Cyber Secure Forum Event Guide

Page 1


24TH JUNE 2025

HILTON LONDON CANARY WHARF

Headline Sponsor

CONTENTS

We’re delighted that you have chosen to join us at the Cyber Secure Forum – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.

And let’s not forget the networking – we’ve created a relaxed environment for you to form new partnerships, with ample opportunities to mix with peers during the buffet lunch and coffee breaks!

4

6

Our Partners

8

Itinerary

‘Browser Security Month: Enterprise Browsers vs. Traditional Browsers –What’s the big idea?’

@forumeventsltd #FECyberSecureForum

10 Seminars

12 ‘Advanced Threat Dashboards: How AI is shaping Predictive Threat Monitoring’

14 Delegates

16 Dates for your Diary

20

Supplier Directory

Follow us on socials:

@forumevents #forumevents

Cyber Secure Forum

For more information about our event, contact:

Liam Cloona - Senior Sales Manager on 01992 374078 or L.Cloona@forumevents.co.uk

Josh Kingsmill - Delegate Sales Executive on 01992 374081 or J.Kingsmill@forumevents.co.uk

Our Partners

Partners & Supporters

SECURE AI AT FULL SPEED

DEVELOPMENT IS FASTER THAN EVER

DevOps, cloud, and open source software help developers create, test, and release code in less time.

THERE’S MORE CODE & APPS THAN EVER

The volume of apps and code - now boosted by AI - is increasing and security needs visbility across the entire code base and software supply chain.

EVERYTHING IS IN THE DEVELOPER’S HANDS

Traditional infrastructure was secured by IT, but now that everything is in the cloud, security is in the developer’s hands.

Itinerary

08.45 - 09.25

Opening Presentation

‘Language Crimes: Interactions of Love, Money and Threat’

Dr Elisabeth Carter

Kingston University London Meeting Room 3/4/5

09.30 - 10.05

Seminar

‘Negotiating with cyber criminals’

Paul Colwell

Wavenet CyberGuard Meeting Room 3/4/5

10.10 - 13.10

Face to Face Meetings Quayside Suite

13.10 - 14.00

Networking Buffet Lunch Cinnamon Restaurant

14.05 - 14.40

Seminar

‘Interactive Cyber Escape Room –The Breach’

Amy Stokes-Waters

The Cyber Escape Room Co.

Meeting Room 3/4/5

14.45 - 16.45

Face to Face Meetings Quayside Suite

Stay One Step Ahead with CyberGuard

Cyber threats are evolving every day, but so are we. Our CyberGuard solutions empower your business to stay secure, resilient, and ahead of the curve.

In a crowded marketplace, you need a security partner you can trust-one that simplifies the noise, cuts through the complexity, and delivers precisely what your business requires.

As proud CHECK and CREST-certified providers, we offer comprehensive cyber protection designed to safeguard your business.

• CREST & CHECK-accredited penetration testing

• 24/7 UK-based, security detection and response managed SOC

• Comprehensive employee training and simulated phishing exercises

• Proactive risk assessments and rapid incident response

• Expert compliance support and strategic advisory

enquiries@wavenet.co.uk wavenet.co.uk

BROWSER SECURITY MONTH: Enterprise Browsers vs. Traditional Browsers – What’s the big idea?

Many organisations are reassessing one of the most overlooked attack vectors in their infrastructure: the web browser. As hybrid and remote work models solidify, traditional browsers, built for consumer convenience, are increasingly falling short in meeting enterprise-grade security requirements. This has fuelled the rise of a new category: secure enterprise browsers…

Unlike legacy browsers enhanced by plug-ins or endpoint agents, secure enterprise browsers are purposebuilt for corporate environments. Solutions from providers such as Island, Talon, and Google’s Chrome Enterprise have emerged as transformative tools that embed security and compliance directly into the browsing experience.

What Sets Enterprise Browsers Apart?

Enterprise browsers offer built-in features such as granular policy enforcement, session monitoring, clipboard and screenshot controls, and data loss prevention (DLP) mechanisms—all centrally managed via admin consoles. This level of control helps organisations enforce security at the point of access without relying on a patchwork of extensions, agents, and manual configurations.

