24th e-Crime & Cybersecurity Congress

From Security to Resilience – Rethinking the Impossible

11th & 12th March 2026 • Park Plaza Victoria, London, UK

100% security is impossible. So, security alone doesn’t keep organisations running, security + resilience does.
Recognising this requires a fundamental shift at every organisation – in people, process, and technology.

 

Secure everything? Or survive anything? 

“Cybercriminals pose a seismic and increasingly sophisticated threat to businesses and national security. Yet Britain seems remarkably ill-prepared,” The Guardian October 2025

Cybersecurity professionals may take issue with the last words, but they surely understand that that’s what it looks like to politicians, shareholders, customers and the public in general. ‘What are ministers going to do about this?’ is an increasingly common question in the press. All of which means that at last the true significance of cybersecurity is being realised. Finally, then, will organisations spend the right money on the right things?

Preventing a Digital Breakdown
Airports grounded. Automakers stalled. Retailers offline. Breweries silenced. The economy runs on tech no one can fully secure. Technology implementation has been so fast and fragmented that organisations no longer understand what they have or who/what they depend on. Security has never been more important.

The Accountability Reckoning
Boards no longer accept ‘too hard to quantify.’ CISOs must speak the language of risk — or be replaced. If we can model credit default and hurricane exposure, and allocate capital against it, why pretend cyber risk is immeasurable? Security is operational risk. It should be measured and managed as such.
Regulators Have Already Decided
Their question isn’t if you’ll be breached. It’s how fast you recover. DORA, NIS2, the UK Resilience Framework and the rest are much less interested in your security stack and much more interested in how you’ve identified critical dependencies, business services and processes and how you can keep them running.
From Defence to Design for Failure
If security can’t guarantee safety, resilience must become the organising principle. A truly resilient enterprise could survive without security. Security becomes an efficiency function — not a guarantee.
The ROI Reset
CISOs started off talking about data crown jewels and GDPR – but data losses are not existential, it’s data encryption and attacks on IoT systems that are. So, is uptime the only relevant metric?
Enabling continuity
Defence tools must prove they enable continuity. Cybersecurity done well should be seen as foundational to resilience. The key is to be able to link specific security goals to business risks.
Next generation tools and models: the rise of AI
Resilience and security need many of the same things: visibility across technology and processes; accurate inventory mapping; data integrity and availability; risk-based prioritization. So how will AI help with these?
The future of the cybersecurity stack
The stack of the future is a resilience architecture: dynamic, AI-assisted, and impact-aware. Its goal is not to prevent every breach, but to ensure that when compromise happens, the organisation stays in business.
CISO or Cyber Resilience Chief – A New Power Base?
Resilience is the new seat at the table. If resilience not security is the endgame, what does that mean for hierarchies, budgets and responsibilities? Will The next generation of CISOs defend walls or rebuild faster?

 

How vendors can respond to the new resilience paradigm

Turning security into resilience – re-thinking your security toolset

Defence tools must prove they enable risk measurement and management, as well as continuity.

Detection as Resilience
Speed is resilience. The vendors who thrive will be those who turn detection and response into minutes, not days. It’s no longer about catching every attacker — it’s about shortening dwell time, preserving core processes, and containing the blast radius before business impact sets in.
Resilience is a Data Problem
You can’t recover what you don’t understand. The best cybersecurity tools are now the ones that see across dependencies — mapping which processes, identities, and suppliers matter most. Visibility isn’t just security analytics anymore; it’s the foundation of adaptive recovery.
Vulnerability Management vs Exposure Prioritisation
Scanning every CVE means nothing without knowing which asset underpins which process. Resilience-aligned vulnerability vendors will fuse exposure data with business criticality scoring — helping risk leaders prove that the systems most vital to operations are also the most defended.
Incident Response Becomes Recovery Engineering
New generation incident response it starts when operations must be restored. The leading IR providers are expanding into “recovery engineering” — building predefined restoration playbooks, secure failover architectures, and post-incident dependency analytics that prove to boards and regulators that recovery times are predictable and tested.
Zero Trust Re-Defined as Graceful Degradation
Zero Trust has been sold as “trust nothing.” The resilience version is “trust what’s left.” The most forward-looking vendors are designing architectures where services degrade gracefully rather than fail catastrophically — so the business can operate in a partial trust mode while recovering full capacity. An impractical utopia becomes realizable.
From Endpoint Protection to Endpoint Continuity
Endpoints aren’t just entry points; they’re business enablers. In a resilience model, the endpoint provider that wins is the one that helps the organisation keep working even when devices are compromised. Automated isolation, local restore capabilities, and identity-based reauthentication make endpoint agents part of the continuity fabric, not just the perimeter.
 

