Agenda
08:00 - 08:50 |
Breakfast & Networking Break |
08:50 - 09:00 |
Chair's Welcome |
09:00 - 09:20 |
►“If you want to go fast, go alone. If you want to go far, go together” Dale Hodgkinson, Head of Strategy and Architecture, Slaughter and May
|
09:20 - 09:40 |
►Is the modern SOC delivering real value? Andrew Gogarty, Account Director UK&I Enterprise Sales, Nomios
|
09:40 - 10:10 |
►Panel discussion: Time to think of law firms as CNI? Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
10:10 - 10:50 |
► Education Seminar 1 Delegates will be able to choose from the following education seminars:
|
10:50 - 11:30 |
Networking Break |
11:30 - 12:00 |
►AI & Law Firms: 5 minutes to Armageddon? Martyn Styles, CISO, Bird & Bird
|
12:00 - 12:20 |
►Taking an Adaptive Approach to Solving the #1 Data Loss Issue of Email Misdelivery Henry Glynn, Cyber Security Solutions Specialist, Bytes Software Services
|
12:20 - 12:40 |
►Defence of the Realm: How we ensure that we still have a business tomorrow Philip Flint, Lead Enterprise Architect, Ampa Group
|
12:40 - 13:20 |
► Education Seminar 2 Delegates will be able to choose from the following education seminars:
|
13:20 - 14:20 |
Lunch & Networking Break |
14:20 - 14:40 |
►Quantum Leap - Preparing for a quantum-safe future Steve Davies, Head of Cyber Security, DLA Piper
|
14:40 - 15:00 |
►Protecting Against the Evolving Threat Landscape Craig Hinchliffe, Regional Sales Engineer, Crowdstrike
|
15:00 - 15:20 |
►Mind the Gap: Uncovering Decision Bias in Cybersecurity Bec McKeown, CPsychol, Mind Science
|
15:20 - 15:50 |
►Mitigating Concentration Risks in an interconnected Business Landscape Ethan Duffell, Head of Information Security, Clifford Chance LLP
|
15:50 - 16:20 |
Networking Break |
16:20 - 17:00 |
►Partnerships or Pitfalls? Mastering Third-Party Risk Adam Avards, Principal for Cyber and Third Party Risk Policy, UK Finance (Moderator)
|
17:00 - 18:00 |
Drinks Reception & Networking |
Education seminars
Ransomware 2025: Advanced Threat Tactics Targeting Legal Firms
John Anthony Smith, Information Security Expert, Conversant Group
With access to sensitive client data and the financial means to pay hefty ransoms, legal firms are high-value targets for sophisticated threat actors. This session will explore the latest tactics used by ransomware groups and strategies to stay one step ahead.
Attendees will learn:
- The latest ransomware tactics targeting the legal sector
- Practical approaches for building resilience, from protecting hybrid work environments to improving vendor security
- How to respond effectively to ransomware incidents, ensuring minimal disruption to operations and client trust
- Key insights from recent ransomware incidents and their impact on the legal industry
SASE, Past Present and Future – a new look at what’s important for securing today’s law firms
Greg Duffy, M.Eng., Product Marketing Director, EMEA, Cato Networks
SASE is the modern network and security architecture for digital businesses. But there is one fundamental requirement for SASE to be successful for today’s Law Firms.
What attendees will learn:
- Using an example illustrating the single most important thing to get right when building a SASE service.
- The four transformational impacts from getting it right.
- A scary vision of what getting it wrong might look like.
Exponential-e
Greg Jorgensen, Senior Cybersecurity Solutions Consultant, Exponential-e
- Law firms manage highly sensitive and high-value data - such as mergers and acquisitions, intellectual property, and privileged client communications, making them prime targets for ransomware, insider threats, supply chain attacks, and cloud misconfigurations.
- This presentation challenges the traditional view of law firms as service providers and suggests they should adopt a mindset similar to critical national infrastructure (CNI), emphasising the need for robust cybersecurity strategies like Zero Trust Architecture.
- It also argues that emerging technologies like AI and quantum computing pose less immediate risk compared to current, more pressing cyber threats that demand urgent action.