24TH JUNE 2025
HILTON LONDON CANARY WHARF
Headline Sponsor

24TH JUNE 2025
HILTON LONDON CANARY WHARF
We’re delighted that you have chosen to join us at the Cyber Secure Forum – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.
And let’s not forget the networking – we’ve created a relaxed environment for you to form new partnerships, with ample opportunities to mix with peers during the buffet lunch and coffee breaks!
4
6
Our Partners
8
Itinerary
‘Browser Security Month: Enterprise Browsers vs. Traditional Browsers –What’s the big idea?’
@forumeventsltd #FECyberSecureForum
10 Seminars
12 ‘Advanced Threat Dashboards: How AI is shaping Predictive Threat Monitoring’
14 Delegates
16 Dates for your Diary
20
Supplier Directory
Follow us on socials:
@forumevents #forumevents
Cyber Secure Forum
For more information about our event, contact:
Liam Cloona - Senior Sales Manager on 01992 374078 or L.Cloona@forumevents.co.uk
Josh Kingsmill - Delegate Sales Executive on 01992 374081 or J.Kingsmill@forumevents.co.uk
DevOps, cloud, and open source software help developers create, test, and release code in less time.
The volume of apps and code - now boosted by AI - is increasing and security needs visbility across the entire code base and software supply chain.
Traditional infrastructure was secured by IT, but now that everything is in the cloud, security is in the developer’s hands.
08.45 - 09.25
Opening Presentation
‘Language Crimes: Interactions of Love, Money and Threat’
Dr Elisabeth Carter
Kingston University London Meeting Room 3/4/5
09.30 - 10.05
Seminar
‘Negotiating with cyber criminals’
Paul Colwell
Wavenet CyberGuard Meeting Room 3/4/5
10.10 - 13.10
Face to Face Meetings Quayside Suite
13.10 - 14.00
Networking Buffet Lunch Cinnamon Restaurant
14.05 - 14.40
Seminar
‘Interactive Cyber Escape Room –The Breach’
Amy Stokes-Waters
The Cyber Escape Room Co.
Meeting Room 3/4/5
14.45 - 16.45
Face to Face Meetings Quayside Suite
Cyber threats are evolving every day, but so are we. Our CyberGuard solutions empower your business to stay secure, resilient, and ahead of the curve.
In a crowded marketplace, you need a security partner you can trust-one that simplifies the noise, cuts through the complexity, and delivers precisely what your business requires.
As proud CHECK and CREST-certified providers, we offer comprehensive cyber protection designed to safeguard your business.
• CREST & CHECK-accredited penetration testing
• 24/7 UK-based, security detection and response managed SOC
• Comprehensive employee training and simulated phishing exercises
• Proactive risk assessments and rapid incident response
• Expert compliance support and strategic advisory
enquiries@wavenet.co.uk wavenet.co.uk
Many organisations are reassessing one of the most overlooked attack vectors in their infrastructure: the web browser. As hybrid and remote work models solidify, traditional browsers, built for consumer convenience, are increasingly falling short in meeting enterprise-grade security requirements. This has fuelled the rise of a new category: secure enterprise browsers…
Unlike legacy browsers enhanced by plug-ins or endpoint agents, secure enterprise browsers are purposebuilt for corporate environments. Solutions from providers such as Island, Talon, and Google’s Chrome Enterprise have emerged as transformative tools that embed security and compliance directly into the browsing experience.
Enterprise browsers offer built-in features such as granular policy enforcement, session monitoring, clipboard and screenshot controls, and data loss prevention (DLP) mechanisms—all centrally managed via admin consoles. This level of control helps organisations enforce security at the point of access without relying on a patchwork of extensions, agents, and manual configurations.
Another core differentiator is Zero Trust compatibility. Secure browsers can verify user identities, isolate browsing sessions, and restrict access to sensitive apps based on contextual risk signals (such as device posture or geolocation). In contrast, traditional browsers often require integration with third-party Zero Trust Network Access (ZTNA) tools, adding complexity and potential gaps.
