14th & 15th April 2026
Northern UK CISO Summit
The TLC Connect Northern UK CISO Summit brings together senior security leaders from across the North of England to tackle the realities of protecting complex, operationally critical organisations in a more hostile and regulated cyber environment.
Over two focused days in Manchester, CISOs, Heads of Security and Risk leaders will work through the challenges of ransomware exposure, legacy infrastructure, supply-chain risk and regulatory pressure, while still being expected to enable digital and commercial growth.
The programme is built around peer-led discussions, real-world case studies and closed-door working sessions, designed to move beyond theory and deliver practical insight, shared learning and decisions leaders can actually take back into their organisations.
Key Themes for 2026
Resilient by Design: Embedding Security into Every Layer of the Enterprise
Cyber Resilience & Operational Continuity
Preparing for disruption with adaptive security models and enterprise-wide resilience planning
Threat Intelligence, Detection & Response
Enhancing visibility, anticipating attacker behaviour, and accelerating response across hybrid environments.
Identity, Access & Zero Trust Execution
Embedding identity-first security, continuous verification, and least-privilege controls across the organisation.
AI, Automation & Secure
Innovation
Implementing AI safely, reducing cyber workload with automation, and enabling secure digital transformation.
Our Speakers
Lee Morton
Head of Cyber Security
CBG
Robin Smith
CISO
Great British Energy - Nuclear
Rob Black
Group Digital & Technology Director
Bruntwood
Professor Gerard Milburn
Quantum Fellow
UK National Quantum Computing Centre
Jon Mattey
CISO
Forge Holiday Group
Michael Heritage
VP Cyber Security
Financial Times
Jay Vinda
Global CISO & Cyber Risk Engineering Lead
Mosaic Insirrance
Petra Vukmirovic
Head of Information Security & IT
Numan
Siegfried Moyo, Director
Director, Cyber| IT| AI Security
Americold Logistics
Gabriela Ahmadi-Assalemi
CISO
University of Cambridge
Dhruv Bisani
Cyber Resilience Director
Starling Bank
David Edwards
VP Information Security
Payroc
Elevate Your Security Dialogue
Summit Agenda Overview
Welcome to the TLC Connect Northern UK CISO Summit. This closed-door gathering brings together senior security leaders responsible for protecting some of the UK’s most operationally critical organisations across industry, infrastructure, public services and regulated sectors.
Across two focused days in Manchester, CISOs and Heads of Security will examine the realities of defending complex environments shaped by legacy systems, expanding attack surfaces, regulatory pressure and persistent ransomware risk — while still being expected to enable transformation and growth.
The agenda is deliberately designed around real-world case studies, peer-led working sessions and senior-level discussions. The goal is not theory, but clarity: shared insight, practical approaches and decisions that security leaders can take back into their organisations with confidence.
12:00 - Registration
Arrival, registration and networking lunch
13:00 - Chair's Welcome
Welcome and Agenda Overview
Peter Dorrington – Founder – XMplify Consulting Ltd
13:05 - Fireside Chat - Resilience in Action: Turning Cyber Crisis into Continuity and Competitive Advantage
IDC forecasts that by 2026, 40% of UK firms will face regulatory penalties tied to resilience failures, while Deloitte notes that incident response maturity is now a differentiator in cyber insurance premiums.
The reality is stark: ransomware, destructive malware, and state-sponsored campaigns are no longer rare events but recurring crises. Boards and regulators expect CISOs to demonstrate not just prevention, but recovery and continuity.
This session explores how leaders design board-level playbooks, integrate legal and PR teams into crisis response, and measure resilience with metrics that matter to regulators and insurers. The conversation will highlight why resilience is now a competitive differentiator, not just a compliance checkbox.
