CYBERUK 2018

Safer Digital Britain
When:  10 Apr 2018 to 12 Apr 2018
Price:  Free to £1099 +VAT
CYBERUK 2018 logo

Lead Sponsors

Amazon Web Services
NCC Group

CYBERUK 2018 is the National Cyber Security Centre’s (NCSC) flagship event on cyber security. Over three days, 1800+ people will attend events covering both strategy (CYBERUK Leadership) and delivery (CYBERUK In Practice) – giving you up to date information and industry leading insights.

Building on success

CYBERUK 2017 was rated a success by sponsors, exhibitors and delegates alike, so our approach this year is to learn from what worked best and build on it. Delegates liked the chance to mix with innovative start-ups as much as established names in the industry. We saw how well the informal atmosphere helped with networking, so we’ll have more networking events and more relaxed breakout areas. And we’ll be adding more ways for delegates to become a part of the event, from live polling and questions to more interactive events and team-based challenges.

CYBERUK 2018 will be a curated event, emphasising quality over quantity. Quality of speakers, quality of workshops, quality of exhibitors and, most of all, quality of delegates. Invitations will go out to the key decision makers and the most skilled professionals across every Whitehall department and the public sector. Both events will be free of charge to public sector participants. We’ll also attract thought leaders and specialists from Critical National Infrastructure, the information security and technology industry as well as Academia and the Third Sector. In other words, everyone at the conference needs to be there – and is worth getting to know.

A Diverse and Inclusive event

Following CYBERUK 2017, NCSC Technical Director Dr Ian Levy wrote about the need for a community of professionals to collectively deliver the goals of the National Cyber Security Strategy. I his closing speech Dr Levy threw out a call to arms to make the cyber security industry an exemplar for diversity and inclusion. In his blog, he discussed the need for a community code of conduct where we can all come together and describe "what's acceptable and what isn't", so that we can "start discouraging behaviours and attitudes we won't accept".

Since then, the NCSC, the wider community and businesses outside the security sector have worked on the code of conduct that we have released to trial at CYBERUK 2018. The eventual aim is for this to be a mandatory part of working with the NCSC and something that the whole community can be proud to back.

You can read the full policy here and more about the creation of the policy in this blog.

CYBERUK 2018: Three Days, Two Events, One Destination

The NCSC’s first annual review identified that the cyber security threat to the UK is large, growing and diverse. In its first year of operating, the NCSC has achieved a huge amount establishing itself as the lead UK authority when it comes to cyber security. To deliver the NCSC vision we need to create a wide range of partnerships between Government, Industry and Academia. More than this, we need to develop a national conversation with everyone living and working in the UK.

That means moving beyond encouraging partnership and co-operation, and looking to build a true community of interest, encompassing everyone with a stake in cyber security. And, since the online threat affects citizens, Industry, Government and wider society, this is the scope of the ‘big conversation’ we need to have. CYBERUK 2018 will be where this starts.

It will never be possible to stop every cyber attack, but the NCSC is committed to delivering a world-class incident management service. CYBERUK 2018 will give us an opportunity to discuss and identify how we can build on what we have done so far. 

We’ll also focus on some areas of the UK economy which face unique challenges in implementing effective cyber security, especially retail and the voluntary sectors. We will discuss how we can support them and help make them less vulnerable to attack.

We know that in the years ahead there is so much to do in countering the strategic threat to our values, prosperity and way of life.  People are our strongest link and we know that building a community of partners for cyber security is crucial to meeting these challenges together.

CYBERUK In Practice (10-11 April): Bringing together 1200+ information security professionals. This will include specialists in the design and development of online services and systems, plus professionals in procurement and delivery. It will be an opportunity to share best practice, learn about the latest security threats and solutions, and consider the growing challenges we all face.

CYBERUK Leadership (12 April): The Government’s leadership event for business and public sector decision makers and strategists.  This is where key senior staff – policy makers, CEOs and thought leaders – will learn about and contribute to the development of the latest thinking on how cyber security and business acumen come together to deliver successful business outcomes. Speakers will be drawn from the same community as the 600+ delegates – Government, Academia, the Third sector, Critical National Infrastructure and Industry.  Minister-led, it will feature senior representatives from GCHQ and the NCSC.  It will include the popular CYBERUK Leadership Networking Dinner on 11 April 2018.

Not just another event

The only UK Government-hosted event for this sector. CYBERUK 2018 will be the largest and most wide ranging event for cyber security leaders and professionals in the UK. It will attract the key players in Government, Academia, and Industry, and will offer unrivalled networking opportunities.

Truly interactive

Everything about the event will be designed to encourage debate, feedback and input. Bringing to you world-class speakers, creating dynamic Q&As, competing at the Cyber Games and sharing through interactive walls, we’ll create an event built around you. An event that will inform, challenge and inspire attendees – and create an atmosphere where networking is built-in, not bolted on.

Why attend?

  • Hear from thought leaders, be that Ministers, technology leaders, or others with interesting and relevant messages to give.
  • Meet leaders from across the sector.
  • Participate in challenging and thought provoking content.
  • Learn from the best – thought leaders from Government, Industry, Academia and the Critical National Infrastructure.
  • Connect with the wide range of public sector participants, personally invited by the UK Government.
  • Enjoy a mix of plenary talks, themed streams/tracks and Lightning Talks.

STREAMS AND TRACKS

Streams and Tracks offer participants an opportunity to share information, explore case studies and take part in debates on issues around information and security.

WORKSHOPS

Allow a deeper understanding of key issues, exchange ideas and develop effective action plans for the future, a strong workshop programme is offered at CYBERUK 2018.

SPOTLIGHT TALKS

Held during breaks, lunch and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2018 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate.

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams, Tracks and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions and chat to our graphic artist who will find visual ways to capture your insights.

