The Future of IT

CIO Think Tank

March 30, 2023 - London, UK


Finbarr Joy
Senior Advisor

Think Tank Speaker

International Technology executive, with an established record for transforming global organisational performance through Digital innovation. Accomplished conference / keynote speaker with a wealth of insights to inspire your forum. From engineer to board member, via startup co-founding, global consulting, and FTSE 100 executive experience, has also led Product Management, Customer Services operations, Business Development, and M&A teams, complementing a comprehensive leadership capability profile.
March 30, 2023


All times United Kingdom Time
10:00 AM-10:45 AM
Welcome & Registration

10:45 AM-11:00 AM
Thought Leadership
The Human Firewall: How to Create a Culture of Cyber Security?

When it comes to information security, many companies still focus on IT security and the technical protection of systems. Employees are often seen as the weakest link in a very complex chain, as 70% of all attacks today are aimed at people and only 30% at systems. However, this is a fallacy. Properly trained, employees can make an essential and valuable contribution to raising the overall level of security and are the most important building block of an all-encompassing security strategy. Therefore, all companies should focus on increasing the awareness of their employees. But how to build a successful awareness campaign that sensitizes employees to the topic of information security in the long term is presented in this session.

11:05 AM-12:00 PM
Vision Keynote Panel
CXO’s Role in Employee Retention

Over the last decade, the ability to understand and utilise existing, new and upcoming technologies has been a critical enterprise success factor. As a result, the need for capable and qualified leaders, whether front-line Analysts, mid-level Managers, or top level CXO’s is at an all-time high. However, the availability of personnel with the necessary skills is sinking to an all-time low. There simply is not enough expertise to go around, or is there? In this environment, senior leaders must express creativity in their pursuit of the people, performance, and passion necessary to address this capability shortfall.

12:00 PM-12:55 PM
Lunch & Innovation Showcase

12:55 PM-1:10 PM
Lunch & Disruptor Showcase
Supply Chain Technology

Many large enterprises in today’s fiercely competitive climate look toward optimizing its supply chain to increase business scale and agility. By harnessing a combination of technologies like artificial intelligence, machine learning, and predictive analytics, companies can automate and create new customer experiences that increase satisfaction and boost sales. Gaps remain in supply chain cyber security even as digitalization accelerates. By doing so, companies are left vulnerable to the growing risk of a cyber-attack. There is no shortage of stories illustrating the dangers of lax cyber security, with the biggest attacks able to utterly paralyze an operation and cause millions in losses. Despite this obvious danger, efforts to improve cyber security are progressing slowly. Future risks to the supply chain will involve software, cloud-based infrastructures, and hyper-converged products, rather than simply hardware. Even after many years of experience, capable CISOs find they may not be equipped to overcome the cybersecurity concerns that arise from building control contractors.

In partnership with

1:10 PM-1:25 PM
In Cyber Security, is Prevention Better Than The Cure?

How can organisations stay ready to defend against cyber threats, so they don’t have to respond in a rush?

In a world of increasingly damaging cyber attacks, organisations need effective strategies to stay ahead of threats and drive a proactive security posture. But the nature of the threats can be hard to measure. How can you manage what you don’t know? How can you secure what you don’t manage?

Organisations need to ask key questions. What assets do we have? What is running on our IT estates? What goes in and out of our network? These are hard questions to answer. But to keep safe, visibility is key. We need to know what we look like to an attacker if we are to defend ourselves. Only with this knowledge can we maintain readiness to respond to new and unexpected dangers.