Another core differentiator is Zero Trust compatibility. Secure browsers can verify user identities, isolate browsing sessions, and restrict access to sensitive apps based on contextual risk signals (such as device posture or geolocation). In contrast, traditional browsers often require integration with third-party Zero Trust Network Access (ZTNA) tools, adding complexity and potential gaps.

Combatting Shadow IT and Phishing

Phishing remains one of the most common entry points for attackers— and browsers are often the first line of defence. Enterprise browsers incorporate advanced anti-phishing controls and real-time URL risk assessment. They can also restrict unsanctioned SaaS usage, helping IT teams mitigate shadow IT without stifling productivity.

Integration and User Experience

A major challenge with layered browser security has been performance and user experience. Enterprise browsers are built to operate smoothly within existing workflows. Many support Chromium-based architecture, ensuring compatibility with web apps and extensions that staff already use. This makes adoption less disruptive compared to traditional bolt-on security models.

When Should Organisations Make the Shift?

IT leaders should evaluate the need for enterprise browsers based on three key triggers: (1) increased SaaS adoption; (2) growing remote or third-party workforce; and (3) regulatory compliance obligations around data security and user activity monitoring.

Conclusion

As web usage dominates enterprise workflows, browsers have become critical control points in the security stack. While traditional browsers remain viable for some use cases, the benefits of enterprise-grade solutions, particularly in terms of visibility, control, and compliance, are driving a quiet but significant shift. For organisations serious about securing the modern workplace, 2025 may be the tipping point for embracing the secure browser revolution.

Scan or click here to subscribe to the Cyber Security Briefing newsletter

W E M A K E N E T W O R K

P E N T E S T I N G E A S Y .

Automated, Affordable, and CREST Accredited Solution!

Seminars

TUESDAY 24TH JUNE

08.45 – 09.25

Kingston University London

“Language Crimes: Interactions of Love, Money and Threat”

Exploring the interplay of love, money & threat in romance fraud, this presentation reveals how language is used to persuade, manipulate and threaten without causing alarm. It exposes and tracks the grooming process and manipulation techniques from first contact with the fraudster, to the transition into the danger zone, and requests for money and intimate images, before morphing into explicit threats and acts of sextortion. The insights contained in this work have clear implications for the future directions of public protection.

• Interpersonal frauds are based on exploiting contextual & situational vulnerabilities.

• These crimes are similar to the manipulation experienced in domestic abuse & coercive control.

• Interpersonal frauds are hybrid rather than singular (e.g romance & investment)

• Public/customer protection should use these insights to work more effectively across all sectors.

Dr Elisabeth Carter examines (ab)uses of language for criminal gain; in particular the ways in which language is used by fraudsters in all APP fraud including romance fraud, investment fraud, courier fraud and what’s app frauds. She has a written a substantial body of empirical cutting-edge published research - journal articles, books, book chapters, encyclopedia entries, cross-Government reports, national trading standards guidance, national police guidance and briefing papers on the language of fraud, deception, witness evidence, negotiations and confessions.

09.30 – 10.05

“Negotiating with cyber criminals”

Step into the CISO’s shoes during a ransomware attack and explore the real-time decisions, intelligence, and dilemmas faced in the first 24 hours of a livecyber crisis.

• Live role-play scenario: Acting as a CISO during a ransomware attack

• Key decisions in the first 24 hours of an incident

• Impact of threat intelligence on response strategy

• “To pay or not to pay?” – navigating ransom demands

• Practical takeaways to inform your own incident response plan

Paul Colwell is Chief Information Security Officer at Wavenet, bringing over two decades of deep technical and leadership experience across cyber security, cloud and enterprise IT. Paul has held senior roles including Chief Technology Officer at Wavenet, and Technical Director at both CyberGuard Technologies and OGL Computer Group. Known for his hands-on innovation and strategic foresight, Paul has built a reputation for developing cutting-edge cloud solutions and forming impactful technology partnerships. He is a cyber security visionary, with a passion for helping businesses navigate the constant evolution of the threat and cyber-attack landscape.

14.05 - 14.40

The Cyber Escape Room

TUESDAY 24TH JUNE

“Interactive Cyber Escape Room – The Breach”

Your company’s been hit with some serious ransomware, which you’ve traced back to a single set of leaked credentials. The Breach tasks you with uncovering the source and identifying how the data got out in the first place. Was it a malicious insider or just bad luck? Find out in this interactive escape room game.