“The fusion of security and resilience will demand new architectures, new mindsets, and perhaps new leadership titles — but also more investment. Organisations can no longer just talk the talk.”

 

Threat Intelligence is Business Impact Intelligence
Threat data has become abundant; what’s scarce is relevance. The next generation of threat-intel vendors map adversary campaigns to the organisation’s critical process dependencies — turning technical IOCs into operational risk insights. The winners are those who can brief not just SOC analysts, but resilience committees and risk officers in business-impact language.
Threat Hunting For Continuous Assurance
The best hunters are becoming resilience auditors. Instead of chasing every trace of intrusion, they prioritise hunts by business criticality — proving that vital functions remain uncompromised. Continuous threat hunting becomes a living control assurance mechanism: a test of whether resilience assumptions hold in practice.
From I(D)AM to Identity Resilience
Identity systems are now single points of systemic failure. IAM vendors must pivot from “locking down” to “failing safe” — ensuring that recovery identity stores, delegated trust models, and just-in-time credentials can keep essential services running when the primary directory collapses. The new IAM pitch: you can still operate when your IdP goes dark.
Cloud Security is Cloud Recovery Architecture
Cloud controls can’t just prevent misconfiguration — they must guarantee recoverability. Cloud-security vendors that integrate configuration management, snapshot integrity checks, and cross-region failover orchestration are no longer security add-ons; they are resilience engines that assure continuity in hybrid and multi-cloud ecosystems.
Network Security Means Dependency Mapping
Firewalls and segmentation are necessary but insufficient. The real value for network vendors now lies in visibility of interdependence — knowing which flows matter most for critical processes. By mapping and tagging business-critical pathways, network vendors can position themselves as resilience cartographers, not just traffic police.
SIEM & XDR Are Situational Awareness Platforms
In a resilience-driven enterprise, telemetry is only useful if it supports real-time decision-making under duress. SIEM and XDR vendors can position themselves as command-centre backbones, feeding incident command, risk, and business continuity teams with shared situational awareness — not just an undigestible tsunami of alerts.

 

“The good news for vendors is that organisations are being reminded daily that their operations can be taken offline for weeks, even months, by a straightforward ransomware attack. They need to invest now.”

 

Security and Resilience through AI (while Securing AI…)
AI in cybersecurity is well-funded but poorly explained. How does it work, what will it deliver and is it secure?
 

