Cyber Secure Forum Event Guide

Page 1

25TH JUNE 2024

HILTON LONDON CANARY WHARF

Headline Sponsor

CONTENTS

We’re delighted that you have chosen to join us at the Cyber Secure Forum – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.

And let’s not forget the networking – we’ve created a relaxed environment for you to form new partnerships, with ample opportunities to mix with peers during the buffet lunch and coffee breaks!

4

6

8 Itinerary

‘Browser Security Month: Shielding your staff from dangerous destinations with proactive defence’

10 Seminars

12 ‘Generative AI now the most frequently deployed AI solution in organisations’

14 Delegates

16

Cyber Secure Forum Our Partners

‘Is defensive AI the key to guarding against emerging Cyber Threats?’

18 Dates for your Diary

22

Supplier Directory

Follow us on socials:

@forumeventsltd #FECyberSecureForum @forumevents #forumevents

For more information about our event, contact:

Courtney Saggers - Senior Sales Manager on 01992 374088 or c.saggers@forumevents.co.uk

Josh Kingsmill - Delegate Sales Executive on 01992 374081 or j.kingsmill@forumevents.co.uk

3
Brought to you by @ForumEventsLtd

Headline Sponsor

4

AUTOMATED INCIDENT RESOLUTION

COST OPTIMISATION

SMARTER PREVENTION

See Ontinue ION in action

08.45 - 09.30

ITINERARY

TUESDAY 25TH JUNE

Opening Presentation

‘How do dark actors use LinkedIn against you?’

James Potter

THE LINKEDIN MAN

Meeting Room 3/4/5

09.40 - 10.00

Seminar

‘Protecting organisations & interests through social engineering threat awareness, managing predominant cyber risks & cyber insurance premiums whilst embedding cyber CSR, next generational awareness and human risk management’

Graham Day

CYBERGUARDIAN

Meeting Room 3/4/5

10.05 - 13.05

Face to Face Meetings

Quayside Suite

13.05 - 13.55

Networking Buffet Lunch Cinnamon Restaurant

14.00 - 14.20

Seminar

‘How I would use AI to rob you!’

Alex Wood

REFORM COURSES

Meeting Room 3/4/5

14.25 - 16.25

Face to Face Meetings Quayside Suite

6

Tired of traditional security awareness?

Traditional approaches can only go so far. Redflags® removes barriers to engagement by drip-feeding content directly onto people’s devices. It intervenes as risky behaviours take place, nudging people towards safe choices. And it offers you, the practitioner, the data you need to show true behaviour change, reduced risk and a return on your investment in awareness.

Learn more about how you can take a real-time approach at thinkcyber.co.uk

from ThinkCyber R e d flags® techUK Cyber Innovator
thinkcyber.co.uk

BROWSER SECURITY MONTH: SHIELDING YOUR STAFF FROM DANGEROUS DESTINATIONS WITH PROACTIVE DEFENCE

The internet is a vital tool for businesses and government institutions alike, but it also presents a landscape rife with security threats. Web browsers, the gateways to this digital world, are a prime target for cybercriminals. Fortunately, the approach to web browser security in organisations, both public and private, has undergone a significant evolution in recent years. Let’s explore this journey towards a more secure online environment and examine the exciting possibilities that await senior IT professionals…

From Patchwork Policies to Proactive Defence:

Traditionally, web browser security relied on a patchwork of measures, including:

• Basic User Education: Raising awareness about phishing scams and malicious websites was a primary focus, but often proved insufficient against increasingly sophisticated attacks.

• Limited Browser Features: Disabling certain browser features like JavaScript could enhance security, but hindered functionality and user experience.

• Outdated Software: Patch management was not always prioritized, leaving organisations vulnerable to known browser vulnerabilities exploited by cybercriminals.

The Public Sector Prioritises

Data Protection:

The public sector, entrusted with sensitive citizen data, has adopted a more proactive approach:

• Centralised Management and Deployment: Standardizing browser configurations across government departments ensures consistency and simplifies security updates.

• Integration with Security Systems: Web browsers are integrated with network security solutions, allowing for real-time threat detection and blocking of malicious websites.

• Multi-Factor Authentication: MFA adds an extra layer of security beyond passwords, making unauthorised access more difficult. The Private Sector Embraces

Advanced Solutions:

The private sector has witnessed a rapid adoption of advanced security solutions:

• Sandboxing: This technology creates isolated environments where suspicious websites can be accessed without risk of infecting the user’s device.

