10th November 2026
Hilton London Canary Wharf
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Hilton London Canary Wharf
Days
Hours
Minutes
How to manage enterprise level projects and deploying cybersecurity technologies to very complicated infrastructures and environments. How to manage risks, issues and stakeholders with effective governance structures.
BIO
As a Cybersecurity Programme Manager at HSBC I have extensive experience delivering high-value projects and programmes exceeding $200,000,000. In addition to my cybersecurity expertise, I am also a bodybuilder, offering unique insights at the intersection of security, leadership, transformation, and wellbeing. I believe my perspective can bring a fresh and engaging dimension to your audience, and I’d be delighted to discuss potential opportunities further.
Cyber resilience is more than just a technology issue. Understand why cyber governance is key to becoming cyber resilient
BIO
With over 25 years as a Partner at both KPMG and BDO, George joined IASME in 2023 ISAME and is currently the Head of IASME Cyber Assurance. George brings a perspective based on helping businesses become cyber resilient in a cost-effective manner. Having also worked on a number of cyber breaches, it became clear that the key denominator in all those breaches was the lack of effective cyber governance. Not only will he focus on good practice, but he will also highlight key frameworks that can help and how you can demonstrate compliance to your own organisation and to your wider supply chain.
A ransomware attack has locked down your organisation’s systems and the hackers are playing games. Literally.
They claim they only needed one set of stolen credentials to get in. Now, they’ve given you the five suspects, five possible methods of compromise, and five locations it could have happened.
If your team can crack the case and identify the right combination, they’ll have over the decryption key. Get it wrong? Game over.
BIO
A decade of Cyber Security sales working with some of the worlds biggest brands on GRC transformation programmes has led Mike to partner with Amy in bringing new solutions to established problems. Supporting organisations to ensure end user engagement as the foundation of security awareness projects, programmes and events; the Cyber Escape Room Co are proud to partner with nationally and internationally recognised brands to maximise security initiative impacts.
Have we gone too far down the rabbit hole without actually understanding the problem?
While the world spends ever-more on security technology, the outcomes keep getting worse. In this presentation we’ll look into why things aren’t working and explore how simple easy to understand concepts already in use in many other industries can lead not just to better security outcomes, but better business as well.
BIO
Greg van der Gaast boasts a distinguished, yet diverse, 25+ year career in information security and cybersecurity. Deemed one of the World’s Top 5 Most Infamous Hackers and an FBI most-wanted, Greg now uses his expertise as a force for good – having since worked as an undercover FBI and DoD operative. Driving change in information security practices, Greg shares his in-depth understanding of how to maintain the security of data as a business-minded CISO and cutting-edge technical consultant. Aside from his business commitments, Greg is also sought after as a keynote speaker – sharing his expertise on how organisations can protect themselves from cyber threats with unconventional approaches.
This presentation exposes the language in fraudulent communications; exploring how legitimacy and credibility are maintained while the interaction movesto requests for money. It reveals the techniques that normalize and mitigate intimate and financial requests that would otherwise cause the victim concernand shows how this can be used to protect the public from future frauds.
BIO
Dr Elisabeth Carter is a criminologist and forensic linguist who conducts interdisciplinary research at the intersection of language and the law. She is bestknown for her work in examining fraudulent interactions, particularly romance and investment fraud. Elisabeth writes research papers, journal articles, cross-sector briefings and books, and regularly features in national TV and radio series, podcasts and print media, talking about fraud, deception, grooming andcompliance. She uses her research to support law enforcement campaigns, drive police operations, deliver training in practical strategies to disrupt thepower of fraudulent communications across the public, private and third sector, and safeguard people in positions of vulnerability.
Step into the CISO’s shoes during a ransomware attack and explore the real-time decisions, intelligence, and dilemmas faced in the first 24 hours of a livecyber crisis.