Phishing remains one of the most common entry points for attackers— and browsers are often the first line of defence. Enterprise browsers incorporate advanced anti-phishing controls and real-time URL risk assessment. They can also restrict unsanctioned SaaS usage, helping IT teams mitigate shadow IT without stifling productivity.
A major challenge with layered browser security has been performance and user experience. Enterprise browsers are built to operate smoothly within existing workflows. Many support Chromium-based architecture, ensuring compatibility with web apps and extensions that staff already use. This makes adoption less disruptive compared to traditional bolt-on security models.
IT leaders should evaluate the need for enterprise browsers based on three key triggers: (1) increased SaaS adoption; (2) growing remote or third-party workforce; and (3) regulatory compliance obligations around data security and user activity monitoring.
As web usage dominates enterprise workflows, browsers have become critical control points in the security stack. While traditional browsers remain viable for some use cases, the benefits of enterprise-grade solutions, particularly in terms of visibility, control, and compliance, are driving a quiet but significant shift. For organisations serious about securing the modern workplace, 2025 may be the tipping point for embracing the secure browser revolution.
Scan or click here to subscribe to the Cyber Security Briefing newsletter
W E M A K E N E T W O R K
P E N T E S T I N G E A S Y .
Automated, Affordable, and CREST Accredited Solution!
TUESDAY 24TH JUNE
08.45 – 09.25
Dr Elisabeth Carter Associate Professor of Criminology
Kingston University London
Exploring the interplay of love, money & threat in romance fraud, this presentation reveals how language is used to persuade, manipulate and threaten without causing alarm. It exposes and tracks the grooming process and manipulation techniques from first contact with the fraudster, to the transition into the danger zone, and requests for money and intimate images, before morphing into explicit threats and acts of sextortion. The insights contained in this work have clear implications for the future directions of public protection.
• Interpersonal frauds are based on exploiting contextual & situational vulnerabilities.
• These crimes are similar to the manipulation experienced in domestic abuse & coercive control.
• Interpersonal frauds are hybrid rather than singular (e.g romance & investment)
• Public/customer protection should use these insights to work more effectively across all sectors.
Dr Elisabeth Carter examines (ab)uses of language for criminal gain; in particular the ways in which language is used by fraudsters in all APP fraud including romance fraud, investment fraud, courier fraud and what’s app frauds. She has a written a substantial body of empirical cutting-edge published research - journal articles, books, book chapters, encyclopedia entries, cross-Government reports, national trading standards guidance, national police guidance and briefing papers on the language of fraud, deception, witness evidence, negotiations and confessions.
09.30 – 10.05
Paul Colwell
Chief Information Security Officer
Wavenet CyberGuard
Step into the CISO’s shoes during a ransomware attack and explore the real-time decisions, intelligence, and dilemmas faced in the first 24 hours of a livecyber crisis.
• Live role-play scenario: Acting as a CISO during a ransomware attack
• Key decisions in the first 24 hours of an incident
• Impact of threat intelligence on response strategy
• “To pay or not to pay?” – navigating ransom demands
• Practical takeaways to inform your own incident response plan
Paul Colwell is Chief Information Security Officer at Wavenet, bringing over two decades of deep technical and leadership experience across cyber security, cloud and enterprise IT. Paul has held senior roles including Chief Technology Officer at Wavenet, and Technical Director at both CyberGuard Technologies and OGL Computer Group. Known for his hands-on innovation and strategic foresight, Paul has built a reputation for developing cutting-edge cloud solutions and forming impactful technology partnerships. He is a cyber security visionary, with a passion for helping businesses navigate the constant evolution of the threat and cyber-attack landscape.
14.05 - 14.40
Amy Stokes-Waters CEO
The Cyber Escape Room
Co.
Your company’s been hit with some serious ransomware, which you’ve traced back to a single set of leaked credentials. The Breach tasks you with uncovering the source and identifying how the data got out in the first place. Was it a malicious insider or just bad luck? Find out in this interactive escape room game.
With over a decade in tech, Amy Stokes-Waters has built a career spanning sales, marketing, and project management. Now CEO of The Cyber Escape Room Co., she is passionate about making cybersecurity training engaging, creative, and effective.