In partnership with

1:30 PM-2:15 PM
How to Optimize your Security Data and reduce SOC TCO with Data Pipelines

Securing your organisation no longer comes down to acquiring the right tools and building the best policies. Additionally, managing the flood of noisy, high volume security data means the difference between detecting a breach and missing a critical alert. Join this session to learn how data pipelines put choice and control over data back into the hands of security teams, helping get the right data, in the right formats, to the right places, all while reducing your SOC TCO

Charlie Howe
Cribl, Inc.
Roben Leonard
Thames Technology
Florian Jörgens
Vorwerk SE & Co. KG
Florian Jörgens initially developed his professional interest in information technology in 2002. Whilst working as an IT specialist for system integration at T-Systems International GmbH, in application and system support he earned his BSc. in Business Information Systems. Gaining further experience in IT auditing at PricewaterhouseCoopers and completing a MSc. in IT Management, Florian Jörgens then worked for E.ON in Essen as a manager leading information security for their entire German sales organization. In March 2019, as Chief Information Security Officer at LANXESS AG in Cologne, he took over holistic responsibility for the Group's information security. Today, he is Chief Information Security Officer of the Vorwerk Group. Additionally, he is active as a keynote speaker, lecturer, author and research assistant at various universities. Furthermore, he gives expert lectures on the topics of information security, awareness and cyber security. Florian Jörgens was awarded the Digital Leader Award in the category "Cyber-Security" by CIO magazine in September 2020.
Khadir Fayaz
VP CISO, Cybersecurity
Khadir Fayaz is a progressive Cyber Security Digital Executive Leader with more than 18 years of experience in driving large scale digital security initiatives, cyber resiliency programs and business information security engagements. Delivered successfully global digital security transformational programs with multi-million dollar investments. Transformed security as an enabler and accelerator for the business through frictionless services to meet both compliance & privacy requirements such as PCI DSS and GDPR. Dynamic, metrics-driven leader of international and virtual teams’ adept at integrating people, business processes, and technology assets into effective risk reduction strategies to elevate organizational security posture from external and internal threats. Significantly improved the risk culture and security maturity in some of the world’s largest PropTech, Learning, FMCG, Financial, Manufacturing, Technology Consulting, Hospitality & Travel companies. Built strong customer and business partner relationships, effective teams across the full spectrum of information security services. Hired and developed global talent, and operated truly globally having extensive hands-on experience in Asia Pacific, UK and USA. A highly sought-after speaker who has contributed immensely to the industry through tech start-up mentoring and holding non-executive director roles.

In partnership with

2:15 PM-2:35 PM
Networking Break

2:35 PM-3:20 PM
Zero Trust Network

A zero trust approach to security has been steadily gaining steam for the last several years. The importance of this approach reached a new level with the May 2021 White House executive order requiring federal agencies to shift to this architecture by fall 2024.

Ransomware continues to grow and clearly as remote work became the new norm, and e-commerce increased. Leaders need to establish a mature level of cyber resilience to better handle ransomware and other potential data breaches. Luckily, zero trust can play a critical part in that strategy as more and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. Will Zero Tolerance for Trust redefine the state of security as government and private industry scrutinize their trusted relationships more, and re-evaluate the ‘who, what, why’ in 2023 more than any other year?