• Endpoint Detection and Response: EDR solutions monitor user activity within web browsers, identifying and responding to potential threats in real-time.

• Browser Extensions and Plugins: A range of browser extensions and plugins offer additional security features like password managers, ad blockers, and website reputation checkers.

The Future of Web Browser Security: A Collaborative Approach

The future of web browser security promises exciting advancements for senior IT professionals:

• Cloud-Based Security Solutions: Cloud-based security solutions offer real-time threat intelligence and centralized management, simplifying security across an organization.

• Zero-Trust Security: This evolving approach verifies every user and device accessing the network, regardless of location, eliminating the concept of implicit trust.

• Integration with Artificial Intelligence: AI can analyze user behaviour and website traffic patterns,identifying anomalies that might indicate a potential cyberattack.

Collaboration is Key: Ensuring robust web browser security requires a collaborative approach:

• Software Vendors: Continued development of secure browser features and prompt patching of vulnerabilities is crucial.

• Security Solution Providers: Continuous innovation in security solutions that integrate seamlessly with web browsers is vital.

• Users: Employee education about safe browsing practices and responsible use of web browsers remains essential.

A Secure Future for Organisations: By embracing a multi-layered approach and utilizing the evolving solutions available, senior IT professionals can create a more robust web browser security environment for UK organisations. Collaboration between stakeholders, coupled with ongoing advancements in technology, holds the key to navigating the ever-changing threat landscape and safeguarding sensitive information. In a world increasingly reliant on the internet, a secure browsing experience is no longer a luxury, but a necessity.

Scan or click here to subscribe to the Cyber Security Briefing newsletter

SEMINARS

TUESDAY 25TH JUNE

“How do dark actors use LinkedIn against you?”

Data is precious, access even more, but many have a LinkedIn “blind” spot. This talk will highlight how it is used against you and how you might use it to help.

• Highlighting potential areas of exposure and risk

• Exposing where you can leak (unintentionally) through LinkedIn

• Sharing how it can be used against you and for you

• Examples of real life use (positive and negative)

• Five actions to take away and do

James Potter is a leading provider of sales and commercial LinkedIn training and consultancy for business professionals trying to get more sales. He has over 35 years of sales experience, more than seventeen years on LinkedIn and since he started using LinkedIn in corporate life as a Sales Director it has enabled him to win engagements worth over £10 million in sales in his first six years alone. James helps companies of all sizes across the world from over 140 leading Plc’s to small businesses by focusing on the practical, tactical skills and human skills needed to succeed when using LinkedIn.

09.40 – 10.00

Graham Day Program Manager CyberGuardian

“Protecting organisations & interests through social engineering threat awareness, managing predominant cyber risks & cyber insurance premiums whilst embedding cyber CSR, next generational awareness and human risk management”

Progressive, holistic security achieved through human risk management, applied proactively in conjunction with cyber security risk management, to manage cyber insurance, embed cyber CSR for the betterment of society and to curtail the wanton criminalisation of the internet.

• Empowering individuals personally develops the vested interest in security

• Informed individuals and enabled employees are security partners and inherent security multipliers

• Reduced security exposure could and should be insurance quantifier

• Empowering individuals is the foundation of common core competence for the betterment of society

• Empowering society reduces target environment to potentially negate juvenile threat actors

24 years British Army veteran, including decade as Military Intelligence Counter Intelligence & Security. Transitioned to Security Information Risk Advisor to UK Government & Critical Infrastructure, followed by a number of short term & contract roles, gaining experience not available in public sector career. Tasks achieved in subsequent roles include building vulnerability management program for a global enterprise, information security & resilience plan for UK critical infrastructure organisation, managed security & compliance of data centres around EMEA & managed the information security & compliance program for a global billion dollar SAAS provider.

Concurrently, founder of Cyber Guardian, SAAS provider of POSSE, next generation threat awareness & digital culture app.

10
08.45 – 09.30
James Potter Director The LinkedIn Man

14.00 - 14.20

TUESDAY 25TH JUNE

“How I would use AI to rob you!”

Alex Wood is a reformed hyper-prolific financial criminal who now leads the financial sector, Government and law enforcement in its response to fraud.

