UPCOMING EVENT

The Technology Chapter 2.0 

"Pioneering the Future of Technology & Security: Innovating a Secure Digital Landscape"

Date: 23rd-24th October 2024

Location: Fairmont Windsor Park, Englefield Green, Egham

Where experience meets investment.

ABM Alliance The Technology Chapter
ABM Alliance The Technology Chapter
ABM Alliance The Technology Chapter
  •  

    Natwest Logo

     

  •  

    TJX_Logo.svg

     

  •  

    Morrisons Logo

     

  •  

    Lloyds-1

     

  •  

    Centirica

     

  •  

    Aston Martin Logo

     

  •  

    ISG-logo

     


  • Sky_Master_Brand_Logo_LARGE_RGB

     

  •  

    LSE_Logo.svg

     

  •  

    Untitled design-4

     

Untitled design-Dec-19-2023-02-42-25-3597-PM

Industry Analysis
Glean the knowledge of your peers to shape your organisation's future 

Untitled design (1)-2

Peer-Led
Workshops, Fireside Chats & Keynote Addresses

Untitled design (2)-1

1 on 1 Meetings
Strategic BANT-qualified meetings based on project alignment 

Untitled design (3)-1

Custom Agenda
Be in control of your own agenda. Maximise your experience.

THE TECHNOLOGY CHAPTER

Audience

We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

70+
Senior Executives

12
Solution Partners

6:1
Executive to Solution Partner Ratio  

54%
C-Suite Executives

46% 
SVP, VP, Director & Head 

Agenda

DAY ONE


18:30 - 19:00

Welcome Drinks Reception

Kickstart your summit experience and meet new peers with drinks and canapés


19:00 - 21:30

Gala Dinner

Enjoy a 3-course silver service dinner in the Monarch Suite and hear from some special guest speakers 

Host: Adam Burns

Keynote Speaker: Matt Webb, CIO at UK Power Networks

Robin Smith, CISO - Aston Martin (15)-2

 


21:30

Drinks & Networking

Continue conversations and building relationships in the 1215 Bar


Agenda

DAY TWO


07:30 - 08:30

Breakfast 

Fuel up for a full day of networking, experiences and content


08:30 - 09:15

Welcome Address

Signature Keynote: Tata Communications

tatacommunicationslogo-1024x205-1


09:20 - 10:00

Driving Efficiency: The Impact of Digital Transformation and Automation

Accelerating digital transformation through process automation, digital workflows, and intelligent automation (IA) technologies is becoming increasingly crucial for businesses aiming to streamline operations and enhance productivity. By investing in robotic process automation (RPA), low-code/no-code development platforms, and enterprise resource planning (ERP) systems, organisations can optimise processes, reduce manual workloads, and drive efficiency. These efforts not only improve operational effectiveness but also position companies to better respond to dynamic market demands.

Key Takeaways:

  • Enhanced Operational Efficiency: Investing in RPA, low-code/no-code platforms, and ERP systems streamlines processes, reduces manual workloads, and significantly boosts productivity.
  • Agility and Responsiveness: Digital transformation enables businesses to quickly adapt to market changes, enhancing their ability to respond to customer needs and competitive pressures effective.

Robin Smith, CISO - Aston Martin (2)-2

Fortifying Cyber Defences in the Age of AI-Driven Threats: Is Your Enterprise Ready for the Next Attack?

Enterprises of all sizes are today entrenched in a cyber war where AI has become a critical weapon, increasingly used by threat actors and nation-state attackers. In 2024 alone, AI-driven ransomware attacks on organisations surged by 30%, and AI-enhanced phishing attacks rose by 15%. According to the latest cyber report from the World Economic Forum, over 50% of Executive Leaders now believe that AI is tipping the scales in favour of attackers. The question is: Are your enterprise's cyber defences prepared to withstand an AI-driven DDoS attack delivering 398 million requests per second?

Key Takeaways:

  • How attackers are leveraging AI to tilt the cyber battlefield in their favour.
  • Best practices for secure AI deployment and harnessing AI's potential for an effective offensive strategy.

Robin Smith, CISO - Aston Martin (5)-2

Vendor Risk Management: Safeguarding Your Supply Chain from Cyber Threats

Take a deep dive into establishing robust vendor risk management processes to assess and mitigate cybersecurity risks linked with third-party vendors and suppliers. Learn how to develop effective strategies for evaluating vendor security practices, identifying potential vulnerabilities, and implementing risk mitigation measures. You will gain insights into safeguarding your supply chain against cyber threats, ensuring the security and resilience of their organisation's operations.

Key Takeaways:

  • Effective Vendor Risk Assessment: Discover methodologies for conducting thorough assessments of vendor cybersecurity practices to identify and mitigate potential risks associated with third-party relationships.
  • Enhancing Supply Chain Security: Learn strategies for strengthening the security of your supply chain by implementing robust vendor risk management processes, thereby reducing the likelihood of cyber incidents and maintaining business continuity.

