TLC Connect - Northern UK CISO Series

14th & 15th April 2026

Manchester

14th & 15th April 2026

Northern UK CISO Summit

The TLC Connect Northern UK CISO Summit brings together senior security leaders from across the North of England to tackle the realities of protecting complex, operationally critical organisations in a more hostile and regulated cyber environment.

Over two focused days in Manchester, CISOs, Heads of Security and Risk leaders will work through the challenges of ransomware exposure, legacy infrastructure, supply-chain risk and regulatory pressure, while still being expected to enable digital and commercial growth.

The programme is built around peer-led discussions, real-world case studies and closed-door working sessions, designed to move beyond theory and deliver practical insight, shared learning and decisions leaders can actually take back into their organisations.

Days
Hours
Minutes
Seconds
Key Themes for 2026

Resilient by Design: Embedding Security into Every Layer of the Enterprise

Cyber Resilience & Operational Continuity

Preparing for disruption with adaptive security models and enterprise-wide resilience planning

Threat Intelligence, Detection & Response

Enhancing visibility, anticipating attacker behaviour, and accelerating response across hybrid environments.

Identity, Access & Zero Trust Execution

Embedding identity-first security, continuous verification, and least-privilege controls across the organisation.

AI, Automation & Secure
Innovation

Implementing AI safely, reducing cyber workload with automation, and enabling secure digital transformation.

Elevate Your Security Dialogue

Summit Agenda Overview

Welcome to the TLC Connect Northern UK CISO Summit. This closed-door gathering brings together senior security leaders responsible for protecting some of the UK’s most operationally critical organisations across industry, infrastructure, public services and regulated sectors.

Across two focused days in Manchester, CISOs and Heads of Security will examine the realities of defending complex environments shaped by legacy systems, expanding attack surfaces, regulatory pressure and persistent ransomware risk — while still being expected to enable transformation and growth.

The agenda is deliberately designed around real-world case studies, peer-led working sessions and senior-level discussions. The goal is not theory, but clarity: shared insight, practical approaches and decisions that security leaders can take back into their organisations with confidence.

12:00 - Registration

Arrival, registration and networking lunch

13:00 - Chair's Welcome

Welcome and Agenda Overview

Peter Dorrington – Founder – XMplify Consulting Ltd

13:05 -Headline Keynote: The Evolving Cyber Threat Landscape: Unpredictability and Preparedness

13:35 - Fireside Chat - Resilience in Action: Turning Cyber Crisis into Continuity and Competitive Advantage

14:20 - Customer Case Study Workshops -Operational Technology Under Fire: Securing Critical Infrastructure (guide topic - subject to partner changes)

14:45 - Customer Case Study Workshop - Cloud-Native Security: Protecting Innovation Without Slowing It Down (guide topic - subject to partner changes)

15:05 - Networking Break and Vendor Exploration

15:25 - Panel Discussion - Beyond the Breach: Building Cyber Strategies for an Uncertain Global Landscape

16:10 - Customer Case Study Workshop - Resilience by Design: Building Cyber Programs That Withstand Disruption (guide topic - subject to partner changes)

16:15 - Roundtable Discussions

Roundtable Discussion 1: Third Party Risk in the Age of AI Vendors

AI vendors are rapidly entering supply chains, often with opaque models and unclear data practices. Traditional third party risk approaches struggle to assess and manage this new class of supplier.

Moderation Questions:

  1. What’s different about assessing AI vendors compared to traditional suppliers?
  2. How do you verify claims about data handling and model security?
  3. Should regulators mandate AI vendor transparency, or can industry self-regulate?
  4. What’s one control you would never compromise on with an AI supplier?

Roundtable Discussion 2: Insider Threats in Hybrid Workforces

Remote and hybrid work has blurred the boundaries of insider risk. Employees, contractors and partners can access critical systems from almost anywhere, while expectations of trust and privacy remain high.

Moderation Questions:

  1. What’s the most effective insider threat control you’ve implemented?
  2. How do you balance employee trust with monitoring and surveillance?
  3. Should insider threat programmes sit with HR, IT or Security?

Roundtable Discussion 3: Cybersecurity Benchmarking

Benchmarking maturity is essential, but many metrics are vanity figures that don’t drive better decisions. This discussion looks at how to measure what actually matters.

Moderation Questions:

  1. What’s the most meaningful benchmark you use internally?
  2. How do you compare maturity across different industries and geographies?
  3. Should benchmarking be standardised or remain sector-specific?