• In this session, Alex will talk candidly about his past and his use of deep social engineering tactics to steal millions of pounds for unsuspecting victims.

• He will then show how fraudsters are embracing Generative AI and how he would deploy AI to commit multiple frauds, simultaneously - and all at arms length.

Alex’ early career was in the music industry, winning top scholarships to attend the Royal Academy of Music and Royal College of Music.

Age 24 his career was abruptly halted with the onset of Repetitive Strain Injury. Faced with mounting debts and no income, his criminal career began, culminating in several years spent in custody for dishonesty offences.

Since his release in 2022, he delivers speeches and consultation to leading global financial institutions (including Tier 1 banks, insurance providers, law firms and risk experts) to enable a deep understanding of the ‘Fraud Mindset’ as well as sophisticated ‘Social Engineering’ techniques.

11 SEMINARS

GENERATIVE AI NOW THE MOST FREQUENTLY DEPLOYED AI SOLUTION IN ORGANISATIONS

According to a Gartner survey conducted in the fourth quarter of 2023, 29% of the 644 respondents from organisations in the U.S., Germany and the U.K. said that they have deployed and are using GenAI, making GenAI the most frequently deployed AI solution. GenAI was found to be more common than other solutions like graph techniques, optimisation algorithms, rule-based systems, natural language processing and other types of machine learning.

The survey also found that utilizing GenAI embedded in existing applications (such as Microsoft’s Copilot for 365 or Adobe Firefly) is the top way to fulfill GenAI use cases, with 34% of respondents saying this is their primary method of using GenAI. This was found to be more common than other options such as customizing GenAI models with prompt engineering (25%), training or fine-tuning bespoke GenAI models (21%), or using standalone GenAI tools, like ChatGPT or Gemini (19%).

“GenAI is acting as a catalyst for the expansion of AI in the enterprise,” said Leinar Ramos, Sr Director Analyst at Gartner. “This creates a window of opportunity for AI leaders, but also a test on whether they will be able to capitalize on this moment and deliver value at scale.”

The primary obstacle to AI adoption, as reported by 49% of survey participants, is the difficulty in estimating and demonstrating the value of AI projects. This issue surpasses other barriers such as talent shortages, technical difficulties, data-related problems, lack of business alignment and trust in AI (see Figure 1).

“Business value continues to be a challenge for organizations when it comes to AI,” said Ramos. “As organizations scale AI, they need to consider the total cost of ownership of their projects, as well as the wide spectrum of benefits beyond productivity improvement.”

“GenAI has increased the degree of AI adoption throughout the business and made topics like AI upskilling and AI governance much more important,” said Ramos. “GenAI is forcing organizations to mature their AI capabilities.”

“Organizations who are struggling to derive business value from AI can learn from mature AI organizations,” said Ramos. “These are organizations that are applying AI more widely across different business units and processes, deploying many more use cases that stay longer in production.”

The survey found 9% of organizations are currently AI-mature and found that what makes these organizations different is that they focus on four foundational capabilities:

• A scalable AI operating model, balancing centralized and distributed capabilities.

• A focus on AI engineering, designing a systematic way of building and deploying AI projects into production.

• An investment on upskilling and change management across the wider organization.

• A focus on trust, risk and security management (TRiSM) capabilities to mitigate the risks that come from AI implementations and drive better business outcomes.

“AI-mature organizations invest in foundational capabilities that will remain relevant regardless of what happens tomorrow in the world of AI, and that allows them to scale their AI deployments efficiently and safely,” said Ramos.

Focusing on these foundational capabilities can help organizations mature and alleviate the current challenge of bringing AI projects to production. The survey found that, on average, only 48% of AI projects make it into production, and it takes 8 months to go from AI prototype to production.