As a single mum and natural multitasker, Amy brings energy, enthusiasm, and focus to everything she does. Whether it’s landing a business on three continents in six months or designing standout events, she throws her whole self into the challenge.
A “force of nature,” she inspires others to think differently and make things happen.
Cybersecurity is defined not just by how quickly organisations respond to threat, but how effectively they anticipate and prevent them. As attack surfaces grow and threats become more sophisticated, traditional dashboards offering historical or real-time data are no longer enough. Instead, security teams attending the Cyber Secure Forum are embracing AI-powered predictive threat monitoring, integrated directly into their threat intelligence dashboards, to move from reactive defence to proactive protection…
At the heart of this shift is the use of machine learning algorithms and behavioural analytics to detect anomalies, flag early indicators of compromise, and prioritise responses based on potential impact. Modern dashboards are no longer passive data displays; they are dynamic, intelligent systems that surface evolving threats before they become breaches.
From Static Data to Predictive Insight
Traditional SIEM (Security Information and Event Management) dashboards provided security teams with consolidated views of log data, alerts, and compliance metrics. While useful for tracking incidents, these systems were largely reactive,
offering visibility after a threat had entered the network.
Today’s AI-enhanced dashboards ingest vast volumes of structured and unstructured data, from endpoints, cloud infrastructure, user behaviour, threat feeds, and external telemetry. Using machine learning models, these platforms can identify patterns that suggest malicious activity, such as unusual login times, abnormal data transfers, or subtle privilege escalations.
Instead of waiting for alerts based on pre-set rules, predictive systems can adapt to baseline behaviours within an organisation and flag deviations in real time. This approach significantly reduces false positives and highlights threats that may otherwise evade detection, such as insider risks or polymorphic malware.
Predictive dashboards also help cybersecurity teams prioritise threats by context. Rather than overwhelming analysts with hundreds of low-impact alerts, AI tools assess risk based on asset criticality, user behaviour, and threat severity—offering a ranked response queue.
Some platforms are now integrating with Security Orchestration,
Automation, and Response (SOAR) systems to trigger automated actions, like isolating endpoints, revoking credentials, or escalating incidents to human analysts. This speeds up time-to-containment and supports round-the-clock security operations without increasing headcount.
Beyond incident response, predictive threat dashboards are informing long-term cyber strategy. By surfacing repeat vulnerabilities, attack patterns, and emerging risks, these platforms help CISOs make better decisions on where to invest, patch, and train.
As cyber threats continue to evolve, AI-driven dashboards will be central to staying ahead. In 2025, the organisations best protected from cyberattack will be those that don’t just monitor threats, they predict and neutralise them before damage is done.
Scan or click here to subscribe to the Cyber Security Briefing newsletter
AIG Group UK Ltd
Allwyn UK
Arkis
Aston University Engineering Academy
BLME
Canon Europe Ltd
CME Group
Commonwealth Secretariat
CPG Logistics Ltd
Croydon Council
Currys
Cygnet Health Care
Dentsu
East and North Hertfordshire NHS Trust
Heathrow Airport
IDX (Investis Digital)
Iglu
J A Kemp
JP Morgan
Katherine Warington School
Kroo Bank
Legal and General
M7 Real Estate
Maccaferri UK & Ireland
Mclaren Construction Group
Metropolitan Police
MOD
Osea Ltd
PDS
Quintessentially
Senior Cyber Risk Specialist
Governance Risk & Compliance Officer
CISO
ICT Network Manager
Cyber & Operational Resilience Manager
IT Security Lead Consultant
Global Head of NSG
Information Security Officer
Head of IT & Security
Cyber Security Specialist
Senior Cyber Security Manager
IT Risk & Compliance Manager
Head of Information Security
Technology Assurance Analyst
Digital Cyber specialist
Cyber Risk & Assurance Lead
CISO
Snr DevOps Engineer
Head of Technology