17:05 - Chair's closing remarks

18:30 - Networking Drinks

19:30 - Gala Dinner and Guest Speaker

08:00 - Registration & Networking Breakfast

08:45 - Chair's Opening and Day 1 Recap

09:00 - Keynote – Cyber Resilience Under Regulation: Governance, Risk and Compliance in a New Era

09:25 - Panel Discussion – Quantum Countdown: Preparing for the Encryption Reset

09:50 - Platinum Keynote - Beyond Compliance: Turning Regulation into Competitive Advantage (guide topic - subject to partner changes)

10:05 - Customer Case Study Workshops - Zero Trust at Scale: Lessons from the World’s Largest Cloud Security Deployments

10:35 - Customer Case Study Workshop - Quantum Readiness: Preparing for the Cryptographic Cliff (guide topic - subject to partner changes)

10:55 - Networking Break & Vendor Exploration

11:15 - Platinum Keynote - Cybersecurity Economics: Measuring ROI in Risk Reduction (guide topic - subject to partner changes)

11:45 - Customer Case Study Workshops - The AI-Powered SOC: Scaling Defense at Machine Speed (guide topic - subject to partner changes)

12:10 - Customer Case Study Workshops - Adaptive Defence: Building Security Architectures That Evolve in Real Time (guide topic - subject to partner changes)

12:30 - Networking Lunch & Vendor Exploration

13:30 - Panel Discussion -Trust but Verify: Closing the Cyber Gaps in Complex Global Supply Chains

14:10 - Roundtable Discussions : Talent, Wellbeing, and Building Resilient Security Teams

Roundtable Discussion 1: From Burnout to Balance: Safeguarding the Mental Health of Security Teams

Cybersecurity professionals often operate under relentless pressure, long hours, high stakes and constant threat monitoring. This roundtable explores how leaders can proactively address burnout, foster psychological safety and embed wellbeing into the culture of security teams.

Moderation Questions:

  1. What early warning signs of burnout should leaders look for in their teams?
  2. How can cybersecurity leaders balance 24/7 operational demands with sustainable workloads?
  3. Which wellbeing initiatives have proven effective in high-stress security environments?
  4. How do you measure the ROI of wellbeing programmes in terms of resilience and retention?

Roundtable Discussion 2: Resilience Through Diversity: Building Teams That Think Differently

Diversity of thought, background and experience strengthens problem-solving and organisational resilience. This roundtable examines how security leaders can embed diversity, equity and inclusion into hiring, development and leadership pipelines.

Moderation Questions:

  1. How does diversity directly impact the resilience of a security team?
  2. What barriers still exist to building diverse security teams, and how can they be dismantled?
  3. How can cybersecurity leaders ensure DEI initiatives are authentic rather than performative?
  4. What metrics or benchmarks can track progress in building diverse teams?

Roundtable Discussion 3: Upskilling for the Future: Preparing Teams for AI, Cloud, and Emerging Threats

As technology evolves, so must the skills of security professionals. This discussion focuses on continuous learning, reskilling and preparing teams for emerging threats — from AI-driven attacks to quantum risk.

Moderation Questions:

  1. Which emerging skills are most critical for security teams over the next 3–5 years?
  2. How can cybersecurity leaders create a culture of continuous learning without overwhelming staff?
  3. What role should certifications, labs and simulations play in upskilling?
  4. How do you balance investment in training with immediate operational needs?

14:50 - Networking Break & Vendor Exploration

15:10 - Panel Discussion - Trust in the Machine: Building Secure, Responsible AI Strategies for the Enterprise

15:35 - Closing Keynote – Sustainability & Cyber Responsibility: Embedding Trust into ESG Strategy

16:05 - Chair's Closing Remarks & Key Takeaways

Past & Current Sponsors

Who Should Attend?

Designed for Security & Risk Leaders Strengthening Enterprise Resilience

CISOs & Security Leaders

Chief Information Security Officers, Directors of Security and Heads of Cyber responsible for steering organisational security strategy, reducing risk, strengthening resilience, and ensuring business continuity amid accelerating threats.

Risk, Governance & Compliance Leaders

Leaders overseeing cyber risk, GRC, audit and organisational oversight — focused on aligning security with regulatory expectations, strengthening governance frameworks, and building defensible decision-making structures.

Security Architecture & Engineering Leaders

Professionals designing and operating secure, scalable architectures across hybrid cloud, identity, network, and endpoint environments — tasked with reducing complexity, modernising controls, and enabling transformation at scale.

Threat, SOC & Incident Response Leaders

Heads of Threat Intelligence, SOC, Detection & Response, and Incident Management who are driving capability uplift, preparing for high-impact events, and adopting AI-enabled detection, automation, and proactive defence strategies.
Scroll to Top