CYBERUK In Practice logo

CYBERUK In Practice (10-11 April 2018)

The highly interactive event over two days will provide a wide range of sessions to cater for all levels of knowledge and experience using the much enjoyed chilli ratings we introduced in 2017.  The event content will be heavily informed by the delegates, sponsors, and exhibitors thus ensuring we create an environment to promote diversity, create challenging conversations and identify opportunities to achieve our vision of making the UK the safest place to live and work online. 

CYBERUK In Practice brings together the professional community responsible for developing and implementing cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling plenary keynotes and panel debates, the following four Tracks will span two days and will be led by NCSC Technical Directors.

TRACKS

Track 1 • Vulnerabilities and Bug hunting - A technical stream that will explore vulnerability discovery, with some strong use-cases.

Track 2 • Cutting edge mitigations and future technology - Showcasing the art of the possible in security mitigations with today’s technology as well as looking to the future.

Track 3 • Data Science, analytics and automation - Taking a data driven approach to security, using analytics and automation to drive operational security.

Track 4 • Whole System Security - Advanced approaches to security analysis and management, drawing on risk, modelling and learning from engineering practices.

NETWORKING

On Monday 9 April there will be an evening Welcome Drinks Reception, held at a central Manchester location.

A relaxed CYBERUK In Practice Networking Drinks evening will take place in the exhibition hall following the first day of CYBERUK In Practice (10 April). Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract 1200+ technology and cyber security professionals from across the public sector, Critical National Infrastructure, Industry and Academia. They’ll come together to share the cyber security challenges we all face.

Our programme of seminars, Lightning Talks and keynote speeches is designed to stimulate feedback, challenge thinking, create debate and enable networking. We saw how well last year’s interactive elements worked in getting delegates talking, exchanging experience and technical insights – so we have planned some new experiences for 2018.

Delegates will leave with a thorough understanding of latest practice and policies, new innovations and emerging cyber threats. And, most of all, they’ll have built valuable new connections.

CYBERUK Leadership logo

CYBERUK Leadership (12th April 2018)

The 2018 event will develop highly interactive sessions which will focus on building our community for cyber security across four objectives; Reduce, Respond, Understand and Nurture.  It will bring together leaders who can enable a dynamic discussion, include workshops where challenges can be explored and time to build new relationships and networks across the public sector, Industry and Academia. 

CYBERUK Leadership will set the agenda for UK cyber security. This event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by an NCSC Engagement Deputy Director entrusted with shaping and leading the team’s delivery.

STREAMS

Stream 1 • REDUCE - Examining how the cyber security community reduces risks to the UK by securing public and private sector networks.

Stream 2  RESPOND - Demonstrating how the cyber security community responds to cyber security incidents to reduce the harm they cause to organisations and the wider UK.

Stream 3 • UNDERSTAND - How the cyber security community understands cyber security, and distils this knowledge into practical guidance that we make available to all.

Stream 4 • NURTURE - Developing industry and academic expertise to nurture the UK's cyber security capability.

NETWORKING DINNER

A prestigious CYBERUK Leadership Networking Dinner will be held on Wednesday 11 April, before the conference begins on Thursday.

THE AUDIENCE

CYBERUK Leadership will attract leaders in cyber security across Government and Industry, regulatory bodies and influencers. How can we be so sure? Last year’s event saw over 800 delegates – from senior leaders and risk owners from Government departments and cyber security leaders from the public and private sector including Academia. Over the day, we created a perfect environment for them to meet, network, and hear from leaders in their fields. This year will build on that success – but with more interactivity, more input from participants, and more opportunities to meet, exchange ideas and build relationships.

Around 60 per cent of participants will come from the public sector, and the public sector places are free.  The NCSC will ensure that we get the right mix by personally inviting key staff in strategic, decision-making roles. These are the people whose voices are listened to, who set the agenda, and who make things happen. CYBERUK Leadership attendance is invitation only for the public sector.

Lead Sponsors

Amazon Web Services

For more than 11 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 100 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, and application development, deployment, and management from 44 Availability Zones (AZs) across 16 geographic regions in the U.S., Australia, Brazil, Canada, China, Germany, India, Ireland, Japan, Korea, Singapore, and the UK. AWS services are trusted by millions of active customers around the world—including the fastest-growing startups, largest enterprises, and leading government agencies—to power their infrastructure, make them more agile, and lower costs.

Amazon Web Services

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.

NCC Group

Networking Sponsors

Trend Micro Incorporated

Networking Sponsor

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro Incorporated

L3 TRL

CYBERUK Leadership Dinner Sponsor

L3 TRL – Transforming the way you manage your cryptos

Since 1983 we have been a security partner of choice for defence and government organisations, we are an authorised development partner and key capability provider to HM Government.

Across 2018 we are launching a series of new CATAPAN High Grade capabilities into the UK Cyber market that will transform the ability to achieve secure missions in a variety of scenarios. The new capabilities include:

  • Data at rest for private clouds, public clouds and personal applications
  • New Micro data in transit crypto
  • Revolutionary benign key delivery solution

Reducing the risk in high threat operations whilst lowering the infrastructure management and costs, thus reducing the significant operating burdens.

CATAPAN is best in breed for High Grade Cyber security – the most effective line of defence to counter the growing threat and evolving nature of cyber-attacks, whilst giving freedom and flexibility to operate without constraint.

L3 TRL

SANS

Delegate Brochure Sponsor and Exhibitor

Established in 1989, SANS Institute is the largest information security training organisation in the world and is a cyber security supplier to HM Govt. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats. SANS training is led by world-renowned, expert instructors and the curriculum covers the most crucial areas of security. Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. In addition, SANS and its partners are currently delivering the HMG Cyber Schools Programme – Cyber Discovery.

