25TH JUNE 2024
HILTON LONDON CANARY WHARF
Headline Sponsor

25TH JUNE 2024
HILTON LONDON CANARY WHARF
We’re delighted that you have chosen to join us at the Cyber Secure Forum – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.
And let’s not forget the networking – we’ve created a relaxed environment for you to form new partnerships, with ample opportunities to mix with peers during the buffet lunch and coffee breaks!
4
6
8 Itinerary
‘Browser Security Month: Shielding your staff from dangerous destinations with proactive defence’
10 Seminars
12 ‘Generative AI now the most frequently deployed AI solution in organisations’
14 Delegates
16
Cyber Secure Forum Our Partners
‘Is defensive AI the key to guarding against emerging Cyber Threats?’
18 Dates for your Diary
22
Supplier Directory
Follow us on socials:
@forumeventsltd #FECyberSecureForum @forumevents #forumevents
For more information about our event, contact:
Courtney Saggers - Senior Sales Manager on 01992 374088 or c.saggers@forumevents.co.uk
Josh Kingsmill - Delegate Sales Executive on 01992 374081 or j.kingsmill@forumevents.co.uk
AUTOMATED INCIDENT RESOLUTION
COST OPTIMISATION
SMARTER PREVENTION
See Ontinue ION in action
08.45 - 09.30
Opening Presentation
‘How do dark actors use LinkedIn against you?’
James Potter
THE LINKEDIN MAN
Meeting Room 3/4/5
09.40 - 10.00
Seminar
‘Protecting organisations & interests through social engineering threat awareness, managing predominant cyber risks & cyber insurance premiums whilst embedding cyber CSR, next generational awareness and human risk management’
Graham Day
CYBERGUARDIAN
Meeting Room 3/4/5
10.05 - 13.05
Face to Face Meetings
Quayside Suite
13.05 - 13.55
Networking Buffet Lunch Cinnamon Restaurant
14.00 - 14.20
Seminar
‘How I would use AI to rob you!’
Alex Wood
REFORM COURSES
Meeting Room 3/4/5
14.25 - 16.25
Face to Face Meetings Quayside Suite
Traditional approaches can only go so far. Redflags® removes barriers to engagement by drip-feeding content directly onto people’s devices. It intervenes as risky behaviours take place, nudging people towards safe choices. And it offers you, the practitioner, the data you need to show true behaviour change, reduced risk and a return on your investment in awareness.
Learn more about how you can take a real-time approach at thinkcyber.co.uk
The internet is a vital tool for businesses and government institutions alike, but it also presents a landscape rife with security threats. Web browsers, the gateways to this digital world, are a prime target for cybercriminals. Fortunately, the approach to web browser security in organisations, both public and private, has undergone a significant evolution in recent years. Let’s explore this journey towards a more secure online environment and examine the exciting possibilities that await senior IT professionals…
From Patchwork Policies to Proactive Defence:
Traditionally, web browser security relied on a patchwork of measures, including:
• Basic User Education: Raising awareness about phishing scams and malicious websites was a primary focus, but often proved insufficient against increasingly sophisticated attacks.
• Limited Browser Features: Disabling certain browser features like JavaScript could enhance security, but hindered functionality and user experience.
• Outdated Software: Patch management was not always prioritized, leaving organisations vulnerable to known browser vulnerabilities exploited by cybercriminals.
The Public Sector Prioritises
Data Protection:
The public sector, entrusted with sensitive citizen data, has adopted a more proactive approach:
• Centralised Management and Deployment: Standardizing browser configurations across government departments ensures consistency and simplifies security updates.
• Integration with Security Systems: Web browsers are integrated with network security solutions, allowing for real-time threat detection and blocking of malicious websites.
• Multi-Factor Authentication: MFA adds an extra layer of security beyond passwords, making unauthorised access more difficult. The Private Sector Embraces
Advanced Solutions:
The private sector has witnessed a rapid adoption of advanced security solutions:
• Sandboxing: This technology creates isolated environments where suspicious websites can be accessed without risk of infecting the user’s device.
• Endpoint Detection and Response: EDR solutions monitor user activity within web browsers, identifying and responding to potential threats in real-time.
• Browser Extensions and Plugins: A range of browser extensions and plugins offer additional security features like password managers, ad blockers, and website reputation checkers.
The Future of Web Browser Security: A Collaborative Approach
The future of web browser security promises exciting advancements for senior IT professionals:
• Cloud-Based Security Solutions: Cloud-based security solutions offer real-time threat intelligence and centralized management, simplifying security across an organization.
