The Future of Cybersecurity

CISO Think Tank

October 3, 2025 - London, UK

VISIONARIES

KHADIR FAYAZ (Placeholder) CBRE
Khadir Fayaz

SVP Digital & Technology

CBRE

Think Tank Speaker

Khadir Fayaz is a progressive Cyber Security Digital Executive Leader with more than 18 years of experience in driving large scale digital security initiatives, cyber resiliency programs and business information security engagements. Delivered successfully global digital security transformational programs with multi-million dollar investments. Transformed security as an enabler and accelerator for the business through frictionless services to meet both compliance & privacy requirements such as PCI DSS and GDPR. Dynamic, metrics-driven leader of international and virtual teams’ adept at integrating people, business processes, and technology assets into effective risk reduction strategies to elevate organizational security posture from external and internal threats. Significantly improved the risk culture and security maturity in some of the world’s largest PropTech, Learning, FMCG, Financial, Manufacturing, Technology Consulting, Hospitality & Travel companies. Built strong customer and business partner relationships, effective teams across the full spectrum of information security services. Hired and developed global talent, and operated truly globally having extensive hands-on experience in Asia Pacific, UK and USA. A highly sought-after speaker who has contributed immensely to the industry through tech start-up mentoring and holding non-executive director roles.

October 3, 2025

Agenda

All times United Kingdom Time

9:00 AM-9:30 AM

Welcome & Registration


9:30 AM-10:00 AM

Network Breakfast


10:00 AM-10:10 AM

Opening Remarks


10:10 AM-10:35 AM
Vision Voices Keynote

Bridging the Gap: Mastering the Art of Business-Technology Harmony

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs and CISOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


10:40 AM-11:05 AM
Keynote

Empower Users with Identity - Navigating to Decentralised Identity

In an age of rampant data breaches and identity theft, empowering users, including your workforce and customers, to autonomously handle and share personal data is reshaping the identity landscape.

Explore decentralised identity principles with us to:
1. Empower your users to securely manage and control personal data, make anonymous identity claims without unnecessary exposure and explicitly authorise data visibility on a need-to-know basis
2. Reduce attack surfaces and minimise risk of breaches tied to vulnerable centralised authorities to enhance organisational privacy and security.

In partnership with:
Ping Identity

11:05 AM-11:25 AM

Coffee Break


11:25 AM-11:40 AM
Vision Voices

Cyber Hygiene 2024: Building a Secure Future in the Digital Era

In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2024, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.


11:45 AM-12:20 PM
Fireside Chat

Adapting to the Cybersecurity Revolution: Unleashing AI for Effective Defence

As the digital landscape undergoes a seismic transformation,  navigating the complexities of the evolving cybersecurity terrain is becoming increasingly difficult. So how do you adapt to the Cybersecurity Revolution unfolding in front of us? Join us to explore the indispensable role of artificial intelligence in contemporary defense strategies and why organisations must embrace AI as a linchpin for fortifying their security posture.

In partnership with:
SentinelOne

12:20 PM-1:20 PM

Lunch & Disruptor Showcase


1:00 PM-1:15 PM
Lunch & Disruptor Showcase

Zero Trust Network

A zero trust approach to security has been steadily gaining steam for the last several years. The importance of this approach reached a new level with the May 2021 White House executive order requiring federal agencies to shift to this architecture by fall 2024.

Ransomware continues to grow and clearly as remote work became the new norm, and e-commerce increased. Leaders need to establish a mature level of cyber resilience to better handle ransomware and other potential data breaches. Luckily, zero trust can play a critical part in that strategy as more and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. Will Zero Tolerance for Trust redefine the state of security as government and private industry scrutinize their trusted relationships more, and re-evaluate the ‘who, what, why’ in 2024 more than any other year?