CISO
Great British Energy Nuclear
Global CISO & Cyber Risk Engineering Lead
Mosaic Insurance
VP Cyber Security
Financial Times
13:35 -Partner Keynote - The Control Layer Manifesto: A Unified Approach to Scaling AI Agents
Scaling AI agents beyond simple pilots requires more than just high-performing models; it requires an independent control layer. This introduces AI Commander as a complete solution framework, focusing on how a unified platform can detect hidden risks, enforce consistent policies, and provide AI resilience through precision rollbacks.
Attendees will learn how to transition from siloed, ad-hoc security to a proactive "inside-out" architecture built on deep contextual data insights.
Regional Manager UK&I
Securiti AI
14:10 - Customer Case Study Workshop - Cloud-Native Security: Protecting Innovation Without Slowing It Down
Identity has never been so hot, and not in a good way. We've all seen the headlines: Cozy Bear, Scattered Spider, Helix Kitten, Lazarus Group. All threat actors that are switching their focus to identity-based attacks. Join this session where we'll discuss strategies and capabilities to defend against these challenges.
Technical Marketing Manager
Rubrik
14:35 - Customer Case Study Workshop - From Fragmented to Unified: Transforming Endpoint Management for Security and Efficiency
Endpoint management often evolves into a patchwork of disconnected tools and reactive processes. In this case study, we’ll explore how one of NinjaOne's partners consolidated its endpoint stack, modernized patching, and aligned vulnerability prioritization with business risk.
Senior Channel Account Manager
NinjaOne
14:55 - Networking Break and Vendor Exploration
15:15 - Panel Discussion - Beyond the Breach: Building Cyber Strategies for an Uncertain Global Landscape
Global volatility is no longer background noise — it is the defining context for cybersecurity strategy. IDC projects worldwide security spending will surge by 12.2% in 2025, reaching $377 billion by 2028, as organisations confront politically charged threat environments and escalating state actor campaigns. Gartner’s 2025 trends highlight that boards now view cyber risk as a direct threat to shareholder value, yet many security functions remain reactive, failing to adapt when business priorities shift. The imperative is clear: resilience must be embedded into the DNA of security programs, enabling continuity, agility, and strategic foresight. This panel will examine how CISOs can move beyond “defense-first” thinking to position cyber resilience as a driver of trust, competitiveness, and long-term business outcomes in a fractured global landscape.
CISO
Forge Holiday Group
Head of Cyber Security
GBG
Security Controls Partner
NatWest
15:50 - Customer Case Study Workshop - Broken Identity, Hidden Risk: Managing Identity’s Dark Matter
Organisations believe they understand their application landscape. The reality is different. Unknown apps, orphaned accounts, and unmanaged behaviours create identity dark matter — hidden risk living outside traditional identity tools.
At the current pace of discovery and onboarding, it can take years to bring these applications into existing identity controls and Agentic AI raises the stakes even further.
This session explores why identity has become fundamentally broken, how identity dark matter emerges, and how Orchid is helping some of the world's largest enterprises fix the problem.
Global Solutions Engineer
Orchid Security
16:15 - Roundtable Discussions
Roundtable Discussion 1: Untangling the Supply Chain
Supply chain risk is no longer just a third-party issue. It’s a shared, systemic challenge.
In this interactive discussion, Justin Kuruvilla, Chief Cyber Security Strategist at Risk Ledger, will kick things off with a perspective on how supply chain risk has evolved beyond traditional TPRM towards Active Supply Chain Security.
From there, the conversation opens up to the room. We’ll explore real-world challenges, concentration risks, and what’s actually working in practice, from visibility to supplier engagement.
Together, we’ll discuss how organisations can move from siloed approaches to a more collaborative, network-based model, and what it truly means to Defend-as-One.
Host: Justin Kuruvilla, Chief Cyber Security Strategist, Risk Ledger
Roundtable Discussion 2: AI or Die: Achieving the Autonomous SOC
In the era of AI-accelerated adversaries, organizations must transform their SOC and empower defenders to overcome alert fatigue and burnout. Join this session to explore how leading security teams are implementing autonomous SOC capabilities to reduce manual workloads, accelerate detection and response, and enable analysts to focus on strategic threats.
