CYBERUK 2017

A SAFER DIGITAL BRITAIN
When:  14 Mar 2017 to 16 Mar 2017
Price:  Free to £1099+VAT
CYBERUK Strategy & In Practice logos

Lead Sponsors

NCC Group
Northrop Grumman

CYBERUK 2017 logo
    

CYBERUK 2017 will be the Government’s biggest and most influential IA and Cyber Security event to date. It will be hosted by the National Cyber Security Centre (NCSC) five months after the organisation’s launch. It will share the vision for achieving a step change in UK cyber resilience.  

CYBERUK 2017 will be two events in one. It will include the Government’s IA and Cyber Security Flagship event, which for the past decade has been the principal vehicle for engaging with IA and Cyber Security leaders. It will also combine CYBERUK In Practice, the event for the professional community.

CYBERUK Strategy (14 March 2017) will be the Government’s primary conference for briefing 800+ cyber security and IA leaders from across Government, CNI, Industry and Academia. It will feature a Networking Dinner at Liverpool’s historic St George’s Hall on the evening of Monday 13 March.

CYBERUK In Practice (15 – 16 March 2017) will bring together the professional communities. This will include specialists in the design and development of online services and systems, procurement and all areas of ICT delivery. It will be an opportunity to share insights, updates and engagement over the cyber security challenges we all face.

At CYBERUK 2017 you will hear from senior Government Ministers, Key GCHQ Senior, Key NCSC Senior and Technical Director. Streams will be shaped by NCSC Deputy Directors and Technical Directors.  They will be supported by a line-up of UK and international cyber security experts from Government, Industry, the CNI and Academia.

The Rt Hon Ben Gummer MP
“The first duty of the government is to keep the nation safe. Any modern state cannot remain secure and prosperous without securing itself in cyberspace. That is why we are taking the decisive action needed to protect the UK, our economy and our citizens from cyberattacks.

“CYBERUK 2017 is a great opportunity to work closely with partners across government, industry, academia and the critical national infrastructure on which the UK depends. It is a focal point in the Government’s Cyber Security calendar and will play a key role in the update on the new National Cyber Security Centre (NCSC) and the National Cyber Security Strategy.”

The Rt Hon Ben Gummer MP
Minister for the Cabinet Office and Paymaster General

STREAMS

Streams offer participants an opportunity to share information, explore case studies and take part in debates impacting on Government and CNI information security.

WORKSHOPS

To allow you to achieve a deeper understanding of key issues, exchange ideas and form/create effective action plans for the future, a strong workshop programme is offered at CYBERUK 2017.

SPOTLIGHT TALKS

Held during lunch breaks and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2017 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate. Issues, updates and approaches discussed during CYBERUK Strategy (Day One) will influence content over CYBERUK In Practice (Days Two and Three).

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions, vote in Plenary or Stream sessions and chat to our graphic artist who will find visual ways to capture your insights

WHAT 2015/16 DELEGATES SAID

“The most informative, honest and current event I have attended for the industry” Nuclear Decommissioning Authority

“Involvement from UK Government decision makers sets these events apart. This is reflected in the strength of the agenda, calibre of speakers and the number and seniority of Government delegates.” Northrop Grumman

“The whole experience was fantastic - the venue, the number and pertinence of vendors and above all, the quality of the seminars were excellent. In my opinion it out-stripped every other UK cyber security conference in every respect.” University of Manchester

“One of the best and most useful events I have attended in a very long time, thanks!” Fujitsu

CyberUK Strategy logo

CYBERUK Strategy (14 March 2017)

CYBERUK 2017 begins with the relaunched Cyber Security and IA Flagship event, CYBERUK Strategy. It will be chaired by Key NCSC Senior. This will be a platform for Government Ministers and Key GCHQ Senior to provide their insights.

CYBERUK Strategy will set the agenda for UK cyber security. Held five months after the launch of the NCSC and the National Cyber Security Strategy, this event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by the respective NCSC Deputy Director entrusted with shaping and leading the Team’s delivery.

STREAMS
 
Stream 1 • Economy and Society - The NCSC’s ambition to make the UK the safest place to live and work in cyberspace cannot be achieved by engaging only with the cyber security and IA community. Success depends on our reaching out to the wider economy, mainstream business, Academia and the citizen. This Stream will feature thought leaders from the information economy and key business segments in considering how the NCSC can best transform the overall resilience of the UK.
Stream 2  Government and Public Sector - Citizens expect the personal information they share with the public sector to be properly safeguarded. More and more they expect to access public services digitally. This stream examines how the NCSC Digital Team is making it easier for the public sector to secure digital services.
Stream 3 • Critical National Infrastructure - The merger of CPNI with CESG and CERT-UK brings support for the Critical National Infrastructure right into the heart of the NCSC’s service delivery. This stream will bring together case studies and commentators from across the CNI and those who own and operate industrial control systems connected to the internet.
Stream 4 • Defence and National Security - Establishing security solutions to meet the needs of the information risk owners in this sector continues to stretch the most capable minds in the UK both in HMG and industry. This stream will give you the opportunity to engage with the NCSC, its stakeholders and partners to explore how these challenges are being addressed collaboratively by this normally hidden mission area.
 

NETWORKING DINNER

A prestigious Networking Dinner will be held for the Strategy delegation on Monday 13 March, before the conference begins on Tuesday. The Dinner will be held at the spectacular St George’s Hall in Liverpool.

On Tuesday 14 March there will also be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

THE AUDIENCE

This is the Government’s strategic event for Information Assurance and cyber security leaders. Presented by the National Cyber Security Centre, CYBERUK Strategy provides delegates with a once a year opportunity to meet, understand their business needs, review the changing threat environment and clarify their responsibilities.

Numbering 800+, the audience will span Government Ministers, SIROs from Government Departments and IA and cyber security leaders from across central and wider Government. There will be senior IA and cyber security industry leaders and representatives from the Critical National Infrastructure and Academia.

CyberUK In Practice logo

CYBERUK In Practice (15 – 16 March 2017)

CYBERUK In Practice then brings together the professional community responsible for developing and implementing IA and cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling Plenary keynotes and panel debates, the following four Streams will span two days and will be led by NCSC Technical Directors.

STREAMS

The stream content is indicative at this stage. The stream sponsor will have the opportunity to interact with the NCSC Technical Director leading the stream on content although the NCSC retains overall responsibility for stream content

Stream 1 • Managing Threat - This Stream will focus on developing a deeper understanding of the threat landscape and approaches to managing it, handling incidents effectively to limit harm and preventing recurrence. 
Stream 2 • People are the Strongest Link - We need to recognise and treat people as the organisations biggest asset, not a security ‘weak link’. This stream will identify how we can better support users to work effectively and securely. What are the real barriers for users working securely?
Stream 3 • Proactive Defence - Our approach to cyber security must evolve to keep pace with new user requirements, technologies and threats. The stream will provide in-depth technical exploration of Active Cyber Defence measures.
Stream 4 • Securing Agile Delivery - Delivered by the NCSC in collaboration with the GDS, this Stream examines how security and resilience can be built into systems and services using a variety of development models, including Agile.
 

NETWORKING

On Tuesday 14 March there will be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

A relaxed Networking Evening will take place in the exhibition hall following the first day of CYBERUK In Practice on Wednesday 15 March. Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract technology and cyber security professionals at all levels from across the public sector, CNI and industry, providing an invaluable opportunity for networking and exchanging experience and technical insights. All those who work in technology, digital security, procurement and data will come together and share the information security challenges we all face. IA and cyber security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats.

CYBERUK Strategy will be chaired by Key NCSC Senior. Attendees will have the opportunity to hear policy shaping speeches from Government Ministers and an important strategic update on the National Cyber Security Strategy from Key GCHQ Senior. Speakers will include senior IA and Cyber Security leaders from Government, Industry and Academia, who will share their experiences and perspectives.

CYBERUK In Practice will be chaired by Key NCSC Senior. Speakers will include leaders and innovators in the technology, digital, security, procurement and data sectors. Experienced IA and Cyber Security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats. The informal event format will give event participants the opportunity to meet, network and interact with these individuals.