With over a decade in tech, Amy Stokes-Waters has built a career spanning sales, marketing, and project management. Now CEO of The Cyber Escape Room Co., she is passionate about making cybersecurity training engaging, creative, and effective.

As a single mum and natural multitasker, Amy brings energy, enthusiasm, and focus to everything she does. Whether it’s landing a business on three continents in six months or designing standout events, she throws her whole self into the challenge.

A “force of nature,” she inspires others to think differently and make things happen.

ADVANCED THREAT DASHBOARDS: How AI is shaping Predictive Threat Monitoring

Cybersecurity is defined not just by how quickly organisations respond to threat, but how effectively they anticipate and prevent them. As attack surfaces grow and threats become more sophisticated, traditional dashboards offering historical or real-time data are no longer enough. Instead, security teams attending the Cyber Secure Forum are embracing AI-powered predictive threat monitoring, integrated directly into their threat intelligence dashboards, to move from reactive defence to proactive protection…

At the heart of this shift is the use of machine learning algorithms and behavioural analytics to detect anomalies, flag early indicators of compromise, and prioritise responses based on potential impact. Modern dashboards are no longer passive data displays; they are dynamic, intelligent systems that surface evolving threats before they become breaches.

From Static Data to Predictive Insight

Traditional SIEM (Security Information and Event Management) dashboards provided security teams with consolidated views of log data, alerts, and compliance metrics. While useful for tracking incidents, these systems were largely reactive,

offering visibility after a threat had entered the network.

Today’s AI-enhanced dashboards ingest vast volumes of structured and unstructured data, from endpoints, cloud infrastructure, user behaviour, threat feeds, and external telemetry. Using machine learning models, these platforms can identify patterns that suggest malicious activity, such as unusual login times, abnormal data transfers, or subtle privilege escalations.

Instead of waiting for alerts based on pre-set rules, predictive systems can adapt to baseline behaviours within an organisation and flag deviations in real time. This approach significantly reduces false positives and highlights threats that may otherwise evade detection, such as insider risks or polymorphic malware.

Prioritisation and Automated Response

Predictive dashboards also help cybersecurity teams prioritise threats by context. Rather than overwhelming analysts with hundreds of low-impact alerts, AI tools assess risk based on asset criticality, user behaviour, and threat severity—offering a ranked response queue.

Some platforms are now integrating with Security Orchestration,

Automation, and Response (SOAR) systems to trigger automated actions, like isolating endpoints, revoking credentials, or escalating incidents to human analysts. This speeds up time-to-containment and supports round-the-clock security operations without increasing headcount.

Driving Strategy with Predictive Intelligence

Beyond incident response, predictive threat dashboards are informing long-term cyber strategy. By surfacing repeat vulnerabilities, attack patterns, and emerging risks, these platforms help CISOs make better decisions on where to invest, patch, and train.

As cyber threats continue to evolve, AI-driven dashboards will be central to staying ahead. In 2025, the organisations best protected from cyberattack will be those that don’t just monitor threats, they predict and neutralise them before damage is done.

Scan or click here to subscribe to the Cyber Security Briefing newsletter

Delegates

AIG Group UK Ltd

Allwyn UK

Arkis

Aston University Engineering Academy

BLME

Canon Europe Ltd

CME Group

Commonwealth Secretariat

CPG Logistics Ltd

Croydon Council

Currys

Cygnet Health Care

Dentsu

East and North Hertfordshire NHS Trust

Heathrow Airport

IDX (Investis Digital)

Iglu

J A Kemp

JP Morgan

Katherine Warington School

Kroo Bank

Legal and General

M7 Real Estate

Maccaferri UK & Ireland

Mclaren Construction Group

Metropolitan Police

MOD

Osea Ltd

PDS

Quintessentially

Senior Cyber Risk Specialist

Governance Risk & Compliance Officer

CISO

ICT Network Manager

Cyber & Operational Resilience Manager

IT Security Lead Consultant

Global Head of NSG

Information Security Officer

Head of IT & Security

Cyber Security Specialist

Senior Cyber Security Manager

IT Risk & Compliance Manager

Head of Information Security

Technology Assurance Analyst

Digital Cyber specialist

Cyber Risk & Assurance Lead

CISO

Snr DevOps Engineer

Head of Technology

Vice President - Cybersecurity Technology & Controls

Network Manager

CISO

Group Digital & Data Risk Manager

IT Manager

ICT Systems Manager

Group IT & Security Director

Head of IT Infrastructure

Senior Cyber Advisor

CTO

Senior Manager IT

Global IT & Infrastructure Engineer

Reliance Bank

Royal Museums Greenwich

RSA Insurance Group

South Tees Hospitals NHS Foundation Trust

SPD Bank (London Branch)