SANS

Track and Stream Sponsors

Northrop Grumman

Track 2 Sponsor

Northrop Grumman is a recognised leader in cyber resilience solutions with more than thirty years’ experience in cyber security and information assurance. As a mission partner, Northrop Grumman brings unparalleled expertise in managing and protecting networks, and delivering trusted security solutions to high-risk customers both here in the UK and overseas.

Northrop Grumman’s aggressive investments in technology harness critical elements of human-decision making with advanced analysis of complex data sets to enable decisive action. The company is committed to building tomorrow’s cyber workforce through advanced cyber education, developing a Cyber Research Consortium with leading UK universities and offering its own Cyber Academy worldwide.

Northrop Grumman is a member of CyberFirst and CyberInvest, and leads CyberCenturion, the cyber defence competition for 12-18 year olds.

Northrop Grumman

QinetiQ

Track 3 and Stream 1 Sponsor

QinetiQ is a leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions to human performance.

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

BAE

Stream 3 Sponsor

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE

Sponsors

Raytheon

Future Zone Sponsor

Raytheon UK is a subsidiary of Raytheon Company. It is a prime contractor and major supplier to the U.K. Ministry of Defence and has developed strong capabilities in mission systems integration in defence, national security and commercial markets. Raytheon UK also designs, develops and manufactures a range of high-technology electronic systems and software at facilities in Harlow, Glenrothes, Gloucester, Waddington, Broughton and Manchester. About Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specialising in defence, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts.

Raytheon

Lockheed Martin

Bursary Sponsor

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Lockheed Martin

Anomali

Workshop Sponsor

Anomali delivers critical threat intelligence capabilities, allowing organisations to detect, investigate and respond to serious external threats. The company’s unmatched customer base spans all major verticals and includes partnerships with many ISACs and threat exchanges. Anomali integrates with internal infrastructure to identify new attacks, or search forensically over the past year to discover existing breaches, and enables security teams to quickly understand and contain threats.

Anomali

Atkins Global

Workshop Sponsor

SNC-Lavalin’s Atkins business is one of the world’s most respected design, engineering and project management consultancies. Together, SNC-Lavalin, a globally fully integrated professional services and project management company and Atkins help our clients plan, design and enable major capital projects, and provide expert consultancy that covers the full lifecycle of projects. We strive to build strong relationships by understanding the challenges our clients face, sharing their vision and helping them transform potential into reality. Our world-class expertise at scale delivers value to our clients, and the depth and breadth of our capabilities sets us apart from the competition.

Atkins Global

Context

Workshop Sponsor

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from cyber strategy and risk assessments, penetration testing and assurance to incident management and response, training and technical security research. We focus on helping clients avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks. Established in 1998, Context’s client base includes some of the world’s leading blue chip companies, alongside public sector and government organisations. With offices in the UK, Australia, Germany and USA, Context is ideally placed to work with clients worldwide.

Context

Egress Software Technologies

Workshop Sponsor

Egress is the leading provider of data privacy and risk management services designed to protect shared information throughout its lifecycle.

Offering Government and Enterprise customers a portfolio of complementary services, the Egress Switch platform leverages machine learning led policy management, encryption and eDiscovery to enable end-users to share and collaborate securely, while reducing the risk of loss and maintaining compliance. These award-winning integrated services include email and document classification, accidental send prevention, secure email and file transfer, secure managed file transfer, secure online collaboration and secure archive.

Certified by Government, Switch offers a seamless user experience, powerful real-time auditing and patented information rights management, all accessible using a single global identity.

Egress Software Technologies

ForeScout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2017 more than 2,500 customers in over 70 countries improve their network security and compliance posture with ForeScout solutions. See devices. Control them. Orchestrate system-wide threat response.

ForeScout

Tanium

Workshop Sponsor

Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. Serving as the "central nervous system" for enterprises, Tanium empowers cybersecurity and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale, and simplicity of Tanium, organizations can effectively protect against modern-day threats and realize new levels of cost efficiency in IT operations.

Tanium

Partner Exhibitor

Fortinet

Only Fortinet can provide you with a powerful, complete, and integrated threat management solution that delivers industry leading protection and performance.

Today’s security networks are too complex - Too many different vendors, too many alerts, and too many different ways of managing each device: it all leads to an unmanageable infrastructure where gaps can be difficult to find. Only Fortinet can deliver a seamless, comprehensive security infrastructure across the entire attack surface. From the cloud to the edge and to the endpoint, Fortinet’s industry-leading suite of products and tools address all phases of the attack cycle – from prevention to detection to remediation. With a complete solution from Fortinet, you deliver more control, greater visibility and less complexity.

Fortinet

Fujitsu

As one of the largest IT services and solutions providers in the world, Fujitsu are globally renowned for their expertise in digital transformation.

Fujitsu’s vision for the digital age is to make coherent information available, whenever and wherever it is needed, capitalising on our cyber-secure capabilities in networking and systems integration to link and enhance situational awareness. 

Through the development of our cutting edge digital solutions, we are helping to shape a new world and transform how people live, work, communicate and share data. Our approach extracts maximum benefit from existing IT systems, innovating, developing and extending capability and functionality.

Fujitsu

Leonardo

Leonardo, NATO’s Global Cyber Defence Mission Partner. Delivering confidence in the Cyber Security Domain for more than 25 years, through design, developing and delivery of security services and solutions in close partnership with customers, suppliers and authorities.  Constantly investing, we offer public and private organisations comprehensive security solutions needed to comply and defend.

Leonardo offers a consult, design, build and operate model with a broad product and service offering.

