Securing Financial Services Summit

The dangerous illusion of security

2nd July 2026 • Park Plaza Victoria, London, UK

Fragmented security architectures struggle to detect threats that span identity, data and systems, leaving critical gaps in how financial institutions understand risk. AI makes all this much worse. So, what's the answer? 

 

Security without visibility: defending what you can't see 

Modern attacks use legitimate access and move across systems undetected-because no single control sees the full picture. Endpoint solutions check device behaviour; identity solutions check for valid logins and authentications; Saas usage looks normal; network traffic looks normal. And yet attacks bypass all of these checks and get through anyway. 

Local visibility is not delivering global understanding. Security tools validate individual events. They do not inherently understand the relationships between events occurring in different parts of the environment. As a result, they cannot detect patterns that only emerge when activity is viewed as a connected whole. 

This creates a dangerous Illusion of security. What is needed is a new approach that manages the blind spots. 

Do identity differently: traditional models treat identity as a gatekeeper-something that determines whether access should be granted. But attackers can easily acquire valid credentials or tokens and login. For CISOs, this means moving beyond authentication and focusing on how identities are actually used. The focus therefore needs to shift from "who logged in" to "what did they do next." 

Understand connections: the modern enterprise is defined by integrations: Saas platforms linked through APls, workflows that span multiple applications, and data flowing continuously between services. Yet in many cases, these connections are only partially documented or understood. Understanding these pathways begins to reveal the routes attackers are most likely to take. 

OAuth permissions and API access are a key blind spot: designed to enable seamless interoperability between systems, these create persistent, often invisible trust relationships. Once granted, these permissions can allow access to data and functionality without further authentication. Bringing these under scrutiny can close off entire classes of attack that would otherwise go undetected. 

Focus on movement not access: even relatively basic monitoring of data movement across key systems can provide a level of insight that traditional access controls do not- unusual transfers between applications, and APl-driven extraction patterns, for example. But this data is rarely brought together in a way that reveals how events relate to one another. This is about looking at risk, not individual solution dashboards. 

Apply all security measures to Al as well as humans: as organisations introduce Al-driven automation, this approach must be extended to include non-human actors. Al agents and automated workflows should be treated as privileged identities in their own right, with clear visibility into what they access, what actions they perform, and what data they touch. Banks are already warning about uncontrolled agent and API sprawl. How bad is it? 

Reduce unnecessary complexity: while wholesale consolidation is rarely achievable in the short term, incremental rationalisation-eliminating redundant tools, standardising on core platforms, and simplifying the operating model-is key. Fewer well-understood tools deliver better outcomes than many poorly integrated ones. 

The big question though: in the longer term, what happens to these unconnected, local visibility solutions in a world in which a connected platform is really the answer? 

Is the UK's Cyber Security and Resilience (Network and Information Systems) Bill a regulation too far? Do prescriptive requirements risk forcing investment into compliance over real risk reduction, duplicating existing frameworks and increasing reporting and assurance burdens without improving visibility into modern threats? Will liability for third-party and systemic failures be pushed disproportionately onto banks, despite their limited control over cloud providers and critical vendors, creating cost, accountability, and insurability challenges. 

The Securing Financial Services Summit will look at how leading institutions are continuing to develop their security and resilience programmes in the era of AI.
Join our real-life case studies and in-depth technical sessions from the security and privacy teams at the UK and Europe’s most sophisticated firms.

 

Key themes will include:

Identity, authority, and control for non-human actors 
CISOs must rethink core identity and governance frameworks, including the adoption of robust agent identity models (spanning machine, service, and workload identities), and clearly defined delegation structures that determine what authority an agent holds and who grants it. What technologies can help them maintain visibility and control? 

Securing algorithmic insiders 
What does "insider threat" mean when the actor is non-human? For CISOs, the focus shifts to monitoring the behaviour of agents as well as users, developing capabilities to detect anomalous machine activity, and establishing effective controls that balance guardrails, detection, and containment. Do you need Al defences to do that? 

Data control when there is no perimeter 
How can firms enforce confidentiality when data is constantly in motion across systems the firm does not fully control? For CISOs, does this mean that the focus must shift toward controlling data itself rather than the environments it resides in? If so, what kinds of architectures and solutions can deliver security in that context? 

The power of automation 
There's too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APls, ticketing systems threat intelligence feeds, and even email servers and coordinates actions across tools via APls and prebuilt integrations and intelligent playbooks. Well, that's the theory. How does it work in the real world? 

Integrity and the Al-enabled supply chain 
Al-native operating models imply dependence on a complex supply chain of foundation models, internal systems, and external APls and orchestration layers that collectively produce legal work. Imagine the consequences of hacking such a system. So how do CISOs stop that happening? 