St Modwen Homes

The Carbon Literacy Project

The Royal Borough Of Kensington and Chelsea

The Sheiling Ringwood

The Travel Corporation

Tove Learning Trust

UBS Ltd

Union Maritime

Vardags

Visa Europe

Whitbread PLC

York St John University London

IT Director

Delegates

Cyber Security Analyst

IT Audit Assistant Manager

IT Infrastructure Security Lead

Systems Developer

Technology Auditor

Deputy Head of IT

IT security & Data Protection Specialist

Cyber Security & IT Analyst

IT Business & Programmes Manager

Senior Applications Manager

Network Manager

Head of Risk

IT & Communications Strategy Lead

IT Architect

Head of IT Infrastructure

Head of IT

Senior Risk Manager

IT Procurement Manager

Program Director

Dates for your Diary

10th July 2025

Hilton London Canary Wharf

Scan or click here for our website:

11th September 2025

Hilton London Canary Wharf

Scan or click here for our website:

20th & 21st October 2025

Radisson Hotel & Conference Centre, London Heathrow

Scan or click here for our website:

11th November 2025

Hilton London Canary Wharf

Scan or click here for our website:

Supplier Directory

Akeyless Security Ltd

+97 254 7338 860 / shahar.i@akeyless.io / akeyless.io

The Akeyless Vaultless Platform is an enterprise-grade cloud-native SaaS solution that secures secrets (credentials, certificates, and keys) while eliminating the need for vaults along with the complex and burdensome necessity of vault management, resulting in up to a 70% reduction in costs. The platform uses Distributed Fragments Cryptology (DFC*™) to ensure zero knowledge - secrets are created as distributed fragments in the cloud and never found in one place. Akeyless is fast to deploy, requires no maintenance, is built for automation, and offers infinite scaling capabilities regardless of the number of environments, regions, or clouds, leading to a 270% higher adoption rate compared to vaults.

Arcanum

02922 784 452 / carrissa.wellings@arcanumis.com / arcanum-cyber.com

Arcanum is a National Cyber Security Centre (NCSC) Assured Cyber Security Consultancy specialising in Risk Management, Audit & Review, Security Architecture, Cyber Resilience Audit, and CHECK Penetration Testing. Since our inception in 2008, we have been committed to delivering expert security advice and services to businesses, safeguarding them against the ever-evolving landscape of cyber threats.

Core To Cloud Ltd

07399 214 130 / tim.mahoney@coretocloud.co.uk / coretocloud.co.uk

Core to Cloud is a UK-based cybersecurity managed services provider that empowers organisations to protect, detect, and respond to today’s digital threats with intelligent, innovative solutions. With a strategic focus on visibility, validation, governance, and response, Core to Cloud partners with leading security vendors to deliver cutting-edge technology and tailored services that improve cyber resilience. The company offers a broad portfolio of services, including Managed Detection and Response (MDR), Security Testing, Crisis Simulation, Dark Web Monitoring, and Third-Party Risk Management. Its approach blends human expertise with advanced tools to uncover vulnerabilities, assess risk, and strengthen overall security posture - without unnecessary complexity or disruption. Known for its consultative style and customer-first ethos, Core to Cloud works across sectors such as healthcare, education, retail, and enterprise, enabling clients to make informed security decisions with confidence.

CoreView

07806 711 499 / jamie.davies@coreview.com / coreview.com

CoreView is the Global Leader in Effortless Microsoft 365 Security, Governance, and Administration. Offering an end-to-end solution that stretches across the whole M365 ecosystem; from your tenant level configurations, right up to your most critical workloads. Created by Microsoft 365 experts, for Microsoft 365 experts, CoreView makes best practice for Microsoft 365 effortless by simplifying, unifying, and enhancing the Microsoft 365 admin experience. CoreView empowers over 4000+ Microsoft 365 organizations to turn the tide on endless tasks, deliver best practice security, and drive ROI.