The impressive speaker line-up will be announced shortly.

Download the agenda (pdf)

Lead Sponsors

NCC Group

NCC Group is a FTSE 250 listed global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

With one of the UK’s largest teams of security consultants and top-level accreditations from bodies ranging from the government’s CESG CHECK scheme to the PCI Security Standards Council, we are a trusted advisor to more than 15,000 clients worldwide.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people.

NCC Group

Northrop Grumman

Northrop Grumman has more than thirty years’ experience in cyber security and information assurance, and brings unparalleled expertise in managing and protecting networks and delivering complex information assurance and security solutions to high-risk customers including government and critical infrastructure industries.

Northrop Grumman is developing the next-generation of advanced cyber solutions which touch on policy, governance requirements, software application, network development, training and operational support, and is responsive to emerging cyber security needs. The company invests in leading edge research & development, and accesses cutting-edge technology through affiliation with academia and SMEs. Northrop Grumman has its own Cyber Research Consortium with leading universities, and is a leader in cyber education, offering its own Cyber Academy worldwide. The company is a major sponsor of school, university and professional cyber competitions worldwide; and sponsors Cyber Security Challenge in the UK.

Northrop Grumman operates in a number of locations throughout the UK (London, Cheltenham, Chester, Coventry, Fareham, Hendon, New Malden, Peterborough, and RAF Waddington). Its Cyber business, which includes state-of-art cyber research & development and the UK CSOC, is located in the new Cheltenham facilities. The company also operates a cyber range in Australia with the Australian Defence Academy and last year acquired M5 Network Security, a provider of cyber security and secure mobile communications to military and intelligence organisations. Northrop Grumman is a leading global security company providing innovative systems, products and solutions in autonomous systems, cyber, strike, C4ISR and logistics and modernization to government and commercial customers worldwide.

Northrop Grumman

Networking Sponsors

SANS

Networking Sponsor

SANS is a Cyber Security Supplier to HM Government and runs the Cyber Retraining Academy in partnership with HM Government.

Established in 1989, SANS Institute is the largest information security training organisation in the world. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats - the ones being actively exploited.

SANS training is led by world-renowned, expert instructors and the curriculum covers all the most crucial areas of security. Courses are updated frequently to ensure they remain current and feature the latest, hands-on lab work.

Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. SANS training is aligned to GIAC certification and represents the ideal preparation for a GIAC exam.

SANS also provides CyberTalent assessments and Securing The Human awareness programmes.

In addition, SANS supports the global security community by providing many free resources, operates the Internet Storm Centre, is the founder sponsor of the UK Cyber Security Challenge and provides expert speakers for conferences, events and the media worldwide.

See www.sans.org  www.cyber-academy/retraining or contact SANS via emea [at] sans.org

SANS

Atkins

Networking Dinner Sponsor

Atkins delivers cyber resilience expertise to the critical national infrastructure, government, national security and defence sectors. We are the largest supplier of client-side advisory in the UK security and intelligence sector and accredited to the Cyber Suppliers to UK Government scheme.

We view cyber resilience as the ability of an organisation to understand the cyber threats it’s facing, to inform the known risks, to put in place proportionate protection, and to recover quickly from attack. Depending upon the client, robust cyber resilience ultimately provides cost-effective business or service continuity, sustained revenue, or the uninterrupted delivery of military effects. It also contributes toward the ongoing protection of the UK.

By combing a deep understanding of the digital ecosystem that surrounds and supports our nation’s critical infrastructure with our experience of working in secure and mission-critical environments, we can offer unrivalled insight into an organisation’s digital vulnerabilities.

Atkins

Stream sponsors

Nominet

Strategy Stream 1 | Economy and Society

Nominet is an internet company delivering public benefit and is the trusted guardian of the UK namespace – one of the world’s largest country code registries. Nominet manages and runs the infrastructure for over 10 million domain names that end in .uk as well as Welsh Top Level Domains (TLDs) .cymru and .wales and 35 other branded and generic TLDs, including .bbc and .london. Over 3 million businesses, and millions more consumers, rely on its domain registry services. It has a team of 150 people based in Oxford and London and over 2,500 members.

Through its work keeping the .uk namespace secure Nominet’s R&D team is exploring the further potential of the Domain Names System (DNS) and the challenges and opportunities around emerging internet technologies. As a result it operates in a number of business areas, from providing internet connectivity and analytics for Internet of Things (IoT) devices to selling complex data analytics software, including its ground-breaking network analytics tool called turing, for tackling cyber threats. Nominet is also working with the UK government to protect its Public Service Network, in partnership with the National Cyber Security Centre.

With the proceeds of its successful registry business, Nominet set up and supports the charitable foundation Nominet Trust, the UK’s leading social tech funder.

Nominet

Trend Micro

Strategy Stream 2 | Government and Public Sector

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro

BAE Systems

Strategy Stream 3 | Critical National Infrastructure

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies  use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE Systems

QinetiQ

Strategy Stream 4 | Defence and Security Strategy

QinetiQ is a world leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions and human performance. 

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

Roke Manor Research

In Practice Stream 1 | Managing Threat

Roke delivers technology research, development and consultancy services to solve the world’s most complex technical challenges in data science, sensing, communications and cyber security. We assist and advise our government and corporate clients by providing effective and efficient information security services, especially when addressing information security for complex or niche systems and emerging technologies.

Focusing on the efficient use of budgets whilst increasing security and usability of IT systems, we are the ideal product independent partner for identifying and assuring your Information Security needs.

  • Research and Development of new Cyber Security ideas and solutions
  • Security Architecture and Risk Assessment
  • Product and Service Assurance
  • Information Security Management
  • High Grade and High Assurance Systems

Trusted by government and corporate partners worldwide, we deliver technology-based R&D services, provide independent advice, and solve technically challenging problems across the entire technology acquisition and assurance lifecycle.

Roke Manor Research

Leonardo

In Practice Stream 2 | People are the Strongest Link

Leonardo, NATO Global Cyber Defence Mission Partner, delivers confidence in the Cyber Space.

Leonardo is a Global high-tech company and a key player in the Aerospace, Defence and Security sector, with headquarters in Italy and a strong presence in the United Kingdom, the United States and Poland, and more than 47000 employees.

Leonardo has more than 25 years’ experience working in cyber security. Drawing on a dedicated organisation, a consolidated approach and constant investment in resources and technology, we provide public and private organisations with a comprehensive security strategy and solutions set, covering organisational, technological and compliance issues.

  • real-time services designed to protect, deter, detect and respond to the most advanced and persistent cyber-attacks.
  • integrated cyber security solutions for the protection of information and data, mobile infrastructures, Industrial Control/SCADA systems
  • highly secure collaboration and information solutions delivering on the ‘the need to share’.
  • a wide range of solutions for interception, capture, management and processing of information.
  • cyber intelligence services aimed at monitoring and analysing Open Sources, Darknets & Big Data.
Leonardo

Thales

In Practice Stream 3 | Proactive Defence

Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company.  Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual, and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.

Thales

Lockheed Martin

In Practice Stream 4 | Securing Agile Delivery

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 98,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

Lockheed Martin

Amazon Web Services

In Practice Stream 5 | Cyber Insights

Amazon Web Services offers a broad set of global compute, storage, database, analytics, application, and deployment services that help organizations move faster, lower IT costs, and scale applications. These services are trusted by the largest enterprises and the hottest start-ups to power a wide variety of workloads including: web and mobile applications, IoT, game development, data processing and warehousing, storage, archive, and many others.

Government, education and nonprofit organizations face unique challenges to accomplish complex missions with limited resources. Amazon Web Services now serves more than 2,000 government, 5,000 education and 17,500 nonprofit organizations worldwide.

Amazon Web Services

Sponsors

DCMS

SME Innovation Zone Sponsor

The Department for Culture, Media & Sport (DCMS) is making Britain the world’s most creative and exciting place to live, visit & do business.