Dealing with regulations 
CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands; they must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret differently later; they face unrealistic expectations around incident reporting; and they face personal liability. Can RegTech help? 


Who Attends

Job titles

Cyber Threat Intelligence Relationships Manager
Security Architect
Cyber Analyst
Software engineer
Senior Information Security Analyst
Third Party Risk Lead
Project Manager
Infrastructure Project Principal
Head of Security Risk & Compliance
Chief Technology Officer
Chief Information Security Officer
Financial crime Executive
PCI DSS Support Function Manager
Cyber Analyst – Resilience
Lead Operational Risk Framework Manager
Lead Security Engineer
Business Security Consultant
CSO Risk & Controls
Lead Devops Analyst
CISO
IT Director
Senior Cyber Specialist
Cyber Security Engineer
Chief Risk Officer
Cyber Security Manager
Senior Internal Audit Manager
Technology & Cyber Risk Manager
Associate Director- EIOD IT Information Security Officer
Fraud Analyst
Information Security Officer
Senior Systems Engineer
IT Support Analyst
CIO and CISO
Head of Risk
Director - Technology and Cyber Risk
Vice-President Technology - Operational Resilience and 3rd Party Risk Oversight
Chief Technology Risk Manager, Head of Information Security & Data Privacy
Vice President, Technology and Cyber Risk Oversight
Head of Tech Ops & Cyber
Senior Information Security Officer
Executive Director, Europe
CTO
Secure Development Manager
Head of Audit
Head of Information Security
Principal Cyber Threat Intelligence Analyst
Head of IT Risk Governance
Manager - IT
Head of Infrastructure
Global Head Cyber Incident Response
Head of IT Security
Senior Cyber Security Engineer
Senior Information Security Governance, Risk & Compliance Analyst
Cyber Threat Intelligence Manager; Tactical & Operational
VP - Cyber Fraud Fusion Centre
Senior Investigator
Global Resilience Risk Specialist, Cloud Senior Manager
Senior Advisor Information Technology
Information Security Manager
Director of Business Information Security
Director of Technology
Director Business Information Security (BISO)
Chief Administration Office - Data Protection & Information security
Cyber Risk Consultant
Security Assurance Team Leader
Director - Fraud Investigations
Head of IT
Information Security and Data Protection Officer
DPO
Chief Information Security Officer
Security Engineer Architect
IT Security Analyst
Head of R&D and Engineering Cyber Fraud Fusion Centre
Enterprise Solution Architect
Head of Technology and Cyber Resilience Risk Oversight
InfoSec Analyst
Information Security Manager
Head of Digital CyberSecurity
Investment Adviser, UK and Ireland
Trade Advisor
CISO
Cyber Security Manager
Senior DevOps Manager
Head of IT & IS
IT Infrastructure & Security Manager
Director, Security Controls Services
VP, Cyber Investigations
Group Head of Information Security and Cyber Risk
Program Manager - Customer Identity and Access Management
Head of Internal Audit
Product security Lead VP
Head of Cyber Intelligence
Information Security Communications & Education Manager
Information Security
Vulnerability Lead Analyst
Security Architect
Technical Architect Cloud Security
Third Party Risk Consultant
Information Security Specialist
Privacy Officer
Head of Cyber Risk Intelligence, Insider Technology Risk and Digital Asset Risk
Cyber Manager
IT Security Analyst Specialist
Senior Manager - Digital Transformation
Vice President - IT Operations
International CIO
Lead - Ops/Tech Risk CA
Associate Director - Infrastructure Risk Management
Information Security Principal
Security Architect
Cyber Security & Operational Resilience Manager
Chief Risk Officer
Vice President, EMEA & UK/I for Cyber Hygiene
Information Technology Audit Manager
Network Security Architect
GRC Manager
Cybersecurity Compliance Manager
Director - Information Security Operations and Threat Intelligence
Senior Special Agent - Global Security
Cyber Security Risk Associate
Executive Director, Cybersecurity & Technology Control Governance & Program Management
Chief Information Security Officer
Business Information Security - Chief Information Security Office
Security Architect
Senior Director, Global Security Operations
Consultant
Senior Security Specialist
Cloud Security & DevSecOps Consultant
IT Audit Manager
Head of IT
Security Analyst
Infosec Analyst
CISO - Corporate Functions
Manager – Strategy & Intelligence; Investigations, Insider Risk and Data Loss Protection
Information Security Officer
Vice President, EMEA Regulatory Engagement Team
IT Manager
Resilience Risk Senior Digital Manager

