtual Summit is the only online event customised to help you with your current challenges. You’ll learn from the industry and connect to the solutions you need. Your time is valuable, and sticking to your budget is more important than ever. CISO VISIONS is designed to help you maximise your time and money for the best possible results.

Become an Exhibitor

Tell us a little about yourself