Vice President - Cybersecurity Technology & Controls
Network Manager
CISO
Group Digital & Data Risk Manager
IT Manager
ICT Systems Manager
Group IT & Security Director
Head of IT Infrastructure
Senior Cyber Advisor
CTO
Senior Manager IT
Global IT & Infrastructure Engineer
Reliance Bank
Royal Museums Greenwich
RSA Insurance Group
South Tees Hospitals NHS Foundation Trust
SPD Bank (London Branch)
St Modwen Homes
The Carbon Literacy Project
The Royal Borough Of Kensington and Chelsea
The Sheiling Ringwood
The Travel Corporation
Tove Learning Trust
UBS Ltd
Union Maritime
Vardags
Visa Europe
Whitbread PLC
York St John University London
IT Director
Cyber Security Analyst
IT Audit Assistant Manager
IT Infrastructure Security Lead
Systems Developer
Technology Auditor
Deputy Head of IT
IT security & Data Protection Specialist
Cyber Security & IT Analyst
IT Business & Programmes Manager
Senior Applications Manager
Network Manager
Head of Risk
IT & Communications Strategy Lead
IT Architect
Head of IT Infrastructure
Head of IT
Senior Risk Manager
IT Procurement Manager
Program Director
10th July 2025
Hilton London Canary Wharf
Scan or click here for our website:
11th September 2025
Hilton London Canary Wharf
Scan or click here for our website:
20th & 21st October 2025
Radisson Hotel & Conference Centre, London Heathrow
Scan or click here for our website:
11th November 2025
Hilton London Canary Wharf
Scan or click here for our website:
+97 254 7338 860 / shahar.i@akeyless.io / akeyless.io
The Akeyless Vaultless Platform is an enterprise-grade cloud-native SaaS solution that secures secrets (credentials, certificates, and keys) while eliminating the need for vaults along with the complex and burdensome necessity of vault management, resulting in up to a 70% reduction in costs. The platform uses Distributed Fragments Cryptology (DFC*™) to ensure zero knowledge - secrets are created as distributed fragments in the cloud and never found in one place. Akeyless is fast to deploy, requires no maintenance, is built for automation, and offers infinite scaling capabilities regardless of the number of environments, regions, or clouds, leading to a 270% higher adoption rate compared to vaults.
02922 784 452 / carrissa.wellings@arcanumis.com / arcanum-cyber.com
Arcanum is a National Cyber Security Centre (NCSC) Assured Cyber Security Consultancy specialising in Risk Management, Audit & Review, Security Architecture, Cyber Resilience Audit, and CHECK Penetration Testing. Since our inception in 2008, we have been committed to delivering expert security advice and services to businesses, safeguarding them against the ever-evolving landscape of cyber threats.
07399 214 130 / tim.mahoney@coretocloud.co.uk / coretocloud.co.uk
Core to Cloud is a UK-based cybersecurity managed services provider that empowers organisations to protect, detect, and respond to today’s digital threats with intelligent, innovative solutions. With a strategic focus on visibility, validation, governance, and response, Core to Cloud partners with leading security vendors to deliver cutting-edge technology and tailored services that improve cyber resilience. The company offers a broad portfolio of services, including Managed Detection and Response (MDR), Security Testing, Crisis Simulation, Dark Web Monitoring, and Third-Party Risk Management. Its approach blends human expertise with advanced tools to uncover vulnerabilities, assess risk, and strengthen overall security posture - without unnecessary complexity or disruption. Known for its consultative style and customer-first ethos, Core to Cloud works across sectors such as healthcare, education, retail, and enterprise, enabling clients to make informed security decisions with confidence.
CoreView
07806 711 499 / jamie.davies@coreview.com / coreview.com
CoreView is the Global Leader in Effortless Microsoft 365 Security, Governance, and Administration. Offering an end-to-end solution that stretches across the whole M365 ecosystem; from your tenant level configurations, right up to your most critical workloads. Created by Microsoft 365 experts, for Microsoft 365 experts, CoreView makes best practice for Microsoft 365 effortless by simplifying, unifying, and enhancing the Microsoft 365 admin experience. CoreView empowers over 4000+ Microsoft 365 organizations to turn the tide on endless tasks, deliver best practice security, and drive ROI.