DCMS is also the department for digital - we support digital enterprise, digital skills, telecoms, the Internet, data protection & cyber security.

Our work to connect the UK and support the digital economy includes protecting industry and society, and helping the UK become the most secure place to do business online. We support the UK cyber security industry, encouraging growth, exports and innovation, especially amongst SMEs. We help improve cyber security skills so industry and Government have the people, knowledge and capability to protect the UK.

DCMS

Airbus Defence and Space

Workshop Sponsor

Airbus DS CyberSecurity is a trusted partner of Governments, Military and Security organisations across Europe.  Through our Cyber Defence Centres in the UK, France and Germany, we offer a range of services and solutions, dynamically combining monitoring, early detection and investigation of attacks, drastically reducing the incident response time.

We have developed a range of trusted products and solutions for securing infrastructure, in order to ensure the protection of our customers’ networks, data and endpoints. We also have one of the largest teams of CESG registered consultants providing Cyber Security consulting and managed services from our secure premises in Cheltenham.

Airbus Defence and Space

Forescout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including Internet of Things devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Forescout

MWR

Workshop Sponsor

Established in 2003, MWR works with clients to deliver security assurance, incident response, managed detection and response, security behaviour training and numerous other cyber defence services to businesses, critical infrastructure and government to strengthen the nation’s cyber security and resilience.

MWR is pleased to be sponsoring and supporting CYBERUK 2017 - come and visit stand A15 to meet the team. Paul Pratley, Associate Director and Head of Global Investigations & Incident Response at MWR will be delivering an Incident Management Workshop at CYBERUK Strategy, showing real world data breach incidents in a simulation exercise to assist crisis management teams in preparing and responding to cyber attacks.

MWR

Palo Alto Networks

Workshop Sponsor

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this, we safely enable applications, users and content; deliver visibility, automation and control; and detect and prevent threats at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.

Palo Alto Networks

PwC

Workshop Sponsor

PwC has one of the largest and most comprehensive cyber security practices with a in the market today, offering a full range of services including consulting, cyber threat intelligence and incident response; cyber crisis management; and threat and vulnerability management. We are unique amongst the large service providers in having an integrated cyber legal practice that is able to offer leading expert legal advice.

Our cyber security practice has industry-recognised certifications (including CHECK, CREST, CIR and CCSC) giving confidence that our security testing, threat intelligence & incident response services as well as cyber security consultancy is undertaken by experts.  

PwC

Titania

Workshop Sponsor

Titania develop cyber security auditing software. Our security and compliance tools enable auditors and end user organisations to harden their systems and produce expert level reports on their networks at a fraction of the time and cost of manual testing, helping them stay secure in the face of cyber threats.

Our tools, Nipper Studio and Paws Studio, generate fast & thorough, security & compliance reports that enable you to act on fact.   

Trusted by organisations in over 80 countries (Inc. U.S DoD, Treasury, FBI) our award-winning products have been recognised by the Govies, PwC & the British Chambers of Commerce.

Titania

PA Consulting

Collateral Sponsor (Delegate brochure)

An independent firm of over 2,600 people, we operate globally from offices across the Americas, Europe, the Nordics, the Gulf and Asia Pacific.

We have extensive experience in designing and delivering digital trust and cyber security programmes for public and private sector clients, in some of the most challenging environments. We offer market-leading, end-to-end capability across the cyber security life cycle, including technical, people and physical security.

Our experts bring together an in-depth understanding of the cyber threat, world-class capability in a range of key digital trust and cyber security disciplines and deep industry knowledge.

Our clients choose us because we don’t just believe in making a difference. We believe in making the difference.

PA Consulting

Ultra Electronics

Collateral Sponsor (Delegate bag)

Ultra Electronics is a leading supplier of CESG-certified encryption solutions at all grades, with a long-established reputation for providing exceptional levels of manageability and reliability.

Ultra Electronics is an internationally successful defence & aerospace, security & cyber, transport and energy company with a consistent track record of development and growth.

Ultra Electronics

Pavilion Exhibitors

IBM

Pavilion Stand & Workshop Sponsor

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services, and operates one of the world’s broadest security research, development and delivery organisations, monitoring 35 billion security events per day. In the UK IBM has 20,000 employees and IBM Security supports UK Critical National Infrastructure across a range of industries. IBM Security delivers proven outcomes for UK Government with Government trained and cleared consultants in UK based List-X facilities. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

IBM

Intel

Intel Security, with its McAfee product line, is dedicated to making the digital world safer and more secure for everyone.  Intel Security is a division of Intel Corporation. Learn more at www.intelsecurity.com

We are very pleased to be attending CyberUK 2017 with Fujitsu, SCC, Softcat and Trustmarque, four of our valued and trusted partners, all of which can help you to simplify the Threat Defence Lifecycle and offer unique advice and solutions to enable you to reduce the threats that get through, find them faster, and use fewer resources in the process.

fujitsu scc softcat logos

Visit us on stand C1 and discover how an integrated security approach can help you achieve your business goals.

Intel

Premium Exhibitors

4Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. For over a decade we have worked in the UK and overseas to create secure end to end systems. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions.

4Secure

Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Anomali

APMG International

APMG International is a global examination institute specialising in professional certifications. In response to mounting risks in a digital age, APMG has designed a broad portfolio of world-class cyber security products. We've partnered with GCHQ to deliver the Certified Professional (CCP) and GCHQ Certified Training (GCT) schemes and the Defence Science and Technology Laboratory (Dstl) to develop CDCAT(®) the unique Cyber Defence Capability Assessment tool.  APMG is an Accreditation Body for NCSC's Cyber Essentials scheme and offers a host of industry recognised certifications including; ISO/IEC 20000, ISO/IEC 27001, COBIT(®)5, IAITAM(®), RESILIA(™) and OBASHI(®).

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android, BlackBerry and Windows Mobile.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Fortinet

From IoT to the Cloud, Fortinet protects some the most sensitive government organisations across the globe.

Fortinet is the only company with security solutions for network, endpoint, application, data centre, cloud and access. These work together as a cooperative fabric, spanning the entire network, linking different sensors and tools to collect, coordinate, and respond to potential threats. This is further strengthened by the industry's highest level of threat research and analytics.

This means Fortinet is the only company that can truly provide a powerful, integrated security fabric across the entire attack surface and at any point along the kill chain.

Fortinet

Frazer-Nash Consultancy

Premium Exhibitor & Meeting Space Sponsor

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains.

We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise.

We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

L3 TRL Technology

L3 TRL Technology is an agile, UK-based company which designs, develops and delivers advanced electronic systems for the protection of people, infrastructure and assets. Working in partnership with global defence, government organisations, and business partners, we defend against evolving and emerging threats worldwide. 

We provide scalable and resilient Cyber Security and Electronic Warfare solutions across a range of markets including: Land, Littoral and Maritime, Government, and CNI.

L3 TRL is part of the UK Cyber Growth Partnership. Our award-winning IP encryption solutions successfully secure and protect the integrity, confidentiality and availability of sensitive and highly classified information.

L3 TRL Technology

Raytheon

Raytheon UK Advanced Cyber Solutions is a dedicated cyber security company providing proactive threat hunting, security engineering, assessment and customised security training.  Raytheon UK has extensive experience pro-actively identifying trends in adversary capabilities, as well as unique relationships with partners who have visibility into adversary planning/staging infrastructure and activities.  Our team of highly qualified and experienced engineers create in-demand security programmes, end-to-end architectures and security operations centres for global financial organisations, power/utility companies, technology providers, and government agencies.

Raytheon

Quintessence Labs

Quintessence Labs helps keep all your data safe, even in the event of a breach. Our Trusted Security Foundation delivers best in class, interoperable key and policy management, with high speed truly random keys and the strength of a hardware security module. Integration with flexible encryption solutions and our client software development kit enable seamless deployments and enterprise-wide data protection.

Quintessence Labs

Exhibitors

2T Security

RiskTree is a new, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2, and supported by innovative browser-based software. It’s been used by both public and private sector clients to reduce the cost of accreditation and support ISO27001 certification.

