Agenda

08.00 - 09.00

Breakfast Networking Break
 

09.00 - 09.10

Chair's Welcome

09.10 - 09.30

►From Cybersecurity to Real, Risk-Based Exposure Management: the True Power of Resilience

Steve Davies, Head of Cyber Security, DLA Piper

  • What is Exposure management and how does it differ from vulnerability management? 
  • Managing the real-world risks associated with the modern attack surface
  • Maximising Exposure Management to reduce risks enterprise-wide
09.30 - 09.50

Akamai - presentation to be announced

09.50 - 10.10

►Evolving Threats to Law Firms: Adversary Tactics, Detection, and Defense

Ekow Oduro, IT Security Operations Lead, Forsters LLP

  • How emerging threat actors are evolving their methods against the legal sector
  • How to uncover vulnerabilities across the wider legal supply chain
  • How to spot and disrupt hidden data exfiltration and C2 activity
  • How to strengthen resilience through threat-led testing and simulation
10.10 - 10.50

►Education Seminar 1

Delegates will be able to choose from a range of topics:

  • Attacked at Machine Speed, Defended at the Speed of Dave in the SOC, Thom Langford, EMEA CTO, Rapid7
  • Visible and Verified: A New Approach to AI Risk and Exposure Management, Joel Barnes, Senior Director, Security Engineering Tenable
10.50 - 11.20

Networking Break

11.20 - 11.45

►Collaborating Securely: Addressing Cyber Risks in Chambers Partnerships

Eleanor Ludlam, Partner - Cyber, Privacy and Technology Litigation, Pinsent Masons (Moderator)
Adam Speker KC, Barrister, 5RB
Melanie Hart, Partner – Contentious Information Law & Dispute Resolution, Kingsley Napley

  • Supply chain risks when engaging barristers
  • Technical challenges of securing chambers
  • Navigating breach of confidence during a cyber incident
  • Injunctive relief as a legal remedy
11.45 - 12.05

►European Cyber Threats Exposed: CrowdStrike Threat Briefing

Mark Ward, Senior Regional Sales Engineer, Crowdstrike

  • Exploration of key findings from the 2025 European Threat Landscape, highlighting the tactics and techniques used by leading threat actors
  • Insight into the strategic objectives of adversaries across eCrime, nation-state and hacktivist groups
  • Guidance on how understanding their playbook can inform stronger, more effective defensive strategies
12.05 - 12.25

►Internal Audit – Bridging the Gap Between Aspirations and Reality

Mark Penlington, Head of Risk, Resilience and Internal Audit, Irwin Mitchell LLP

  • Why Internal Audit Is Important: Learn why Internal Audit is essential to providing the assurance and confidence senior executives need to understand how teams actually operate in practice
  • What Internal Audit Is: Understand the role of Internal Audit as an objective, constructive process that strengthens governance and accountability
  • How It Enhances Risk Management and Governance: Discover how Internal Audit bridges the gap between stated controls and actual practice by validating control effectiveness, uncovering hidden risks, and driving better decision-making
  • How to Embed Internal Audit in a Practical Way: Learn practical approaches to implement and integrate Internal Audit to deliver meaningful insight, drive activity and provide lasting value
12.25 - 13.05

►Education Seminar 2

Delegates will be able to choose from a range of topics:

  • Turning Employees Into your First Line of Defence, Sam Hooke, Sales Director, Hoxhunt & Martyn Styles, CISO, Bird & Bird
  • The Intricacies of AI Breach Response, Ahsan Qureshi, Managing Director, Ankura
13.05 - 14.00

Lunch Networking Break

14.00 - 14.05

►Zero Trust Controls at the Endpoint

Thomas Jenkins, Account Executive, Threatlocker

  • Discover how ThreatLocker applies Zero Trust at the endpoint, eliminating implicit trust by continuously verifying every application, executable, and action before authorisation
  • Learn how a deny-by-default, malware-proofing approach reduces ransomware risk, stopping unauthorised software and scripts even when other security layers are bypassed
  • Understand how least-privilege enforcement limits attacker capability, ensuring applications and users can perform only explicitly approved actions on enterprise devices
  • Explore how granular, policy-based endpoint control safeguards against modern threats, reducing enterprise exposure to ransomware and other advanced attacks
14.05 - 14.30