Darktrace

07974 590 984 / isabel.carter@darktrace.com / darktrace.com

Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013 in Cambridge, UK, Darktrace provides the essential cybersecurity platform to protect organizations from unknown threats using AI that learns from each business in real-time. Darktrace’s platform and services are supported by 2,400+ employees who protect nearly 10,000 customers globally.

EC-Council / CISO MAG

02039 819 041 / Faizal.Shabeer@eccouncil.org / eccouncil.org / cisomag.com

EC-Council, creator of the Certified Ethical Hacker (C|EH), is a global cybersecurity certification and training leader with 380,000+ certified professionals. Trusted by Fortune companies and intelligence agencies, it empowers security teams worldwide. Its publication, CISO MAG, delivers expert insights to combat evolving cyber threats and protect digital landscapes.

01202 308 000 / jbush@enhanced.co.uk / enhanced.co.uk

At Enhanced, we specialise in helping businesses reach their potential through the power of technology. Founded in 1994, we have grown our portfolio of products and industry-leading services for over 30 years. In 2022, Enhanced transitioned into an Employee Ownership Trust, empowering our staff to feel part of the bigger picture. We are proud of our invaluable, highly skilled team and are passionate about offering exceptional IT Support, working as an extension of our clients’ teams. Our approach is client-focused and consultative, building lasting partnerships that deliver real business value. From managed IT services and cybersecurity to cloud solutions and business software, we provide tailored technology strategies that drive efficiency and growth. Based in Dorset, we serve businesses across the South and beyond, bringing enterprise-level IT expertise to organisations of all sizes.

07851 235 531 / thomas.gowers@esentire.com / esentire.com eSentire UK Ltd

eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organisations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.

+18 443 973 524 / ted.stockton@expel.com / expel.com

Expel is the leading managed detection and response (MDR) provider trusted by some of the world’s most recognizable brands to expel their adversaries, minimize risk, and build security resilience. We combine world-class security practitioners and our AI-driven platform to augment existing programs, helping customers maximize their security investments and focus on building trust—with their customers, partners, and employees.

patrick.mcmonagle@kaseya.com / vonahi.io Kaseya

The industry’s most valued automated network penetration testing platform. vPenTest from Vonahi Security, a Kaseya company, is the leading SaaS platform that’s revolutionizing network penetration testing through automation. The full-scale penetration testing platform makes network pentesting more scalable, accurate, faster, consistent, and not prone to human error. Using vPenTest, organizations can now schedule a network penetration test at any time, allowing security teams to evaluate their risks to cyber attacks in real-time. Vonahi Security is proud to be a CREST Accredited in both EMEA and Australasia. MSP partners and customers can now receive a CREST-certified network penetration test report from vPenTest across Europe, the Middle East, Africa (EMEA), and Australasia. This prestigious accreditation places us among an elite group of only 300 CRESTaccredited cybersecurity providers worldwide.

National DevOps Awards

405 9842 / hello@testassociates.co.uk / devopsonline.co.uk/devops-awards

The National DevOps Awards spotlight top innovations in agile and DevOps transformations. Want to showcase your success on a national stage? Let’s talk –reach out today at hello@testassociates.co.uk

02033 270 699 / reza.mahmood@securityhq.com / securityhq.com

SecurityHQ is a technology-agnostic MSSP that designs and architects custom security solutions to fit your environment’s specific needs. Whether that includes fully managing your security program or filling in well-defined gaps, we serve as an extension of your security team and give you the essential elements you need to protect your organization: Time and insights. With bespoke managed services ranging from 24/7 MDR to threat and risk advisory to proactive security posture management, our 450+ SOC Analysts and Engineers detect and remediate threats with a 62% lower noise-to-signal ratio than competitors.

Socura

02045 910 291 / simon@socura.co.uk / socura.co.uk

Socura reduces cyber risk by proactively detecting and responding to threats, 24/7. Our Managed Detection and Response (MDR) service operates as an extension of your team - supplying highly skilled SOC experts and the additional capabilities you need to scale your security operations and accelerate your response to attacks.

