Agenda
| 08.00 - 09.00 |
Breakfast Networking Break |
| 09.00 - 09.10 |
Chair's Welcome |
| 09.10 - 09.30 |
►From Cybersecurity to Real, Risk-Based Exposure Management: the True Power of Resilience Steve Davies, Head of Cyber Security, DLA Piper
|
| 09.30 - 09.50 |
Akamai - presentation to be announced |
| 09.50 - 10.10 |
►Evolving Threats to Law Firms: Adversary Tactics, Detection, and Defense Ekow Oduro, IT Security Operations Lead, Forsters LLP
|
| 10.10 - 10.50 |
►Education Seminar 1 Delegates will be able to choose from a range of topics:
|
| 10.50 - 11.20 |
Networking Break |
| 11.20 - 11.45 |
►Collaborating Securely: Addressing Cyber Risks in Chambers Partnerships Eleanor Ludlam, Partner - Cyber, Privacy and Technology Litigation, Pinsent Masons (Moderator)
|
| 11.45 - 12.05 |
►European Cyber Threats Exposed: CrowdStrike Threat Briefing Mark Ward, Senior Regional Sales Engineer, Crowdstrike
|
| 12.05 - 12.25 |
►Internal Audit – Bridging the Gap Between Aspirations and Reality Mark Penlington, Head of Risk, Resilience and Internal Audit, Irwin Mitchell LLP
|
| 12.25 - 13.05 |
►Education Seminar 2 Delegates will be able to choose from a range of topics:
|
| 13.05 - 14.00 |
Lunch Networking Break |
| 14.00 - 14.05 |
►Zero Trust Controls at the Endpoint Thomas Jenkins, Account Executive, Threatlocker
|
| 14.05 - 14.30 |
►Fireside Chat: Mitigating Concentration Risks in an Interconnected Business Landscape Simon Brady, Event Chairman, AKJ Associates (moderator)
|
| 14.30 - 15.10 |
►Education Seminar 3 Delegates will be able to choose from a range of topics:
|
| 15.10 - 15.30 |
Networking Break |
| 15.30 - 16.00 |
►Panel Discussion: Beyond Compliance — Building Cyber Resilience That Actually Works Simon Brady, Event Chairman, AKJ Associates (moderator)
|
| 16.00 - 16.00 |
Chairman's Closing Remarks |
| 16.00 - 17.00 |
Drinks Networking Reception |
Education seminars
Safe AI Adoption for Law Firms: Guardrails that Protect Clients (and your Firm)
James Derbyshire, Cybersecurity Entrepreneur, Harmonic Security
Legal teams are embracing AI to accelerate research, improve client service, and streamline operations. Yet as firms adopt tools ranging from GenAI assistants to AI-enabled practice software, they face a dilemma: how to encourage innovation while upholding strict client commitments, confidentiality obligations, and regulatory requirements.
This session explores how leading legal firms are moving quickly on AI adoption while implementing the controls needed to avoid data exposure, ethical missteps, and compliance violations. Attendees will learn where the most common governance gaps occur, the types of AI-related risks that frequently go unnoticed, and how to establish practical guardrails that protect sensitive information without slowing lawyers down.
Drawing on real patterns observed across law firms of all sizes, the talk outlines a clear framework for responsible AI enablement. You will leave with a deeper understanding of how to safely operationalise AI in a legal environment and how forward leaning firms are putting structure around experimentation, oversight, and continuous monitoring.
Attendees will learn:
- The most common AI driven exposure patterns in legal workflows and why they occur
- Where governance gaps arise as firms introduce both sanctioned and unsanctioned AI tools
- Practical guardrails that balance innovation with confidentiality, client commitments, and regulatory duties
- How progressive firms are enabling responsible internal AI use while maintaining full compliance
Attacked at Machine Speed, Defended at the Speed of Dave in the SOC
Thom Langford, EMEA CTO, Rapid7
Budgets are tight, your team is stretched thin, and the business is (very) demanding. What CAN you do to get the most out of your people, investments and technology? How can you turn data into action; moving from drowning in alerts to executing precise, high-impact remediations.
Attendees will learn:
- Augmenting your response time with AI and human expertise
- Shifting to Managed eXtended Detection and Response to unify visibility across your estate
- Proactively staying on the right side of the regulators
Beyond Questionnaires: Rethinking Supply Chain Security in Law Firms
Justin Kuruvilla, Chief Cyber Security Strategist, Risk Ledger
Organisations across all sectors rely on increasingly complex digital supply chains, from cloud services and software providers to managed services and specialist vendors. Each connection introduces supply chain risk, yet many security and risk teams still depend on point-in-time assessments that struggle to reflect how risk changes over time. In this session, Risk Ledger will explore the fundamentals of supply chain risk and security, focusing on why visibility is often limited, where blind spots typically emerge, and how organisations can start to untangle complex supplier ecosystems. We will examine why questionnaire-led approaches alone are no longer sufficient, how external and continuous signals can complement existing governance processes, and what a more resilient, defensible approach to supply chain security can look like in practice. The session will also cover how organisations can prioritise effort, reduce noise, and focus on the suppliers that matter most. This session is designed for leaders looking to better understand supply chain risk, build stronger foundations for continuous assurance, and make more informed risk decisions regardless of sector.
Attendees will learn:
- A clearer understanding of how supply chain cyber risk emerges and evolves
- Insight into common visibility gaps and why they persist
- Practical principles for moving beyond point-in-time assessments
- A framework for prioritising suppliers and focusing on what matters most
Turning Employees Into your First Line of Defence
Sam Hook Hoxhunt
Martyn Styles, Bird & Bird
Security awareness that actually scales.
Attendees will learn:
- Humans and security - People will always be vulnerable to scams, so Infosec teams must focus on education and building a strong “suspicious bone”
- Low effort for Infosec - Hoxhunt largely runs itself, requiring minimal setup and ongoing management from busy security teams
- Practical demo - Live demonstration of realistic phishing simulations and how easy it is to set up effective security awareness training