Leonardo

Premium Exhibitor

APMG International

APMG International is a global examination institute specialising in professional certifications.  In response to mounting risks in a digital age, APMG has designed a broad portfolio of world-class cyber security products. We've partnered with GCHQ to deliver the Certified Professional (CCP) and GCHQ Certified Training (GCT) schemes and the Defence Science and Technology Laboratory (Dstl) to develop CDCAT® the unique Cyber Defence Capability Assessment tool.  APMG is an Accreditation Body for NCSC's Cyber Essentials scheme and offers a host of other industry recognised certifications including; ISO/IEC 27001, COBIT® 5, IAITAM®, Cloud Industry Forum (CIF) and more.

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android and BlackBerry.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Deep Secure

Deep Secure has recently pioneered a unique and highly disruptive technology that delivers completely threat-free content.  The efficacy of the technology is unsurpassed, addressing a significant gap in the market for being able to simultaneously defeat all content threats – known, unknown (zero-day), and the undetectable – without the need to examine or isolate traffic.  Deep Secure’s 'Content Threat Removal' has universal relevance in protecting information systems, enabling organisations - to Click, Share, and Transact in perfect safety.

Deep Secure

e2e-assure

e2e-assure offer SOC-as-a-Service to protect your organisation which provides a complete cyber defence service suitable for all Government and Commercial customers, large and small. Protect your critical assets from cyber-attacks and GDPR breaches with our continuous security monitoring and active incident response. We provide the people, technology, and processes to deliver cost effective, high value protection. Deployed as-a-service for cloud services and/or on-premise with pay-as-you-go flexible pricing. Quick to implement, with immediate benefit. e2e-assure provides a range of secure cyber services including Protective Monitoring, SOC Services, Cyber Investigation and Incident Response, Cyber Assessments, Web Gateway and Secure Managed Clouds.

e2e-assure

Frazer-Nash Consultancy

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains. We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise. We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

Ixia Solutions Group

Ixia, a Keysight Business, provides testing, visibility, and security solutions to strengthen networks and cloud environments for enterprises, service providers, and network equipment manufacturers. Ixia offers organizations trusted environments in which to develop, deploy, and operate. Customers worldwide rely on Ixia to verify their designs, optimize their performance, and ensure protection of their networks and cloud environments.

Ixia Solutions Group

Reliance acsn

Reliance acsn is a Digital and Cybersecurity Service provider that believes results come from a well-executed and business-integrated approach stemming from the application of our skills and expertise, combined with threat intelligence and effective risk management.

ACSN was founded in 2003. Reliance acsn was born through merger with Reliance Cyber Science in 2016. We’ve built strong partnerships with over 80 customers across 5 continents, helping them to address Digital Transformation and Cybersecurity challenges. We have a highly skilled and experienced team, accredited by all the major security vendors

Reliance acsn

Surevine

Described by the Financial Times at launch as a “secure Facebook for cyber threats”, Threatvine is a cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

Threatvine unites critical national infrastructure, law enforcement and academia, moving beyond cyber-security information sharing to collaborative cyber-security intelligence analysis; keeping you one step ahead of the cyber threat.

Surevine, the company behind Threatvine, build secure, scalable collaboration environments for the most security conscious organisations; joining people up and enabling collaboration on their most sensitive information.

Smart, secure networks of connected people.

Surevine

Exhibitors

2T Security

RiskTree is a business-focused, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2. Using our innovative, browser-based software, it’s being used by both public and private sector clients to reduce the cost and delivery time for accreditation, and to support ISO27001 certification.

2T Security

4 Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions, we for over a decade have worked in the UK and overseas to create secure end to end systems.

4 Secure

Armour Communications

Armour Communications Limited provides market leading technology for secure communications on everyday devices. Easy to use, cost effective technology combined with advanced security techniques to deliver cloud-based and on-premises secure solutions.  Advanced features like MCPTT are available as well as integration with unified communications. Armour’s technology is FIPS, CPA and NATO approved.

Armour Communications

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

Tripwire

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprise and public sector organizations. Tripwire solutions are based on high-fidelity asset visibility and endpoint intelligence combined with business context. Tripwire’s solutions include configuration and policy management, file integrity monitoring, vulnerability management, log management, reporting and analytics.

Tripwire

Small Business Hub

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

CASQUE SNR

CASQUE SNR protects access. It is NCSC CAPS certified, suitable for Secret and resists Insider Attacks. Customer Controlled Keys with Out-of-the-Box Gateway Integration. Built for Cloud Identity as a Service."

CASQUE SNR

Cyber Security Jobsite

Cyber Security Jobsite.com, The definitive Job Board for Cyber Security Professionals. Search 100s of vacancies from the UKs top employers. Register your CV for FREE.

Cyber Security Jobsite

Data Eliminate

Data Eliminate specializes in the secure disposal and recycling of electronic and other sensitive assets and the provision of secure transport.  Accreditations for certain services include the MoD & CPNI.

Data Eliminate

IASME Consortium

The IASME Consortium is one of 5 Accreditation Bodies appointed by Government to assess against the Cyber Essentials scheme.  IASME also assesses against its own highly regarded and award-winning governance standard which includes the GDPR requirements.

IASME Consortium

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Topsec

Topsec is a leading provider of cloud-based managed email filtering & security solutions. Our services include anti-spam, anti-virus, continuity email, blended threats (real-time malware & phishing protection), content filtering, image analysis, email archiving, secure-file-transfer, phishing-training-as-a-service & Domain Management. 

Topsec

Yellow Room Learning

Yellow Room Learning empowers your workforce to protect business critical information and data by combining education, simulated phishing, augmented reality, video, and more, as part of a security awareness campaign.

