Agenda

08:00 - 09:00

Breakfast Networking Break

09:00 - 09:10

Chairs Welcome

09:10 - 09:30

►Defining and Securing AI Responsibilities in Financial Service

Ioan Nascu, GenAI Security Assurance specialist, Citi 

  • Introducing a pragmatic framework that clarifies cybersecurity accountabilities between financial institutions and AI providers
  • Leveraging familiar IaaS, PaaS, and SaaS structures to map security responsibilities for AI systems
  • Applying the model to Foundation Models to support secure and responsible AI adoption
  • Enabling a flexible, high-level approach tailored to the financial sector’s evolving needs
09:30 - 09:50

►The Imperative for Cyber Resilience in Financial Services

Guy Batey, Head of Specialist Engineering EMEA, Rubrik

  • Attack Reality: Hyper-innovation and Industrialized AI are accelerating attacks, rendering traditional prevention ineffective and expanding the regulatory/technological attack surface
  • Strategic Mandate: The security posture must adopt the "Assume Breach" Mandate, acknowledging inevitable compromise
  • Shift in Focus: Security emphasis must move from perimeter control to robust in-network capabilities
  • Core Pillars: The strategy hinges on rapid Detection, effective Response, and, most critically, Rapid Recovery of business operations post-compromise
  • Ultimate Metric: Cyber Resilience—the capacity to withstand the attack and reliably recover—is the only meaningful metric for protecting firm stability and meeting regulatory obligations
09:50 - 10:10

►Getting Supply Chain Risk Management Right

Evie Wild, Information Security Officer, EMEA Region, LBBW Bank

  • How to build a culture that drives quality awareness and early risk detection
  • How to apply focused due diligence and tiering to target the highest-impact risks
  • How to empower SMEs and shift left to influence decisions before they solidifGetting supply chain risk management right
  • How to control hidden risks by addressing shadow IT/procurement and gating spend before payment
10:10 - 10:50

►Education Seminar 1

Delegates will be able to choose from a range of topics:

  • Transparent AI & Automation: Taking Control of Phishing Defence, James Hickey, Principle Sales Engineering, Cofense
  • Beyond Compliance: Securing AI-Driven Financial Services Against Insider Risk and Emerging Threats, Sven Dehnert, Principal Solutions Consultant, OpenText 
10:50 - 11:20

Networking Break

11:20 - 11:40

►The Calming of the "Cs"

Gill Fenney, Former Head of IT Risk Governance, Bupa

  • Compliance - the ever increasing burden on Financial Services
  • Complexity - the nuances of various compliance commitments
  • Cost - the cost of attaining and maintaining compliance
  • Chaos - the risk of an unstructured approach
11:40 - 12:00

►Mapping Criminal Infrastructure: Reducing Financial Exposure from Abused RDP and Bulletproof Hosting

Nick Palmer, Technical Lead, Censys

  • Criminal groups use resilient hosting and abused remote access to sustain ransomware and fraud
  • Censys + honeypots map patterns in exposed RDP and bulletproof hosting
  • Persistent infrastructure increases ongoing financial risk
  • Actionable signals help prioritize mitigation despite unclear attribution
12:00 - 12:20

►AI in the Financial Trenches: Securing Digital Trust

Paul Fearns, Senior Enterprise Security Architect, EMEA, Akamai Technologies

  • Recognise emerging AI-enabled attack patterns in financial ecosystems
  • Learn controls that prevent prompt-injection, model-poisoning, and synthetic automation
  • Understand frameworks to align AI security with FFIEC, NIST, and OWASP guidance
12:20 - 12:25

►Zero Trust Controls at the Endpoint

Raphael Marranghello, Account Executive, Threatlocker

  • Discover how ThreatLocker applies Zero Trust at the endpoint, eliminating implicit trust by continuously verifying every application, executable, and action before authorisation
  • Learn how a deny-by-default, malware-proofing approach reduces ransomware risk, stopping unauthorised software and scripts even when other security layers are bypassed
  • Understand how least-privilege enforcement limits attacker capability, ensuring applications and users can perform only explicitly approved actions on enterprise devices
  • Explore how granular, policy-based endpoint control safeguards against modern threats, reducing enterprise exposure to ransomware and other advanced attacks
12:25 - 13:05

