CYBERUK 2017

A SAFER DIGITAL BRITAIN
When:  14 Mar 2017 to 16 Mar 2017
Price:  Free to £1099+VAT
Registration has now closed
CYBERUK Strategy & In Practice logos

Lead Sponsors

NCC Group
Northrop Grumman

CYBERUK 2017 logo
    

CYBERUK 2017 will be the Government’s biggest and most influential IA and Cyber Security event to date. It will be hosted by the National Cyber Security Centre (NCSC) five months after the organisation’s launch. It will share the vision for achieving a step change in UK cyber resilience.  

CYBERUK 2017 will be two events in one. It will include the Government’s IA and Cyber Security Flagship event, which for the past decade has been the principal vehicle for engaging with IA and Cyber Security leaders. It will also combine CYBERUK In Practice, the event for the professional community.

CYBERUK Strategy (14 March 2017) will be the Government’s primary conference for briefing 800+ cyber security and IA leaders from across Government, CNI, Industry and Academia. It will feature a Networking Dinner at Liverpool’s historic St George’s Hall on the evening of Monday 13 March.

CYBERUK In Practice (15 – 16 March 2017) will bring together the professional communities. This will include specialists in the design and development of online services and systems, procurement and all areas of ICT delivery. It will be an opportunity to share insights, updates and engagement over the cyber security challenges we all face.

At CYBERUK 2017 you will hear from senior Government Ministers, Key GCHQ Senior, Key NCSC Senior and Technical Director. Streams will be shaped by NCSC Deputy Directors and Technical Directors.  They will be supported by a line-up of UK and international cyber security experts from Government, Industry, the CNI and Academia.

The Rt Hon Ben Gummer MP
“The first duty of the government is to keep the nation safe. Any modern state cannot remain secure and prosperous without securing itself in cyberspace. That is why we are taking the decisive action needed to protect the UK, our economy and our citizens from cyberattacks.

“CYBERUK 2017 is a great opportunity to work closely with partners across government, industry, academia and the critical national infrastructure on which the UK depends. It is a focal point in the Government’s Cyber Security calendar and will play a key role in the update on the new National Cyber Security Centre (NCSC) and the National Cyber Security Strategy.”

The Rt Hon Ben Gummer MP
Minister for the Cabinet Office and Paymaster General

STREAMS

Streams offer participants an opportunity to share information, explore case studies and take part in debates impacting on Government and CNI information security.

WORKSHOPS

To allow you to achieve a deeper understanding of key issues, exchange ideas and form/create effective action plans for the future, a strong workshop programme is offered at CYBERUK 2017.

SPOTLIGHT TALKS

Held during lunch breaks and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2017 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate. Issues, updates and approaches discussed during CYBERUK Strategy (Day One) will influence content over CYBERUK In Practice (Days Two and Three).

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions, vote in Plenary or Stream sessions and chat to our graphic artist who will find visual ways to capture your insights

WHAT 2015/16 DELEGATES SAID

“The most informative, honest and current event I have attended for the industry” Nuclear Decommissioning Authority

“Involvement from UK Government decision makers sets these events apart. This is reflected in the strength of the agenda, calibre of speakers and the number and seniority of Government delegates.” Northrop Grumman

“The whole experience was fantastic - the venue, the number and pertinence of vendors and above all, the quality of the seminars were excellent. In my opinion it out-stripped every other UK cyber security conference in every respect.” University of Manchester

“One of the best and most useful events I have attended in a very long time, thanks!” Fujitsu

CyberUK Strategy logo

CYBERUK Strategy (14 March 2017)

CYBERUK 2017 begins with the relaunched Cyber Security and IA Flagship event, CYBERUK Strategy. It will be chaired by Key NCSC Senior. This will be a platform for Government Ministers and Key GCHQ Senior to provide their insights.

CYBERUK Strategy will set the agenda for UK cyber security. Held five months after the launch of the NCSC and the National Cyber Security Strategy, this event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by the respective NCSC Deputy Director entrusted with shaping and leading the Team’s delivery.