Yellow Room Learning

CYBERUK_2018_Sponsorship_Brochure.pdf

PDF, 5379.79KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 Sponsorship Brochure

CYBERUK E-Bulletin 2.pdf

PDF, 2394.65KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin

CYBERUK 2018 is the National Cyber Security Centre’s (NCSC) flagship event on cyber security. Over three days, 1800+ people will attend events covering both strategy (CYBERUK Leadership) and delivery (CYBERUK In Practice) – giving you up to date information and industry leading insights.

Building on success

CYBERUK 2017 was rated a success by sponsors, exhibitors and delegates alike, so our approach this year is to learn from what worked best and build on it. Delegates liked the chance to mix with innovative start-ups as much as established names in the industry. We saw how well the informal atmosphere helped with networking, so we’ll have more networking events and more relaxed breakout areas. And we’ll be adding more ways for delegates to become a part of the event, from live polling and questions to more interactive events and team-based challenges.

CYBERUK 2018 will be a curated event, emphasising quality over quantity. Quality of speakers, quality of workshops, quality of exhibitors and, most of all, quality of delegates. Invitations will go out to the key decision makers and the most skilled professionals across every Whitehall department and the public sector. Both events will be free of charge to public sector participants. We’ll also attract thought leaders and specialists from Critical National Infrastructure, the information security and technology industry as well as Academia and the Third Sector. In other words, everyone at the conference needs to be there – and is worth getting to know.

A Diverse and Inclusive event

Following CYBERUK 2017, NCSC Technical Director Dr Ian Levy wrote about the need for a community of professionals to collectively deliver the goals of the National Cyber Security Strategy. I his closing speech Dr Levy threw out a call to arms to make the cyber security industry an exemplar for diversity and inclusion. In his blog, he discussed the need for a community code of conduct where we can all come together and describe "what's acceptable and what isn't", so that we can "start discouraging behaviours and attitudes we won't accept".

Since then, the NCSC, the wider community and businesses outside the security sector have worked on the code of conduct that we have released to trial at CYBERUK 2018. The eventual aim is for this to be a mandatory part of working with the NCSC and something that the whole community can be proud to back.

You can read the full policy here and more about the creation of the policy in this blog.

CYBERUK 2018: Three Days, Two Events, One Destination

The NCSC’s first annual review identified that the cyber security threat to the UK is large, growing and diverse. In its first year of operating, the NCSC has achieved a huge amount establishing itself as the lead UK authority when it comes to cyber security. To deliver the NCSC vision we need to create a wide range of partnerships between Government, Industry and Academia. More than this, we need to develop a national conversation with everyone living and working in the UK.

That means moving beyond encouraging partnership and co-operation, and looking to build a true community of interest, encompassing everyone with a stake in cyber security. And, since the online threat affects citizens, Industry, Government and wider society, this is the scope of the ‘big conversation’ we need to have. CYBERUK 2018 will be where this starts.

It will never be possible to stop every cyber attack, but the NCSC is committed to delivering a world-class incident management service. CYBERUK 2018 will give us an opportunity to discuss and identify how we can build on what we have done so far. 

We’ll also focus on some areas of the UK economy which face unique challenges in implementing effective cyber security, especially retail and the voluntary sectors. We will discuss how we can support them and help make them less vulnerable to attack.

We know that in the years ahead there is so much to do in countering the strategic threat to our values, prosperity and way of life.  People are our strongest link and we know that building a community of partners for cyber security is crucial to meeting these challenges together.

CYBERUK In Practice (10-11 April): Bringing together 1200+ information security professionals. This will include specialists in the design and development of online services and systems, plus professionals in procurement and delivery. It will be an opportunity to share best practice, learn about the latest security threats and solutions, and consider the growing challenges we all face.

CYBERUK Leadership (12 April): The Government’s leadership event for business and public sector decision makers and strategists.  This is where key senior staff – policy makers, CEOs and thought leaders – will learn about and contribute to the development of the latest thinking on how cyber security and business acumen come together to deliver successful business outcomes. Speakers will be drawn from the same community as the 600+ delegates – Government, Academia, the Third sector, Critical National Infrastructure and Industry.  Minister-led, it will feature senior representatives from GCHQ and the NCSC.  It will include the popular CYBERUK Leadership Networking Dinner on 11 April 2018.

Not just another event

The only UK Government-hosted event for this sector. CYBERUK 2018 will be the largest and most wide ranging event for cyber security leaders and professionals in the UK. It will attract the key players in Government, Academia, and Industry, and will offer unrivalled networking opportunities.

Truly interactive

Everything about the event will be designed to encourage debate, feedback and input. Bringing to you world-class speakers, creating dynamic Q&As, competing at the Cyber Games and sharing through interactive walls, we’ll create an event built around you. An event that will inform, challenge and inspire attendees – and create an atmosphere where networking is built-in, not bolted on.

Why attend?

  • Hear from thought leaders, be that Ministers, technology leaders, or others with interesting and relevant messages to give.
  • Meet leaders from across the sector.
  • Participate in challenging and thought provoking content.
  • Learn from the best – thought leaders from Government, Industry, Academia and the Critical National Infrastructure.
  • Connect with the wide range of public sector participants, personally invited by the UK Government.
  • Enjoy a mix of plenary talks, themed streams/tracks and Lightning Talks.

STREAMS AND TRACKS

Streams and Tracks offer participants an opportunity to share information, explore case studies and take part in debates on issues around information and security.

WORKSHOPS

Allow a deeper understanding of key issues, exchange ideas and develop effective action plans for the future, a strong workshop programme is offered at CYBERUK 2018.

SPOTLIGHT TALKS

Held during breaks, lunch and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2018 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate.

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams, Tracks and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions and chat to our graphic artist who will find visual ways to capture your insights.