►Education Seminar 2

Delegates will be able to choose from a range of topics:

  • Shadow API: Find Them, Test Them, Fix What Matters, Mark Schembri, Field Software Engineering Manager, Invicti Security
  • Adopting AI Across the Workforce with Confidence, James Derbyshire, Cybersecurity Entrepreneur, Harmonic Security
13:05 - 14:00

Lunch Networking Break

14:00 - 14:30

►Securing the AI Revolution in Banking, Insurance and Asset Management

Adam Avards, Principal for Cyber and Third Party Risk Policy, UK Finance (Moderator)
Steph Phelps, Global Operational Resilience Specialist, RGA
Claire Schrader, Senior Responsible AI Lead, AI Centre of Excellence, Lloyds Banking Group
Gill Fenney, Former Head of IT Risk Governance, Bupa
Ioan Nascu, GenAI Security Assurance specialist, Citi

For security leaders, the challenge is stark: how do you secure these systems, ensure compliance, and maintain resilience when the technology itself is evolving faster than the controls designed to protect it?

  • Future-Proofing Security: Designing adaptive governance and security frameworks that evolve alongside AI, rather than always playing catch-up
  • DORA and AI Compliance: How the Digital Operational Resilience Act reshapes resilience expectations in banking, insurance, and asset management, especially for fast-evolving AI systems
  • Securing the AI Supply Chain: Managing third-party and model risks, from external data providers to cloud-based AI platforms, in line with DORA’s ICT risk requirements
  • Balancing Innovation and Control: Embedding resilience testing and security guardrails without stifling AI-driven innovation
14:30 - 14:50

►Keeping Security Teams Sharp in the Absence of Incidents

Steve Armstrong-Godwin, Lead of Security Incident Response and Threat Management, Danske Bank

  • Experience-led insights into keeping security teams sharp when incidents are rare but stakes remain high
  • Practical methods for building confidence and coordination through low-friction, high-impact exercises
  • Design principles for simulations and training that fit real-world constraints, not fantasy budgets
  • Tactics to avoid drift, burnout, and complacency—without waiting for a crisis to galvanise the team
14:50 - 15:10

►The new CISO deal 

Ryan Virani, Founder, Cyber Moves LTD 

  • CISO and Head of Security briefs have changed in the last 2–3 years
  • What “good” now looks like in successful CISO appointments, from a talent and behaviours perspective
  • Snapshot of current salary and day-rate ranges for CISOs and Heads of Security 
  • Where mandate, support and reward are misaligned, and what CISOs are now asking for before they say yes
15:10 - 15:30

Networking Break

15:30 - 16:00

►Panel Discussion: Beyond Compliance — Building Cyber Resilience That Actually Works

Simon Brady, Event Chairman, AKJ Associates (moderator) 
Jonathan Freedman, Director of Technology & Security, Howard Kennedy 
Jonathan Turner, Head of Cyber Security, Farrer & Co 
Federico Iaschi, Information Security Director, Starling Bank
Will Packard, Director - Operational Resilience, Ernst & Young LLP

  • How do we turn risk appetite statements into real decision levers instead of paperwork?
  • With NIS2 and similar rules, what does “appropriate and proportionate” really mean on the ground — and how can risk management steer the response?
  • What cyber metrics really matter — and how do we prove our risk posture to the Board, to clients, and across the entire supply chain, right down to nth-party dependencies?
  • How does a resilience-first mindset transform culture — moving from blame and unrealistic prevention to readiness, adaptability, and fast recovery?
16:00 - 16:00

Closing Remarks

16:00 - 17:00

Drinks Reception

Education seminars


Adopting AI Across the Workforce with Confidence


James Derbyshire, Cybersecurity Entrepreneur, Harmonic Security

Organisations across industries are accelerating their use of AI to improve efficiency, remain competitive, and empower employees. Financial services firms, in particular, face mounting pressure to innovate while adhering to strict regulatory expectations and protecting highly sensitive data. As AI becomes woven into everyday workflows through sanctioned tools, embedded features, and a long tail of unsanctioned applications, leaders must determine how to safely enable broad adoption without introducing new operational, compliance, or security risks. 