STREAMS
 
Stream 1 • Economy and Society - The NCSC’s ambition to make the UK the safest place to live and work in cyberspace cannot be achieved by engaging only with the cyber security and IA community. Success depends on our reaching out to the wider economy, mainstream business, Academia and the citizen. This Stream will feature thought leaders from the information economy and key business segments in considering how the NCSC can best transform the overall resilience of the UK.
Stream 2  Government and Public Sector - Citizens expect the personal information they share with the public sector to be properly safeguarded. More and more they expect to access public services digitally. This stream examines how the NCSC Digital Team is making it easier for the public sector to secure digital services.
Stream 3 • Critical National Infrastructure - The merger of CPNI with CESG and CERT-UK brings support for the Critical National Infrastructure right into the heart of the NCSC’s service delivery. This stream will bring together case studies and commentators from across the CNI and those who own and operate industrial control systems connected to the internet.
Stream 4 • Defence and National Security - Establishing security solutions to meet the needs of the information risk owners in this sector continues to stretch the most capable minds in the UK both in HMG and industry. This stream will give you the opportunity to engage with the NCSC, its stakeholders and partners to explore how these challenges are being addressed collaboratively by this normally hidden mission area.
 

NETWORKING DINNER

A prestigious Networking Dinner will be held for the Strategy delegation on Monday 13 March, before the conference begins on Tuesday. The Dinner will be held at the spectacular St George’s Hall in Liverpool.

On Tuesday 14 March there will also be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

THE AUDIENCE

This is the Government’s strategic event for Information Assurance and cyber security leaders. Presented by the National Cyber Security Centre, CYBERUK Strategy provides delegates with a once a year opportunity to meet, understand their business needs, review the changing threat environment and clarify their responsibilities.

Numbering 800+, the audience will span Government Ministers, SIROs from Government Departments and IA and cyber security leaders from across central and wider Government. There will be senior IA and cyber security industry leaders and representatives from the Critical National Infrastructure and Academia.

CyberUK In Practice logo

CYBERUK In Practice (15 – 16 March 2017)

CYBERUK In Practice then brings together the professional community responsible for developing and implementing IA and cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling Plenary keynotes and panel debates, the following four Streams will span two days and will be led by NCSC Technical Directors.

STREAMS

The stream content is indicative at this stage. The stream sponsor will have the opportunity to interact with the NCSC Technical Director leading the stream on content although the NCSC retains overall responsibility for stream content

Stream 1 • Managing Threat - This Stream will focus on developing a deeper understanding of the threat landscape and approaches to managing it, handling incidents effectively to limit harm and preventing recurrence. 
Stream 2 • People are the Strongest Link - We need to recognise and treat people as the organisations biggest asset, not a security ‘weak link’. This stream will identify how we can better support users to work effectively and securely. What are the real barriers for users working securely?
Stream 3 • Proactive Defence - Our approach to cyber security must evolve to keep pace with new user requirements, technologies and threats. The stream will provide in-depth technical exploration of Active Cyber Defence measures.
Stream 4 • Securing Agile Delivery - Delivered by the NCSC in collaboration with the GDS, this Stream examines how security and resilience can be built into systems and services using a variety of development models, including Agile.
 

NETWORKING

On Tuesday 14 March there will be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

A relaxed Networking Evening will take place in the exhibition hall following the first day of CYBERUK In Practice on Wednesday 15 March. Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract technology and cyber security professionals at all levels from across the public sector, CNI and industry, providing an invaluable opportunity for networking and exchanging experience and technical insights. All those who work in technology, digital security, procurement and data will come together and share the information security challenges we all face. IA and cyber security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats.

CYBERUK Strategy

CYBERUK Strategy will be chaired by Key NCSC Senior. Attendees will have the opportunity to hear policy shaping speeches from Government Ministers and an important strategic update on the National Cyber Security Strategy from Key GCHQ Senior. Speakers will include senior IA and Cyber Security leaders from Government, Industry and Academia, who will share their experiences and perspectives.