07974 590 984 / isabel.carter@darktrace.com / darktrace.com
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013 in Cambridge, UK, Darktrace provides the essential cybersecurity platform to protect organizations from unknown threats using AI that learns from each business in real-time. Darktrace’s platform and services are supported by 2,400+ employees who protect nearly 10,000 customers globally.
02039 819 041 / Faizal.Shabeer@eccouncil.org / eccouncil.org / cisomag.com
EC-Council, creator of the Certified Ethical Hacker (C|EH), is a global cybersecurity certification and training leader with 380,000+ certified professionals. Trusted by Fortune companies and intelligence agencies, it empowers security teams worldwide. Its publication, CISO MAG, delivers expert insights to combat evolving cyber threats and protect digital landscapes.
01202 308 000 / jbush@enhanced.co.uk / enhanced.co.uk
At Enhanced, we specialise in helping businesses reach their potential through the power of technology. Founded in 1994, we have grown our portfolio of products and industry-leading services for over 30 years. In 2022, Enhanced transitioned into an Employee Ownership Trust, empowering our staff to feel part of the bigger picture. We are proud of our invaluable, highly skilled team and are passionate about offering exceptional IT Support, working as an extension of our clients’ teams. Our approach is client-focused and consultative, building lasting partnerships that deliver real business value. From managed IT services and cybersecurity to cloud solutions and business software, we provide tailored technology strategies that drive efficiency and growth. Based in Dorset, we serve businesses across the South and beyond, bringing enterprise-level IT expertise to organisations of all sizes.
07851 235 531 / thomas.gowers@esentire.com / esentire.com eSentire UK Ltd
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organisations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
+18 443 973 524 / ted.stockton@expel.com / expel.com
Expel is the leading managed detection and response (MDR) provider trusted by some of the world’s most recognizable brands to expel their adversaries, minimize risk, and build security resilience. We combine world-class security practitioners and our AI-driven platform to augment existing programs, helping customers maximize their security investments and focus on building trust—with their customers, partners, and employees.
patrick.mcmonagle@kaseya.com / vonahi.io Kaseya
The industry’s most valued automated network penetration testing platform. vPenTest from Vonahi Security, a Kaseya company, is the leading SaaS platform that’s revolutionizing network penetration testing through automation. The full-scale penetration testing platform makes network pentesting more scalable, accurate, faster, consistent, and not prone to human error. Using vPenTest, organizations can now schedule a network penetration test at any time, allowing security teams to evaluate their risks to cyber attacks in real-time. Vonahi Security is proud to be a CREST Accredited in both EMEA and Australasia. MSP partners and customers can now receive a CREST-certified network penetration test report from vPenTest across Europe, the Middle East, Africa (EMEA), and Australasia. This prestigious accreditation places us among an elite group of only 300 CRESTaccredited cybersecurity providers worldwide.
405 9842 / hello@testassociates.co.uk / devopsonline.co.uk/devops-awards
The National DevOps Awards spotlight top innovations in agile and DevOps transformations. Want to showcase your success on a national stage? Let’s talk –reach out today at hello@testassociates.co.uk
02033 270 699 / reza.mahmood@securityhq.com / securityhq.com
SecurityHQ is a technology-agnostic MSSP that designs and architects custom security solutions to fit your environment’s specific needs. Whether that includes fully managing your security program or filling in well-defined gaps, we serve as an extension of your security team and give you the essential elements you need to protect your organization: Time and insights. With bespoke managed services ranging from 24/7 MDR to threat and risk advisory to proactive security posture management, our 450+ SOC Analysts and Engineers detect and remediate threats with a 62% lower noise-to-signal ratio than competitors.
02045 910 291 / simon@socura.co.uk / socura.co.uk
Socura reduces cyber risk by proactively detecting and responding to threats, 24/7. Our Managed Detection and Response (MDR) service operates as an extension of your team - supplying highly skilled SOC experts and the additional capabilities you need to scale your security operations and accelerate your response to attacks.