2T Security

Armour Communications

Armour Communications Limited provides secure communications solutions for voice, video and messaging on everyday smartphones and tablets. CPA approved to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

Armour Communications

Bridewell Consulting

Bridewell Consulting are an NCSC Certified Cyber Security Consultancy. Our teams have a proven track record working with local and central government across the UK. Bridewell specialise in Information Audit, Assurance, Cyber Security, Technology Risk, Security Testing and Data Privacy, providing pragmatic cost effective solutions for our clients.

Bridewell Consulting

BSI Info-Assure

BSI Info-Assure is a leading provider of cyber security and information assurance services.

BSI Info-Assure is a member of key industry cyber security schemes including:

  • CREST (Penetration Testing, Star Testing, CSIR & Cyber Essentials)
  • PCI DSS QSA
  • CESG (CHECK, CCSC, CAS, CTAS & CPA)
  • Common Criteria Lab
     
BSI Info-Assure

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

Context

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from penetration testing and assurance to rapid incident response and intrusion analysis, training and technical security research. Context is focused on helping clients manage their cyber risk, avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks.

Context

Deep Secure

Spotting a gap in the global market for truly preventing the unknown (zero-day) cyber threat, Deep Secure pioneered 'Content Threat Removal' a technique which completely eliminates content threat; enabling organisations - to Click, Share, and Transact in perfect safety - to counter even the most sophisticated attacks.

Deep Secure

E&T

E&T is the IET's award-winning magazine and associated website for professional engineers, covering all aspects of engineering.  Our E&T Cyber Security Hub offers a combination of expert-reviewed, cyber security-specific content, practical advice and networking tools. It is a perfect platform for security engineers and specialists to learn about new solutions, share knowledge, connect or just ask questions.

E&T

e2e-assure

e2e-assure - a world-class cyber security company.

e2e-assure provide secure cloud and cyber defence services.

e2e-assure have developed an industry leading SOC-as-a-Service to protect your organisation.

See our live cyber hacking demos: Ransomware in action, hack and take control of a fully patched Windows10 laptop and steal your Office365 credentials!

e2e-assure

EclecticIQ 

EclecticIQ is an applied cyber threat intelligence (CTI) technology provider, enabling enterprise security programs and governments to mature a CTI practice. EclecticIQ Platform is a Threat Intelligence Platform that enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of intelligence detection, prevention and response capabilities.

EclecticIQ 

Egress Software Technologies

Egress Software Technologies is the leading provider of encryption services designed to secure all forms of electronic information. The Egress Switch portfolio of products includes email and document classification, the only CESG CPA-certified email and file encryption service, secure automation, secure online collaboration, and Switch Secure Vault for email archiving, compliance and auditing.

Egress Software Technologies

Euro Recycling

Euro Recycling is a mobile CPNI, CESG & MoD approved ICT media destruction company. We destroy computer hard discs and other mass storage devices at our client’s site to 6mm/2mm particles in accordance with HMG IA Standard No 5. We are ISO 27001, 14001, 18001 and 9001 accredited.

Euro Recycling

IRM

Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining more than 17 years of consultancy with advanced software technology.  By covering all aspects of cyber security from PCI compliance to automated threat intelligence, IRM supports organisations at every step of their cyber maturity journey.

IRM

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security.

(ISC)²

Naimuri

Naimuri is a north-west based company with a focus on technology, cyber and information security, and business change. Our aim is to enhance the security, ability and efficiency of our partners and customers and create a continuous competitive edge driven by ever-improving technology, culture and processes.

Naimuri

Nexor

Nexor provides solutions to get information into and out of secure networks. This enables organisations to perform more efficiently and effectively. The connection of secure networks is achieved by using people, process and technologies that align to best cyber security practice established by national authorities.

Nexor

Outsource UK

Outsource UK are an award winning IT Recruitment agency with a specialist cyber division with a proven reputation in highly regulated industries. We can supply SOC / SIEM specialists, IAs, Pen testers, Cyber PMs and Managers and Cyber Security Architects on a contract, permanent or consultancy basis.

Outsource UK

SolarWinds

SolarWinds provides powerful and affordable IT management software to government agencies worldwide, including the UK’s National Health Service, European Parliament, NATO, and nearly every U.S. civilian agency, DoD branch, and intelligence agency. SolarWinds products are designed to solve the problems government IT professionals face every day and eliminate complexity from every IT process imaginable.

SolarWinds

Surevine

Described by the Financial Times at its launch as a “secure Facebook for cyber-threats”, Threatvine is a next generation cyber security information sharing platform.

Surevine, the company behind Threatvine, build secure, scalable collaboration solutions for security conscious organisations; joining people up and enabling collaboration on their most highly sensitive information.

Surevine

Thinklogical

Thinklogical manufactures secure video distribution and KVM signal extension and switching solutions for C4ISR and command and control applications. Thinklogical products increase cyber security and enable multi-domain isolation in visual computing environments, and are IA-accredited to Common Criteria EAL4, NATO NIAPC, TEMPEST Level B, and the U.S. JITC UC APL.

Thinklogical

TNP

TNP provide network security solutions and specialise in public sector organisations and businesses with large/complex internet connectivity requirements. We assist them to develop, implement and manage their network security and work with vendors such as Fortinet to deliver network security solutions across the UK using a team of highly trained consultants and engineers. 

TNP

Trustonic

Trustonic is a leading player in mobile device and application security. Almost a billion devices have Trustonic security embedded at the manufacturing stage, providing smart devices with an embedded root of trust and a hardware-protected environment for secure storage and processing. Trustonic also offer application-level security across multiple platforms, including smartphone (iOS and Android) and IoT.

Trustonic

SME Showcase

Ascentor

Ascentor helps organisations improve performance through our cyber security services. Customers rely on our business focused approach to their information security challenges. We will be joined by foreseeti, showing their cyber security modelling tool.

Ascentor

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

Covata

Covata protects enterprises from data security threats intrinsic to conducting business in the digital age. In today’s connected ecosystem, security risks to enterprises are greater and more costly than ever.

Covata

DigitalXRAID

DigitalXRAID is a Yorkshire based Cyber Security company. Accredited by CREST, IASME GOLD, Cyber Essentials PLUS and ISO. We have the expertise to help you with your Cyber Security needs.

DigitalXRAID

Dome recruitment

Dome are a long-established cyber and technology resourcing and recruitment firm, with 15+ years’ experience of providing contractors, project teams and skilled FTE’s for Central Government, Corporates & SI’s.

Dome recruitment

GeDaP

Printix, Microsoft Certified Cloud Print Management for Azure & 365 secures print reduces cost. KeyTalk strong authentication without tokens or software, seamlessly distributes short term certificates for applications or IoT.

GeDaP

Intruder

Intruder is a proactive security monitoring platform for internet-facing systems. Intruder regularly scans your digital assets, provides notifications for critical vulnerabilities and outlines remediation advice in the simplest terms.

Intruder

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Templar Executives

The pre-eminent Cyber Security and Information Assurance strategic advisory company, Templar Executives has been at the forefront of HM Government, FTSE100-350, SME and international services for more than 10 years.

 

Templar Executives

Topsec

Topsec are leading providers of cloud-based email security solutions. Our services include email security (anti-spam, anti-virus and content filtering), email continuity, URL sandboxing, email archiving, file-sharing and domain name management.

Topsec

Event partners

CYBERUK_2017_Agenda.pdf

PDF, 691.87KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Agenda

CYBERUK 2017 E-Brochure.pdf

PDF, 6711.44KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Double page spreads

CYBERUK 2017 E-Brochure Print Friendly.pdf

PDF, 3761.83KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Print Friendly

CyberUK 2017 Sponsorship Brochure.pdf

PDF, 4356.24KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Sponsorship brochure

CYBERUK 2017 E-Bulletin 1.pdf

PDF, 561.51KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 1

CYBERUK E-Bulletin 2.pdf

PDF, 3086.82KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 2

CYBERUK 2017 E-Bulletin 3.pdf

PDF, 2691.58KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 3

CYBERUK 2017 logo
    

CYBERUK 2017 will be the Government’s biggest and most influential IA and Cyber Security event to date. It will be hosted by the National Cyber Security Centre (NCSC) five months after the organisation’s launch. It will share the vision for achieving a step change in UK cyber resilience.  