►Fireside Chat: Mitigating Concentration Risks in an Interconnected Business Landscape

Simon Brady, Event Chairman, AKJ Associates (moderator)
Ethan Duffell, Head of Information Security, Clifford Chance LLP

  • Identifying and assessing concentration risk across vendors and technology ecosystems
  • Balancing operational efficiency with diversification and risk reduction
  • Communicating the importance of concentration risk to boards and stakeholders
  • Embedding resilience planning to address concentration risks in today’s threat environment
  • Lessons from recent incidents such as Microsoft 365/Azure outages (2024), the 2024 CrowdStrike disruption, and the June 2025 Google Cloud outage
14.30 - 15.10

►Education Seminar 3

Delegates will be able to choose from a range of topics:

  • Safe AI Adoption for Law Firms: Guardrails that Protect Clients (and your Firm), James Derbyshire, Cybersecurity Entrepreneur, Harmonic Security
  • Beyond Questionnaires: Rethinking Supply Chain Security in Law Firms, Justin Kuruvilla, Chief Cyber Security Strategist, Risk Ledger
15.10 - 15.30

Networking Break

15.30 - 16.00

►Panel Discussion: Beyond Compliance — Building Cyber Resilience That Actually Works

Simon Brady, Event Chairman, AKJ Associates (moderator) 
Jonathan Freedman, Director of Technology & Security, Howard Kennedy 
Jonathan Turner, Head of Cyber Security, Farrer & Co 
Federico Iaschi, Information Security Director, Starling Bank
Will Packard, Director - Operational Resilience, Ernst & Young LLP

  • How do we turn risk appetite statements into real decision levers instead of paperwork?
  • With NIS2 and similar rules, what does “appropriate and proportionate” really mean on the ground — and how can risk management steer the response?
  • What cyber metrics really matter — and how do we prove our risk posture to the Board, to clients, and across the entire supply chain, right down to nth-party dependencies?
  • How does a resilience-first mindset transform culture — moving from blame and unrealistic prevention to readiness, adaptability, and fast recovery?
16.00 - 16.00

Chairman's Closing Remarks

16.00 - 17.00

Drinks Networking Reception

Education seminars


Safe AI Adoption for Law Firms: Guardrails that Protect Clients (and your Firm)


James Derbyshire, Cybersecurity Entrepreneur, Harmonic Security

Legal teams are embracing AI to accelerate research, improve client service, and streamline operations. Yet as firms adopt tools ranging from GenAI assistants to AI-enabled practice software, they face a dilemma: how to encourage innovation while upholding strict client commitments, confidentiality obligations, and regulatory requirements.

This session explores how leading legal firms are moving quickly on AI adoption while implementing the controls needed to avoid data exposure, ethical missteps, and compliance violations. Attendees will learn where the most common governance gaps occur, the types of AI-related risks that frequently go unnoticed, and how to establish practical guardrails that protect sensitive information without slowing lawyers down.

Drawing on real patterns observed across law firms of all sizes, the talk outlines a clear framework for responsible AI enablement. You will leave with a deeper understanding of how to safely operationalise AI in a legal environment and how forward leaning firms are putting structure around experimentation, oversight, and continuous monitoring.

Attendees will learn:

  • The most common AI driven exposure patterns in legal workflows and why they occur
  • Where governance gaps arise as firms introduce both sanctioned and unsanctioned AI tools
  • Practical guardrails that balance innovation with confidentiality, client commitments, and regulatory duties
  • How progressive firms are enabling responsible internal AI use while maintaining full compliance

Attacked at Machine Speed, Defended at the Speed of Dave in the SOC


Thom Langford, EMEA CTO, Rapid7

Budgets are tight, your team is stretched thin, and the business is (very) demanding. What CAN you do to get the most out of your people, investments and technology? How can you turn data into action; moving from drowning in alerts to executing precise, high-impact remediations.

