top of page

18

Years of Industry Experience

global-GRC.white-png.png

GRC, Data Privacy & Cyber Security Conference

LONDON, UK

MARCH 2026

08:00 AM – 05.30 PM Approx. Local Time

KEY THEMES

Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Who Attends?

The GRC, Data Privacy, and Cybersecurity Conference gathers 100-150 senior-level professionals responsible for governance, risk, compliance, data protection, and cybersecurity within their organizations. The event also welcomes law firm partners and technology service providers offering cutting-edge legal and cybersecurity solutions.

Senior Leadership & Executives

  • Chief Legal Officer (CLO)

  • Chief Compliance Officer (CCO)

  • Chief Risk Officer (CRO)

  • Chief Privacy Officer (CPO)

  • Chief Information Security Officer (CISO)

  • Chief Data Officer (CDO)

Legal, Compliance & Risk Professionals

  • General Counsel

  • Head of Legal & Compliance

  • Risk & Compliance Director

  • Privacy Counsel / Data Protection Officer (DPO)

  • Regulatory Affairs Director

  • Corporate Governance Manager

Cybersecurity & IT Professionals

  • VP / Director of Cybersecurity

  • Information Security Manager

  • Data Protection Specialist

  • Cyber Risk Manager

  • IT Governance Manager

Technology & Solution Providers

  • GRC & Compliance Technology Providers

  • Cybersecurity & Risk Management Solution Providers

  • Data Privacy Technology Providers

  • AI & Machine Learning Experts in Legal Tech

  • Cloud Security & Identity Management Providers

  • RegTech & LegalTech Innovators

ABOUT THE SPEAKERS

Events 4 Sure & GeneralCounsel360 present a distinguished lineup of GRC, Privacy & Security leaders from global corporations. Speakers will share expert insights, strategies, and guidance on key agenda topics.

KEY SPEAKERS
Mark Anderson.jpg
insightful (2).jpg

Mark Anderson

​Product Owner,

Insightful Technology

Nick Rich.jpg
exterro-lo_edited.jpg

Nick Rich

Strategic Accounts

Exterro

Sofoklis Karapidakis.png
met.png

Sofoklis Karapidakis

Compliance Director and DPO, Metlen Energy & Metals

Frank Vukovits.jpg
del.jpg

Frank Vukovits

Chief Security Scientist,

Delinea

Matthew Ginn.png
lam.jpg

Matthew Ginn

Data Protection Officer,

London Borough of Lambeth

Nicola Lishak.png
ro.jpg

Nicola Lishak

Director of Privacy and DPO,

Royal Mail

Gary Brown.png
wes.jpg

Gary Brown

Chief Privacy Officer,

Westinghouse Electric Company

Giulia Carnà.jpg
aci.jpg

Giulia Carnà

Global Senior Privacy Lawyer,

ACI Worldwide

AGENDA PROGRAM

(One on One Introductions & Meetings Format)

(08:00 AM – 05.30 PM Approx. Local Time)

08:00 AM – Onwards  |  Conference Registration & Networking Refreshments

  • Kickstart the event with registration, accompanied by tea, coffee, and networking with speakers, sponsors, and fellow delegates

08:00 AM – 09:00 AM  |  Introductions & Peer-to-Peer Meetings

Indicative Focus Areas:

Regulatory Compliance & AI – AI & POPIA, cross-border risks, financial sector
Cyber Resilience – Ransomware, public sector risks, digital identity fraud
Third-Party Risk – Telecom security, vendor compliance, automation
Data Privacy & Compliance – POPIA enforcement, AI risk, data localization
GRC Automation – Real-time monitoring, cloud compliance, legal tech

09:00 AM – 09:40 AM  | Collaborative Round Table Discussions

Navigating the Complex Regulatory Landscape: Adapting to POPIA, GDPR, and Beyond in South Africa

  • Recent updates in POPIA and their implications for businesses

  • The intersection of GDPR and South African regulations: Opportunities and conflicts

  • Strategies for managing compliance across multiple jurisdictions

  • Leveraging technology for compliance automation

  • Lessons from regulatory enforcement actions in South Africa

09:40 AM – 10:00 AM  |  Keynote Address

(A leading service provider delivers a powerful, insight-rich keynote that offers exceptional value, helping the audience learn, reflect, and apply practical solutions)

Transforming GRC with Technology: The Future of Governance, Risk, and Compliance Management

