TLC Connect - Northern UK CISO Series

14th & 15th April 2026

The Lowry Hotel – Manchester

14th & 15th April 2026

Northern UK CISO Summit

The TLC Connect Northern UK CISO Summit brings together senior security leaders from across the North of England to tackle the realities of protecting complex, operationally critical organisations in a more hostile and regulated cyber environment.

Over two focused days in Manchester, CISOs, Heads of Security and Risk leaders will work through the challenges of ransomware exposure, legacy infrastructure, supply-chain risk and regulatory pressure, while still being expected to enable digital and commercial growth.

The programme is built around peer-led discussions, real-world case studies and closed-door working sessions, designed to move beyond theory and deliver practical insight, shared learning and decisions leaders can actually take back into their organisations.

Days
Hours
Minutes
Seconds
Key Themes for 2026

Resilient by Design: Embedding Security into Every Layer of the Enterprise

Cyber Resilience & Operational Continuity

Preparing for disruption with adaptive security models and enterprise-wide resilience planning

Threat Intelligence, Detection & Response

Enhancing visibility, anticipating attacker behaviour, and accelerating response across hybrid environments.

Identity, Access & Zero Trust Execution

Embedding identity-first security, continuous verification, and least-privilege controls across the organisation.

AI, Automation & Secure
Innovation

Implementing AI safely, reducing cyber workload with automation, and enabling secure digital transformation.

Our Speakers

Speaker 1

Lee Morton

Head of Cyber Security

CBG

Speaker 2

Robin Smith

CISO

Great British Energy - Nuclear

Speaker 3

Rob Black

Group Digital & Technology Director

Bruntwood

Speaker 4

Professor Gerard Milburn

Quantum Fellow

UK National Quantum Computing Centre

Speaker 5

Jon Mattey

CISO

Forge Holiday Group

Speaker 6

Michael Heritage

VP Cyber Security

Financial Times

Speaker 7

Jay Vinda

Global CISO & Cyber Risk Engineering Lead

Mosaic Insirrance

Speaker 8

Petra Vukmirovic

Head of Information Security & IT

Numan

Speaker 9

Siegfried Moyo, Director

Director, Cyber| IT| AI Security

Americold Logistics

Speaker 10

Gabriela Ahmadi-Assalemi

CISO

University of Cambridge

Speaker 11

Dhruv Bisani

Cyber Resilience Director

Starling Bank

Speaker 12

David Edwards

VP Information Security

Payroc

Elevate Your Security Dialogue

Summit Agenda Overview

Welcome to the TLC Connect Northern UK CISO Summit. This closed-door gathering brings together senior security leaders responsible for protecting some of the UK’s most operationally critical organisations across industry, infrastructure, public services and regulated sectors.

Across two focused days in Manchester, CISOs and Heads of Security will examine the realities of defending complex environments shaped by legacy systems, expanding attack surfaces, regulatory pressure and persistent ransomware risk — while still being expected to enable transformation and growth.

The agenda is deliberately designed around real-world case studies, peer-led working sessions and senior-level discussions. The goal is not theory, but clarity: shared insight, practical approaches and decisions that security leaders can take back into their organisations with confidence.

12:00 - Registration

Arrival, registration and networking lunch

13:00 - Chair's Welcome

Welcome and Agenda Overview

Peter Dorrington – Founder – XMplify Consulting Ltd

13:05 - Fireside Chat - Resilience in Action: Turning Cyber Crisis into Continuity and Competitive Advantage

13:35 -Partner Keynote - The Control Layer Manifesto: A Unified Approach to Scaling AI Agents

14:10 - Customer Case Study Workshop - Cloud-Native Security: Protecting Innovation Without Slowing It Down

14:35 - Customer Case Study Workshop - From Fragmented to Unified: Transforming Endpoint Management for Security and Efficiency

14:55 - Networking Break and Vendor Exploration

15:15 - Panel Discussion - Beyond the Breach: Building Cyber Strategies for an Uncertain Global Landscape

15:50 - Customer Case Study Workshop - Broken Identity, Hidden Risk: Managing Identity’s Dark Matter

16:15 - Roundtable Discussions

Roundtable Discussion 1: Third Party Risk in the Age of AI Vendors

AI vendors are rapidly entering supply chains, often with opaque models and data practices. This roundtable examines how to assess and manage third party risk when AI is part of the equation.