From Static Rules to Self-Learning Defences
Traditional SIEM, EDR, and XDR platforms are evolving from rule-based systems into self-learning ecosystems. Advanced ML models and transformer-based architectures allow systems to identify novel attack patterns without prior signatures. However, these models can be poisoned by adversarial data or manipulated through prompt injection and model inversion — creating new surfaces of compromise.
Threat Intelligence and Adversary Simulation
Generative AI is transforming how analysts synthesize and communicate intelligence. LLMs can draft attacker playbooks, simulate phishing lures, and summarize multi-source threat feeds, dramatically reducing the time between detection and action. But the same capability can be exploited by attackers at scale — forcing defenders to authenticate not just identities, but language patterns and context.
Predict, Prioritise, Patch
By integrating NLP and predictive analytics, AI can mine vulnerability databases, code repositories, and telemetry to predict which CVEs are most likely to be exploited in a given environment. This enables CISOs to move from reactive patching to pre-emptive mitigation. But attackers can use similar models to target unpatched systems faster than ever, creating an AI-accelerated race between discovery and exploitation.
Always-On Defence, Continuous Response
Agentic AI architectures — where semi-autonomous software entities patrol networks, triage incidents, and even patch systems — promise 24/7 protection without human fatigue. These agents can coordinate across silos (endpoint, cloud, identity) to contain threats in seconds. Yet the delegation of operational authority raises governance questions: how do CISOs ensure explainability, ethical boundaries, and control if an agent acts on incomplete or corrupted data?
Data Correlation and Anomaly Detection
AI’s ability to unify disparate telemetry — from IoT sensors to SaaS APIs to industrial controllers — gives security teams unprecedented visibility across the enterprise. Cross-domain embeddings and graph AI reveal hidden dependencies and behaviours that human analysts would miss. Yet increased reliance on centralized AI pipelines introduces systemic risk: if data integrity or model logic is compromised, every downstream decision may be corrupted.
Model Integrity, Governance, and Supply-Chain Risk
As organizations embed AI into every layer of their stack, “AI security” becomes a new domain of cybersecurity. Models must be version-controlled, auditable, and protected from theft, inversion, or malicious fine-tuning. Governance frameworks must extend beyond data privacy to include model provenance and policy enforcement. CISOs now need to protect not just networks and data — but the AI decision systems that will increasingly run both.

Join our real-life case studies and in-depth technical sessions from the security and privacy teams at some of the world’s most admired brands.