Storm Guidance Limited

07938 915 524 / markm@stormguidance.com / stormguidance.com

STORM Guidance are pioneers of digital investigations, beginning our journey in early 1990’s supporting cybercrime and other criminal investigations with digital forensics, where our work established cybercrime case law and earned us police and judicial commendations in the UK and the US. We have been the Cyber Incident Response (CIR) firm of choice for leading cyber insurers for over a decade. Our current CIR service delivers a comprehensive suite of specialisms. All that is needed for any organisation of any size when faced with a cyber incident. Our decades of experience in CIR informs our delivery of Cyber Incident Exercising (CIE) and we offer both tabletop and live play CIE workshops for executives, managers and operational specialists. Our realistic scenarios are tailored to our client’s operations to deliver an optimal learning experience. We are proud to be a UK NCSC CIR and CIE Assured Service Provider (ASP).

The Cyber Escape Room Co.

07712 741 463 / cyberescaperoom.co

Training that doesn’t suck. At The Cyber Escape Room Co., we make cyber security awareness actually fun. No death-by-slideshow. No tick-the-box boredom. Just immersive, interactive experiences that get people engaged, laughing, and... most importantly... learning. From physical and digital escape rooms to AR games, breach workshops, CTF challenges and AI-powered vishing attacks, we create training your team won’t forget. Our blend of storytelling, suspense, and real-world relevance turns passive learners into active defenders. We work with CISOs, security awareness pros, and L&D leads across enterprise and mid-market businesses... especially in finance, retail and critical infrastructure. Whether you’re UK-based or scaling across South Africa, the USA, or beyond, we’ve got you. And yes, we’ve got speakers who’ll wake up your event too. Bottom line? We’re the anti-boring security awareness provider. If your training needs an upgrade, we’ve got the good stuff.

ThreatLocker

07415 738 402 / robyn.vaughan@threatlocker.com / threatlocker.com

Stop Ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Detect EDR and MDR solutions.

Tuskira

07984 455 066 /

Tuskira stops AI-driven threats by unifying your security stack into an AI-powered defence system. Our AI agents simulate real-world attacks in a digital twin of your environment to pinpoint and fix misconfigurations, optimise security controls, and preempt AI-powered exploits, even for unpatched vulnerabilities. With Tuskira, you move beyond reactive patching to proactive, AI-driven risk defense. Our unified platform allows you to respond to today’s risks while building resilience for tomorrow, securing every exposure point across your entire environment.

Varonis UK Ltd

07833 432 258 / cmalkin@varonis.com / varonis.com

Varonis (Nasdaq: VRNS) is the leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organizations worldwide trust Varonis to defend their data wherever it lives — across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), AI security, and insider risk management. Varonis protects data first, not last. Learn more at www.varonis.com.

Wavenet CyberGuard

Formed in 2000, Wavenet is the UK’s most trusted managed service and security provider. Through its broad portfolio in cyber security, connectivity, cloud and communications, blended with the power of AI and automation, Wavenet’s award-winning solutions help customers drive digital transformation. Wavenet’s vision is to pioneer a future where scalable technology, expertise and exceptional customer service redefine what’s possible for businesses and communities. Wavenet has a CREST & CHECK accredited cyber security division and a 24/7 UK Security Operations Centre. It looks after over 22,000 commercial organisations, financial institutions and public sector bodies, with customers including DVLA, Greene King, Alliance Automotive, NHS 111 and NatWest. Wavenet offers economies of scale and diverse vendor relationships, with long-standing partnerships with top technology providers including Microsoft, Cisco, HPE, and Gigamon. It has over 30 offices across the UK and employs 1,700 people. 07764 230 014 / James.Colwell@wavenet.co.uk

The Total Security Summit is evolving!

Now featuring the Fire Prevention & Safety Summit, this event connects security, fire protection, and workplace safety professionals with top solution providers.

Gain industry insights, build key connections, and explore innovative solutions through one-to-one meetings and networking.

11th November 2025

Hilton London Canary Wharf

The Cyber Secure Forum continues to follow the awardwinning structure, that brings key IT/cyber security professionals together with leading solution providers for focused one-to-one meetings via a pre-arranged itinerary of business meetings.

Explore how our event unfolds here

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.