Scan or click here to subscribe to the Cyber Security Briefing newsletter

Strengthen Your Security Cul ture and Reduce Human Risk as your last line of defense. TRAIN YOUR USERS The world’s largest library of security awareness training content. Automated training campaigns with scheduled reminder emails. PHISH YOUR USERS thousands of templates with unlimited usage, and community phishing templates. SEE THE RESULTS for both training and phishing, ready for management. Show the great ROI! Sales@KnowBe4.com www.KnowBe4.com +44 (0) 1347 487512 See How Effective Our Security Awareness Platform Is KnowBe4.com/UKI-Demo

DELEGATES

Addison Lee

Asthma + Lung UK

Aviva

Barclays Ltd

Bloomsbury Institute London

British Business Bank

Churchdown School Academy

Cygnet Healthcare

Deloitte

Dune London

Ebiquity Plc

Enfinium

Exposure

Global Savings Group

HPD Lendscape

JP Morgan Chase

JSM Group

Jumeirah Carlton Tower Hotel

Klimate Net Ltd

Maccaferri UK & Ireland

Mazars

McDonald's

MUFG Bank & Securities

Norwich City Football Club

Nottingham Ice Centre Ltd

Ruffer LLP

Science Museum Group

Senior Plc

Sonic Healthcare

Starbucks Coffee

The Delta Group

The Pegasus Partnership Trust

The Salvation Army UK Territory with Republic of Ireland

The Sheiling Ringwood

UBS Ltd

University Of East London

University of West London

W. R. Berkley

WPP

Cyber Security Analyst

Director of Technology

Head of Cyber Security Education

Cyber Head of Strategy & Execution

Head of IT Services

Information Security Analyst

ICT Network Manager

Head of Cyber Security

Manager - Cyber Risk & Strategy

Head of IT Operations

Group Risk Assurance Officer

CISO & Project Manager

Desktop & Security Team Leader

Associate Director Information Security

ICT Operations Squad Lead

Vice President Senior Lead Cyber Security Architect

Head of IT

Cluster Director of IT

Operations Manager

ICT Systems Manager

Associate Director

Cyber Security & Identity Specialist

AVP - Cloud Security Lead

Senior IT Technician

Head of IT

Senior Technology Analyst - Information Security

Information Security Officer

IT Administrator

Director of Information Security

Information Security Officer

Information Security Manager

Senior Manager, Information Security

Infrastructure Manager

IT Manager

ISM

Network Manager

Project Manager

Senior Cyber Security Analyst

Senior Lecturer in Cyber Security

Regional Information Security Officer (EMEA)

IT Project Manager EMEA

14

IS DEFENSIVE AI THE KEY TO GUARDING AGAINST EMERGING CYBER THREATS?

Google’s recent announcement of an artificial intelligence (AI) Cyber Defense Initiative to enhance global cybersecurity underscores the importance of defending against increasingly sophisticated and pervasive cyber threats.

And according to analysts at GlobalData, AI will play a pivotal role in collecting, processing, and neutralising threats, transforming the way organisations combat cyber risks.

Looking at AI cyber threat detection technology through the lens of innovation using GlobalData’s Technology Foresights tool reveals some compelling insights. Patent filings have surged from 387 in 2018 to 1,098 in 2023, highlighting a robust growth trajectory in AI-driven security solutions. Furthermore, the entry of 53 new companies in 2023, for a total of 239, showcases the expanding interest and investment in this critical area of technology.

Vaibhav Gundre, Project Manager of Disruptive Tech at GlobalData, said: “The ability of AI to improve threat identification, streamline the management of vulnerabilities, and enhance the efficiency of incident responses is key in addressing the continuous evolution of cyber threats. The rapid progression in the field of defensive AI is underscored by a 13% compound annual growth rate in patent applications over the last three years, reflecting a strong commitment to innovation. This trend is also indicative of the recognized importance of having formidable cyber defense

systems in place, signifying substantial research and development activities aimed at overcoming new cyber threats.”

An analysis of GlobalData’s Disruptor Intelligence Center highlights the partnership between AIShield and DEKRA as a notable collaboration aimed at enhancing the security of AI models and systems. Through advanced training, assessment, and protection strategies, the partnership seeks to bolster cyber resilience across industries and foster trust in AI technologies.

Similarly, Darktrace’s collaboration with Cyware exemplifies a proactive approach to cybersecurity. By facilitating collaboration among security teams and sharing threat intelligence, the partnership enables organizations to mitigate risks and respond effectively to emerging cyber threats.

AI cyber threat detection finds application across diverse use cases, including threat detection in security cameras, real-time malware detection, network threat detection,

anomaly detection in critical infrastructure, fraud prevention, and AI-powered surveillance systems.