CYBERUK 2017 will be two events in one. It will include the Government’s IA and Cyber Security Flagship event, which for the past decade has been the principal vehicle for engaging with IA and Cyber Security leaders. It will also combine CYBERUK In Practice, the event for the professional community.

CYBERUK Strategy (14 March 2017) will be the Government’s primary conference for briefing 800+ cyber security and IA leaders from across Government, CNI, Industry and Academia. It will feature a Networking Dinner at Liverpool’s historic St George’s Hall on the evening of Monday 13 March.

CYBERUK In Practice (15 – 16 March 2017) will bring together the professional communities. This will include specialists in the design and development of online services and systems, procurement and all areas of ICT delivery. It will be an opportunity to share insights, updates and engagement over the cyber security challenges we all face.

At CYBERUK 2017 you will hear from senior Government Ministers, Key GCHQ Senior, Key NCSC Senior and Technical Director. Streams will be shaped by NCSC Deputy Directors and Technical Directors.  They will be supported by a line-up of UK and international cyber security experts from Government, Industry, the CNI and Academia.

The Rt Hon Ben Gummer MP
“The first duty of the government is to keep the nation safe. Any modern state cannot remain secure and prosperous without securing itself in cyberspace. That is why we are taking the decisive action needed to protect the UK, our economy and our citizens from cyberattacks.

“CYBERUK 2017 is a great opportunity to work closely with partners across government, industry, academia and the critical national infrastructure on which the UK depends. It is a focal point in the Government’s Cyber Security calendar and will play a key role in the update on the new National Cyber Security Centre (NCSC) and the National Cyber Security Strategy.”

The Rt Hon Ben Gummer MP
Minister for the Cabinet Office and Paymaster General

STREAMS

Streams offer participants an opportunity to share information, explore case studies and take part in debates impacting on Government and CNI information security.

WORKSHOPS

To allow you to achieve a deeper understanding of key issues, exchange ideas and form/create effective action plans for the future, a strong workshop programme is offered at CYBERUK 2017.

SPOTLIGHT TALKS

Held during lunch breaks and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2017 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate. Issues, updates and approaches discussed during CYBERUK Strategy (Day One) will influence content over CYBERUK In Practice (Days Two and Three).

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions, vote in Plenary or Stream sessions and chat to our graphic artist who will find visual ways to capture your insights

WHAT 2015/16 DELEGATES SAID

“The most informative, honest and current event I have attended for the industry” Nuclear Decommissioning Authority

“Involvement from UK Government decision makers sets these events apart. This is reflected in the strength of the agenda, calibre of speakers and the number and seniority of Government delegates.” Northrop Grumman

“The whole experience was fantastic - the venue, the number and pertinence of vendors and above all, the quality of the seminars were excellent. In my opinion it out-stripped every other UK cyber security conference in every respect.” University of Manchester

“One of the best and most useful events I have attended in a very long time, thanks!” Fujitsu

CyberUK Strategy logo

CYBERUK Strategy (14 March 2017)

CYBERUK 2017 begins with the relaunched Cyber Security and IA Flagship event, CYBERUK Strategy. It will be chaired by Key NCSC Senior. This will be a platform for Government Ministers and Key GCHQ Senior to provide their insights.

CYBERUK Strategy will set the agenda for UK cyber security. Held five months after the launch of the NCSC and the National Cyber Security Strategy, this event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by the respective NCSC Deputy Director entrusted with shaping and leading the Team’s delivery.

STREAMS
 
Stream 1 • Economy and Society - The NCSC’s ambition to make the UK the safest place to live and work in cyberspace cannot be achieved by engaging only with the cyber security and IA community. Success depends on our reaching out to the wider economy, mainstream business, Academia and the citizen. This Stream will feature thought leaders from the information economy and key business segments in considering how the NCSC can best transform the overall resilience of the UK.
Stream 2  Government and Public Sector - Citizens expect the personal information they share with the public sector to be properly safeguarded. More and more they expect to access public services digitally. This stream examines how the NCSC Digital Team is making it easier for the public sector to secure digital services.
Stream 3 • Critical National Infrastructure - The merger of CPNI with CESG and CERT-UK brings support for the Critical National Infrastructure right into the heart of the NCSC’s service delivery. This stream will bring together case studies and commentators from across the CNI and those who own and operate industrial control systems connected to the internet.
Stream 4 • Defence and National Security - Establishing security solutions to meet the needs of the information risk owners in this sector continues to stretch the most capable minds in the UK both in HMG and industry. This stream will give you the opportunity to engage with the NCSC, its stakeholders and partners to explore how these challenges are being addressed collaboratively by this normally hidden mission area.
 

NETWORKING DINNER

A prestigious Networking Dinner will be held for the Strategy delegation on Monday 13 March, before the conference begins on Tuesday. The Dinner will be held at the spectacular St George’s Hall in Liverpool.

On Tuesday 14 March there will also be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

THE AUDIENCE

This is the Government’s strategic event for Information Assurance and cyber security leaders. Presented by the National Cyber Security Centre, CYBERUK Strategy provides delegates with a once a year opportunity to meet, understand their business needs, review the changing threat environment and clarify their responsibilities.

Numbering 800+, the audience will span Government Ministers, SIROs from Government Departments and IA and cyber security leaders from across central and wider Government. There will be senior IA and cyber security industry leaders and representatives from the Critical National Infrastructure and Academia.

CyberUK In Practice logo

CYBERUK In Practice (15 – 16 March 2017)

CYBERUK In Practice then brings together the professional community responsible for developing and implementing IA and cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling Plenary keynotes and panel debates, the following four Streams will span two days and will be led by NCSC Technical Directors.

STREAMS

The stream content is indicative at this stage. The stream sponsor will have the opportunity to interact with the NCSC Technical Director leading the stream on content although the NCSC retains overall responsibility for stream content

Stream 1 • Managing Threat - This Stream will focus on developing a deeper understanding of the threat landscape and approaches to managing it, handling incidents effectively to limit harm and preventing recurrence. 
Stream 2 • People are the Strongest Link - We need to recognise and treat people as the organisations biggest asset, not a security ‘weak link’. This stream will identify how we can better support users to work effectively and securely. What are the real barriers for users working securely?
Stream 3 • Proactive Defence - Our approach to cyber security must evolve to keep pace with new user requirements, technologies and threats. The stream will provide in-depth technical exploration of Active Cyber Defence measures.
Stream 4 • Securing Agile Delivery - Delivered by the NCSC in collaboration with the GDS, this Stream examines how security and resilience can be built into systems and services using a variety of development models, including Agile.
 

NETWORKING

On Tuesday 14 March there will be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

A relaxed Networking Evening will take place in the exhibition hall following the first day of CYBERUK In Practice on Wednesday 15 March. Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract technology and cyber security professionals at all levels from across the public sector, CNI and industry, providing an invaluable opportunity for networking and exchanging experience and technical insights. All those who work in technology, digital security, procurement and data will come together and share the information security challenges we all face. IA and cyber security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats.

CYBERUK Strategy will be chaired by Key NCSC Senior. Attendees will have the opportunity to hear policy shaping speeches from Government Ministers and an important strategic update on the National Cyber Security Strategy from Key GCHQ Senior. Speakers will include senior IA and Cyber Security leaders from Government, Industry and Academia, who will share their experiences and perspectives.

CYBERUK In Practice will be chaired by Key NCSC Senior. Speakers will include leaders and innovators in the technology, digital, security, procurement and data sectors. Experienced IA and Cyber Security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats. The informal event format will give event participants the opportunity to meet, network and interact with these individuals.

The impressive speaker line-up will be announced shortly.