Who attends

Job titles

Information Security Officer
Cyber Threat Intelligence Relationships Manager
Cyber Analytics and Information Risk Manager
Group Chief Information Security Officer
Chief Digital and Technology Officer
Cyber Security Analyst
Information Security Officer
FIO & Intelligence Officer
IT Director (Core infrastructure, Cyber Security, Risk and Compliance)
Senior Group Risk Consultant
Head of Information & Cyber Security
Vice President - IT Audit Specialist
Threat management lead
Third Party Risk Lead
Senior Infosec Specialist
Project Manager
Head of Information Security
Senior Security and Network Engineer
Security Architect
Head of Security Risk & Compliance
GRC Manager
Cyber Security Lead
Security Engineer
Cyber Security Analyst
CISO
Financial crime Executive
Digital Criminal Justice Lead
CIO
Cyber Security Advisor
Cyber Analyst – Resilience
Principle InfoSec Architect
Business Security Consultant
Information Security Program Manager
Data Privacy Specialist
Information Security Risk & Compliance | Senior Manager Team Lead
CISO
Head of Information Security
Cyber Security Analyst
Cyber Security Manager
Senior Internal Audit Manager
Information Security Officer
Information Security Architect
Associate Director- EIOD IT Information Security Officer
Principle Security Engineer
Senior Operations Manager - Cyber Security
Security Eng
Chief Compliance and Business Ethics Officer
Information Security Lead
IT Support Analyst
Head of IT Operations & Governance
CISO
Information Security & Data Privacy Mgr
HEO Army Security Culture
Security Training and Awareness Manager
Infrastructure Analyst/Project Manager
Head of Risk
Lead Enterprise Security Architect
Principal Security Engineer
Technology Compliance Manager
Cyber GRC Manager
Information Security Manager
Global Chief Information Security Officer
Technical Lead (Platform & Security)
Vice-President Technology - Operational Resilience and 3rd Party Risk Oversight
Cybersecurity Delivery Analyst
Technology and Information Security Risk & Compliance Manager
IT Security Engineer
Group Chief Information Security Officer
Head of Enterprise Risk Management
Vice President, Technology and Cyber Risk Oversight
Head of Cyber Engagement
Director of Technology & Information Security
HoD Information Security, Governance and Compliance
Cyber Intelligence Specialist
Manager - Cyber Fraud Taskforce
DDaT CTO
Senior Manager Threat Intelligence
Security Architect
Senior Cyber Security Analyst
Information Security Manager
Secure Development Manager
MD
CISO
Cyber Security Engineer
Group Information Security Manager
Director - National Cyber Operations
Head of IT Risk Governance
Information Security Analyst
VP MI and Reporting Demand Management
Lead Enterprise Architect
Principal Cybersecurity Strategist
Security & Compliance Manager
Group IT Security and Compliance
Cyber Security Project Manager
Technical Support Specialist
Head of Infrastructure
Risk Management Specialist
Security Administrator
Senior Tech Manager, Info Sec, Risk & Compliance
Compliance & Security Director
Global Head of Information Security
Senior Cyber Security Engineer
Senior Information Security Governance, Risk & Compliance Analyst
Team Leader - CNI Cyber
Data Protection Officer
Chief Information Security Officer
VP Information Security Management
Security & Resilience
Head of IT Service & Operations
Interim CISO (Cirrus Programme) & Security Lead
Internal Digital Audit Manager
Cybercrime Investigator
Lead Controls Architect
Global Resilience Risk Specialist, Cloud Senior Manager
Head of Network Security
Cyber Risk Manager
Chief Information Security Officer
Cyber Security Risk Manager
CISO
Security Controller
Principal Cyber Risk Consultant
Information Security Manager
Senior Information Assurance Officer
Information Security Manager
Senior Security Product Manager
Senior Fraud Risk Manager
Head of Information Security
Head Of Information Security
Director of Business Information Security
Group Head of Security Engineering and Product Security
Group IT Security Manager
Vice President Cyber Security
SVP - Business Information Security Officer
IS Security Support Engineer
Information Security Manager
Fraud & Auth Lab and Shared Systems - Senior Lead Business Analyst
Director Business Information Security (BISO)
Chief Administration Office - Data Protection & Information security
Group Director of Information Security
Deputy Director, Compliance
Director of Information Security
Senior SOC Engineer
Business Information Security Officer & Third Party Officer
Senior Information Security Manager
Threat Intelligence Specialist
Data Protection/Cyber Security Manager
Cyber Risk Consultant
Security Assurance Team Leader
Director - Fraud Investigations
Information Security Manager
Head of Cybersecurity and Telematics
Chief Information Security Officer
Cyber Security and IT Change Analyst
Head of IT
Head of Business Support and Cost Optimisation
Information Security & Compliance Officer
Information Security Manager