Speakers

Beverley Keogh
Beverley Keogh | Stream Three, Session Two, Tuesday 14 March

I starting my working life back in 1984 as a meter reading administrator and over my 33 year career I have held a number of key roles in Customer Service and Engineering Operations across a number of the SSE groups companies.  I am currently the Director of Networks Business Assurance for Scottish and Southern Electricity Networks responsible for ensuring both the Transmission and Distribution companies that form SSEN are run in a compliant manner, a role I have held since early 2015. Reporting to the Managing Director the scope of my responsibility includes legal, regulatory, safety and internal compliance requirements including risk management and the emerging threat around Cyber Security.

Contacts:  SSENTwitter or Facebook

 

Dave Medwell
Dave Medwell | Stream Four, Session Three, Tuesday 14th March

Dave has been delivering defence capability for the last thirty five years. Originally joining the Ministry of Defence as a technician apprentice, he spent the early part of his career in the design and development of secure communications systems before transitioning to acquisitions. For the last twenty years he has undertaken a series of project, programme and portfolio management roles. He took up his current post in 2015 and leads a team responsible for the delivery of a portfolio of cyber resilience projects and services.

 

Hugo Rosemont
Hugo Rosemont Ph.D. | Stream One, Session Two , Tuesday 14 March

Hugo is Policy Adviser on Crime, Security and Risk issues at the British Retail Consortium, serving as policy lead for its work on tackling all forms of crime facing the retail industry including theft, fraud and cyber-crime. Prior to his current appointment, he served as Teaching Fellow and Assistant Director of the Centre for Defence Studies within the Department of War Studies at King’s College, London. Previously, Hugo served as Policy Adviser (Security and Resilience) to ADS - the trade organisation advancing the UK AeroSpace, Defence and Security Industries. He was a member of the Home Office’s Olympic and Paralympic Industry Advisory Group and served as Security Executive to the winning London 2012 Olympic bid team.

 

Ian Goslin | Stream Four, Session Three, Tuesday 14 March

A former RAF communications officer, Ian’s 28 year RAF career, saw him hold posts ranging from Satellite Operations Officer, through to Deployed Operations Base Commander in Al Udeid and on to commanding the UK’s Joint CIS Force in Afghanistan. He was also a UK liaison officer to the US Defense Information Services Agency through 9/11 and commanded a multinational NATO communications squadron in Germany. Upon leaving the RAF, he joined Airbus in 2012 as a Programme Manager and through good fortune and some effort progressed to become the Head of Cyber UK, responsible for Airbus’ cyber offerings into the UK.

 

Jane Cannon
Jane Cannon | Stream Four, Session Three, Tuesday 14 March

Jane has spent 30 years in industry and the last 12 years in the Security and Defence sector.  She joined OSCT from Amadeus Capital Partners. Previously Jane was a Partner in Ernst & Young and she was Group Managing Director for Lockheed Martin UK and Managing Director of QinetiQ’s Security Solutions business. Jane is currently Vice-Chair of the Engineering Council. Jane has been Chair of the ADS and was a founder member of RISC. Jane holds a bachelor’s degree in Electrical and Electronic Engineering from UCL and an MBA (Technology Management) from the Open University. She is a Fellow of the Institution of Engineering and Technology and is a Fellow of UCL. In 2003 Jane was awarded an MBE for services to business and engineering.

 

Lee Omar
Lee Omar | Stream Three, Session One Tuesday 14 March

Lee Omar, CEO, Red Ninja - Design led technology company, that co-creates technology using their expertise in data science, Internet of Things, smart cities, electrical engineering, app development and design. Led teams that created IoT products in healthcare, transport, energy and urban planning sectors. Co-chair of City Standards Institute - collaboration between Future Cities Catapult and British Standards Institution to drive Smart City Market. Worked with Chief Scientific Advisor to UK Government on Foresight Future Cities Project. Advises President of India on Smart Cities. Accompanied PM - Teresa May on trade delegation to India to participate in UK-India Tech Summit with Indian Prime Minister.