CYBERUK In Practice logo

CYBERUK In Practice (10-11 April 2018)

The highly interactive event over two days will provide a wide range of sessions to cater for all levels of knowledge and experience using the much enjoyed chilli ratings we introduced in 2017.  The event content will be heavily informed by the delegates, sponsors, and exhibitors thus ensuring we create an environment to promote diversity, create challenging conversations and identify opportunities to achieve our vision of making the UK the safest place to live and work online. 

CYBERUK In Practice brings together the professional community responsible for developing and implementing cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling plenary keynotes and panel debates, the following four Tracks will span two days and will be led by NCSC Technical Directors.

TRACKS

Track 1 • Vulnerabilities and Bug hunting - A technical stream that will explore vulnerability discovery, with some strong use-cases.

Track 2 • Cutting edge mitigations and future technology - Showcasing the art of the possible in security mitigations with today’s technology as well as looking to the future.

Track 3 • Data Science, analytics and automation - Taking a data driven approach to security, using analytics and automation to drive operational security.

Track 4 • Whole System Security - Advanced approaches to security analysis and management, drawing on risk, modelling and learning from engineering practices.

NETWORKING

On Monday 9 April there will be an evening Welcome Drinks Reception, held at a central Manchester location.

A relaxed CYBERUK In Practice Networking Drinks evening will take place in the exhibition hall following the first day of CYBERUK In Practice (10 April). Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract 1200+ technology and cyber security professionals from across the public sector, Critical National Infrastructure, Industry and Academia. They’ll come together to share the cyber security challenges we all face.

Our programme of seminars, Lightning Talks and keynote speeches is designed to stimulate feedback, challenge thinking, create debate and enable networking. We saw how well last year’s interactive elements worked in getting delegates talking, exchanging experience and technical insights – so we have planned some new experiences for 2018.

Delegates will leave with a thorough understanding of latest practice and policies, new innovations and emerging cyber threats. And, most of all, they’ll have built valuable new connections.

CYBERUK Leadership logo

CYBERUK Leadership (12th April 2018)

The 2018 event will develop highly interactive sessions which will focus on building our community for cyber security across four objectives; Reduce, Respond, Understand and Nurture.  It will bring together leaders who can enable a dynamic discussion, include workshops where challenges can be explored and time to build new relationships and networks across the public sector, Industry and Academia. 

CYBERUK Leadership will set the agenda for UK cyber security. This event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by an NCSC Engagement Deputy Director entrusted with shaping and leading the team’s delivery.

STREAMS

Stream 1 • REDUCE - Examining how the cyber security community reduces risks to the UK by securing public and private sector networks.

Stream 2  RESPOND - Demonstrating how the cyber security community responds to cyber security incidents to reduce the harm they cause to organisations and the wider UK.

Stream 3 • UNDERSTAND - How the cyber security community understands cyber security, and distils this knowledge into practical guidance that we make available to all.

Stream 4 • NURTURE - Developing industry and academic expertise to nurture the UK's cyber security capability.

NETWORKING DINNER

A prestigious CYBERUK Leadership Networking Dinner will be held on Wednesday 11 April, before the conference begins on Thursday.

THE AUDIENCE

CYBERUK Leadership will attract leaders in cyber security across Government and Industry, regulatory bodies and influencers. How can we be so sure? Last year’s event saw over 800 delegates – from senior leaders and risk owners from Government departments and cyber security leaders from the public and private sector including Academia. Over the day, we created a perfect environment for them to meet, network, and hear from leaders in their fields. This year will build on that success – but with more interactivity, more input from participants, and more opportunities to meet, exchange ideas and build relationships.

Around 60 per cent of participants will come from the public sector, and the public sector places are free.  The NCSC will ensure that we get the right mix by personally inviting key staff in strategic, decision-making roles. These are the people whose voices are listened to, who set the agenda, and who make things happen. CYBERUK Leadership attendance is invitation only for the public sector.

Lead Sponsors

Amazon Web Services

For more than 11 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 100 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, and application development, deployment, and management from 44 Availability Zones (AZs) across 16 geographic regions in the U.S., Australia, Brazil, Canada, China, Germany, India, Ireland, Japan, Korea, Singapore, and the UK. AWS services are trusted by millions of active customers around the world—including the fastest-growing startups, largest enterprises, and leading government agencies—to power their infrastructure, make them more agile, and lower costs.

Amazon Web Services

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.

NCC Group

Networking Sponsors

Trend Micro Incorporated

Networking Sponsor

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro Incorporated

L3 TRL

CYBERUK Leadership Dinner Sponsor

L3 TRL – Transforming the way you manage your cryptos

Since 1983 we have been a security partner of choice for defence and government organisations, we are an authorised development partner and key capability provider to HM Government.

Across 2018 we are launching a series of new CATAPAN High Grade capabilities into the UK Cyber market that will transform the ability to achieve secure missions in a variety of scenarios. The new capabilities include:

  • Data at rest for private clouds, public clouds and personal applications
  • New Micro data in transit crypto
  • Revolutionary benign key delivery solution

Reducing the risk in high threat operations whilst lowering the infrastructure management and costs, thus reducing the significant operating burdens.

CATAPAN is best in breed for High Grade Cyber security – the most effective line of defence to counter the growing threat and evolving nature of cyber-attacks, whilst giving freedom and flexibility to operate without constraint.

L3 TRL

SANS

Delegate Brochure Sponsor and Exhibitor

Established in 1989, SANS Institute is the largest information security training organisation in the world and is a cyber security supplier to HM Govt. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats. SANS training is led by world-renowned, expert instructors and the curriculum covers the most crucial areas of security. Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. In addition, SANS and its partners are currently delivering the HMG Cyber Schools Programme – Cyber Discovery.