Cornelius Namiluko
VP Global Co-Head Security Architecture (Cloud & Infrastructure)
Goldman Sachs
I am an experienced software and systems security engineer with over five years experience in various industries including health, consulting and internet services. I am interested in working on challenging software design and implementation problems within the areas of web technologies, mobile computing, big data and general distributed systems. I am proficient in Java, C# and JavaScript (including Node.js) and I can quickly pick up any new technology. I have worked on various implementations of data driven systems that utilise databases such as MySQL, MS SQL Server, MongoDB, Redis and Casandra. My specialities include software architecture design. security analysis, programming, application of agile methodologies and data extraction algorithm design.
Ledum Maeba
Head, Information Security
Avanti HYLAS 2 Limited
Ledum oversees all aspects of Security - Quality Assurance, Information / Cyber Security & Business Continuity Management for Avanti globally. He has successfully led the company through re-certification, surveillance, internal audits & implementation activities including training & consultancy. Ledum is a Certified Lead Auditor, Certified Internal Auditor, Certified Lead Implementer & Chartered Quality Professional. He previously worked at DHL, IT Governance, Connect Plus Services (M25 Motorway). Ledum is a graduate of Biochemistry & Computer Programming.
Neil Thacker
Neil Thacker, a cybersecurity executive and co-founder holds over 20 years’ experience in the cybersecurity and technology industry. As Netskope Chief Information Security Officer EMEA, Neil works alongside product and engineering teams to ensure the secure delivery of Netskope technology and services. With a focus on data protection and regulatory compliance, Neil works with Netskope customers to ensure their security programmes are both optimised and can deliver on their strategic requirements in a cloud-first world. Prior to joining Netskope, Neil served at Swiss Re, Deutsche Bank, Camelot Group and Forcepoint. Neil is co-founder and board member of the Security Advisor Alliance (SAA), a not-for-profit organisation formed to both help security leaders in their role and to promote information security and cybersecurity careers to future generations. Neil is Advisory Board member for the Cloud Security Alliance (CSA) EMEA and member of the ENISA Threat Landscape stakeholder group where he contributes to the EU agency program to position the threat landscape, mitigation advice and threat analysis and innovation. Neil is Advisory Board member to NeuroCyber, supporting and coordinating national activity, awareness, knowledge and action on improving neurodiversity and inclusion in cybersecurity. Neil is CISSP, CIPP/E and CEH certified and is a frequent speaker and writer on cybersecurity, data protection and privacy-related topics.
Dorian Skeete
Head, Information Security
Dorian Skeete is the Head of IT Security at Boohoo Group, where he is responsible for IT Security, Data Protection and Privacy across their 13 brands, including household names like Pretty Little Thing, BoohooMAN and Karen Millen. Day to day, Dorian looks after a team of 10, while delivering on a multi-year cybersecurity strategy including advisory for the Boohoo Risk Committee and Board, increasing IT Security capability and professional development of his staff. Prior to Boohoo, Dorian was the IT Security Lead at Advantage Smollan and an Associate Director at Crossword Cybersecurity, while spending his formative years as an RF and Cyber Engineer for the Ministry of Defence. With more than 10 years IT Security experience, Dorian has worked on several valuable projects including IT transformation, ISO 27001 and Cyber Essentials certification, Security Awareness improvement and improving businesses overall IT Security posture. When not dealing with the fast-paced environment of a world-leading fashion brand, Dorian enjoys sport (especially football and F1), travel, exercise and is a self-proclaimed foodie.

3:25 PM-4:00 PM
Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.

Sachin Gaba
Managing Director-Head of Software Development / Lead Architect
State Street
Sadiq Sani
Adviser and Senior Lecturer in Cybersecurity
University of Greenwich
Shikha Hornsey
Chief Digital Information Officer
Crown Commercial Service
Phil Scully
VP Digital & EMEA Technology
RS Group plc

4:00 PM-4:20 PM
Networking Break

4:20 PM-5:05 PM
The Greatest Fears?

The biggest fear for CISOs is often human error, typified by a distracted user that falls for a well-crafted social engineering email. Secure email gateways fail to catch business email compromises and security analysts struggle to keep up with the flood of user-reported suspicious emails. How can we truly create a culture of security while also making the best use of a cybersecurity leader’s most precious resource – people?

5:10 PM-5:55 PM
Promoting & Enabling Women in Tech to Succeed

How do we come together, as a group of professionals, to create and foster an inclusive tech world where all women have a role to play? We know that a major part of this is attracting and retaining talent at every level but how exactly do we do that and where can we use technology to help? Our panelists will discuss how their companies are creating more inclusive environments, the use AI tools to help uncover hidden biases, what flexibility looks like for all team members and how they are advancing women earlier and signing them up for long term success.

Shweta Gupta
VP Global Transformation Manager
Deutsche Bank
Marina Brilleman
Global IT Manager
British American Tobacco
Adrian Leung
Group DPO

5:55 PM-6:00 PM
Closing Remarks & Raffle Giveaway

6:00 PM-7:00 PM
Cocktail Hour