 

Matthew Rowe | Stream Three, Session One, Tuesday 14 March

Matthew is the Director of Security at Nationwide Building Society, having joined the organisation as Head of Cyber Security in 2014. Alongside his leadership of Nationwide's Security teams, Matthew is the current chair of the industry and NCSC group the Financial Services Information Exchange (FSIE), which shares information about the threats being faced across the financial services industry. Prior to Nationwide Matthew worked at the Bank of England, and before that in UK Government.

 

Mike StJohn-Green
Mike StJohn-Green | Stream Four, Session Three, Tuesday 14 March

Mike is an active consultant in cyber security with clients in the City of London and abroad as a subject matter expert. Mike retired in 2013 after 39 years in MoD, GCHQ and then the Cabinet Office. His roles in GCHQ included deputy director CESG. Mike is a frequent speaker and writer on cyber security. He is technical advisor to the Information Security Forum, which publishes the internationally-recognised Standard of Good Practice. He co-authored a book on Cyber Resilience, is a Fellow of the IET and an Honorary Fellow of the University of Warwick.

 

Nick Whidborne
Nick Whidborne | Stream Three, Session Two, Tuesday 14 March

Nick comes from an IT background and is currently the Group Head of Solution Architecture for SSE plc. He has held this role since joining SSE in October 2013 and has more recently held the role of interim Head of Information Risk and Security (acting CISO). In this latter role he had oversight for SSE’s Security Programme and its approach to Operational Technology. Prior to SSE, working for IBM and GE, he was the Chief Architect for a number of integration programmes that ran across central government and for advanced analytics solutions to support both aviation and public sector organisations.

 

Steve Wright
Steve Wright | Stream One, Session Two, Tuesday 14 March

Steve joined The John Lewis Partnership in April 2016 and is responsible for both the Information Security and Data Privacy, both of these enable the John Lewis Partnership to protect the personal data of our customers and partners, to be compliant with data protection laws and regulations, and to provide trust and transparency - resulting in greater brand experiences across our digital, mobile and ecommerce channels.

 

Thomas Seidling | Session One, Session One Tuesday 14 March

As an ex-olympian, Thomas knows that the tough path is often the right one. After completing a masters in Law, Thomas did what any reasonable professional would do and joined a startup. Ensuring seamless communications with partners, advisors and clients at CyberSmart, Thomas strives towards the mission of securing the worlds SMB's

Contacts: CyberSmart, @CyberSmartUK or LinkedIn

 

CYBERUK In Practice

CYBERUK In Practice will be chaired by Key NCSC Senior. Speakers will include leaders and innovators in the technology, digital, security, procurement and data sectors. Experienced IA and Cyber Security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats. The informal event format will give event participants the opportunity to meet, network and interact with these individuals.

Speakers

Adam Joinson
Adam Joinson | Stream Two, Session One, Wednesday 15th March

Adam holds the post of ‘Professor of Information Systems’ at the University of Bath, School of Management. His research focuses on the interaction between psychology and technology, with a particular focus on how technology can be to shape behaviour, social relations and attitudes. He is principal investigator for the Cybersecurity across the Lifespan (www.cSALSA.uk) project, and co-investigator for the Centre for Research and Evidence on Security Threats (www.crestresearch.ac.uk). His personal website is: www.joinson.com

 

Ahana Datta
Ahana Datta | Plenary Panel, Thursday 16 March

Prior to her current role, Ahana has spent a few years breaking things around various government departments, ethically hacking cash machines, and reverse engineering catalytic converters. As a mathematician by trade, her ever-changing main interest lies specifically in lattice-based cryptography. Leading a team of assorted cyber security junkies at MoJ, she also spends time with the Foreign and Commonwealth Office, with the aim of making government a more secure place by deploying the most powerful security tool - common sense.