Moderation Questions:

  1. What’s different about assessing AI vendors compared to traditional suppliers?
  2. How do you verify claims about data handling and model security?
  3. Should regulators mandate AI vendor transparency, or should industry self regulate?
  4. What’s one control you’d never compromise on with an AI supplier?

Roundtable Discussion 2: AI or Die: Achieving the Autonomous SOC

In the era of AI-accelerated adversaries, organizations must transform their SOC and empower defenders to overcome alert fatigue and burnout. Join this session to explore how leading security teams are implementing autonomous SOC capabilities to reduce manual workloads, accelerate detection and response, and enable analysts to focus on strategic threats.

Host: Robbie Jakon-Whitworth, Senior Solutions Engineer EMEA, Torq

Torq Logo

Roundtable Discussion 3: Cybersecurity Benchmarking

Benchmarking maturity is essential, but many metrics are vanity. This session explores how to measure what matters.

Moderation Questions:

  1. What’s the most meaningful benchmark you use internally?
  2. How do you compare maturity across industries?
  3. Should benchmarking be standardized or remain sector specific?

16:45 - Chair's closing remarks

17:30 - Networking Drinks

18:30 - Gala Dinner and Guest Speaker

08:00 - Registration & Networking Breakfast

08:45 - Chair's Opening and Day 1 Recap

08:55 - Keynote - Moving Beyond Point-in-Time Security: Adapting to Continuous Compliance across Cyber

09:20 - Panel Discussion - Trust in the Machine: Building Secure, Responsible AI Strategies for the Enterprise

10:00 - Platinum Keynote - Beyond Compliance: Turning Regulation into Competitive Advantage (guide topic - subject to partner changes)

10:35 - Customer Case Study Workshop - Securing AI Agent Rollout at a Major Financial Institution: A Case Study

10:55 - Networking Break & Vendor Exploration

11:15 - Workshop - Cybersecurity Economics: Measuring ROI in Risk Reduction (guide topic - subject to partner changes)

11:40 - Customer Case Study Workshops - The AI-Powered SOC: Scaling Defense at Machine Speed (guide topic - subject to partner changes)

12:00 - Panel Discussion - Trust but Verify: Closing the Cyber Gaps in Complex Global Supply Chains

12:10 - Customer Case Study Workshops - Adaptive Defence: Building Security Architectures That Evolve in Real Time (guide topic - subject to partner changes)

12:40 - 121 meetings and peer-discussions

13:00 - Networking Lunch & Vendor Exploration

14:00 - Onstage Interview – Quantum Computing: What CISOs Need to Know Now - Separating Hype from Strategic Risk

14:30 - Closing Fireside Chat – The Human Firewall: Mental Health, Burnout, and Diversity in Cyber Leadership

15:00 - Chair's Closing Remarks & Key Takeaways

Past & Current Sponsors

Who Should Attend?

Designed for Security & Risk Leaders Strengthening Enterprise Resilience

CISOs & Security Leaders

Chief Information Security Officers, Directors of Security and Heads of Cyber responsible for steering organisational security strategy, reducing risk, strengthening resilience, and ensuring business continuity amid accelerating threats.

Risk, Governance & Compliance Leaders

Leaders overseeing cyber risk, GRC, audit and organisational oversight — focused on aligning security with regulatory expectations, strengthening governance frameworks, and building defensible decision-making structures.

Security Architecture & Engineering Leaders

Professionals designing and operating secure, scalable architectures across hybrid cloud, identity, network, and endpoint environments — tasked with reducing complexity, modernising controls, and enabling transformation at scale.

Threat, SOC & Incident Response Leaders

Heads of Threat Intelligence, SOC, Detection & Response, and Incident Management who are driving capability uplift, preparing for high-impact events, and adopting AI-enabled detection, automation, and proactive defence strategies.
Scroll to Top