BIO
Paul Colwell is Chief Information Security Officer at Wavenet, bringing over two decades of deep technical and leadership experience across cyber security, cloud and enterprise IT. Paul has held senior roles including Chief Technology Officer at Wavenet, and Technical Director at both CyberGuard Technologies and OGL Computer Group. Known for his hands-on innovation and strategic foresight, Paul has built a reputation for developing cutting-edge cloud solutions and forming impactful technology partnerships. He is a cyber security visionary, with a passion for helping businesses navigate the constant evolution of the threat and cyber-attack landscape.
In an age where every click leaves a trace, navigating the balance between sharing and security is crucial. Discover how to protect your digital identity and exactly how hackers exploit your personal information.
BIO:
Ben is an internationally recognised expert in covert operations, surveillance and digital intelligence with over 23 years’ experience working at the very height of national security, military operations and now the private sector. Ben also stars in the global hit TV show, Hunted. He now films the Australian version which was the most popular TV show in Australia since 2015 with Season 1. Ben is also known as the ‘Digital Spy’, giving talks across the world to keep clients and businesses safe from the bad guys.
BIO
Tony provides advice and training on situational awareness and counter terrorism.
He has previously worked in the corporate sector responsible for fraud and revenue assurance systems at several large multinationals along with running large project management departments.
Tony gained an MBA in 1995 and decided to return to university in 2016 to study for his Masters In Counter Terrorism at UCLAN.
Tony is a Fellow at the Chartered Institute of management and the Institute of Strategic Risk Management and a member of the Security Institute.
In this seminar, Martin Byford-Rew will introduce the concept of 2S2C, which stands for Standardising, Simplifying, Consistency, and Compliance. This approach advocates for the standardisation and simplification of digital and technology provisions in educational & other settings to achieve consistency and compliance with statutory and advisory obligations. Martin will discuss the common pitfalls of adopting new technologies without considering their integration with existing systems, leading to inefficiencies and increased costs. By adhering to the 2S2C framework, institutions can ensure their technology systems are more predictable, easier to support, and compliant with relevant obligations, ultimately enhancing the effectiveness and financial sustainability of their digital and technology initiatives.
BIO:
With 27 years’ experience of working in ICT within Education, culminating as the Head of Digital Systems at the King Edward VI Foundation, I am currently leading a project to on-board multiple schools onto a single Microsoft 365 tenant. I strive to standardise and simplify systems and solutions to bring about consistency and compliance for all users and the organisation. I believe that ICT should be transparent to the user. IT should just work. It should enable users to access the services they need when they need them using resilient secure systems that are easy to support, minimise repetition using automation where appropriate to do so and are sustainable in the current era.
I have a demonstrable track record of working in the primary/secondary education including project managing the onboarding of seven schools into the trust using a common digital strategy and approach, maximising available resources to deliver a centralised ICT department capable of supporting the needs of a growing trust now and into the future. I believe that the key to success of any organisation lays in the strength of its staff and the way in which they are developed and given opportunities to grow to positions where they enjoy a fulfilled and productive experience.
I am skilled in Educational Technology, People Management, Business Development and IT Operations and maintain an awareness of current trends and developments within areas which may present as candidates for use within the Education sector.With 27 years’ experience of working in ICT within Education, culminating as the Head of Digital Systems at the King Edward VI Foundation, I am currently leading a project to on-board multiple schools onto a single Microsoft 365 tenant. I strive to standardise and simplify systems and solutions to bring about consistency and compliance for all users and the organisation. I believe that ICT should be transparent to the user. IT should just work. It should enable users to access the services they need when they need them using resilient secure systems that are easy to support, minimise repetition using automation where appropriate to do so and are sustainable in the current era. I have a demonstrable track record of working in the primary/secondary education including project managing the onboarding of seven schools into the trust using a common digital strategy and approach, maximising available resources to deliver a centralised ICT department capable of supporting the needs of a growing trust now and into the future. I believe that the key to success of any organisation lays in the strength of its staff and the way in which they are developed and given opportunities to grow to positions where they enjoy a fulfilled and productive experience. I am skilled in Educational Technology, People Management, Business Development and IT Operations and maintain an awareness of current trends and developments within areas which may present as candidates for use within the Education sector.