 

Prof Angella Sasse
Angela Sasse | Stream Two, Session One, Wednesday 15th March

M. Angela Sasse FREng is the Professor of Human-Centred Technology in the Department of Computer Science at University College London, UK.  A usability researcher by training, she started investigating the causes and effects of usability issues with security mechanisms in 1996.  In addition to studying specific mechanisms such as passwords, biometrics, and access control, her research group has developed human-centred frameworks that explain the role of security, privacy, identity and trust in human interactions with technology.  She was elected a Fellow of the Royal Academy of Engineering in 2015, and is currently the Director of the multidisciplinary UK Research Institute for Science of Cyber Security (RISCS).

 

Ben Houghton
Ben Houghton | Stream Three, Session Five | Stream Four, Session Four Thursday 16 March

Ben Houghton is a Microsoft Azure Solution Architect working with National Security customers.

Contact: LinkedIn

 

Dr Claudia Natanson
Claudia Natanson | Plenary Speaker, Wednesday 15th March

An Information and Cyber Security Leader with over 20 year’s global experience, Claudia is currently the Chief Security Officer at the Department for Works and Pensions. Dr Natanson has worked with Fortune 500, and FTSE 100 companies, helping them build cyber security resilience and embedding security into the cultural fabric of their organisations.  She has held positions at drinks giant Diageo responsible for implementing a global security programme across 85 countries and 120 markets.  At British Telecom she was responsible for setting up the UK’s first accredited commercial Computer Incident and Security Team and BT’s Secure Business Services. Claudia is currently the Chair of the Corporate Executive Programme (CEP) which brings together C-level leaders for whom risk, security, privacy are priority items on their agendas.  She is active across Europe in the area of networks, security and policy and a regular speaker and journal contributor in the security industry.

Dr Natanson holds a B.Sc. in Nuclear Chemistry, MSc. in Computer Science and a Ph.D. in Computers and Education. She is a CISSP, a Chartered IT Professional, ISO27001 Lead Auditor and a Fellow of the British Computing Society.

 

Diane Lovejoy
Diane Lovejoy | Stream Three, Session One, Wednesday 15th March

I got into the exciting dynamic arena of Information Technology in 1996 when I started working for a public school as a IT Technician, a role I thoroughly enjoyed and decided that this was the career for me. From there I moved into various IT positions, mainly with a support emphasis.

I have been employed at Ofqual for 3 and a half years. In the past 2 years I have been involved in the transition from on-premise hosted IT infrastructure to Azure Iaas, Saas, Paas and Office 365 technology solutions.

Contacts: OFQUAL, LinkedIn or FaceBook

 

Dan North
Dan North | Stream Four, Session One, Wednesday 15th March 

Dan uses his deep technical and organisational knowledge to help CIOs, business and software teams to deliver quickly and successfully. He puts people first and finds simple, pragmatic solutions to business and technical problems, often using lean and agile techniques. With twenty five years of experience in IT, Dan is a frequent speaker at technology conferences worldwide. The originator of Behaviour-Driven Development (BDD) and Deliberate Discovery, Dan has published feature articles in numerous software and business publications, and contributed to The RSpec Book and 97 Things Every Programmer Should Know.

He occasionally blogs at dannorth.net

 

Dave Rogers
Dave Rogers | Stream Two, Session Two, Wednesday 15th March | Stream Four, Session 5, Thursday 16th March

Dave is Head of Security & Architecture at the Ministry of Justice.

Contacts: Twitter or LinkedIn

 

Ed Tucker
Ed Tucker | Stream Three, Session Two, Wednesday 15th March

Ed has been working in IT and Security for over 15 years, with a broad spectrum of responsibilities and expertise, including Online Fraud, Hacking Analysis & Capability Scoring, Forensic Investigations, Cyber Threat. Ed currently leads HMRC’s Cyber Security capability. A regular speaker at events such as InfoSec Europe, European Information Security Summit, European CISO Conference, InfoCrime Summit, and now eCrime, Ed is a highly regarded industry expert in the UK on all aspects of cyber security.