Host: Robbie Jakob-Whitworth, Senior Solutions Engineer EMEA, Torq
Roundtable Discussion 3: The Visibility Gap: Eliminating Blind Spots Across the Total Attack Surface
You cannot secure what you cannot see, yet most CISOs estimate they are missing 20% or more of their actual network footprint.
From forgotten "test" servers in the cloud to unmanaged IoT devices and legacy OT on the factory floor, these blind spots are the primary entry points for modern ransomware.
This roundtable discusses how to build a definitive "Source of Truth" without the friction of agents or credentials, and how to use that data to prioritize risk in a world of infinite vulnerabilities.
Host: Sam Choudhury, Enterprise Account Executive, RunZero
Chris Phillips, Mid-Market Account Executive, RunZero
16:45 - Fireside-Chat: Always On, Never Off: The Hidden Cost of Cyber Burnout
Cybersecurity teams are reaching a breaking point. The relentless pace of threats, 24/7 alerting, and chronic understaffing have created a mental health pressure cooker across SOC, engineering, and CISO organisations. Recent studies show rising levels of stress, sleep disruption, and emotional exhaustion among cyber professionals — factors directly linked to slower response times, increased error rates, and higher attrition.
For CISOs, this is no longer a wellbeing discussion but a security and operational risk. Burnout is weakening defensive posture, eroding analytical sharpness, and undermining team resilience at a time when threat actors are accelerating.
This session explores how cyber leaders can recognise early warning signs, reduce cognitive overload, and build healthier, more sustainable security environments without compromising readiness.
CISO
Astley Digital
Global CISO & Cyber Risk Engineering Lead
Mosaic Insurance
17:15 - Chair's closing remarks
17:30 - Networking Drinks & Dinner
08:00 - Registration & Networking Breakfast
08:45 - Chair's Opening and Day 1 Recap
08:55 - Keynote - Moving Beyond Point-in-Time Security: Adapting to Continuous Compliance across Cyber
In the past, compliance efforts have largely centred around providing a snapshot of security at a specific moment. However, with evolving regulations like DORA, NIS2, and others, this approach is becoming outdated. These new standards demand a more dynamic and continuous view of security.
This session will unpack the operational, cultural, and technological changes required to move from static reporting to living, breathing security assurance, and why this shift is essential for organisations facing increasing regulatory scrutiny, expanding attack surfaces, and rising expectations from boards and customers.
Head of Cyber Security
GBG
09:20 - Panel Discussion - Trust in the Machine: Building Secure, Responsible AI Strategies for the Enterprise
80% of enterprises are deploying AI, but only 20% have robust AI security frameworks (451 Research). McKinsey warns that adversarial AI attacks could cost industries $300B annually by 2030.
As UK firms embrace generative AI for SOC automation, fraud detection, and customer engagement, attackers are exploiting model manipulation, data poisoning, and prompt injection. The challenge is balancing innovation with risk: how to harness AI’s productivity gains without exposing organisations to novel attack surfaces.
This session explores governance frameworks, case studies, and the role of CISOs in shaping AI adoption strategies that are secure, ethical, and resilient.
Director, Cyber | IT | AI Security
Americold Logistics
Security Controls Partner
NatWest
Data Protection Officer
NIC
10:00 - Platinum Keynote - From Recovery to Resilience: The Cyber Imperative
Hear how we've helped organisations move beyond backup and protect themselves from the catastrophic impact of today's cyberattacks.
Senior Manager Sales Engineering
Rubrik
10:35 - Customer Case Study Workshop - Securing AI Agent Rollout at a Major Financial Institution: A Case Study
This session will review a case study of a major US bank facing security challenges that blocked their planned deployment of enterprise AI agents across over 100 petabytes of structured and unstructured data.
The bank struggled with a lack of data trust for AI consumption, the massive scale of metadata management, and complex regulatory compliance. Learn how the bank transformed data security and compliance to enable safe agents by moving at business speed and automating risk detection.