10:00 AM – 10:10 AM  |  Exclusive Case Study Presentation

(A service provider showcases innovative solutions addressing key industry challenges aligned with the conference theme)

10:10 AM – 10:50 AM  |  Collaborative Round Table Discussions

Protecting Critical Infrastructure: Building Cyber Resilience for South Africa's Key Sectors

  • Identifying vulnerabilities in South Africa's critical infrastructure

  • Cyber resilience strategies for the energy and financial sectors

  • Regulatory compliance for critical infrastructure protection

  • The role of AI and IoT in critical infrastructure cybersecurity

  • Case studies of cyberattacks on critical sectors and lessons learned

10:50 AM – 11:10 AM  |  Keynote Address

(A leading service provider delivers a powerful, insight-rich keynote that offers exceptional value, helping the audience learn, reflect, and apply practical solutions)

AI-Powered Cybersecurity: Enhancing Threat Detection and Mitigation in the Age of Advanced Persistent Threats

11:10 AM – 11:20 AM  |  Exclusive Case Study Presentation

(A service provider showcases innovative solutions addressing key industry challenges aligned with the conference theme)

11:20 AM – 11:40 AM  |  Refreshments 

  • Enjoy a tea break while networking and engaging in peer-to-peer discussions

11:40 AM – 12:20 PM  |  Collaborative Round Table Discussions

Cross-Border Data Transfers and Sovereignty: Ensuring Compliance While Maintaining Business Agility

  • POPIA compliance for cross-border data flows

  • Managing compliance with divergent global data privacy laws

  • Cloud storage and cross-border risks: Challenges and solutions

  • Tools for real-time monitoring of data transfers

  • Ensuring accountability when outsourcing data processing

12:20 PM – 12:30 PM  |  Exclusive Case Study Presentation

(A service provider showcases innovative solutions addressing key industry challenges aligned with the conference theme)

12:30 PM – 01:30 PM  |  Peer-to-Peer Meetings

Indicative Focus Areas:

Regulatory Compliance & AI – AI & POPIA, cross-border risks, financial sector
Cyber Resilience – Ransomware, public sector risks, digital identity fraud
Third-Party Risk – Telecom security, vendor compliance, automation
Data Privacy & Compliance – POPIA enforcement, AI risk, data localization
GRC Automation – Real-time monitoring, cloud compliance, legal tech

01:00 PM – 02:00 PM  |  Lunch Break & Informal Networking

  • Enjoy a networking lunch with speakers, sponsors, and fellow delegates

02:00 PM – 02:40 PM  |  Collaborative Round Table Discussions

ESG Integration in Risk Management: Meeting Compliance Standards and Achieving Sustainability Goals

  • Regulatory drivers for ESG compliance in South Africa

  • Managing environmental risks within the GRC framework

  • Social compliance: Addressing labor rights and diversity challenges

  • Governance risks: Ensuring transparency and accountability

  • The role of technology in tracking and reporting ESG metrics

02:40 PM – 02:50 PM  |  Exclusive Case Study Presentation

(A service provider showcases innovative solutions addressing key industry challenges aligned with the conference theme)

02:50 PM – 03:30 PM  |  Collaborative Round Table Discussions

Staying Ahead of the Curve: Addressing Advanced Cyber Threats in a Rapidly Evolving Landscape

  • Understanding the latest trends in cyber threat evolution

  • AI and machine learning in proactive threat detection

  • Managing cyber risks in remote and hybrid work environments

  • Case studies: South African organizations responding to APTs

  • Collaboration between public and private sectors to combat threats

03:30 PM – 04:10 PM  |  Collaborative Round Table Discussions

Embedding Privacy by Design: Turning Compliance into a Competitive Advantage

  • Core principles of Privacy by Design: How to implement them

  • Building cross-functional teams to embed privacy into processes

  • Case studies on successful privacy-first product designs

  • Overcoming challenges in legacy system transformations

  • Key metrics for measuring Privacy by Design effectiveness

04:10 PM – 04:30 PM  |  Peer-to-Peer Meetings

Indicative Focus Areas:

Regulatory Compliance & AI – AI & POPIA, cross-border risks, financial sector
Cyber Resilience – Ransomware, public sector risks, digital identity fraud
Third-Party Risk – Telecom security, vendor compliance, automation
Data Privacy & Compliance – POPIA enforcement, AI risk, data localization
GRC Automation – Real-time monitoring, cloud compliance, legal tech