Contacts: CISO-Central or Twitter

 

Gavin Rawson
Gavin Rawson | Stream Three, Session Four, Thursday 16th March

Gavin manages a team of technical experts and is responsible for Nominet’s turing solution. He is passionate about leveraging AI and security advances to detect malicious signals in DNS traffic. Gavin drives turing’s roadmap, ensuring the solution stays at the forefront of technological innovation. 

 

Graham Calladine | Stream Four, Session Four Thursday 16 March

Graham Calladine is Principal Lead Security Manager in the Trust Worthy Computing group at Microsoft, Redmond. Graham has been living security in Microsoft for past 10 years, with a deep focus on the security development lifecycle, security static analysis, security tooling, large scale security detection analytics, and large scale engineering education programmes. All for some of Microsoft’s most complex engineering products.

 

Imogen Hewing
Imogen Hewing, KPMG | Stream Two, Session Three, Wednesday 15 March

Imogen has worked with clients across the Security, Intelligence and Defence sector in a range of business transformation roles, assisting clients through problem identification, scoping and design through to planning and implementation, where she specialises in programme and project management. Her passion for security and intelligence is grounded in academic studies and she most recently completed a Postgraduate Diploma of Research in Security, Conflict and Justice in 2014 at the University of Bath. Imogen is a strong advocate for women’s issues in the sector and leads a KPMG internal group focussed on advancing women’s positions across the organisation and the industry.

 

Isobel Baylis
Isobel Baylis | In Practice Stream Two, Session Three, Wednesday 15 March

Isobel helps Public & Private Sector clients tackle organisational design issues, skills deficits and strategic challenges. Her experience and knowledge of performance improvement, process re-design, business planning, organisational design, change management and strategy development has been primarily within an Aerospace, Defence & Intelligence context. Most recent clients have been the Department for Exiting the EU, Ministry of Defence & Defence primes.

 

James Stewart
James Stewart | In Practice Stream Three, Session Five, Thursday 16th March

James Stewart is as an independent consultant supporting senior leaders in a range of sectors embed modern technology and security in their strategies, and helping organisations with digitally-enabled transformation.

Previously James was a co-founder of the Government Digital Service and Deputy CTO of the UK Government. He was responsible for the technical architecture of GOV.UK, building the acclaimed team behind it, supporting the delivery of dozens of projects across government and transforming the UK Government’s relationship with open source by “coding in the open.” He’s been instrumental in the UK government’s move to use of public cloud, reform of network policy and coordinating the network of senior technology leaders across government.

Contacts: jystewart.net, Twitter or LinkedIn

 

Jeremy Habberley
Jeremy Habberley | Stream Three, Session Five, Thursday 16th March

Jeremy is the UK Country manager for Axon Public Safety, part of TASER international. He is responsible for driving sales of CED, Axon body worn cameras, public safety organisations across the UK.

Jeremy has over 15 years experience selling technical solutions into the blue light market, having worked previously at Sepura PLC and Global RadioData Communications. He is passionate about providing innovative, leading edge solutions that allow the police to take advantage of the exponential growth in computing power available today.

Contact: Twitter

 

John Elliott
John Elliott, Easyjet | Stream Two, Session Three, Wednesday 15 March

John is a pragmatic cybersecurity, payments and privacy specialist. He is a passionate advocate for the integration of cybersecurity with business objectives at both a personal and organizational level. His current research aims to improve cybersecurity assurance in contractual and regulatory relationships. He is a Chartered Fellow of the BCS, holds professional certifications in risk, privacy and security, and is a Pluralsight Author.

 

Mahbubul Islam
Mahbubul Islam | Stream Three, Session Five, Thursday 16th March

Mahbubul is the Head of Secure Design at DWP for a Digital Project. He has over 8 years in IT Security experience spanning across Physical, Personnel, Policy and Technical security within HMG. His area of interest has focused mainly around Security Governance and Risk Management with particular focus on controls in the space of Respond and Recover. He is actively supporting the mentoring of students both within the Civil Service and outside. 