Senior Officer
Security Engineer Architect
Head of Cyber Security Operations
VP EMEA Info Sec
Director, Cybersecurity EUR and Business Information Security Officer UK and Ireland
Vice President , IT Risk Control & Security
Information Security Manager
Head of Cyber Operations
IT Governance & Risk Manager
IT Security Manager
Security Analyst
Head of R&D and Engineering Cyber Fraud Fusion Centre
Enterprise Solution Architect
Information Security Manager
InfoSec Analyst
MLRO
IT Director
Information Security Manager
Security Operations Analyst
Trade Advisor
Senior Supervisor Insurance - Prudential Regulation Authority
Technical Support Specialist
IT Risk Manager Analyst
CISO
IT and Innovation Manager
Head of IT & IS
Security Design and Assurance Specialist
Cyber Risk Manager
Information Security Analyst
Project Manager Cyber Security
Vulnerability Testing Manager
Investigator
Head of Information Security & Privacy
Group Head of Information Security and Cyber Risk
Global Security Manager
Deputy CISO
I.T. Manager
Security Architect
Senior IT Engineer
IT Security Lead
Head of Internal Audit
Cyber Security Analyst
Senior IT Risk Manager
Head of Cyber Intelligence
Information Security Communications & Education Manager
Federal Agent & Cyber International Liaison Officer
Head of Security and IT Risk Management
Cyber Detective
Vulnerability Lead Analyst
Technical Architect Cloud Security
Cyber Security Specialist
Senior Cyber Engineer
Privacy Officer
Head of IT
CISO & Head of Security
Cyber Manager
Head of Information and Cyber Security
Director Cybersecurity Architecture and Engineering
Chief Information Security Officer
Senior Manager - Digital Transformation
Technical Security Architect
Information Security Specialist
Detective Constable
Chief Information Security Officer
Financial Risks Director
Senior Manager Information Security
Head of Cyber Regulation and Policy
Head, Cyber Resilience Policy
Head of Cyber Development and Assurance
Vice President - IT Operations
IT Security Manager
Vice President IT Risk
Senior Technology Manager, Security Operations
BISO
Associate Director - Infrastructure Risk Management
Group CIO
Security Architect
Technology Change Risk Consultant
IT Security Professional
Chief Risk Officer
Global Security Operations Manager
Senior Infrastructure Security Architect
Vice President, EMEA & UK/I for Cyber Hygiene
Defensive Cyber Operations
Information Security Consultant
Executive Director & IT Audit Partner
Information Security Analyst
Information Technology Audit Manager
Assistant Director and Projects CTO
Cybercrime Specialist Abroad
Senior InfoSec Analyst
GRC Manager
Head of Data Privacy and Cyber Security
Head of Information Security
Lead Cloud Security & DevSecOps Engineer
CISO
Senior Information Security Analyst
Manager Supply Chain Security
Director - Information Security Operations and Threat Intelligence
Senior Special Agent - Global Security
Cyber Security Risk Associate
Security Policy Manager
UK Security Operations Manager
Executive Director, Cybersecurity & Technology Control Governance & Program Management
Director of Cyber Security & Compliance
Head of Digital, Data, Technology and Facilities
Modernising Technology Programme Manager
Associate
Information Security Officer
IT Portfolio and Security Manager
Governance Risk & Compliance Lead
Information Security Risk Manager
Security Operations Manager
Cyber Security Auditor
Head of Information Security
Cyber Security Manager
Director, Security Operations
Information Security Specialist
Technicians
Operational Risk Supervisor, Vice President
Senior Director - Information Security and Global Response, EMEA
Global R&C Ops Risk and Resilience Lead
Cloud Security & DevSecOps Consultant
Police Officer
Global Head of Cyber Threat Intelligence
CIO
End User Engineer
Research Products and Group Security Business Partner
Temporary Deputy Chief Constable
Cybersecurity
Security Compliance and Assurance Manager
Deputy CISO and Security Operations Lead
Information Systems Development Analyst
VP, Cyber Security
Senior IT Manager
Head of Governance, Risk & Compliance
CISO
Assistant Director - Head of CNI Policy & Cyber
Security Adviser
EMEA Cybsersecurity Lead, Digital IT
Junior IT Helpdesk Associate
Security Analyst
Solutions Architect
Associate Director - Information Security
Cyber Risk & Assurance Manager
Information Security Manager
Special Agent
CISO - Corporate Functions
IT Operational Security Manager
IT Security, Risk and Control Assurance
UK&IE Information Security Specialist
Executive Director of Digital and Technical Services
Audit and Risk Assurance Committee
Identity and Security Analyst
Global Vulnerability Manager
Senior Cybersecurity Architect
Detective Constable
IT Security Officer
Vice President, EMEA Regulatory Engagement Team
Digital Specialist
Senior Cyber Operations Engineer
Director-Insider Threat
Gp Capt
Chief Information Officer
Senior Project Audit Manager
Resilience Risk Senior Digital Manager
Director of IT
CTO