Robin Smith, CISO - Aston Martin (8)-1

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 


10:05 - 10:45

Demo & Innovation 

See first-hand how latest products and services can influence your business


10:45 - 11:00

Networking Break 

Take a break and reflect on the morning's content with peers


11:00 - 11:40

Elevating Customer Experience: Strategies for Digital Engagement

Enhancing customer experience through digital channels is vital for maintaining customer satisfaction and loyalty. CIOs must focus on investing in customer relationship management (CRM) systems, omnichannel engagement platforms, and personalised marketing technologies. These tools enable businesses to provide seamless, consistent, and personalised interactions across all digital touchpoints, ultimately improving customer satisfaction and fostering long-term loyalty.

Key Takeaways:

  • Improved Customer Satisfaction: Investing in CRM systems and omnichannel engagement platforms ensures consistent and personalised customer interactions, enhancing overall satisfaction and loyalty.
  • Personalised Marketing: Utilising personalised marketing technologies allows for targeted, relevant customer communications, driving engagement and strengthening customer relationships.

Robin Smith, CISO - Aston Martin (6)-2

Securing Microsoft Copilot: Preventing Prompt-Hacking and Data Exposure

Microsoft Copilot has been called one of the most powerful productivity tools on the planet, taking drudgery out of daily work. But Copilot is a different beast than ChatGPT and other AI tools because it has access to everything you’ve ever worked on in Microsoft 365, and therein lies the hidden risks for information security teams. During this session, we’ll show you just how easily your company’s sensitive data can be exposed using Microsoft Copilot with simple prompts. Our team will then share practical steps and strategies to ensure a secure Microsoft Co-pilot rollout and prevent prompt-hacking data exposure.

Robin Smith, CISO - Aston Martin (14)-3

Mastering Cloud Network Infrastructure: Streamlining Complexity and Boosting Efficiency

In today's evolving multi-cloud environments, organisations face growing challenges in managing their network infrastructure. This interactive workshop will address the key complexities of seamlessly connecting clouds, rising operational inefficiencies, and costs driven by outdated architectures. You will explore practical strategies for improving flexibility, reliability, and performance, while aligning your infrastructure to meet the demands of modern cloud architectures. Whether you're looking to overcome inefficiencies or unlock the full potential of your multi-cloud deployment, this workshop will equip you with actionable insights to optimise your network infrastructure for the cloud era.

Key Takeaways:

  • Learn strategies to streamline complex cloud network architecture for improved operational efficiency and cost management.
  • Gain insights into tools that can enhance flexibility and performance, maximising the potential of your multi-cloud environment.

tatacommunicationslogo-1024x205-1

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 


11:45 - 12:30

Panel Discussion: Building Trust with CIOs and CISOs in the Modern Procurement Landscape

Hear from Industry leading CIOs and CISOs about best practices and approaches to capture attention and cut through the noise in a crowded procurement marketplace. The discussion aims to equip vendors with actionable approaches to strengthen trust, drive collaboration, and enhance their reputation within the IT and security landscape.  
 
Robin Smith, CISO - Aston Martin (14)-2
 
Robin Smith, CISO - Aston Martin-3
 
Robin Smith, CISO - Aston Martin (1)-4
 
Robin Smith, CISO - Aston Martin (13)-3

12:30 - 13:30

Lunch 

Buffet Lunch


13:30 - 14:00

Keynote with Q&A - Evolution of Enterprise Data Security Challenges in the AI and Rampant Ransomware Era

Data is the key strategic asset for every organisation. Data provides competitive differentiation, acts as a source of growth and innovation, and fuels informed decision making. It is also a source of risk with liabilities associated with data security breaches. In this session we will look into the recent trends of bad actors targeting not only integrity and availability, but also confidentiality of enterprise data. We will also explore dramatic shifts of data security priorities with the explosive growth of sanctioned and unsanctioned AI/ML applications. Finally, we will review best practices of leveraging zero trust approach to minimise and control data security risks.
 

Robin Smith, CISO - Aston Martin (1)-2

    


14:05 - 14:45

Shielding the IoT/OT Frontier: Combating Ransomware with a Zero Trust Mindset

As the Internet of Things (IoT) and Operational Technology (OT) sectors expand, they face unprecedented risks from a surge in ransomware and malware attacks, threatening critical infrastructure and business continuity. This talk will explore the growing vulnerability landscape within the IoT/OT market, highlighting real-world incidents and the costly impacts of security breaches. Attendees will gain insights into the weaknesses that cybercriminals exploit and why traditional security measures are no longer sufficient. We will delve into the Zero Trust security model—a bold, proactive approach that assumes no user or device can be trusted by default. By implementing Zero Trust principles, organizations can fortify their IoT/OT environments against evolving threats, ensuring robust defenses that go beyond the perimeter. Get ready to reimagine security strategies and empower your organization to stay one step ahead of the attackers.