This session examines the real patterns emerging inside enterprise environments as AI usage expands. Drawing on observed behavior across hundreds of companies, we will break down why legacy assumptions about control no longer hold true. Employees increasingly rely on personal accounts, free tier tools, and AI powered SaaS features, often without awareness of where their data is going or how it may be retained. These shifts create new exposure pathways, from inadvertent sharing of regulated information to interactions with models that train on user inputs. 

Building on these insights, the session offers a practical framework for safe, scalable AI enablement. Rather than relying on restrictive blocks that inadvertently drive shadow adoption, organisations are beginning to apply intelligent guardrails that monitor AI usage, detect sensitive data, and enforce policy in real time. This approach supports responsible experimentation while ensuring regulatory alignment and reducing the likelihood of costly data mishandling. Attendees will leave with actionable guidance for operationalising AI governance in complex, regulated environments and a clear understanding of how leading firms are balancing innovation with risk.

Attendees will learn:

  • The realities of enterprise AI adoption and why usage is now distributed and often unsanctioned
  • The most common exposure patterns and governance gaps emerging across financial services and other regulated industries
  • How to establish guardrails that detect sensitive data, understand user intent, and enforce policy without hindering productivity
  • A practical framework for enabling responsible AI use that supports innovation, oversight, and continuous monitoring

Shadow API: Find Them, Test Them, Fix What Matters


Mark Schembri, Field Software Engineering Manager, Invicti Security

Financial institutions are rapidly expanding their API ecosystems to power banking, payments, trading, and partner integrations. Yet many security teams still lack complete visibility into the APIs operating across their environment. Undiscovered or “shadow API” introduces hidden risk—creating pathways for data exposure, fraud, and non-compliance.

In this session, you will learn how you can apply Invicti’s multilayered approach to API discovery and schema reconstruction. Once discovered, you test these APIs with the industry's best API DAST. Validating difficult-to-find vulnerabilities like BOLA and BLFA, business logic errors, and the presence of weak authentication with proof-based scanning to achieve AppSec’s charter that only secure APIs reach production.

Attendees will learn:

  • Discover hidden APIs 
  • Improve governance 
  • Identify unmanaged APIs 
  • Align with OWASP Top 10 for API 

Transparent AI & Automation: Taking Control of Phishing Defence


James Hickey, Principal Sales Engineering, Cofense 

In today’s rapidly evolving threat landscape, email remains a primary attack vector for cybercriminals. Whilst AI tools seem an ideal solution, the reality is that they come with risks and limitations leaving organisations vulnerable. Join us for an insightful session where we will explore how to build resilient phishing defence that stays ahead of emerging threats by balancing automation and human expertise.

Attendees will learn:

  • The Power of Live Threat Data: Learn why real-time threat intelligence is critical for robust email protection and how it can help you stay one step ahead of attackers
  • Crowdsourced Intelligence Without the Risks: Discover how to leverage the collective power of crowdsourced threat data while mitigating potential privacy and security concerns
  • AI and Automation in Phishing defence: Understand the optimal roles of AI and automation in detecting, preventing, and responding to email-based threats

Beyond Compliance: Securing AI-Driven Financial Services Against Insider Risk and Emerging Threats


Sven Dehnert, Principal Solutions Consultant, OpenText

AI is transforming UK financial services, but it’s also expanding the attack surface faster than traditional controls can adapt. Under the FCA’s Operational Resilience framework, firms must evidence resilience across critical services while managing new risks introduced by AI models, agentic workflows, and opaque supply chains. This session goes beyond compliance to show how behavioral analytics and insider-risk detection can safeguard AI-enabled operations without drowning SOC teams in alerts. Delegates will leave with a clear roadmap for aligning insider-threat detection with FCA resilience requirements while addressing emerging AI-driven risks that traditional rules and signatures simply can’t catch.

Attendees will learn:

  • The new insider-risk challenge in an AI-first world: Why credential misuse, lateral movement, and data exfiltration now intersect with adversarial AI exploits and model drift
  • Bridging FCA resilience mapping with NCSC insider-risk guidance: Practical steps to embed detection into SOC workflows and demonstrate resilience
  • Behavioral AI in action: How OpenText Core Threat Detection & Response (Core TDR) integrates with Microsoft Defender for Endpoint and Microsoft Entra ID to deliver MITRE-aligned, plain-language insights that accelerate investigations and cut through noise