04:30 PM – 04:40 PM  |  Refreshments

  • Enjoy a tea break while networking and engaging in peer-to-peer discussions

04:40 PM – 05:20 PM  |  Collaborative Round Table Discussions

Managing Third-Party Risks: Building Resilient Vendor and Supplier Relationships in a Global Economy

  • Evaluating vendor contracts for compliance and risk

  • Monitoring third-party cybersecurity practices

  • Managing data breaches originating from third-party vendors

  • Tools for effective third-party risk assessments

  • Collaborating with vendors to ensure mutual compliance

05:20 PM – 06:00 PM  |  Collaborative Round Table Discussions

Understanding and Mitigating Insider Threats: A Key Challenge for Cybersecurity Teams

  • Understanding the psychology behind insider threats

  • Best practices for access control and data segmentation

  • Detecting malicious vs. accidental insider activities

  • Leveraging behavioral analytics to identify threats early

  • Building a culture of security awareness among employees

06:00 PM – 06:10 PM

Thank You & Closing Remarks

  • A heartfelt thank you to all speakers, sponsors, and delegates for their invaluable support and participation

*Program and Timings are subject to change without notice.

Buy Delegate Pass
Abstract Background

Anmeldungen

Delegate Pass and Pricing Details

Corporate In-house Professionals*

Early Bird

Standard

GBP 499

GBP 699

(USD 635)

(USD 890)

Buy Now

Law Firm
Professionals^

Early Bird

Standard

GBP 699

GBP 899

(USD 890)

(USD 1145)

Buy Now

Tech Vendors/ Consultants/ Service Providers*^

Early Bird

Standard

GBP 999

GBP 1199

(USD 1270)

(USD 1525)

Buy Now
Conference & Exhibition Pass
Yes (01)​
Yes (01)​
Yes (01)​
Networking Tea and Luncheon Pass
Yes
Yes
Yes
Networking with Speakers, Key Participants, and Exhibitors
Yes
Yes
Yes
Opportunity to Participate in the Q&A Session
Yes
Yes
Yes
Community Engagement Opportunities
Yes
Yes
Yes
Scenario-Based Learning and Case Study Presentations
Yes
Yes
Yes
Digital Certificate of Participation
Yes
Yes
Yes
Earn CLE/CPD Credits for Professional Development
Yes
Yes
No
Access to Educational Materials and Gift
Yes
Yes
Yes
* Corporate In-house Professionals: Open only to in-house corporate professionals. Vendor-affiliated individuals are not eligible.
^Law Firm & Academia Professionals: Open to law firm partners, attorneys, legal consultants, researchers, paralegals, and legal tech experts.
*^ Tech Vendors & Service Providers: Must register under this category if offering services or tech solutions to buyers.
For speakership & 1:1 meetings, or group discounts, fill out 
this form or email info@events4sure.com for assistance.
Experience Our Conferences

TESTIMONIALS

“A heartfelt thank you to Events 4 Sure for including me in this year’s conference. I truly appreciate the opportunity to engage with such brilliant legal minds, and it was an enriching experience. I look forward to being part of future events and continuing to collaborate with this amazing team”

Nicola Loh.jpg

Nicola Loh

Partner, Head of Regulatory & Compliance Practice, JTJB LLP

"It was an engaging audience, with a perfect blend of practitioners and in-house counsels, as we had the honor of taking the final panel of the day. The panel, made up of long-time colleagues, shared insightful war stories and a wealth of best practices, including in the area of cyber crisis management. On my way home, I realized we had over 80 years of collective experience on that one stage.

​A big thank you to Events 4 Sure for ensuring a seamless experience and for providing the opportunity to reconnect with like-minded members of the legal community."

Sandra Tsao.jpg

Sandra Tsao

General Counsel,

Mandai Wildlife Group

"Many thanks to Events 4 Sure for having me and congratulations on organizing a truly successful conference.

The panel discussion on the cyber session was fantastic, and I thoroughly enjoyed the opportunity to share insights with fellow experts.

Looking forward to future opportunities with Events 4 Sure!"

Peggy Chow.jpg

Peggy Chow

Attorney,

Herbert Smith Freehills

SPONSORS & PARTNERS

Presenting Sponsors

General-Counsel-360-final-logo-BL.png

Regular Participants

Past & Current Sponsors: Global Events

bottom of page