Companies

Kargo Commerce
MasterCard
Holland & Barrett
Hill & Smith PLC
Masonic Charitable Foundation
British Medical Association (BMA)
Boden
National Crime Agency (NCA)
Halma plc
Howdens Joinery
The London Clinic
Northern Trust
NatWest Group
Financial Services Information Sharing and Analysis Center (FS-ISAC)
Just Eat
African Development Bank (AfDB)
Lebara
Savills Plc
Walkers Global
AXA XL
Pearson
Salary Finance
Just Eat
Cadent Gas
Envelop Risk Analytics Ltd
CIMB
Metropolitan Police Service
Gemfields
Pinsent Masons LLP
Pay.UK
DPD (UK)
Mizuho
Körber Supply Chain Software
IKEA Group
PwC
NorthStandard
Cognassist
Whitbread PLC
Alpha Group (Alpha FX)
Pepper Money UK
University College London (UCL)
JD Sports Fashion plc
Mizuho
BT
Ministry of Justice
Virgin Media O2
Saint-Gobain Group
NHS Counter Fraud Authority (NHSCFA)
AEGIS London
Macmillan Cancer Support
Walkers Global
IKEA Group
British Army
Hutchison 3G UK Ltd t/as Three UK
Helaba (Landesbank Hessen Thuringen)
Atomos
Virgin Atlantic Airways
US Bank
Canada Life
Mishcon de Reya LLP
Tilbury Douglas
M&C Saatchi Ltd
Rentokil Initial
Pentland
MUFG - Mitsubishi UFJ Financial Group
HSBC
Babylon Health
Shawbrook Group plc (Shawbrook Bank)
The AA
Simmons & Simmons
MUFG - Mitsubishi UFJ Financial Group
Cabinet Office
Atcore Technology
Currys plc
Cadent Gas
Santander
UK Home Office
Sky
LV=
University Hospitals Birmingham NHS Foundation Trust
Costa Coffee
HSBC
Alesther
Portakabin
Gousto
Ocado
NHS England
Bupa Global
M&C Saatchi Ltd
Deutsche Bank Group
Shakespeare Martineau
Philip Morris International
SilverRail Technologies
Savills Plc
Greene King
IKEA Group
UnityLink Financial Services Limited
Essex County Council
Shrewsbury Food Hub
Just Eat
Healthcare RM
Mawdsleys
Bank of England
Legal & General
Cabinet Office
University of Leicester
WHSmith
JPMorgan Chase & Co.
Nationwide Building Society
Acrisure Re
Department for Business Energy and Industrial Strategy (BEIS)
Kingfisher plc
Metropolitan Police Service
Just Eat
HSBC
TUI Group
UK Civil Service
GAM Investments
Thomas Miller
British Medical Association (BMA)
Tilbury Douglas
Crawford & Company
AXA
University of Leicester
NSPCC
Virgin Media O2
HSBC
Maritime and Coastguard Agency
The Wellcome Trust
LSEG (London Stock Exchange Group)
Cinch
Oxford Instruments
Financial Times
Bank of America Merrill Lynch
Sky
John Lewis Partnership
Lloyds Banking Group
LCH
Commerzbank
Senior Plc
Alderney Gambling Control Commission (AGCC)
Reward Gateway
Square Enix
Citigroup
Rail Delivery Group
Sky
DHL
Zurich Insurance Group
MarkerStudy
American Express
Premier Foods
Tevva Hydrogen Electric Trucks
Met Office
University of the Arts London
Europe Arab Bank
MUFG - Mitsubishi UFJ Financial Group
Biosite Systems Ltd
National Trust
National Crime Agency (NCA)
Standard Bank Group
National Highways
Northern Trust
Travelers Insurance
MUFG - Mitsubishi UFJ Financial Group
BBC
Hiscox
Commerzbank
Virgin Media O2