• Zero-Trust Security: This evolving approach verifies every user and device accessing the network, regardless of location, eliminating the concept of implicit trust.
• Integration with Artificial Intelligence: AI can analyze user behaviour and website traffic patterns,identifying anomalies that might indicate a potential cyberattack.
Collaboration is Key: Ensuring robust web browser security requires a collaborative approach:
• Software Vendors: Continued development of secure browser features and prompt patching of vulnerabilities is crucial.
• Security Solution Providers: Continuous innovation in security solutions that integrate seamlessly with web browsers is vital.
• Users: Employee education about safe browsing practices and responsible use of web browsers remains essential.
A Secure Future for Organisations: By embracing a multi-layered approach and utilizing the evolving solutions available, senior IT professionals can create a more robust web browser security environment for UK organisations. Collaboration between stakeholders, coupled with ongoing advancements in technology, holds the key to navigating the ever-changing threat landscape and safeguarding sensitive information. In a world increasingly reliant on the internet, a secure browsing experience is no longer a luxury, but a necessity.
Scan or click here to subscribe to the Cyber Security Briefing newsletter
Data is precious, access even more, but many have a LinkedIn “blind” spot. This talk will highlight how it is used against you and how you might use it to help.
• Highlighting potential areas of exposure and risk
• Exposing where you can leak (unintentionally) through LinkedIn
• Sharing how it can be used against you and for you
• Examples of real life use (positive and negative)
• Five actions to take away and do
James Potter is a leading provider of sales and commercial LinkedIn training and consultancy for business professionals trying to get more sales. He has over 35 years of sales experience, more than seventeen years on LinkedIn and since he started using LinkedIn in corporate life as a Sales Director it has enabled him to win engagements worth over £10 million in sales in his first six years alone. James helps companies of all sizes across the world from over 140 leading Plc’s to small businesses by focusing on the practical, tactical skills and human skills needed to succeed when using LinkedIn.
09.40 – 10.00
Graham Day Program Manager CyberGuardian
“Protecting organisations & interests through social engineering threat awareness, managing predominant cyber risks & cyber insurance premiums whilst embedding cyber CSR, next generational awareness and human risk management”
Progressive, holistic security achieved through human risk management, applied proactively in conjunction with cyber security risk management, to manage cyber insurance, embed cyber CSR for the betterment of society and to curtail the wanton criminalisation of the internet.
• Empowering individuals personally develops the vested interest in security
• Informed individuals and enabled employees are security partners and inherent security multipliers
• Reduced security exposure could and should be insurance quantifier
• Empowering individuals is the foundation of common core competence for the betterment of society
• Empowering society reduces target environment to potentially negate juvenile threat actors
24 years British Army veteran, including decade as Military Intelligence Counter Intelligence & Security. Transitioned to Security Information Risk Advisor to UK Government & Critical Infrastructure, followed by a number of short term & contract roles, gaining experience not available in public sector career. Tasks achieved in subsequent roles include building vulnerability management program for a global enterprise, information security & resilience plan for UK critical infrastructure organisation, managed security & compliance of data centres around EMEA & managed the information security & compliance program for a global billion dollar SAAS provider.
Concurrently, founder of Cyber Guardian, SAAS provider of POSSE, next generation threat awareness & digital culture app.
14.00 - 14.20
“How I would use AI to rob you!”
Alex Wood is a reformed hyper-prolific financial criminal who now leads the financial sector, Government and law enforcement in its response to fraud.
• In this session, Alex will talk candidly about his past and his use of deep social engineering tactics to steal millions of pounds for unsuspecting victims.
• He will then show how fraudsters are embracing Generative AI and how he would deploy AI to commit multiple frauds, simultaneously - and all at arms length.
Alex’ early career was in the music industry, winning top scholarships to attend the Royal Academy of Music and Royal College of Music.
Age 24 his career was abruptly halted with the onset of Repetitive Strain Injury. Faced with mounting debts and no income, his criminal career began, culminating in several years spent in custody for dishonesty offences.
Since his release in 2022, he delivers speeches and consultation to leading global financial institutions (including Tier 1 banks, insurance providers, law firms and risk experts) to enable a deep understanding of the ‘Fraud Mindset’ as well as sophisticated ‘Social Engineering’ techniques.