Gundre concluded: “As organizations harness the power of AI cyber threat detection, they must also confront significant challenges. The rapid evolution of cyber threats, coupled with the complexity of regulatory landscapes, underscores the need for continuous innovation and collaboration. While patents and partnerships lay the foundation for robust cyber defense strategies, addressing these challenges will require a concerted effort from industry stakeholders. By staying vigilant and embracing a proactive approach, organizations can navigate the evolving cybersecurity landscape with confidence, safeguarding critical assets and preserving digital trust.”

Scan or click here to subscribe to the Cyber Security Briefing newsletter

DATES FOR YOUR DIARY

2nd July 2024

Hilton London Canary Wharf

4th February 2025

Hilton London Canary Wharf

Scan or click here for our website:

24th September 2024

Radisson Blu Manchester Airport

10th March 2025

Hilton London Canary Wharf

Scan or click here for our website:

7th & 8th October 2024

Radisson Blu Hotel Manchester Airport

18th & 19th March 2025

Radisson Hotel & Conference Centre, London Heathrow

Scan or click here for our website:

7th November 2024

Hilton London Canary Wharf

24th June 2025

Hilton London Canary Wharf

Scan or click here for our website:

18
SHARE YOUR TIME AT OUR EVENT ON SOCIAL MEDIA! @forumeventsltd @forumevents Forum Events & Media Group #FECyberSecureForum ALSO LET KNOW YOUR EXPERIENCE! normcyber.com info@normcyber.com | 0203 855 6215
normcyber.com | info@normcyber.com | 0203 855 6215 All services are underpinned by a UK-based, CREST certified Security Operations Centre 24/7 MANAGED THREAT DETECTION & RESPONSE CYBER INCIDENT RESPONSE PENETRATION TESTING COMPLIANCE SERVICES 5 CYBER SAFETY & PHISHING DATA PROTECTION SERVICES The full-service cyber specialist

SUPPLIER DIRECTORY

Centrality Ltd

07836 212 951 / scrozier@centrality.com

Founded over 28 years ago, Centrality is a UK Top 20 Microsoft accredited solutions provider that has grown predominately through referral. We are one of 10 Microsoft Managed Security Partners in the UK to reach Elite status and are trusted to help organisations unlock their potential through the expert design, delivery and support of the right technology. Providing Managed Cloud Security Services, consultancy to migrate customers to cloud-native services & ongoing Proactive Azure Infrastructure Support, we help customers across both the private and public sectors at all stages of their journey to the cloud, ensuring they maximise ROI.

Cydea

am@cydea.com / cydea.com

Cydea is an optimistic cyber security company. We help organisations to quantify their cyber risk, measure their security posture, and have confidence in the decisions and mitigations they take. We help improve cyber security conversations by linking otherwise technical subject matter to business operations that can be more easily understood by technical and non-technical stakeholders alike. Cydea’s services let organisations quantify their cyber risk in a structured manner and simply aggregate different scenarios. We allow an organisation to define its risk appetite in financial terms and see how their profile compares to acceptable levels. Our software and advisory services provide actionable, human advice and bring technical subject matter to life for management teams. We can help you #CloseTheLoop on cyber risk.

Darktrace

07814 062 792 / eve.burgoyne@darktrace.com

Darktrace (DARK.L), a global leader in cyber security artificial intelligence, delivers complete AI-powered solutions in its mission to free the world of cyber disruption. Breakthrough innovations from the Darktrace Cyber AI Research Centre in Cambridge, UK and its R&D centre in The Hague, The Netherlands have resulted in over 145 patent applications filed and significant research published to contribute to the cyber security community. Darktrace’s technology continuously learns and updates its knowledge of 'you' for an organization and applies that understanding to achieve an optimal state of cyber security. It is delivering the first ever Cyber AI Loop, fuelling a continuous end-to-end security capability that can autonomously prevent, detect, and respond to novel, in-progress threats in real time. Darktrace employs 2,200+ people around the world and protects over 9,000 organizations globally from advanced cyber-threats. It was named one of TIME magazine’s ‘Most Influential Companies’ in 2021.

22

Quantify

Manage

Comply with frameworks

Learn

cyber risk
security programmes
#PositiveSecurity
from security incidents
cydea.com/platform/

dope.security

07984 455 066 / asif@dope.security

We’re streamlining cybersecurity. No stopovers. No outages. No re-routed traffic. Our Fly-Direct Secure Web Gateway and LLM-powered CASB Neural ensure a direct, invisible internet experience. Whether your company is small or large, we provide a first-class experience with the easiest deployment process in the industry. It’s not that we’re mad at yesterday’s solutions—just disappointed. So we made it dope.

eSentire

07851 235 531 / thomas.gowers@esentire.com

eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organisations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.