Download the agenda (pdf)

Lead Sponsors

NCC Group

NCC Group is a FTSE 250 listed global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

With one of the UK’s largest teams of security consultants and top-level accreditations from bodies ranging from the government’s CESG CHECK scheme to the PCI Security Standards Council, we are a trusted advisor to more than 15,000 clients worldwide.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people.

NCC Group

Northrop Grumman

Northrop Grumman has more than thirty years’ experience in cyber security and information assurance, and brings unparalleled expertise in managing and protecting networks and delivering complex information assurance and security solutions to high-risk customers including government and critical infrastructure industries.

Northrop Grumman is developing the next-generation of advanced cyber solutions which touch on policy, governance requirements, software application, network development, training and operational support, and is responsive to emerging cyber security needs. The company invests in leading edge research & development, and accesses cutting-edge technology through affiliation with academia and SMEs. Northrop Grumman has its own Cyber Research Consortium with leading universities, and is a leader in cyber education, offering its own Cyber Academy worldwide. The company is a major sponsor of school, university and professional cyber competitions worldwide; and sponsors Cyber Security Challenge in the UK.

Northrop Grumman operates in a number of locations throughout the UK (London, Cheltenham, Chester, Coventry, Fareham, Hendon, New Malden, Peterborough, and RAF Waddington). Its Cyber business, which includes state-of-art cyber research & development and the UK CSOC, is located in the new Cheltenham facilities. The company also operates a cyber range in Australia with the Australian Defence Academy and last year acquired M5 Network Security, a provider of cyber security and secure mobile communications to military and intelligence organisations. Northrop Grumman is a leading global security company providing innovative systems, products and solutions in autonomous systems, cyber, strike, C4ISR and logistics and modernization to government and commercial customers worldwide.

Northrop Grumman

Networking Sponsors

SANS

Networking Sponsor

SANS is a Cyber Security Supplier to HM Government and runs the Cyber Retraining Academy in partnership with HM Government.

Established in 1989, SANS Institute is the largest information security training organisation in the world. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats - the ones being actively exploited.

SANS training is led by world-renowned, expert instructors and the curriculum covers all the most crucial areas of security. Courses are updated frequently to ensure they remain current and feature the latest, hands-on lab work.

Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. SANS training is aligned to GIAC certification and represents the ideal preparation for a GIAC exam.

SANS also provides CyberTalent assessments and Securing The Human awareness programmes.

In addition, SANS supports the global security community by providing many free resources, operates the Internet Storm Centre, is the founder sponsor of the UK Cyber Security Challenge and provides expert speakers for conferences, events and the media worldwide.

See www.sans.org  www.cyber-academy/retraining or contact SANS via emea [at] sans.org

SANS

Atkins

Networking Dinner Sponsor

Atkins delivers cyber resilience expertise to the critical national infrastructure, government, national security and defence sectors. We are the largest supplier of client-side advisory in the UK security and intelligence sector and accredited to the Cyber Suppliers to UK Government scheme.

We view cyber resilience as the ability of an organisation to understand the cyber threats it’s facing, to inform the known risks, to put in place proportionate protection, and to recover quickly from attack. Depending upon the client, robust cyber resilience ultimately provides cost-effective business or service continuity, sustained revenue, or the uninterrupted delivery of military effects. It also contributes toward the ongoing protection of the UK.

By combing a deep understanding of the digital ecosystem that surrounds and supports our nation’s critical infrastructure with our experience of working in secure and mission-critical environments, we can offer unrivalled insight into an organisation’s digital vulnerabilities.

Atkins

Stream sponsors

Nominet

Strategy Stream 1 | Economy and Society

Nominet is an internet company delivering public benefit and is the trusted guardian of the UK namespace – one of the world’s largest country code registries. Nominet manages and runs the infrastructure for over 10 million domain names that end in .uk as well as Welsh Top Level Domains (TLDs) .cymru and .wales and 35 other branded and generic TLDs, including .bbc and .london. Over 3 million businesses, and millions more consumers, rely on its domain registry services. It has a team of 150 people based in Oxford and London and over 2,500 members.

Through its work keeping the .uk namespace secure Nominet’s R&D team is exploring the further potential of the Domain Names System (DNS) and the challenges and opportunities around emerging internet technologies. As a result it operates in a number of business areas, from providing internet connectivity and analytics for Internet of Things (IoT) devices to selling complex data analytics software, including its ground-breaking network analytics tool called turing, for tackling cyber threats. Nominet is also working with the UK government to protect its Public Service Network, in partnership with the National Cyber Security Centre.

With the proceeds of its successful registry business, Nominet set up and supports the charitable foundation Nominet Trust, the UK’s leading social tech funder.

Nominet

Trend Micro

Strategy Stream 2 | Government and Public Sector

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro

BAE Systems

Strategy Stream 3 | Critical National Infrastructure

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies  use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE Systems

QinetiQ

Strategy Stream 4 | Defence and Security Strategy

QinetiQ is a world leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions and human performance. 

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

Roke Manor Research

In Practice Stream 1 | Managing Threat

Roke delivers technology research, development and consultancy services to solve the world’s most complex technical challenges in data science, sensing, communications and cyber security. We assist and advise our government and corporate clients by providing effective and efficient information security services, especially when addressing information security for complex or niche systems and emerging technologies.

Focusing on the efficient use of budgets whilst increasing security and usability of IT systems, we are the ideal product independent partner for identifying and assuring your Information Security needs.

  • Research and Development of new Cyber Security ideas and solutions
  • Security Architecture and Risk Assessment
  • Product and Service Assurance
  • Information Security Management
  • High Grade and High Assurance Systems

Trusted by government and corporate partners worldwide, we deliver technology-based R&D services, provide independent advice, and solve technically challenging problems across the entire technology acquisition and assurance lifecycle.

Roke Manor Research

Leonardo

In Practice Stream 2 | People are the Strongest Link

Leonardo, NATO Global Cyber Defence Mission Partner, delivers confidence in the Cyber Space.

Leonardo is a Global high-tech company and a key player in the Aerospace, Defence and Security sector, with headquarters in Italy and a strong presence in the United Kingdom, the United States and Poland, and more than 47000 employees.

Leonardo has more than 25 years’ experience working in cyber security. Drawing on a dedicated organisation, a consolidated approach and constant investment in resources and technology, we provide public and private organisations with a comprehensive security strategy and solutions set, covering organisational, technological and compliance issues.

  • real-time services designed to protect, deter, detect and respond to the most advanced and persistent cyber-attacks.
  • integrated cyber security solutions for the protection of information and data, mobile infrastructures, Industrial Control/SCADA systems
  • highly secure collaboration and information solutions delivering on the ‘the need to share’.
  • a wide range of solutions for interception, capture, management and processing of information.
  • cyber intelligence services aimed at monitoring and analysing Open Sources, Darknets & Big Data.
Leonardo

Thales

In Practice Stream 3 | Proactive Defence

Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company.  Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual, and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.

Thales

Lockheed Martin

In Practice Stream 4 | Securing Agile Delivery

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 98,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

Lockheed Martin

Amazon Web Services

In Practice Stream 5 | Cyber Insights

Amazon Web Services offers a broad set of global compute, storage, database, analytics, application, and deployment services that help organizations move faster, lower IT costs, and scale applications. These services are trusted by the largest enterprises and the hottest start-ups to power a wide variety of workloads including: web and mobile applications, IoT, game development, data processing and warehousing, storage, archive, and many others.

Government, education and nonprofit organizations face unique challenges to accomplish complex missions with limited resources. Amazon Web Services now serves more than 2,000 government, 5,000 education and 17,500 nonprofit organizations worldwide.

Amazon Web Services

Sponsors

DCMS

SME Innovation Zone Sponsor

The Department for Culture, Media & Sport (DCMS) is making Britain the world’s most creative and exciting place to live, visit & do business.

DCMS is also the department for digital - we support digital enterprise, digital skills, telecoms, the Internet, data protection & cyber security.