According to a Gartner survey conducted in the fourth quarter of 2023, 29% of the 644 respondents from organisations in the U.S., Germany and the U.K. said that they have deployed and are using GenAI, making GenAI the most frequently deployed AI solution. GenAI was found to be more common than other solutions like graph techniques, optimisation algorithms, rule-based systems, natural language processing and other types of machine learning.
The survey also found that utilizing GenAI embedded in existing applications (such as Microsoft’s Copilot for 365 or Adobe Firefly) is the top way to fulfill GenAI use cases, with 34% of respondents saying this is their primary method of using GenAI. This was found to be more common than other options such as customizing GenAI models with prompt engineering (25%), training or fine-tuning bespoke GenAI models (21%), or using standalone GenAI tools, like ChatGPT or Gemini (19%).
“GenAI is acting as a catalyst for the expansion of AI in the enterprise,” said Leinar Ramos, Sr Director Analyst at Gartner. “This creates a window of opportunity for AI leaders, but also a test on whether they will be able to capitalize on this moment and deliver value at scale.”
The primary obstacle to AI adoption, as reported by 49% of survey participants, is the difficulty in estimating and demonstrating the value of AI projects. This issue surpasses other barriers such as talent shortages, technical difficulties, data-related problems, lack of business alignment and trust in AI (see Figure 1).
“Business value continues to be a challenge for organizations when it comes to AI,” said Ramos. “As organizations scale AI, they need to consider the total cost of ownership of their projects, as well as the wide spectrum of benefits beyond productivity improvement.”
“GenAI has increased the degree of AI adoption throughout the business and made topics like AI upskilling and AI governance much more important,” said Ramos. “GenAI is forcing organizations to mature their AI capabilities.”
“Organizations who are struggling to derive business value from AI can learn from mature AI organizations,” said Ramos. “These are organizations that are applying AI more widely across different business units and processes, deploying many more use cases that stay longer in production.”
The survey found 9% of organizations are currently AI-mature and found that what makes these organizations different is that they focus on four foundational capabilities:
• A scalable AI operating model, balancing centralized and distributed capabilities.
• A focus on AI engineering, designing a systematic way of building and deploying AI projects into production.
• An investment on upskilling and change management across the wider organization.
• A focus on trust, risk and security management (TRiSM) capabilities to mitigate the risks that come from AI implementations and drive better business outcomes.
“AI-mature organizations invest in foundational capabilities that will remain relevant regardless of what happens tomorrow in the world of AI, and that allows them to scale their AI deployments efficiently and safely,” said Ramos.
Focusing on these foundational capabilities can help organizations mature and alleviate the current challenge of bringing AI projects to production. The survey found that, on average, only 48% of AI projects make it into production, and it takes 8 months to go from AI prototype to production.
Scan or click here to subscribe to the Cyber Security Briefing newsletter
Addison Lee
Asthma + Lung UK
Aviva
Barclays Ltd
Bloomsbury Institute London
British Business Bank
Churchdown School Academy
Cygnet Healthcare
Deloitte
Dune London
Ebiquity Plc
Enfinium
Exposure
Global Savings Group
HPD Lendscape
JP Morgan Chase
JSM Group
Jumeirah Carlton Tower Hotel
Klimate Net Ltd
Maccaferri UK & Ireland
Mazars
McDonald's
MUFG Bank & Securities
Norwich City Football Club
Nottingham Ice Centre Ltd
Ruffer LLP
Science Museum Group
Senior Plc
Sonic Healthcare
Starbucks Coffee
The Delta Group
The Pegasus Partnership Trust
The Salvation Army UK Territory with Republic of Ireland
The Sheiling Ringwood
UBS Ltd
University Of East London
University of West London
W. R. Berkley
WPP
Cyber Security Analyst
Director of Technology
Head of Cyber Security Education
Cyber Head of Strategy & Execution
Head of IT Services
Information Security Analyst
ICT Network Manager
Head of Cyber Security
Manager - Cyber Risk & Strategy
Head of IT Operations
Group Risk Assurance Officer
CISO & Project Manager
Desktop & Security Team Leader
Associate Director Information Security
ICT Operations Squad Lead
Vice President Senior Lead Cyber Security Architect
Head of IT
Cluster Director of IT
Operations Manager
ICT Systems Manager
Associate Director
Cyber Security & Identity Specialist
AVP - Cloud Security Lead
Senior IT Technician
Head of IT
Senior Technology Analyst - Information Security
Information Security Officer
IT Administrator
Director of Information Security
Information Security Officer
Information Security Manager
Senior Manager, Information Security
Infrastructure Manager
IT Manager
ISM
Network Manager
Project Manager
Senior Cyber Security Analyst
Senior Lecturer in Cyber Security
Regional Information Security Officer (EMEA)
IT Project Manager EMEA
Google’s recent announcement of an artificial intelligence (AI) Cyber Defense Initiative to enhance global cybersecurity underscores the importance of defending against increasingly sophisticated and pervasive cyber threats.