EveryCloud Security Ltd

07411 928 973 / jamie.little@everycloud.co.uk / everycloud.co.uk

EveryCloud is a Cloud Security specialist. Our purpose is to enable businesses to transform into a secure workplace, available anywhere. Our extensive Cloud Security experience at EveryCloud guides businesses into achieving their business security capabilities. Our team will help improve and develop your business’s security strategy by designing and implementing key security frameworks and compliance requirements. EveryCloud’s focus is on key security areas: - Supporting business into achieving a SASE framework as part of a to journey to Zero Trust model. - Protecting the Endpoints from Cyber Threats and Ransomware with our Endpoint Detection and Response. - Strengthening email security through advanced AI threat detection and encryption protocols. - Ensuring business continuity, with secure Cloud Backup and Disaster Recovery. - Empowering security teams and increasing efficiency with our specialist toolset. - Education the workforce with awareness training.Understanding cloud security posture. Our comprehensive and consultative approach also includes regular assessments and workshops to maximise the value of Microsoft Licensing.

24
/ dope.security

07530 730 870 / charlie.dunne@illumio.com / illumio.com

Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-value assets and compromised systems to proactively or reactively stop the spread of a breach. ZTS is proven to help organizations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects. Assume breach. Minimize impact. Increase resilience.

iSTORM® are an award-winning consultancy and support services provider. We specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services. Our team of specialist consultants help to identify the threats that your organisation faces, the external attack surface that you have, and the vulnerabilities in your applications and networks to help you to minimise cyber risk. We have a range of fixed price products and customised services to meet the requirements of both large and small companies. It’s important to our clients that we understand the challenges they face, which is why we accredited to ISO 27001:2013, hold the Cyber Essentials+ Certification and are an approved CREST Penetration Testing Provider.

01347 487 512 / sales@knowbe4.com / knowbe4.com KnowBe4 UK Ltd

KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training. Deploying KnowBe4 results in users that are alert and care about the damage that phishing, ransomware and other social engineering threats pose. The platform includes a comprehensive suite of awareness & compliance training, real-time user coaching, AI-powered simulated social engineering, and crowdsourced anti-phishing defence. With content in 35+ languages, KnowBe4 provides the world’s largest, always-fresh library of engaging content to strengthen your human firewall.

26
Illumio
01789
joe.richards@istormsolutions.co.uk
608 708 /
iSTORM®

Normcyber

07827 323 915 /

360-degree Visibility. Total Protection. NormCyber is an award-winning cyber risk management specialist, renowned for delivering exceptional service and operational excellence. Our modular Cyber Security Managed Service combines cutting-edge security tooling with robust runbooks, global threat intelligence, and human insight delivering comprehensive cyber protection and total visibility. Backed by a CREST-accredited, UK-based SOC, we leverage leading technology, next-generation automation and proven processes, to deliver a fully customised Managed Service that seamlessly integrates with your existing security investments. Whether you are looking to remove the burden of cyber security or require assistance with a specific business need, our modular offerings provide total flexibility as your cyber security needs evolve.

1. 24/7/365: Round-the-clock protection

2. Threat Hunting: Expert-led threat hunting and next-generation automation

3. Threat Mitigation: Automatic isolation and investigation as standard

4. Strategic Guidance: Access strategic guidance via your dedicated Focal Analyst

5. Regulatory Compliance: Assistance with compliance and regulations

Ontinue is on a mission to be the most trusted, 24/7, always-on security partner that empowers customers to embrace the future by operating more strategically and with less risk. Grounded in an intelligent, clouddelivered SecOps platform, Ontinue offers superior protection that goes well beyond basic detection and response services. Ontinue is the only MDR provider that leverages AI-driven automation, human expertise, and the Microsoft security platform to continuously assess and protect your environment and advance your security posture for digital transformation. Continuous protection. Always-on prevention Services. That’s Ontinue.