07938 915 524 / markm@stormguidance.com / stormguidance.com
STORM Guidance are pioneers of digital investigations, beginning our journey in early 1990’s supporting cybercrime and other criminal investigations with digital forensics, where our work established cybercrime case law and earned us police and judicial commendations in the UK and the US. We have been the Cyber Incident Response (CIR) firm of choice for leading cyber insurers for over a decade. Our current CIR service delivers a comprehensive suite of specialisms. All that is needed for any organisation of any size when faced with a cyber incident. Our decades of experience in CIR informs our delivery of Cyber Incident Exercising (CIE) and we offer both tabletop and live play CIE workshops for executives, managers and operational specialists. Our realistic scenarios are tailored to our client’s operations to deliver an optimal learning experience. We are proud to be a UK NCSC CIR and CIE Assured Service Provider (ASP).
07712 741 463 / cyberescaperoom.co
Training that doesn’t suck. At The Cyber Escape Room Co., we make cyber security awareness actually fun. No death-by-slideshow. No tick-the-box boredom. Just immersive, interactive experiences that get people engaged, laughing, and... most importantly... learning. From physical and digital escape rooms to AR games, breach workshops, CTF challenges and AI-powered vishing attacks, we create training your team won’t forget. Our blend of storytelling, suspense, and real-world relevance turns passive learners into active defenders. We work with CISOs, security awareness pros, and L&D leads across enterprise and mid-market businesses... especially in finance, retail and critical infrastructure. Whether you’re UK-based or scaling across South Africa, the USA, or beyond, we’ve got you. And yes, we’ve got speakers who’ll wake up your event too. Bottom line? We’re the anti-boring security awareness provider. If your training needs an upgrade, we’ve got the good stuff.
07415 738 402 / robyn.vaughan@threatlocker.com / threatlocker.com
Stop Ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Detect EDR and MDR solutions.
07984 455 066 /
Tuskira stops AI-driven threats by unifying your security stack into an AI-powered defence system. Our AI agents simulate real-world attacks in a digital twin of your environment to pinpoint and fix misconfigurations, optimise security controls, and preempt AI-powered exploits, even for unpatched vulnerabilities. With Tuskira, you move beyond reactive patching to proactive, AI-driven risk defense. Our unified platform allows you to respond to today’s risks while building resilience for tomorrow, securing every exposure point across your entire environment.
07833 432 258 / cmalkin@varonis.com / varonis.com
Varonis (Nasdaq: VRNS) is the leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organizations worldwide trust Varonis to defend their data wherever it lives — across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), AI security, and insider risk management. Varonis protects data first, not last. Learn more at www.varonis.com.
Formed in 2000, Wavenet is the UK’s most trusted managed service and security provider. Through its broad portfolio in cyber security, connectivity, cloud and communications, blended with the power of AI and automation, Wavenet’s award-winning solutions help customers drive digital transformation. Wavenet’s vision is to pioneer a future where scalable technology, expertise and exceptional customer service redefine what’s possible for businesses and communities. Wavenet has a CREST & CHECK accredited cyber security division and a 24/7 UK Security Operations Centre. It looks after over 22,000 commercial organisations, financial institutions and public sector bodies, with customers including DVLA, Greene King, Alliance Automotive, NHS 111 and NatWest. Wavenet offers economies of scale and diverse vendor relationships, with long-standing partnerships with top technology providers including Microsoft, Cisco, HPE, and Gigamon. It has over 30 offices across the UK and employs 1,700 people. 07764 230 014 / James.Colwell@wavenet.co.uk
The Total Security Summit is evolving!
Now featuring the Fire Prevention & Safety Summit, this event connects security, fire protection, and workplace safety professionals with top solution providers.
Gain industry insights, build key connections, and explore innovative solutions through one-to-one meetings and networking.
11th November 2025
Hilton London Canary Wharf
The Cyber Secure Forum continues to follow the awardwinning structure, that brings key IT/cyber security professionals together with leading solution providers for focused one-to-one meetings via a pre-arranged itinerary of business meetings.
Explore how our event unfolds here