And according to analysts at GlobalData, AI will play a pivotal role in collecting, processing, and neutralising threats, transforming the way organisations combat cyber risks.
Looking at AI cyber threat detection technology through the lens of innovation using GlobalData’s Technology Foresights tool reveals some compelling insights. Patent filings have surged from 387 in 2018 to 1,098 in 2023, highlighting a robust growth trajectory in AI-driven security solutions. Furthermore, the entry of 53 new companies in 2023, for a total of 239, showcases the expanding interest and investment in this critical area of technology.
Vaibhav Gundre, Project Manager of Disruptive Tech at GlobalData, said: “The ability of AI to improve threat identification, streamline the management of vulnerabilities, and enhance the efficiency of incident responses is key in addressing the continuous evolution of cyber threats. The rapid progression in the field of defensive AI is underscored by a 13% compound annual growth rate in patent applications over the last three years, reflecting a strong commitment to innovation. This trend is also indicative of the recognized importance of having formidable cyber defense
systems in place, signifying substantial research and development activities aimed at overcoming new cyber threats.”
An analysis of GlobalData’s Disruptor Intelligence Center highlights the partnership between AIShield and DEKRA as a notable collaboration aimed at enhancing the security of AI models and systems. Through advanced training, assessment, and protection strategies, the partnership seeks to bolster cyber resilience across industries and foster trust in AI technologies.
Similarly, Darktrace’s collaboration with Cyware exemplifies a proactive approach to cybersecurity. By facilitating collaboration among security teams and sharing threat intelligence, the partnership enables organizations to mitigate risks and respond effectively to emerging cyber threats.
AI cyber threat detection finds application across diverse use cases, including threat detection in security cameras, real-time malware detection, network threat detection,
anomaly detection in critical infrastructure, fraud prevention, and AI-powered surveillance systems.
Gundre concluded: “As organizations harness the power of AI cyber threat detection, they must also confront significant challenges. The rapid evolution of cyber threats, coupled with the complexity of regulatory landscapes, underscores the need for continuous innovation and collaboration. While patents and partnerships lay the foundation for robust cyber defense strategies, addressing these challenges will require a concerted effort from industry stakeholders. By staying vigilant and embracing a proactive approach, organizations can navigate the evolving cybersecurity landscape with confidence, safeguarding critical assets and preserving digital trust.”
Scan or click here to subscribe to the Cyber Security Briefing newsletter
2nd July 2024
Hilton London Canary Wharf
4th February 2025
Hilton London Canary Wharf
Scan or click here for our website:
24th September 2024
Radisson Blu Manchester Airport
10th March 2025
Hilton London Canary Wharf
Scan or click here for our website:
7th & 8th October 2024
Radisson Blu Hotel Manchester Airport
18th & 19th March 2025
Radisson Hotel & Conference Centre, London Heathrow
Scan or click here for our website:
7th November 2024
Hilton London Canary Wharf
24th June 2025
Hilton London Canary Wharf
Scan or click here for our website:
Founded over 28 years ago, Centrality is a UK Top 20 Microsoft accredited solutions provider that has grown predominately through referral. We are one of 10 Microsoft Managed Security Partners in the UK to reach Elite status and are trusted to help organisations unlock their potential through the expert design, delivery and support of the right technology. Providing Managed Cloud Security Services, consultancy to migrate customers to cloud-native services & ongoing Proactive Azure Infrastructure Support, we help customers across both the private and public sectors at all stages of their journey to the cloud, ensuring they maximise ROI.
am@cydea.com / cydea.com
Cydea is an optimistic cyber security company. We help organisations to quantify their cyber risk, measure their security posture, and have confidence in the decisions and mitigations they take. We help improve cyber security conversations by linking otherwise technical subject matter to business operations that can be more easily understood by technical and non-technical stakeholders alike. Cydea’s services let organisations quantify their cyber risk in a structured manner and simply aggregate different scenarios. We allow an organisation to define its risk appetite in financial terms and see how their profile compares to acceptable levels. Our software and advisory services provide actionable, human advice and bring technical subject matter to life for management teams. We can help you #CloseTheLoop on cyber risk.