SANS

Track and Stream Sponsors

Northrop Grumman

Track 2 Sponsor

Northrop Grumman is a recognised leader in cyber resilience solutions with more than thirty years’ experience in cyber security and information assurance. As a mission partner, Northrop Grumman brings unparalleled expertise in managing and protecting networks, and delivering trusted security solutions to high-risk customers both here in the UK and overseas.

Northrop Grumman’s aggressive investments in technology harness critical elements of human-decision making with advanced analysis of complex data sets to enable decisive action. The company is committed to building tomorrow’s cyber workforce through advanced cyber education, developing a Cyber Research Consortium with leading UK universities and offering its own Cyber Academy worldwide.

Northrop Grumman is a member of CyberFirst and CyberInvest, and leads CyberCenturion, the cyber defence competition for 12-18 year olds.

Northrop Grumman

QinetiQ

Track 3 and Stream 1 Sponsor

QinetiQ is a leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions to human performance.

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

BAE

Stream 3 Sponsor

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE

Sponsors

Raytheon

Future Zone Sponsor

Raytheon UK is a subsidiary of Raytheon Company. It is a prime contractor and major supplier to the U.K. Ministry of Defence and has developed strong capabilities in mission systems integration in defence, national security and commercial markets. Raytheon UK also designs, develops and manufactures a range of high-technology electronic systems and software at facilities in Harlow, Glenrothes, Gloucester, Waddington, Broughton and Manchester. About Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specialising in defence, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts.

Raytheon

Lockheed Martin

Bursary Sponsor

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Lockheed Martin

Anomali

Workshop Sponsor

Anomali delivers critical threat intelligence capabilities, allowing organisations to detect, investigate and respond to serious external threats. The company’s unmatched customer base spans all major verticals and includes partnerships with many ISACs and threat exchanges. Anomali integrates with internal infrastructure to identify new attacks, or search forensically over the past year to discover existing breaches, and enables security teams to quickly understand and contain threats.

Anomali

Atkins Global

Workshop Sponsor

SNC-Lavalin’s Atkins business is one of the world’s most respected design, engineering and project management consultancies. Together, SNC-Lavalin, a globally fully integrated professional services and project management company and Atkins help our clients plan, design and enable major capital projects, and provide expert consultancy that covers the full lifecycle of projects. We strive to build strong relationships by understanding the challenges our clients face, sharing their vision and helping them transform potential into reality. Our world-class expertise at scale delivers value to our clients, and the depth and breadth of our capabilities sets us apart from the competition.

Atkins Global

Context

Workshop Sponsor

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from cyber strategy and risk assessments, penetration testing and assurance to incident management and response, training and technical security research. We focus on helping clients avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks. Established in 1998, Context’s client base includes some of the world’s leading blue chip companies, alongside public sector and government organisations. With offices in the UK, Australia, Germany and USA, Context is ideally placed to work with clients worldwide.

Context

Egress Software Technologies

Workshop Sponsor

Egress is the leading provider of data privacy and risk management services designed to protect shared information throughout its lifecycle.

Offering Government and Enterprise customers a portfolio of complementary services, the Egress Switch platform leverages machine learning led policy management, encryption and eDiscovery to enable end-users to share and collaborate securely, while reducing the risk of loss and maintaining compliance. These award-winning integrated services include email and document classification, accidental send prevention, secure email and file transfer, secure managed file transfer, secure online collaboration and secure archive.

Certified by Government, Switch offers a seamless user experience, powerful real-time auditing and patented information rights management, all accessible using a single global identity.

Egress Software Technologies

ForeScout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2017 more than 2,500 customers in over 70 countries improve their network security and compliance posture with ForeScout solutions. See devices. Control them. Orchestrate system-wide threat response.

ForeScout

Tanium

Workshop Sponsor

Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. Serving as the "central nervous system" for enterprises, Tanium empowers cybersecurity and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale, and simplicity of Tanium, organizations can effectively protect against modern-day threats and realize new levels of cost efficiency in IT operations.

Tanium

Partner Exhibitor

Fortinet

Only Fortinet can provide you with a powerful, complete, and integrated threat management solution that delivers industry leading protection and performance.

Today’s security networks are too complex - Too many different vendors, too many alerts, and too many different ways of managing each device: it all leads to an unmanageable infrastructure where gaps can be difficult to find. Only Fortinet can deliver a seamless, comprehensive security infrastructure across the entire attack surface. From the cloud to the edge and to the endpoint, Fortinet’s industry-leading suite of products and tools address all phases of the attack cycle – from prevention to detection to remediation. With a complete solution from Fortinet, you deliver more control, greater visibility and less complexity.

Fortinet

Fujitsu

As one of the largest IT services and solutions providers in the world, Fujitsu are globally renowned for their expertise in digital transformation.

Fujitsu’s vision for the digital age is to make coherent information available, whenever and wherever it is needed, capitalising on our cyber-secure capabilities in networking and systems integration to link and enhance situational awareness. 

Through the development of our cutting edge digital solutions, we are helping to shape a new world and transform how people live, work, communicate and share data. Our approach extracts maximum benefit from existing IT systems, innovating, developing and extending capability and functionality.

Fujitsu

Leonardo

Leonardo, NATO’s Global Cyber Defence Mission Partner. Delivering confidence in the Cyber Security Domain for more than 25 years, through design, developing and delivery of security services and solutions in close partnership with customers, suppliers and authorities.  Constantly investing, we offer public and private organisations comprehensive security solutions needed to comply and defend.

Leonardo offers a consult, design, build and operate model with a broad product and service offering.