Our work to connect the UK and support the digital economy includes protecting industry and society, and helping the UK become the most secure place to do business online. We support the UK cyber security industry, encouraging growth, exports and innovation, especially amongst SMEs. We help improve cyber security skills so industry and Government have the people, knowledge and capability to protect the UK.

DCMS

Airbus Defence and Space

Workshop Sponsor

Airbus DS CyberSecurity is a trusted partner of Governments, Military and Security organisations across Europe.  Through our Cyber Defence Centres in the UK, France and Germany, we offer a range of services and solutions, dynamically combining monitoring, early detection and investigation of attacks, drastically reducing the incident response time.

We have developed a range of trusted products and solutions for securing infrastructure, in order to ensure the protection of our customers’ networks, data and endpoints. We also have one of the largest teams of CESG registered consultants providing Cyber Security consulting and managed services from our secure premises in Cheltenham.

Airbus Defence and Space

Forescout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including Internet of Things devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Forescout

MWR

Workshop Sponsor

Established in 2003, MWR works with clients to deliver security assurance, incident response, managed detection and response, security behaviour training and numerous other cyber defence services to businesses, critical infrastructure and government to strengthen the nation’s cyber security and resilience.

MWR is pleased to be sponsoring and supporting CYBERUK 2017 - come and visit stand A15 to meet the team. Paul Pratley, Associate Director and Head of Global Investigations & Incident Response at MWR will be delivering an Incident Management Workshop at CYBERUK Strategy, showing real world data breach incidents in a simulation exercise to assist crisis management teams in preparing and responding to cyber attacks.

MWR

Palo Alto Networks

Workshop Sponsor

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this, we safely enable applications, users and content; deliver visibility, automation and control; and detect and prevent threats at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.

Palo Alto Networks

PwC

Workshop Sponsor

PwC has one of the largest and most comprehensive cyber security practices with a in the market today, offering a full range of services including consulting, cyber threat intelligence and incident response; cyber crisis management; and threat and vulnerability management. We are unique amongst the large service providers in having an integrated cyber legal practice that is able to offer leading expert legal advice.

Our cyber security practice has industry-recognised certifications (including CHECK, CREST, CIR and CCSC) giving confidence that our security testing, threat intelligence & incident response services as well as cyber security consultancy is undertaken by experts.  

PwC

Titania

Workshop Sponsor

Titania develop cyber security auditing software. Our security and compliance tools enable auditors and end user organisations to harden their systems and produce expert level reports on their networks at a fraction of the time and cost of manual testing, helping them stay secure in the face of cyber threats.

Our tools, Nipper Studio and Paws Studio, generate fast & thorough, security & compliance reports that enable you to act on fact.   

Trusted by organisations in over 80 countries (Inc. U.S DoD, Treasury, FBI) our award-winning products have been recognised by the Govies, PwC & the British Chambers of Commerce.

Titania

PA Consulting

Collateral Sponsor (Delegate brochure)

An independent firm of over 2,600 people, we operate globally from offices across the Americas, Europe, the Nordics, the Gulf and Asia Pacific.

We have extensive experience in designing and delivering digital trust and cyber security programmes for public and private sector clients, in some of the most challenging environments. We offer market-leading, end-to-end capability across the cyber security life cycle, including technical, people and physical security.

Our experts bring together an in-depth understanding of the cyber threat, world-class capability in a range of key digital trust and cyber security disciplines and deep industry knowledge.

Our clients choose us because we don’t just believe in making a difference. We believe in making the difference.

PA Consulting

Ultra Electronics

Collateral Sponsor (Delegate bag)

Ultra Electronics is a leading supplier of CESG-certified encryption solutions at all grades, with a long-established reputation for providing exceptional levels of manageability and reliability.

Ultra Electronics is an internationally successful defence & aerospace, security & cyber, transport and energy company with a consistent track record of development and growth.

Ultra Electronics

Pavilion Exhibitors

IBM

Pavilion Stand & Workshop Sponsor

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services, and operates one of the world’s broadest security research, development and delivery organisations, monitoring 35 billion security events per day. In the UK IBM has 20,000 employees and IBM Security supports UK Critical National Infrastructure across a range of industries. IBM Security delivers proven outcomes for UK Government with Government trained and cleared consultants in UK based List-X facilities. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

IBM

Intel

Intel Security, with its McAfee product line, is dedicated to making the digital world safer and more secure for everyone.  Intel Security is a division of Intel Corporation. Learn more at www.intelsecurity.com

We are very pleased to be attending CyberUK 2017 with Fujitsu, SCC, Softcat and Trustmarque, four of our valued and trusted partners, all of which can help you to simplify the Threat Defence Lifecycle and offer unique advice and solutions to enable you to reduce the threats that get through, find them faster, and use fewer resources in the process.

fujitsu scc softcat logos

Visit us on stand C1 and discover how an integrated security approach can help you achieve your business goals.

Intel

Premium Exhibitors

4Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. For over a decade we have worked in the UK and overseas to create secure end to end systems. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions.

4Secure

Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Anomali

APMG International

APMG International is a global examination institute specialising in professional certifications. In response to mounting risks in a digital age, APMG has designed a broad portfolio of world-class cyber security products. We've partnered with GCHQ to deliver the Certified Professional (CCP) and GCHQ Certified Training (GCT) schemes and the Defence Science and Technology Laboratory (Dstl) to develop CDCAT(®) the unique Cyber Defence Capability Assessment tool.  APMG is an Accreditation Body for NCSC's Cyber Essentials scheme and offers a host of industry recognised certifications including; ISO/IEC 20000, ISO/IEC 27001, COBIT(®)5, IAITAM(®), RESILIA(™) and OBASHI(®).

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android, BlackBerry and Windows Mobile.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Fortinet

From IoT to the Cloud, Fortinet protects some the most sensitive government organisations across the globe.

Fortinet is the only company with security solutions for network, endpoint, application, data centre, cloud and access. These work together as a cooperative fabric, spanning the entire network, linking different sensors and tools to collect, coordinate, and respond to potential threats. This is further strengthened by the industry's highest level of threat research and analytics.

This means Fortinet is the only company that can truly provide a powerful, integrated security fabric across the entire attack surface and at any point along the kill chain.

Fortinet

Frazer-Nash Consultancy

Premium Exhibitor & Meeting Space Sponsor

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains.

We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise.

We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

L3 TRL Technology

L3 TRL Technology is an agile, UK-based company which designs, develops and delivers advanced electronic systems for the protection of people, infrastructure and assets. Working in partnership with global defence, government organisations, and business partners, we defend against evolving and emerging threats worldwide. 

We provide scalable and resilient Cyber Security and Electronic Warfare solutions across a range of markets including: Land, Littoral and Maritime, Government, and CNI.

L3 TRL is part of the UK Cyber Growth Partnership. Our award-winning IP encryption solutions successfully secure and protect the integrity, confidentiality and availability of sensitive and highly classified information.

L3 TRL Technology

Raytheon

Raytheon UK Advanced Cyber Solutions is a dedicated cyber security company providing proactive threat hunting, security engineering, assessment and customised security training.  Raytheon UK has extensive experience pro-actively identifying trends in adversary capabilities, as well as unique relationships with partners who have visibility into adversary planning/staging infrastructure and activities.  Our team of highly qualified and experienced engineers create in-demand security programmes, end-to-end architectures and security operations centres for global financial organisations, power/utility companies, technology providers, and government agencies.

Raytheon

Quintessence Labs

Quintessence Labs helps keep all your data safe, even in the event of a breach. Our Trusted Security Foundation delivers best in class, interoperable key and policy management, with high speed truly random keys and the strength of a hardware security module. Integration with flexible encryption solutions and our client software development kit enable seamless deployments and enterprise-wide data protection.

Quintessence Labs

Exhibitors

2T Security

RiskTree is a new, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2, and supported by innovative browser-based software. It’s been used by both public and private sector clients to reduce the cost of accreditation and support ISO27001 certification.