Airwair International Ltd - Dr Martens
Barclays
Embark Group
A.P. Moller - Maersk
Legal & General
UnityLink Financial Services Limited
RiskSTOP Group Ltd
Legal & General
Airwair International Ltd - Dr Martens
Business France
Bank of England
IKEA Group
Royal Borough of Kensington and Chelsea
Orbital
Excello Law
Suffolk Building Society
Cancer Research UK (CRUK)
Santander
Pearson
Condé Nast
Frasers Group
Bank of England
Doctor Care Anywhere
Bank of Ireland
Apple
Unilever
Gemfields
Coventry Building Society
Pimlico Academy
ScottishPower
Pepper Money UK
The Church of England
Diligenta
Envelop Risk Analytics Ltd
Allianz Holdings Plc
Australian Federal Police
Clarks
Metropolitan Police Service
MasterCard
Munich Re
Government Legal Department
British Transport Police
Raymond James Financial
Global Witness
GoHenry
Pay.UK
Diligenta
Unilever
GSS UK Services Limited
Santander
Sainsbury's
IKEA Group
Metropolitan Police Service
BMT GROUP
Berkeley Insurance Group UK Ltd
Pearson
A.P. Moller - Maersk
Department for Science Innovation and Technology
Heathrow
Intellect Design Arena Ltd
Citizen Housing Group
London Metal Exchange
Just Eat
Macquarie Group
Royal Bank of Canada (RBC)
Rentokil Initial
LSEG (London Stock Exchange Group)
M&G plc
Canon
Credit Suisse
Airwair International Ltd - Dr Martens
Pearson
Deutsche Bank Group
British Army
Atkins
Sumitomo Mitsui Banking Corporation
JD Sports Fashion plc
MUFG - Mitsubishi UFJ Financial Group
University of Sussex
Royal Canadian Mounted Police
Sainsbury's
Moneycorp
The Travel Corporation
All Saints Retail Ltd
Auctane
Financial Conduct Authority
Unum
Philip Morris International
MasterCard
American Express
Mizuho
NatWest Group
Woven by Toyota
JPMorgan Chase & Co.
Lumanity
The Electoral Commission
Cabinet Office
Pinsent Masons LLP
Gowling WLG
Education Development Trust
Harbour Energy
Whitbread PLC
Ocado
Paragon Customer Communications
Bird & Bird LLP
Which?
Brambles Industries
Cancer Research UK (CRUK)
Pimlico Academy
Société Générale Corporate and Investment Banking (SGCIB)
Canon
Amazon
FIS Global
Metropolitan Police Service
Credit Suisse
The Wellcome Trust
Department for Transport (DfT)
G-Research
Police Service of Northern Ireland
Sky
High Speed Two (HS2) Ltd
The Francis Crick Institute
University of Kent
Credit Suisse
The Honourable Society of Lincoln's Inn
Mesmerise Group
Brit Insurance
Cabinet Office
HM Passport Office (HMPO)
Canon
Buckles Solicitors LLP
StoneX Group Inc.
Kaplan Inc
Morae Global
Heathrow
Pearson
U.S. Secret Service
Credit Suisse
Queen Mary University of London
NEST Corporation (National Employment Savings Trust)
IKEA Group
Staffordshire University
Department for Business and Trade
Toyota PLC
Just Eat
Coventry Building Society
Metropolitan Police Service
Citizen Housing Group
JPMorgan Chase & Co.
IKEA Group
Department for Transport (DfT)
Unilever
Uk Strategic Command
Synthomer
HSBC
HSBC
Eltham College
Colossus Bets