Leonardo

Premium Exhibitor

APMG International

APMG International is a global examination institute specialising in professional certifications.  In response to mounting risks in a digital age, APMG has designed a broad portfolio of world-class cyber security products. We've partnered with GCHQ to deliver the Certified Professional (CCP) and GCHQ Certified Training (GCT) schemes and the Defence Science and Technology Laboratory (Dstl) to develop CDCAT® the unique Cyber Defence Capability Assessment tool.  APMG is an Accreditation Body for NCSC's Cyber Essentials scheme and offers a host of other industry recognised certifications including; ISO/IEC 27001, COBIT® 5, IAITAM®, Cloud Industry Forum (CIF) and more.

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android and BlackBerry.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Deep Secure

Deep Secure has recently pioneered a unique and highly disruptive technology that delivers completely threat-free content.  The efficacy of the technology is unsurpassed, addressing a significant gap in the market for being able to simultaneously defeat all content threats – known, unknown (zero-day), and the undetectable – without the need to examine or isolate traffic.  Deep Secure’s 'Content Threat Removal' has universal relevance in protecting information systems, enabling organisations - to Click, Share, and Transact in perfect safety.

Deep Secure

e2e-assure

e2e-assure offer SOC-as-a-Service to protect your organisation which provides a complete cyber defence service suitable for all Government and Commercial customers, large and small. Protect your critical assets from cyber-attacks and GDPR breaches with our continuous security monitoring and active incident response. We provide the people, technology, and processes to deliver cost effective, high value protection. Deployed as-a-service for cloud services and/or on-premise with pay-as-you-go flexible pricing. Quick to implement, with immediate benefit. e2e-assure provides a range of secure cyber services including Protective Monitoring, SOC Services, Cyber Investigation and Incident Response, Cyber Assessments, Web Gateway and Secure Managed Clouds.

e2e-assure

Frazer-Nash Consultancy

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains. We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise. We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

Ixia Solutions Group

Ixia, a Keysight Business, provides testing, visibility, and security solutions to strengthen networks and cloud environments for enterprises, service providers, and network equipment manufacturers. Ixia offers organizations trusted environments in which to develop, deploy, and operate. Customers worldwide rely on Ixia to verify their designs, optimize their performance, and ensure protection of their networks and cloud environments.

Ixia Solutions Group

Reliance acsn

Reliance acsn is a Digital and Cybersecurity Service provider that believes results come from a well-executed and business-integrated approach stemming from the application of our skills and expertise, combined with threat intelligence and effective risk management.

ACSN was founded in 2003. Reliance acsn was born through merger with Reliance Cyber Science in 2016. We’ve built strong partnerships with over 80 customers across 5 continents, helping them to address Digital Transformation and Cybersecurity challenges. We have a highly skilled and experienced team, accredited by all the major security vendors

Reliance acsn

Surevine

Described by the Financial Times at launch as a “secure Facebook for cyber threats”, Threatvine is a cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

Threatvine unites critical national infrastructure, law enforcement and academia, moving beyond cyber-security information sharing to collaborative cyber-security intelligence analysis; keeping you one step ahead of the cyber threat.

Surevine, the company behind Threatvine, build secure, scalable collaboration environments for the most security conscious organisations; joining people up and enabling collaboration on their most sensitive information.

Smart, secure networks of connected people.

Surevine

Exhibitors

2T Security

RiskTree is a business-focused, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2. Using our innovative, browser-based software, it’s being used by both public and private sector clients to reduce the cost and delivery time for accreditation, and to support ISO27001 certification.

2T Security

4 Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions, we for over a decade have worked in the UK and overseas to create secure end to end systems.

4 Secure

Armour Communications

Armour Communications Limited provides market leading technology for secure communications on everyday devices. Easy to use, cost effective technology combined with advanced security techniques to deliver cloud-based and on-premises secure solutions.  Advanced features like MCPTT are available as well as integration with unified communications. Armour’s technology is FIPS, CPA and NATO approved.

Armour Communications

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

Tripwire

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprise and public sector organizations. Tripwire solutions are based on high-fidelity asset visibility and endpoint intelligence combined with business context. Tripwire’s solutions include configuration and policy management, file integrity monitoring, vulnerability management, log management, reporting and analytics.

Tripwire

Small Business Hub

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

CASQUE SNR

CASQUE SNR protects access. It is NCSC CAPS certified, suitable for Secret and resists Insider Attacks. Customer Controlled Keys with Out-of-the-Box Gateway Integration. Built for Cloud Identity as a Service."

CASQUE SNR

Cyber Security Jobsite

Cyber Security Jobsite.com, The definitive Job Board for Cyber Security Professionals. Search 100s of vacancies from the UKs top employers. Register your CV for FREE.

Cyber Security Jobsite

Data Eliminate

Data Eliminate specializes in the secure disposal and recycling of electronic and other sensitive assets and the provision of secure transport.  Accreditations for certain services include the MoD & CPNI.

Data Eliminate

IASME Consortium

The IASME Consortium is one of 5 Accreditation Bodies appointed by Government to assess against the Cyber Essentials scheme.  IASME also assesses against its own highly regarded and award-winning governance standard which includes the GDPR requirements.

IASME Consortium

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Topsec

Topsec is a leading provider of cloud-based managed email filtering & security solutions. Our services include anti-spam, anti-virus, continuity email, blended threats (real-time malware & phishing protection), content filtering, image analysis, email archiving, secure-file-transfer, phishing-training-as-a-service & Domain Management. 

Topsec

Yellow Room Learning

Yellow Room Learning empowers your workforce to protect business critical information and data by combining education, simulated phishing, augmented reality, video, and more, as part of a security awareness campaign.

Yellow Room Learning

CYBERUK_2018_Sponsorship_Brochure.pdf

PDF, 5379.79KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 Sponsorship Brochure

CYBERUK E-Bulletin 2.pdf

PDF, 2394.65KB

This file may not be suitable for users of assistive technology.

CYBERUK 2018 e-bulletin

Share this page

Was this information helpful?

We need your feedback to improve this content.

Yes No