Outpost24 helps organizations improve cyber resilience with a complete range of Continuous Threat Exposure Management (CTEM) solutions. Outpost24’s intelligent cloud platform unifies asset management, automates vulnerability assessment, and quantifies cyber risk in business context. Executives and security teams around the world trust Outpost24 to identify and prioritize the most important security issues across their attack surface to accelerate risk reduction. Founded in 2001, Outpost24 is headquartered in Sweden and the US, with additional offices in the UK, Netherlands, Belgium, Denmark, France, and Spain.

27
/ normcyber.com
ricky.abbs-fortnum@normcyber.com
rking@ontinue.com / ontinue.com Ontinue
07827
413
outpost24.com
441
/ joshua.springer@outpost24.com /
Outpost24 UK

Patrowl offers a continuous and comprehensive risk coverage tool, safeguarding against accidental, opportunistic, and targeted attacks. Protecting your business from all external threat scenarios, concerning all you internet exposed assets (applications, web sites, API, remote access, cloud…). Patrowl is a Continuous Threat Exposure Management (CTEM) service. Patrowl is structured around four fundamental actions:

1. Mapping, ensure continuous discovery of all your internet exposed assets.

2. Identification, detect weaknesses and vulnerabilities in real-time with no false positives.

3. Remediation, effortlessly generate remediation plans and automated 1-click reports.

4. Control, supervise remediation or correction with 1-click retest.

Specops Software

01156 549 235 / simon.jones@outpost24.com

Specops Software, an Outpost24 company, is the leading provider of password management and authentication solutions. Specops protects your business data by blocking weak passwords and securing user authentication. With a complete portfolio of solutions natively integrated with Active Directory, Specops ensures sensitive data is stored on-premises and in your control. Specops Software was founded in 2001 and is headquartered in Stockholm, Sweden with additional offices in the US, Canada, the UK, and Germany.

Think Cyber Security Ltd

07460 042 828 /

ThinkCyber deliver measurable secure behaviour change for their customers, empowering people to protect themselves against cyber threats. When 85% of cyber-attacks start with the human user and technical controls can never be 100%, organisations need their staff to be the last line of defence. Unfortunately, traditional awareness is often infrequent, boring and/or patronising and therefore, quickly forgotten. Ethical phishing solutions often leave staff feeling tricked or embarrassed. The multi-award winning Redflags® Real-time Security Awareness software applies behavioural and learning science theory to deliver context-sensitive, just-in-time security guidance. For example, when users are about to click links, visit certain web pages, enter their username into a web page, handle attachments, etc. Redflags® won the Teiss Awards for “Best Cyber Security Training & Awareness Product or Service” in 2024 and techUK Cyber Innovator of the year 2021; it was part of NCSC for Startups Programme and Accenture Fintech Innovation Lab 2022.

28
+33 766 702 944 / carla.bore@patrowl.io / patrowl.io
Patrowl.io
/ specopssoft.com
/ thinkcyber.co.uk
ben.fader@thinkcyber.co.uk

ThreatLocker

07415 738 402 / robyn.vaughan@threatlocker.com / threatlocker.com

Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.

Tines Security Services Ltd

+35 383 8923 138 / dmurray@tines.io / tines.com

Tines is the smart, secure workflow builder for your whole team. Break down barriers across systems with fewer duplicate efforts, unnecessary alerts, and information silos.

Veeam Software

07824 562 494 / clare.angood@veeam.com / veeam.com

Veeam®, the #1 global market leader in data protection and ransomware recovery, is on a mission to help every organization not just bounce back from a data outage or loss but bounce forward. With Veeam, organizations achieve radical resilience through data security, data recovery, and data freedom for their hybrid cloud. The Veeam Data Platform delivers a single solution for cloud, virtual, physical, SaaS, and Kubernetes environments that gives IT and security leaders peace of mind that their apps and data are protected and always available. Headquartered in Columbus, Ohio, with offices in more than 30 countries, Veeam protects over 450,000 customers worldwide, including 73% of the Global 2000, who trust Veeam to keep their businesses running. Radical resilience starts with Veeam. Learn more at www.veeam. com or follow Veeam on LinkedIn @veeam-software and X @veeam.

29
last ing business relat ionships meet ings seminars net working g.buckland@forumevents.co.uk Total Security Summit 01992 374065 Scan or click here for our website
event
Explore how our
unfolds here Radisson Blu Hotel Manchester Airport 7th & 8th October 2024

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.