Industries

Other Industry
Banking
Retail
Manufacturer
Charity
Association
Retail
National Law Enforcement
Electronic/Electrical Equipment
Retail
Healthcare Services
Banking
Banking
Banking
Retail
Banking
Telecommunications
Real Estate
Legal
Insurance
Media
Banking
Retail
Oil/Gas
Insurance
Banking
Regional Law Enforcement
Mining/Metals
Legal
Banking
Transportation/Shipping
Banking
Machinery
Retail
Accounting/Auditing
Insurance
Healthcare Services
Travel/Leisure/Hospitality
Banking
Banking
Education
Retail
Banking
Telecommunications
Central Government
Telecommunications
Manufacturer
Healthcare Services
Insurance
Charity
Legal
Retail
Military
Telecommunications
Banking
Banking
Travel/Leisure/Hospitality
Banking
Insurance
Legal
Construction
Media
Other Industry
Retail
Banking
Banking
Healthcare Services
Banking
Automobiles/Parts
Legal
Banking
Central Government
Travel/Leisure/Hospitality
Retail
Oil/Gas
Banking
Central Government
Media
Insurance
Healthcare Services
Retail
Banking
Oil/Gas
Construction
Retail
Transportation/Shipping
Healthcare Services
Healthcare Services
Media
Banking
Legal
Food/Beverage/Tobacco
Software/Hardware
Real Estate
Food/Beverage/Tobacco
Retail
Banking
Regional Government
Charity
Retail
Healthcare Services
Pharmaceuticals
Banking
Insurance
Central Government
Education
Retail
Banking
Banking
Insurance
Central Government
Retail
Regional Law Enforcement
Retail
Banking
Travel/Leisure/Hospitality
Central Government
Banking
Insurance
Association
Construction
Insurance
Insurance
Education
Charity
Telecommunications
Banking
Central Government
Charity
Banking
Machinery
Manufacturer
Media
Banking
Media
Retail
Banking
Banking
Banking
Manufacturer
Central Government
Media
Casinos/Gaming
Banking
Transportation/Shipping
Media
Transportation/Shipping
Insurance
Insurance
Banking
Food/Beverage/Tobacco
Manufacturer
Central Government
Education
Banking
Banking
Software
Charity
National Law Enforcement
Banking
Transportation/Shipping
Banking
Insurance
Banking
Media
Insurance
Banking
Telecommunications
Retail
Banking
Banking
Transportation/Shipping
Insurance
Banking
Other Industry
Insurance
Retail
Central Government
Banking
Retail
Regional Government
Banking
Legal
Banking
Charity
Banking
Media
Media
Retail
Banking
Healthcare Services
Banking
Electronic/Electrical Equipment
Household/Personal Products
Mining/Metals
Banking
Education
Electricity
Banking
Other Industry
Consultancy
Insurance
Insurance
National Law Enforcement
Retail
Regional Law Enforcement
Banking
Insurance
Legal
National Law Enforcement
Banking
Charity
Banking
Banking
Consultancy
Household/Personal Products
Banking
Banking
Retail
Retail
Regional Law Enforcement
Other Industry
Insurance
Media
Transportation/Shipping
Central Government
Transportation/Shipping
Banking
Charity
Mining/Metals
Retail
Banking
Banking
Other Industry
Banking
Banking
Electronic/Electrical Equipment
Banking
Retail
Media
Banking
Military
Industrial Engineering
Banking
Retail
Banking
Education
National Law Enforcement
Retail
Banking
Travel/Leisure/Hospitality
Retail
Software
Regulator
Insurance
Food/Beverage/Tobacco
Banking
Banking
Banking
Banking
Automobiles/Parts
Banking
Research
Central Government
Central Government
Legal
Legal
Education
Oil/Gas
Travel/Leisure/Hospitality
Transportation/Shipping
Software
Legal
Media
Transportation/Shipping
Charity
Education
Banking
Electronic/Electrical Equipment
Retail
Banking
Regional Law Enforcement
Banking
Charity
Central Government
Research
National Law Enforcement
Media
Transportation/Shipping
Research
Education
Banking
Legal
Software/Hardware
Insurance
Central Government
Central Government
Electronic/Electrical Equipment
Legal
Banking
Education
Legal
Transportation/Shipping
Media
National Law Enforcement
Banking
Education
Banking
Retail
Education
Central Government
Automobiles/Parts
Retail
Banking
Regional Law Enforcement
Charity
Banking
Retail
Central Government
Household/Personal Products
Other Industry
Commercial Chemicals
Banking
Banking
Education
Casinos/Gaming


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, UK, SW1V 1EQ
Telephone: 0333 400 6140

Directions:
Please click here