2T Security

Armour Communications

Armour Communications Limited provides secure communications solutions for voice, video and messaging on everyday smartphones and tablets. CPA approved to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

Armour Communications

Bridewell Consulting

Bridewell Consulting are an NCSC Certified Cyber Security Consultancy. Our teams have a proven track record working with local and central government across the UK. Bridewell specialise in Information Audit, Assurance, Cyber Security, Technology Risk, Security Testing and Data Privacy, providing pragmatic cost effective solutions for our clients.

Bridewell Consulting

BSI Info-Assure

BSI Info-Assure is a leading provider of cyber security and information assurance services.

BSI Info-Assure is a member of key industry cyber security schemes including:

  • CREST (Penetration Testing, Star Testing, CSIR & Cyber Essentials)
  • PCI DSS QSA
  • CESG (CHECK, CCSC, CAS, CTAS & CPA)
  • Common Criteria Lab
     
BSI Info-Assure

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

Context

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from penetration testing and assurance to rapid incident response and intrusion analysis, training and technical security research. Context is focused on helping clients manage their cyber risk, avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks.

Context

Deep Secure

Spotting a gap in the global market for truly preventing the unknown (zero-day) cyber threat, Deep Secure pioneered 'Content Threat Removal' a technique which completely eliminates content threat; enabling organisations - to Click, Share, and Transact in perfect safety - to counter even the most sophisticated attacks.

Deep Secure

E&T

E&T is the IET's award-winning magazine and associated website for professional engineers, covering all aspects of engineering.  Our E&T Cyber Security Hub offers a combination of expert-reviewed, cyber security-specific content, practical advice and networking tools. It is a perfect platform for security engineers and specialists to learn about new solutions, share knowledge, connect or just ask questions.

E&T

e2e-assure

e2e-assure - a world-class cyber security company.

e2e-assure provide secure cloud and cyber defence services.

e2e-assure have developed an industry leading SOC-as-a-Service to protect your organisation.

See our live cyber hacking demos: Ransomware in action, hack and take control of a fully patched Windows10 laptop and steal your Office365 credentials!

e2e-assure

EclecticIQ 

EclecticIQ is an applied cyber threat intelligence (CTI) technology provider, enabling enterprise security programs and governments to mature a CTI practice. EclecticIQ Platform is a Threat Intelligence Platform that enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of intelligence detection, prevention and response capabilities.

EclecticIQ 

Egress Software Technologies

Egress Software Technologies is the leading provider of encryption services designed to secure all forms of electronic information. The Egress Switch portfolio of products includes email and document classification, the only CESG CPA-certified email and file encryption service, secure automation, secure online collaboration, and Switch Secure Vault for email archiving, compliance and auditing.

Egress Software Technologies

Euro Recycling

Euro Recycling is a mobile CPNI, CESG & MoD approved ICT media destruction company. We destroy computer hard discs and other mass storage devices at our client’s site to 6mm/2mm particles in accordance with HMG IA Standard No 5. We are ISO 27001, 14001, 18001 and 9001 accredited.

Euro Recycling

IRM

Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining more than 17 years of consultancy with advanced software technology.  By covering all aspects of cyber security from PCI compliance to automated threat intelligence, IRM supports organisations at every step of their cyber maturity journey.

IRM

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security.

(ISC)²

Naimuri

Naimuri is a north-west based company with a focus on technology, cyber and information security, and business change. Our aim is to enhance the security, ability and efficiency of our partners and customers and create a continuous competitive edge driven by ever-improving technology, culture and processes.

Naimuri

Nexor

Nexor provides solutions to get information into and out of secure networks. This enables organisations to perform more efficiently and effectively. The connection of secure networks is achieved by using people, process and technologies that align to best cyber security practice established by national authorities.

Nexor

Outsource UK

Outsource UK are an award winning IT Recruitment agency with a specialist cyber division with a proven reputation in highly regulated industries. We can supply SOC / SIEM specialists, IAs, Pen testers, Cyber PMs and Managers and Cyber Security Architects on a contract, permanent or consultancy basis.

Outsource UK

SolarWinds

SolarWinds provides powerful and affordable IT management software to government agencies worldwide, including the UK’s National Health Service, European Parliament, NATO, and nearly every U.S. civilian agency, DoD branch, and intelligence agency. SolarWinds products are designed to solve the problems government IT professionals face every day and eliminate complexity from every IT process imaginable.

SolarWinds

Surevine

Described by the Financial Times at its launch as a “secure Facebook for cyber-threats”, Threatvine is a next generation cyber security information sharing platform.

Surevine, the company behind Threatvine, build secure, scalable collaboration solutions for security conscious organisations; joining people up and enabling collaboration on their most highly sensitive information.

Surevine

Thinklogical

Thinklogical manufactures secure video distribution and KVM signal extension and switching solutions for C4ISR and command and control applications. Thinklogical products increase cyber security and enable multi-domain isolation in visual computing environments, and are IA-accredited to Common Criteria EAL4, NATO NIAPC, TEMPEST Level B, and the U.S. JITC UC APL.

Thinklogical

TNP

TNP provide network security solutions and specialise in public sector organisations and businesses with large/complex internet connectivity requirements. We assist them to develop, implement and manage their network security and work with vendors such as Fortinet to deliver network security solutions across the UK using a team of highly trained consultants and engineers. 

TNP

Trustonic

Trustonic is a leading player in mobile device and application security. Almost a billion devices have Trustonic security embedded at the manufacturing stage, providing smart devices with an embedded root of trust and a hardware-protected environment for secure storage and processing. Trustonic also offer application-level security across multiple platforms, including smartphone (iOS and Android) and IoT.

Trustonic

SME Showcase

Ascentor

Ascentor helps organisations improve performance through our cyber security services. Customers rely on our business focused approach to their information security challenges. We will be joined by foreseeti, showing their cyber security modelling tool.

Ascentor

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

Covata

Covata protects enterprises from data security threats intrinsic to conducting business in the digital age. In today’s connected ecosystem, security risks to enterprises are greater and more costly than ever.

Covata

DigitalXRAID

DigitalXRAID is a Yorkshire based Cyber Security company. Accredited by CREST, IASME GOLD, Cyber Essentials PLUS and ISO. We have the expertise to help you with your Cyber Security needs.

DigitalXRAID

Dome recruitment

Dome are a long-established cyber and technology resourcing and recruitment firm, with 15+ years’ experience of providing contractors, project teams and skilled FTE’s for Central Government, Corporates & SI’s.

Dome recruitment

GeDaP

Printix, Microsoft Certified Cloud Print Management for Azure & 365 secures print reduces cost. KeyTalk strong authentication without tokens or software, seamlessly distributes short term certificates for applications or IoT.

GeDaP

Intruder

Intruder is a proactive security monitoring platform for internet-facing systems. Intruder regularly scans your digital assets, provides notifications for critical vulnerabilities and outlines remediation advice in the simplest terms.

Intruder

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Templar Executives

The pre-eminent Cyber Security and Information Assurance strategic advisory company, Templar Executives has been at the forefront of HM Government, FTSE100-350, SME and international services for more than 10 years.

 

Templar Executives

Topsec

Topsec are leading providers of cloud-based email security solutions. Our services include email security (anti-spam, anti-virus and content filtering), email continuity, URL sandboxing, email archiving, file-sharing and domain name management.

Topsec

Event partners

CYBERUK_2017_Agenda.pdf

PDF, 691.87KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Agenda

CYBERUK 2017 E-Brochure.pdf

PDF, 6711.44KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Double page spreads

CYBERUK 2017 E-Brochure Print Friendly.pdf

PDF, 3761.83KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Print Friendly

CyberUK 2017 Sponsorship Brochure.pdf

PDF, 4356.24KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Sponsorship brochure

CYBERUK 2017 E-Bulletin 1.pdf

PDF, 561.51KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 1

CYBERUK E-Bulletin 2.pdf

PDF, 3086.82KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 2

CYBERUK 2017 E-Bulletin 3.pdf

PDF, 2691.58KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 3

Share this page

Was this information helpful?

We need your feedback to improve this content.

Yes No