1:20 PM-2:05 PM
Panel

Securing Data: The Strategic Imperative for CISOs in the Age of Analytics

In the era of vast data proliferation, CISOs are pivotal in safeguarding organizational information. It is imperative for CISOs to orchestrate meticulous data management strategies, ensuring the accuracy, security, and accessibility of data. This involves establishing robust protocols for data collection, storage, analysis, and strict adherence to data privacy regulations. Moreover, CISOs must harness the power of advanced analytics tools to extract meaningful insights, uncover trends, and identify opportunities within the data ecosystem. By leveraging these insights, CISOs empower informed decision-making, foster business growth, and elevate the customer experience. In today's competitive landscape, mastering data security and harnessing the potential of security analytics are paramount for CISOs, enabling their organizations to make data-driven decisions and maintain a competitive edge.


2:10 PM-2:25 PM
Disruptor

Ransomware and Cyber Readiness

Ransomware attacks are in the headlines, affecting businesses and individuals in all sectors. Through 2024, these attacks have continued to grow, resulting in significant financial losses, data theft, and reputational damage. Even businesses that have achieved a level of cybersecurity compliance remain at risk unless they have understood what impact a ransomware attack really means in the context of their business. 
The good news?  When you have identified how to protect your business from a ransomware attack you have already defined what needs to be done to reduce your total cyber risk exposure across all levels of attack.

Ransomware might be the most reported attack, but is nowhere near the most expensive or damaging cyber attack you might face.

In partnership with:
Zero Networks

2:25 PM-2:45 PM

Networking Break


2:45 PM-3:20 PM
Fireside Chat

Cloud in the Storm: Security Challenges in an Era of Remote Work and Rapid Innovation

According to Gartner 79% of companies have experienced at least one cloud data breach during the pandemic. Remote work is here to stay, and the concept of securing a perimeter has essentially ended. Traditional application security measures are broken. The need to innovate faster and shift to cloud-native application architectures isn’t just driving complexity, it’s creating significant vulnerability blind spots also.
Under the thumb of the pandemic, enterprises and IT leaders had to look for tech solutions that were resilient and agile to empower the remote workforce. To sustain business continuity plans, organizations shifted workloads to the cloud. As much as cloud adoption offers flexibility and productivity, it also exposes organizations to cyber threats and data breaches. So, the question remains if moving to the cloud is the right thing to do and if so how to protect it from the new risks given that most organizations believe that application security should be completely automated to keep pace with dynamic clouds and rapid software development practices. 


3:25 PM-3:40 PM
Vision Voices

Infinite Horizons: Unleashing the Potential of Generative AI in Shaping Future IT Landscapes

Let's explore the transformative power of generative AI technologies and their profound impact on the strategic vision of CIOs. This keynote delves into innovative applications of generative AI, ranging from creative content generation to advanced problem-solving, providing CIOs with insights on how to leverage these technologies to enhance operational efficiency, foster innovation, and navigate the evolving digital landscape. Attendees will gain a deep understanding of generative AI's potential, empowering them to drive their organizations towards a future where limitless possibilities meet strategic IT excellence.


3:45 PM-4:30 PM
Panel

Cultivating Inclusive Excellence: Driving Diversity in Technology Leadership

Let's explore the imperative of diversity in technology leadership roles, particularly within the CIO and Security domain. From gender and ethnicity to varied professional backgrounds, diverse perspectives foster innovation, resilience, and better decision-making in today's rapidly evolving tech landscape. Join us as industry leaders share their experiences, insights, and strategies for promoting inclusivity, breaking down barriers, and empowering underrepresented groups in technology leadership roles. From fostering inclusive cultures within organisations to implementing proactive recruitment and mentorship initiatives, attendees will gain actionable insights to drive meaningful change and cultivate diverse, high-performing technology teams. Let's chart a course towards inclusive excellence in technology leadership together.


4:30 PM-4:35 PM

Closing Remarks & Raffle Giveaway


4:35 PM-5:35 PM

Cocktail Hour