Robin Smith, CISO - Aston Martin (13)-2

Mastering Cloud Security: Advanced Techniques in Zero Trust, Encryption, and Identity Management

This session focuses on enhancing cloud security posture through advanced security controls, encryption, identity management solutions, and Zero Trust principles tailored to cloud environments. Understand how to implement robust security measures that ensure data protection and regulatory compliance. The workshop covers essential strategies for securing cloud infrastructure, protecting sensitive data, and managing identities effectively in the cloud while integrating Zero Trust principles to ensure that no entity—whether inside or outside the network—is trusted by default.

Key Takeaways:

  • Implementing Zero Trust Principles: Gain practical knowledge on integrating Zero Trust architecture into your cloud security strategy, ensuring that every access request is rigorously authenticated, authorized, and continuously monitored, regardless of its origin.
  • Advanced Protection Techniques: Learn how to deploy advanced security controls and encryption methods specifically designed for cloud environments, effectively safeguarding sensitive data and ensuring compliance with regulatory requirements.

Robin Smith, CISO - Aston Martin (5)-3

Leveraging AI and Machine Learning for Advanced Cybersecurity and IT Operations

Discover the transformative impact of AI and Machine Learning on cybersecurity and IT operations. This workshop explores how these technologies can be harnessed for proactive threat detection, automated response mechanisms, and predictive maintenance. Participants will gain practical skills to implement AI-driven solutions that enhance security posture and operational efficiency. Essential concepts, tools, and best practices will be covered, equipping IT professionals to effectively navigate the evolving landscape of digital threats and operational challenges.

Key Takeaways:
  • Proactive Threat Detection and Automated Response: Understand how AI and Machine Learning algorithms can swiftly identify and neutralise security threats in real-time, thereby reducing the risk of breaches and minimising response times through automation.
  • Predictive Maintenance for IT Operations: Learn how predictive analytics can anticipate and prevent IT infrastructure failures, ensuring smoother operations and decreasing downtime by proactively addressing potential issues before they escalate.

Robin Smith, CISO - Aston Martin (9)-1

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 


14:50 - 15:30

Demo & Innovation

See first-hand how latest products and services can influence your business


15:30 - 15:45

Networking Break

Take a break and reflect on the afternoon's content with peers


15:45 - 16:20

Security Awareness as a Practice

In today's digital landscape, cultivating Security Awareness as a Practice is crucial for safeguarding organisational assets. This workshop will explore strategies for embedding security consciousness into daily operations, fostering a culture of vigilance among employees. We'll examine practical steps for continuous education and proactive threat identification.

Key Takeaways:

  • Continuous Education: Regular, engaging training sessions are vital to keep employees updated on emerging threats and best practices, ensuring they remain vigilant and informed.
  • Proactive Threat Identification: Empowering staff to recognise and report suspicious activities early can prevent potential breaches and mitigate risks effectively.

Robin Smith, CISO - Aston Martin (10)-2

Embracing Sustainability: The Role of CIOs in Driving Green IT Initiatives

In today's environmentally-conscious world, businesses are prioritising sustainability to mitigate their impact on the planet. For Chief Information Officers (CIOs), this means focusing on green IT initiatives such as energy-efficient data centres, sustainable IT practices, and technologies that reduce environmental footprints. Aligning these efforts with corporate social responsibility (CSR) goals can enhance corporate image and achieve cost efficiencies while contributing to environmental preservation.

Key Takeaways:

  • Energy Efficiency and Resource Optimization: Investing in energy-efficient data centres, virtualization, and sustainable IT practices reduces energy consumption and operational costs, minimising environmental impact.
  • Aligning with Corporate Social Responsibility (CSR) Goals: Integrating green IT initiatives with CSR strategies improves public image, attracts eco-conscious stakeholders, and ensures long-term sustainability.

Robin Smith, CISO - Aston Martin (11)-2

How Zero Trust Can Help Address NIS2 Compliance?

NIS2 exists because our society and economy and the organizations that operate within are fully dependent on IT infrastructures today and NIS2 was updated to reflect the fact that cybersecurity risks are escalating.

In simple terms, we want the productivity to work from anywhere, with always accessible applications and data, so we allow for a hybrid workforce and placing more and more sensitive data in public clouds and SaaS applications. We want things like automating business processes and empowering end customers to self-serve certain tasks. But doing all this also increases the attack surface and makes IT infrastructure more attractive targets. In an interactive workshop, we’ll turn theory into practice and demonstrate how these scenarios and architectures can be implemented in the real world.

Key practical questions we’ll address:

  • Securing access to self-hosted apps on an hybrid cloud and workforce environment
  • How to properly secure SaaS applications, both managed and unmanaged
  • Threat defense strategies for the hybrid workforce
  • The integration between WAN and Zero Trust environments

Robin Smith, CISO - Aston Martin (14)-2

Strategic, predetermined and agreed meetings based on project alignment with executives and vendors.


16:25 - 16:45

Closing Remarks


16:45 - 17:30 

Drinks & Nibbles

Close off the event and final opportunity for networking.


JOIN US

Register Interest

Meet with fellow industry leaders and solve today’s greatest business challenges.

ABM-icon3-1

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

ABM-icon3-1

Join the Executive Community 

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.

CONTACT

Get in Touch