07814 062 792 / eve.burgoyne@darktrace.com
Darktrace (DARK.L), a global leader in cyber security artificial intelligence, delivers complete AI-powered solutions in its mission to free the world of cyber disruption. Breakthrough innovations from the Darktrace Cyber AI Research Centre in Cambridge, UK and its R&D centre in The Hague, The Netherlands have resulted in over 145 patent applications filed and significant research published to contribute to the cyber security community. Darktrace’s technology continuously learns and updates its knowledge of 'you' for an organization and applies that understanding to achieve an optimal state of cyber security. It is delivering the first ever Cyber AI Loop, fuelling a continuous end-to-end security capability that can autonomously prevent, detect, and respond to novel, in-progress threats in real time. Darktrace employs 2,200+ people around the world and protects over 9,000 organizations globally from advanced cyber-threats. It was named one of TIME magazine’s ‘Most Influential Companies’ in 2021.
Quantify
Manage
Comply with frameworks
Learn
07984 455 066 / asif@dope.security
We’re streamlining cybersecurity. No stopovers. No outages. No re-routed traffic. Our Fly-Direct Secure Web Gateway and LLM-powered CASB Neural ensure a direct, invisible internet experience. Whether your company is small or large, we provide a first-class experience with the easiest deployment process in the industry. It’s not that we’re mad at yesterday’s solutions—just disappointed. So we made it dope.
07851 235 531 / thomas.gowers@esentire.com
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organisations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
07411 928 973 / jamie.little@everycloud.co.uk / everycloud.co.uk
EveryCloud is a Cloud Security specialist. Our purpose is to enable businesses to transform into a secure workplace, available anywhere. Our extensive Cloud Security experience at EveryCloud guides businesses into achieving their business security capabilities. Our team will help improve and develop your business’s security strategy by designing and implementing key security frameworks and compliance requirements. EveryCloud’s focus is on key security areas: - Supporting business into achieving a SASE framework as part of a to journey to Zero Trust model. - Protecting the Endpoints from Cyber Threats and Ransomware with our Endpoint Detection and Response. - Strengthening email security through advanced AI threat detection and encryption protocols. - Ensuring business continuity, with secure Cloud Backup and Disaster Recovery. - Empowering security teams and increasing efficiency with our specialist toolset. - Education the workforce with awareness training.Understanding cloud security posture. Our comprehensive and consultative approach also includes regular assessments and workshops to maximise the value of Microsoft Licensing.
07530 730 870 / charlie.dunne@illumio.com / illumio.com
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-value assets and compromised systems to proactively or reactively stop the spread of a breach. ZTS is proven to help organizations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects. Assume breach. Minimize impact. Increase resilience.
iSTORM® are an award-winning consultancy and support services provider. We specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services. Our team of specialist consultants help to identify the threats that your organisation faces, the external attack surface that you have, and the vulnerabilities in your applications and networks to help you to minimise cyber risk. We have a range of fixed price products and customised services to meet the requirements of both large and small companies. It’s important to our clients that we understand the challenges they face, which is why we accredited to ISO 27001:2013, hold the Cyber Essentials+ Certification and are an approved CREST Penetration Testing Provider.
01347 487 512 / sales@knowbe4.com / knowbe4.com KnowBe4 UK Ltd
KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training. Deploying KnowBe4 results in users that are alert and care about the damage that phishing, ransomware and other social engineering threats pose. The platform includes a comprehensive suite of awareness & compliance training, real-time user coaching, AI-powered simulated social engineering, and crowdsourced anti-phishing defence. With content in 35+ languages, KnowBe4 provides the world’s largest, always-fresh library of engaging content to strengthen your human firewall.
07827 323 915 /
360-degree Visibility. Total Protection. NormCyber is an award-winning cyber risk management specialist, renowned for delivering exceptional service and operational excellence. Our modular Cyber Security Managed Service combines cutting-edge security tooling with robust runbooks, global threat intelligence, and human insight delivering comprehensive cyber protection and total visibility. Backed by a CREST-accredited, UK-based SOC, we leverage leading technology, next-generation automation and proven processes, to deliver a fully customised Managed Service that seamlessly integrates with your existing security investments. Whether you are looking to remove the burden of cyber security or require assistance with a specific business need, our modular offerings provide total flexibility as your cyber security needs evolve.
