Agenda
08:00 - 08:50 |
Registration and Networking Breakfast |
08:50 - 09:00 |
Chair's Welcome |
09:00 - 09:20 |
►Briefs and Breaches: Why Foreign States Target Law Firms Chris Worthy, Former Deputy Director, UK Home Office & Independent Consultant
|
09:20 - 09:40 |
►Bridging the cybersecurity skills gap. Are you part of the problem or part of the solution? Ash Spencer, Head of IT and Security, Minster Law
|
09:40 - 10:00 |
►Safeguarding Your Enterprise: Addressing Human and Insider Risks in Data Loss Prevention Henry Glynn, Cyber Security Solutions Specialist, Bytes
|
10:00 - 10:20 |
►Securing GenAI: Our Journey & Lessons Learned Ali Shepherd, Director of Cyber & Operational Resilience (CISO), FCA
|
10:20 - 11:00 |
►Education Seminar 1 Delegates will be able to choose from a range of topics:
|
11:00 - 11:30 |
Networking Break |
11:30 - 12:00 |
►Panel Discussion: Managing Elevated Threats: Protecting Clients, Staff, and Data Steve Davies, Head of Cyber Security, DLA Piper (moderator)
|
12:00 - 12:20 |
►Data Security, Governance & Consolidation for Legal Firms Scott Chenery, Regional Manager UK & Ireland, Kiteworks
|
12:20 - 12:40 |
►Cyber Leadership in an era of Dis-Cooperation William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation
|
12:40 - 13:20 |
►Education Seminar 2 Delegates will be able to choose from a range of topics:
|
13:20 - 14:30 |
Lunch Networking Break |
14:30 - 14:50 |
►Quantum Leap - Preparing for a quantum-safe future Steve Davies, Head of Cyber Security, DLA Piper
|
14:50 - 15:10 |
►Securing Cloud Adoption in Law Firms Neil Bell, Information Security Manager, Forster LLP
|
15:10 - 15:50 |
►Panel Discussion: Operationalising Threat Intelligence in High-Risk Environments Rob Flanders, Head of Threat and Incident Response, BAE Systems
|
15:50 - 16:10 |
Networking Break |
16:10 - 16:30 |
►Ransomware in Financial Services: How AI-Driven Ransomware Will Trigger the Next Major Breach Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
|
16:30 - 17:00 |
►Panel Discussion: The Quantum Threat Timeline: Migration Challenges and Strategic Planning Adam Avards, Principal for Cyber and Third Party Risk Policy, UK Finance (Moderator)
|
17:00 - 17:00 |
Chair's Closing Remarks |
17:00 - 18:00 |
Drinks Reception |
Education seminars
Security operations and the Cloud: How to address the security staff shortage
Graham Holt, Regional Vice President (Sales), Arctic Wolf
Cyber Security continues to be a top priority for law firms - yet the operational burden, resource challenges, and fast-evolving threat landscape make it difficult to stay ahead. As more firms shift critical business functions to cloud-based SaaS platforms, it's time to ask: Should security operations follow suit? This discussion will bring together CISOs, CIOs, IT Directors, and Partners from the legal industry to explore key challenges.
Attendees will learn:
- Shortage of skilled security professionals and retention difficulties
- The need for continuous, 24x7x365 monitoring across increasingly complex security stacks
- Alert fatigue and dissatisfaction with existing tools-based approaches
- Rising compliance demands and the growing cost of cyber insurance
Securing the Last Mile – Rethinking Browser Security in the Enterprise
David Segev, VP Sales Global Strategic Accounts & International Markets, Layer X
Modern enterprises face an evolving threat landscape where the browser has become a significant point of vulnerability. Traditional security measures often fall short in addressing the unique risks associated with browser usage, including SaaS sprawl, the rise of shadow AI, and the proliferation of malicious browser extensions. This session will explore why the browser is now the riskiest application within the enterprise and demonstrate how LayerX provides a novel approach, transforming the browser into a controllable, visible, and secure workspace, moving beyond Zero Trust to achieve Zero Gaps security.
Attendees will learn:
- Understand the evolving risks that make the browser a prime target in today's enterprise environment
- Identify the limitations of traditional security approaches in addressing modern browser-based threats
- Learn about emerging threats such as SaaS sprawl, shadow AI, and malicious browser extensions that exploit browser vulnerabilities
- Discover how LayerX offers a comprehensive solution to secure browser activity, enhancing visibility and control
Supplier engagement is key to building supply chain resilience
►Supplier engagement is key to building supply chain resilience
Justin Kuruvilla, Chief Cyber Security Officer, Risk Ledger
Supply chain risk management involves complex business relationships and vast data volumes, yet many organisations still rely on static spreadsheets in shared drives. We examine why Third-Party Risk Management (TPRM) often fails and how strategic collaboration can improve security across your entire supply chain.
Attendees will learn:
- Why traditional TPRM approaches fall short in today’s interconnected threat landscape
- How engaging suppliers directly can reduce friction and improve data quality
- What ‘good’ looks like: practical steps to move from transactional to collaborative supply chain security