We will discuss the journey to establish strong AI governance, enabling the safe and accelerated adoption of enterprise knowledge agents, and the key finding that data must be classified and labeled before utilization by any AI agent.
Regional Manager UK & I
Securiti AI
10:55 - Networking Break & Vendor Exploration
11:15 - Workshop - Cybersecurity Economics: Measuring ROI in Risk Reduction (guide topic - subject to partner changes)
Boards increasingly demand quantifiable proof of cybersecurity investment value. This keynote examines frameworks for measuring ROI in terms of risk reduction, resilience, and regulatory alignment, equipping CISOs to communicate security’s business impact with clarity.
Job Title
ThreatLocker
11:40 - 121 meetings and peer-discussions
12:00 - Panel Discussion - Trust but Verify: Closing the Cyber Gaps in Complex Global Supply Chains
Forrester reports that 60% of breaches in 2025 originated in third-party ecosystems, underscoring the fragility of extended supply chains. PwC highlights that supply chain risk is now a board-level KPI, with regulators demanding evidence of vendor assurance.
In sectors like healthcare and finance, attackers exploit weak links in outsourced IT, cloud providers, and logistics partners to gain entry. The challenge is compounded by geopolitical instability, where state actors target suppliers to disrupt critical national infrastructure.
This panel examines frameworks for continuous vendor assurance, contractual clauses, and intelligence-sharing networks that allow CISOs to “trust but verify” in an era where supply chain compromise is the fastest-growing attack vector.
Cyber Resilience Director
Starling Bank
CISO
University of Cambridge
VP Information Security
Payroc
12:40 - Onstage Interview – Quantum Computing: What CISOs Need to Know Now - Separating Hype from Strategic Risk
Quantum computing is accelerating fast, but what does that really mean for enterprise security? In this fireside interview, Professor Gerard Milburn, Quantum Fellow at the UK’s National Quantum Computing Centre, cuts through the hype to give CISOs a clear, practical view of the risks, timelines, and strategic decisions that matter now.
From the future of cryptography to the rise of “harvest now, decrypt later” threats, this session offers a rare opportunity to hear directly from one of the UK’s leading quantum thinkers on how to build long-term resilience in a rapidly shifting landscape.
Quantum Fellow
UK National Quantum Computing Centre
13:00 - Networking Lunch & Vendor Exploration
14:00 - Roundtable Discussions
Roundtable Discussion 1: Third Party Risk in the Age of AI Vendors
AI vendors are rapidly entering supply chains, often with opaque models and data practices. This roundtable examines how to assess and manage third party risk when AI is part of the equation.
Moderation Questions:
- What’s different about assessing AI vendors compared to traditional suppliers?
- How do you verify claims about data handling and model security?
- Should regulators mandate AI vendor transparency, or should industry self regulate?
- What’s one control you’d never compromise on with an AI supplier?
Roundtable Discussion 2: Upskilling for the Future: Preparing Teams for AI, Cloud, and Emerging Threats
As technology evolves, so must the skills of security professionals. This roundtable focuses on continuous learning, reskilling, and preparing teams for the next wave of threats, from AI-driven attacks to quantum risks.
Moderation Questions:
- Which emerging skills are most critical for security teams over the next 3–5 years?
- How can cybersecurity leaders create a culture of continuous learning without overwhelming staff?
- What role should certifications, labs, and simulations play in upskilling?
- How do you balance investment in training with immediate operational needs?
Roundtable Discussion 3: Insider Threats in Hybrid Workforces
Remote and hybrid work has blurred the boundaries of insider risk. This roundtable explores how to balance trust, monitoring, and privacy.
Moderation Questions:
- What’s the most effective insider threat control you’ve implemented?
- How do you balance employee trust with monitoring?
- Should insider threat programs sit with HR, IT, or Security?
14:45 - Chair's Closing Remarks & Key Takeaways
Past & Current Sponsors
Who Should Attend?
Designed for Security & Risk Leaders Strengthening Enterprise Resilience