Organisations

MasterCard
Santander
Bank of England
Man Group Plc
US Bank
Financial Services Information Sharing and Analysis Center (FS-ISAC)
African Development Bank (AfDB)
European Bank for Reconstruction & Development (EBRD)
AXA XL
Allianz
LV=
CIMB
NatWest Group
Pay.UK
Metro Bank
Beacon Platform
Mizuho
Credit Suisse
LSEG (London Stock Exchange Group)
NorthStandard
Specialist Risk Group
British International Investment
Lloyds Banking Group
OakNorth
Alpha Group (Alpha FX)
Pepper Money UK
Allianz
Mizuho
NatWest Group
First Abu Dhabi Bank
Suffolk Building Society
AEGIS London
Bibby Financial Services
Atomos
OakNorth
MUFG - Mitsubishi UFJ Financial Group
Natixis
MUFG - Mitsubishi UFJ Financial Group
Triple Point
Weatherbys Bank
Financial Services Information Sharing and Analysis Center (FS-ISAC)
Oxbury Bank Plc
HSBC
NatWest Group
Salary Finance
LSEG (London Stock Exchange Group)
Bupa Global
StreamBank
UnityLink Financial Services Limited
S&P Global
Kroo Bank
Bank of England
Legal & General
Fidelity International
Barclays
M&G plc
HSBC
Redwood Bank
AXA
LSEG (London Stock Exchange Group)
Financial Wellness Group
LCH
Commerzbank
Zurich Insurance Group
MarkerStudy
American Express
Europe Arab Bank
Allica Bank
Metro Bank
Beazley
Standard Bank Group
Financial Services Compensation Scheme (FSCS)
Barclays
Embark Group
abrdn
Legal & General
Legal & General
Lloyds Banking Group
Business France
Business France
Orbital
Royal London
LSEG (London Stock Exchange Group)
Suffolk Building Society
Alpha Bank
LSEG (London Stock Exchange Group)
Barclays
Bank of Ireland
UBS Group
Pepper Money UK
JPMorgan Chase & Co.
Envelop Risk Analytics Ltd
Allianz Holdings Plc
Natixis
MasterCard
Santander
Munich Re
Provident Financial Group
Vanquis Bank
Raymond James Financial
BNP Paribas Group
Pay.UK
FIS Global
Santander
Intellect Design Arena Ltd
Jefferies
Credit Suisse
Royal Bank of Canada (RBC)
European Bank for Reconstruction & Development (EBRD)
LSEG (London Stock Exchange Group)
NorthStandard
Credit Suisse
Deutsche Bank Group
MUFG - Mitsubishi UFJ Financial Group
Deutsche Bank Group
Moneycorp
HSBC
MasterCard
American Express
Mizuho
JPMorgan Chase & Co.
Allica Bank
Deutsche Bank Group
Insight Investment Management
Planet
Multigate
Mizuho
FIS Global
M&G plc
Union Bank UK
StoneX Group Inc.
Verto Fx
Credit Suisse
Lloyds Banking Group
Landesbank Baden-Württemberg
JPMorgan Chase & Co.
DorisIT
HSBC

Company headcount

5000-9999
100-499
3000-4999
10,000+
10,000+
10,000+
100-499
100-499
10,000+
100-499
10,000+
10,000+
100-499
10,000+
5000-9999
3000-4999
3000-4999
10,000+
10,000+
10,000+
10,000+
100-499
1000-1999
100-499
10,000+
500-999
2000-2999
1000-1999
1000-1999
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
1-99
500-999
1-99
3000-4999
3000-4999
100-499
5000-9999
100-499
100-499
100-499
100-499
5000-9999
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
500-999
1000-1999
3000-4999
10,000+
10,000+
10,000+
100-499
1000-1999
5000-9999
5000-9999
5000-9999
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
5000-9999
5000-9999
5000-9999
2000-2999
1000-1999
10,000+
10,000+
10,000+
3000-4999
3000-4999
10,000+
10,000+
10,000+
10,000+
500-999
10,000+
10,000+
10,000+
1-99
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
100-499
100-499
500-999
500-999
100-499
1-99
100-499
100-499
100-499
100-499
2000-2999
2000-2999
5000-9999
1-99
10,000+
2000-2999
10,000+
100-499
10,000+
10,000+
10,000+
500-999
10,000+
3000-4999
100-499
100-499
100-499
100-499
10,000+
1-99
100-499
10,000+
1000-1999
1-99
100-499
10,000+


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, UK, SW1V 1EQ
Telephone: 0333 400 6140

Directions:
Please click here