1. 24/7/365: Round-the-clock protection
2. Threat Hunting: Expert-led threat hunting and next-generation automation
3. Threat Mitigation: Automatic isolation and investigation as standard
4. Strategic Guidance: Access strategic guidance via your dedicated Focal Analyst
5. Regulatory Compliance: Assistance with compliance and regulations
Ontinue is on a mission to be the most trusted, 24/7, always-on security partner that empowers customers to embrace the future by operating more strategically and with less risk. Grounded in an intelligent, clouddelivered SecOps platform, Ontinue offers superior protection that goes well beyond basic detection and response services. Ontinue is the only MDR provider that leverages AI-driven automation, human expertise, and the Microsoft security platform to continuously assess and protect your environment and advance your security posture for digital transformation. Continuous protection. Always-on prevention Services. That’s Ontinue.
Outpost24 helps organizations improve cyber resilience with a complete range of Continuous Threat Exposure Management (CTEM) solutions. Outpost24’s intelligent cloud platform unifies asset management, automates vulnerability assessment, and quantifies cyber risk in business context. Executives and security teams around the world trust Outpost24 to identify and prioritize the most important security issues across their attack surface to accelerate risk reduction. Founded in 2001, Outpost24 is headquartered in Sweden and the US, with additional offices in the UK, Netherlands, Belgium, Denmark, France, and Spain.
Patrowl offers a continuous and comprehensive risk coverage tool, safeguarding against accidental, opportunistic, and targeted attacks. Protecting your business from all external threat scenarios, concerning all you internet exposed assets (applications, web sites, API, remote access, cloud…). Patrowl is a Continuous Threat Exposure Management (CTEM) service. Patrowl is structured around four fundamental actions:
1. Mapping, ensure continuous discovery of all your internet exposed assets.
2. Identification, detect weaknesses and vulnerabilities in real-time with no false positives.
3. Remediation, effortlessly generate remediation plans and automated 1-click reports.
4. Control, supervise remediation or correction with 1-click retest.
01156 549 235 / simon.jones@outpost24.com
Specops Software, an Outpost24 company, is the leading provider of password management and authentication solutions. Specops protects your business data by blocking weak passwords and securing user authentication. With a complete portfolio of solutions natively integrated with Active Directory, Specops ensures sensitive data is stored on-premises and in your control. Specops Software was founded in 2001 and is headquartered in Stockholm, Sweden with additional offices in the US, Canada, the UK, and Germany.
07460 042 828 /
ThinkCyber deliver measurable secure behaviour change for their customers, empowering people to protect themselves against cyber threats. When 85% of cyber-attacks start with the human user and technical controls can never be 100%, organisations need their staff to be the last line of defence. Unfortunately, traditional awareness is often infrequent, boring and/or patronising and therefore, quickly forgotten. Ethical phishing solutions often leave staff feeling tricked or embarrassed. The multi-award winning Redflags® Real-time Security Awareness software applies behavioural and learning science theory to deliver context-sensitive, just-in-time security guidance. For example, when users are about to click links, visit certain web pages, enter their username into a web page, handle attachments, etc. Redflags® won the Teiss Awards for “Best Cyber Security Training & Awareness Product or Service” in 2024 and techUK Cyber Innovator of the year 2021; it was part of NCSC for Startups Programme and Accenture Fintech Innovation Lab 2022.
07415 738 402 / robyn.vaughan@threatlocker.com / threatlocker.com
Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.
+35 383 8923 138 / dmurray@tines.io / tines.com
Tines is the smart, secure workflow builder for your whole team. Break down barriers across systems with fewer duplicate efforts, unnecessary alerts, and information silos.
07824 562 494 / clare.angood@veeam.com / veeam.com
Veeam®, the #1 global market leader in data protection and ransomware recovery, is on a mission to help every organization not just bounce back from a data outage or loss but bounce forward. With Veeam, organizations achieve radical resilience through data security, data recovery, and data freedom for their hybrid cloud. The Veeam Data Platform delivers a single solution for cloud, virtual, physical, SaaS, and Kubernetes environments that gives IT and security leaders peace of mind that their apps and data are protected and always available. Headquartered in Columbus, Ohio, with offices in more than 30 countries, Veeam protects over 450,000 customers worldwide, including 73% of the Global 2000, who trust Veeam to keep their businesses running. Radical resilience starts with Veeam. Learn more at www.veeam. com or follow Veeam on LinkedIn @veeam-software and X @veeam.