Attendees will learn:

  • Augmenting your response time with AI and human expertise
  • Shifting to Managed eXtended Detection and Response to unify visibility across your estate
  • Proactively staying on the right side of the regulators

Beyond Questionnaires: Rethinking Supply Chain Security in Law Firms


Justin Kuruvilla, Chief Cyber Security Strategist, Risk Ledger

Organisations across all sectors rely on increasingly complex digital supply chains, from cloud services and software providers to managed services and specialist vendors. Each connection introduces supply chain risk, yet many security and risk teams still depend on point-in-time assessments that struggle to reflect how risk changes over time. In this session, Risk Ledger will explore the fundamentals of supply chain risk and security, focusing on why visibility is often limited, where blind spots typically emerge, and how organisations can start to untangle complex supplier ecosystems. We will examine why questionnaire-led approaches alone are no longer sufficient, how external and continuous signals can complement existing governance processes, and what a more resilient, defensible approach to supply chain security can look like in practice. The session will also cover how organisations can prioritise effort, reduce noise, and focus on the suppliers that matter most. This session is designed for leaders looking to better understand supply chain risk, build stronger foundations for continuous assurance, and make more informed risk decisions regardless of sector.

Attendees will learn:

  • A clearer understanding of how supply chain cyber risk emerges and evolves
  • Insight into common visibility gaps and why they persist
  • Practical principles for moving beyond point-in-time assessments
  • A framework for prioritising suppliers and focusing on what matters most

Turning Employees Into your First Line of Defence


Sam Hook Hoxhunt 
Martyn Styles, CISO, Bird & Bird 

Humans remain one of the most targeted - and most exploited - elements of any organisation’s security maturity. Despite continued investment in technical controls, phishing and social engineering attacks continue to succeed because they are designed to manipulate human behaviors rather than systems. This session explores how organisations can realistically address this challenge by strengthening the human layer of security without overwhelming already stretched Infosec teams.

Co-presented by Bird & Bird and Hoxhunt, this talk combines real-world experience with practical insight into building effective, scalable security awareness programs. The speakers will discuss why user error is inevitable, and why the goal of security awareness should not be perfection, but resilience - helping employees develop a strong “suspicious bone” that enables them to recognise and respond appropriately to threats. Attendees will learn how security awareness can be delivered at scale with minimal ongoing effort, using automation and adaptive training to reduce administrative overhead while maintaining high engagement levels across the organisation. A key highlight of the presentation will be a live, practical demonstration of high-quality phishing simulation emails and the ease with which targeted security awareness training packages can be deployed. This hands-on walkthrough will show how realistic simulations, timely feedback, and automated training can work together to drive lasting behavioral change.

Attendees will learn:

  • Humans and security - People will always be vulnerable to scams, so Infosec teams must focus on education and building a strong “suspicious bone”
  • Low effort for Infosec - Hoxhunt largely runs itself, requiring minimal setup and ongoing management from busy security teams
  • Practical demo - Live demonstration of realistic phishing simulations and how easy it is to set up effective security awareness training

The intricacies of AI breach response


Ryan Rubin, Senior Managing Director – Cyber EMEA, Ankura

AI technologies are being adopted at a rapid rate within the Law Firm Industry. Whilst many have been ironing out the flaws such as accuracy, IP and hallucinations, not many have come to grips with the security risks around the AI technology itself. It is only a matter of time before the next cyber incident relates to a breach in the AI technology.

Join us for an interactive session running through key areas to consider in responding to an AI technology related breach and some of the challenges this brings to organisations needing to do so. We will cover a combination of Agentic AI, Chat based AI and internal AI platforms that law firms may be using to support their business and share general lessons learned from breaches within the law firm industry as key take aways.

Attendees will learn:

  • What happens when an AI Agent goes rogue
  • How AI breaches differ from standard cyber breaches
  • Lessons learned from supporting breaches within law firms
  • Shining a light on Shadow AI
  • Regulations and Governance

Visible and Verified: A New Approach to AI Risk and Exposure Management


Joel Barnes, Senior Director, Security Engineering, Tenable

As legal firms race to harness AI for critical cost savings and competitive advantage, the widening gap between rapid innovation and necessary governance is creating a volatile new landscape of risk. With fee-earners and internal teams deploying "shadow" agents and onboarding unproven vendors to stay ahead of the competition, security teams are often forced to choose between obstructing business growth or accepting unchecked exposure. This session explores how a holistic Exposure Management strategy bridges this divide, providing the unified visibility needed to control AI-driven data risks, output accuracy, and vendor vulnerabilities.

Attendees will learn:

  •