Speakers
Yair Kler, Head of Security Architecture, Standard Chartered Bank
Yair is a security executive with +20 years of experience leading cyber-security solution design in cutting edge and Fortune 500 technology companies. Serves as a subject matter expert for cyber-security with specialization on the topics of cyber-resiliency, cloud, artificial-intelligence, digital assets and quantum computing. Executive director and head of security... architecture at standard chartered bank, previously led Huawei's security architecture for Telec-Cloud (4G/5G) in EMEA, guided TDA's cloud transformation, and headed the development of multiple network security solutions. Former member in several security associations WG including GSMA's fraud and security groups, 5G task force, RIFS, MOTIF and GSMA coordinated vulnerability disclosure (CVD) panel of experts.more
Matt Adams, Head of Security Enablement, Citi
Matt is the Head of Security Enablement at Citi, where he is responsible for enabling the secure adoption of disruptive technologies such as GenAI, DLT/Blockchain, and Quantum Cryptography. In this role, he also leads a team dedicated to identifying and developing use cases for leveraging these technologies to address cybersecurity challenges. Matt's expertise lies... in the intersection of disruptive technologies and cybersecurity, and he is committed to driving innovation and enhancing security practices in the financial services industry.more
Robin Bylenga, Digital Strategy & AI Security Lead, DWS
Robin is VP and Information Security Lead at DWS and holds a master’s degree in Information Security with Distinction from Royal Holloway, University of London. She currently resides in London and is active in many professional organisations such as the Investment Association (Cyber Resilience Operating Group), SASIG, ISACA and the London Ladies Hacking Society.
As... a thought leader, she provides in-depth direction and guidance on a significant blind spot in cybersecurity—The human element. Robin is the Co-Founder of the Global Human Factors Cybersecurity Council, a working group to assist business organisations in addressing human performance and human behavioural issues in cybersecurity. more
Peter Olivier, Head of Security Delivery, Admiral Insurance
Peter Olivier leads the strategic security changes for Admiral as the Head of Security Delivery. He has a strong technical background and over 30 years of leading complex change in various sectors, such as Aerospace, Nuclear, and Finance. He knows how important people are for successful outcomes.
He has created many security teams in different disciplines for... over a decade and values highly motivated and effective teams. He co-founded the Mental Health in Cyber Security Foundation and cares about investing in people and improving cyber resilience at the organisational level. He is an award-winning coach and mentor who creates cyber security capabilities that meet the organisation’s needs.more
Dom Lucas, Head of Security, British International Investment
Dom is a security leader with over 25 years professional experience, working across a range of public and private sector organisations, leading others to success. He has worked for numerous large firms including, Barclays, Allen & Overy, Clifford Chance and also Financial Conduct Authority in the field of Information and Cyber Security. He is currently Head... of Security at British International Investment. Dom is passionate as to the discipline and has been a a leading participant in the development of information sharing across the domain. Outside of work, Dom is a keen supported of non-professional Theatre, having performed in, stage managed and directed seven theatrical shows over the past 15 months. more
Ben Trethowan, CISO, Brit Insurance
Ben is a senior technology leader of some 18 years’ experience and is currently the Chief Information Security Officer (CISO) for Brit Insurance. He is an accomplished hands-on Cyber Security leader, with extensive experience working in the FinTech, Entertainment, Transport and Defence sectors. Ben has led Cyber Security activities at all levels, from governance... and strategy to transformation and technical implementation, and continues to expand his skills through both academic and professional development. He also offers his Cyber Security and broader engineering skills voluntarily to a number of organisations that he supports. more
Charlee Ryman, Co-Founder, Trident Search
Charlee, is a Co-Founder at Trident Search, a cyber recruitment agency and has been building defensive teams across the globe since leaving the Royal Navy as a Submariner on the nations nuclear deterrent in 2017. He is a huge advocate for innovation and supporting the development of the security industry in the UK. He also has a passion for mental health and enjoys... acting a career guide for executives within security.more
Jonathan Armstrong, Partner, Punter Southall Law
Jonathan is an experienced lawyer with a concentration on technology and compliance. His practice includes advising multinational companies on matters involving risk, compliance and technology across Europe. He has handled legal matters in more than 60 countries involving emerging technology, corporate governance, ethics code implementation, reputation, internal investigations,... marketing, branding and global privacy policies. Jonathan has counselled a range of clients on breach prevention, mitigation and response. He has also been particularly active in advising multi-national corporations on their response to the UK Bribery Act 2010 and its inter-relationship with the U.S. Foreign Corrupt Practices Act (FCPA).
Jonathan is one of three co-authors of the LexisNexis definitive work on technology law, “Managing Risk: Technology & Communications”. He is a frequent broadcaster for the BBC and other channels and appeared on BBC News 24 as the studio guest on the Walport Review.
In July 2023 Jonathan was appointed to the New York State Bar Association Presidential Task Force on Artificial Intelligence. Jonathan sits on the Task Force with leading practitioners, regulators, judges and academics to develop frameworks for the use and control of AI in the legal system.more
Ash Hunt, CISO, Apex Group
Ash Hunt is a Global CISO and Information Security & Risk specialist with a decade of experience in complex, multi-national environments. He has worked extensively across UK Government departments, FTSE/FORBES organisations and Critical National Infrastructure (CNI), in addition to authoring the UK’s first quantitative framework... and actuarial model for information risk. He has also served as a media commentator for Sky News & ITV on cybersecurity issues. He is currently the Global CISO at Apex Group more
Ian Dutton, Senior Sales Engineer UK, Gatewatcher
Ian has 20+ years of experience working in the networking and security industry. He has held senior positions in engineering and architecture roles whilst working for Resellers, MSSP’s and Distributors where he has designed cybersecurity solutions, provided expertise and distilled knowledge to leading enterprises. Ian is now the Senior Sales Engineer for Gatewatcher... in the UK and Ireland. more
Natalija Buldakova, Solution Architect, Quest Software
I am a Certified IT professional and Sales Engineer at Quest Software, based in London, England. With nearly two decades of cross-industry experience, primarily utilising the Microsoft technology stack, I empathise with the challenges faced by IT project and BAU teams in managing IT infrastructure and navigating the impact of changes on business users. In my current... role at Quest Software, I leverage my expertise in IT Solutions Architecture and Cyber Security to ensure that our solutions enable customers to maximise the benefits of the technology, streamline IT operations, and enhance cyber resilience.more
Andy Sutcliffe, Principal Solution Architect, Veracode
Andy is a security specialist, with over 15 years’ experience in Network, Cloud and Application security. He has a keen interest in offensive security, automations and DevSecOps. When not breaking computers, Andy enjoys playing guitar, mountain biking and hiking.
Rob Byrne, Field Strategist, One Identity
Rob Byrne, a Field Strategist at One Identity, has worked in IT for more than 20 years in various roles – including development, consulting and technical sales – the majority of his career has focused on Identity Management. Rob focuses on helping organizations build Identity into their Cybersecurity strategies. Prior to joining One Identity, Rob worked... for Dell, Oracle and Sun Microsystems. more
Tom McVey, Sr. Solution Architect, Menlo Security
Tom is a Solution Architect at Menlo Security for the EMEA region, a leader in cloud security. In this role, he works closely with customers to meet their technical requirements and architects web and email isolation deployments for organisations across different industries. Coming from a varied background in cyber, Tom provides expert cybersecurity advice and strategic... guidance to clients.
Prior to Menlo Security, Tom previously worked for LogRhythm and Varonis. Tom is experienced at speaking at live events, including Infosecurity Europe, and presenting on webinars and podcasts.
more
Steve Benton, VP Anomali Threat Research, Anomali
Steve Benton is the Vice President of Anomali Threat Research at Anomali. He is a highly experienced executive-level security expert. Prior to joining Anomali, he was BT’s Deputy CISO and, latterly, CSO for this global communications company.At BT, he was accountable for BT’s physical and cybersecurity - investment, posture, and response - globally (170 countries)... and in the UK as part of the Critical National Infrastructure. He created and led the Protect BT Services and Operations organization - comprising 350 people across Intelligence, Offensive Security; Cyber Security Operations; Physical Security Operations; Investigations and Incidents; Strategy. Steve transformed the Intelligence capability at BT to source and develop high quality, actionable intelligence underpinned by Anomali to update security posture and disrupt threat actor activities at pace whilst driving the ‘democratization’ of threat intelligence for everyone. Steve was educated at Queen’s University Belfast, graduating in 1990 with First Class Honours in Information Technology. He is a CISSP, a Fellow of the Chartered Institute of Information Security, and a member of the Cyber Defenders Council.more
Dan Jones, Senior Security Advisor, Tanium
Dan has recently joined Tanium as Senior Security Advisor in EMEA following a long and distinguished career with the Ministry of Defence, where since 2016 he has led the development and delivery of enterprise scale defensive cyber security services for the UK Armed Forces.
Garry Sidaway, Principal Solutions Engineer, Balbix
Sidaway works with global enterprise customers to help them address the challenges of embedding information security and risk management into the security fabric of a business.
He’s been working in IT throughout the world for more than 25 years. Sidaway has been instrumental in growing businesses from startup to acquisition, understanding the unique challenges... of building a business and transforming companies into acquisition targets.
Sidaway is experienced in strategic customer management, partnership building and development. As a strategic thinker, he’s worked across the complete breadth of information security companies and is an expert in a wide range of technologies. His industry experience includes banking, retail, aerospace, finance and government as well as defence.more
Jay Gray, Interim Head of Cyber Solutions, Cloud Renewals & Standard Soln, Exponential-e
Jay has worked in the IT industry since 2000, developing deep experience in private enterprises, telecoms, Cloud, and managed service providers, collaborating with IT leadership teams to achieve strategic digital goals. His particular areas of expertise include orchestrating complex migrations and optimising investments. At Exponential-e, his current focus is on cyber... security, specialising in detection and response capabilities in complex environments, with an emphasis on technologies such as ZTNA, NGFW, SASE, SIEM, SOAR, XDR, and Cloud security.more