Contact: LinkedIn 

 

Lizzie Coles Kemp
Lizzie Coles-Kemp | Stream Two, Session Four | Stream Two, Session Five, Thursday 16 March

Lizzie Coles-Kemp is a Professor of Information Security at Royal Holloway University of London. She is a qualitative researcher who uses creative engagement methods to explore everyday practices of information production, protection, circulation, curation and consumption within and between communities. She took up a full-time academic post in 2008 and prior to joining Royal Holloway University of London she worked for 18 years as an information security practitioner. Lizzie’s particular focus is the intersection between human and technological security and she specialises in public and community service design, provision and consumption.

 

Matthew Atkinson
Matthew Atkinson | Stream Two, Session Two, Wednesday 15th March

I am the Information Security Manager for the Animal and Plant Health Agency, part of Defra. I’ve been a proper InfoSec manager within Defra for about 10 years, before that I ran a software development team and did information security as a sideline. I’ve never been a ‘just follow the rules’ person, but prefer to make my colleagues think about their actions, and so the latest NCSC guidance fits me really well. I’ve always thought that making people change their passwords regularly is wrong, and I’m so pleased I now agree with the official guidance.

Contact: APHA website, Twitter or LinkedIn

 

Mike Prettejohn
Mike Prettejohn | Stream Three, Session Two, Wednesday 15th March

Mike Prettejohn founded and runs Netcraft. Based in Bath, Netcraft provides Internet security services which are used by many of the World’s leading Internet infrastructure companies and banks. Since June the NCSC has contracted with Netcraft to disrupt phishing and malware attacks which are hosted in the UK or impersonate HMG, defending the country as if it was one very large enterprise.

Contact: netcraft.com

 

Nick Breeze
Nick Breeze | Stream Two, Session Five, Thursday 16 March

Research Lead for Common Technology Services, part of GDS. 15+ years research experience in the public and private sector.

 

Nick Woodcraft
Nick Woodcraft | Stream Three, Session Two Wednesday 15th March

Having worked previously at the Guardian, the Cabinet Office Technology Transformation, and Common Technology Services (CTS), Nick is now a Senior Technical Adviser at GDS covering email security and improving access to cloud applications. In February 2016 he published guidance on securing government email, working with the Cabinet Office and NCSC to promote the use of DMARC along with SPF and DKIM in all public sector organisations.

Contact: Twitter

 

Ollie Whitehouse
Ollie Whitehouse | Stream Three Session Three, Wednesday 15th March | Plenary Panellist Thursday 16th March

Ollie is Technical Director at NCC Group where he oversees group direction, research & development and cyber defence services. In a cyber security career spanning more than 20 years he has held roles in engineering, applied research and consultancy at organizations such as @stake, Symantec at BlackBerry. This career has resulted in various patents in software exploitation countermeasures, malicious code detection & containment along with numerous whitepapers and presentations. In addition to his role at NCC Group Ollie is an advisor to various organizations including the National Cyber Security Centre, EPSRC, UK Cyber Security Challenge and Cylon incubator.

Contacts: NCC WebsiteTwitter or LinkedIn

 

Pam Briggs
Pam Briggs | Plenary Panel Session, Thursday 16th March

Pam is a Professor in Applied Psychology at Northumbria University.  Her research addresses issues of identity, security, privacy and trust. Pam is a founder member of the UK’s Research Institute in the Science of Cybersecurity and is an investigator on current RCUK funded projects in digital identity; cybercrime and cybersecurity across the lifespan.  She has co-authored two UK Government Office for Science reports on cybersecurity and has over thirty scientific publications in this area. 

Contact: northumbria.ac.uk, Twitter or LinkedIn

 

Pear lNoble-Mallock
Pearl Noble-Mallock | Stream Two, Session Three, Wednesday 15 March

Pearl is a (cyber) security specialist providing assurance for BAE Systems Naval Ships Products and Services. Her role as Head of Product Information Assurance and Security requires close work with Customer, Government, and other Aerospace and Defence organisations to improve (cyber) security. Pearl is recognised as a leader in her field and has driven significant advances in the profession, influencing and progressing a future development areas; both within her organisation, the wider engineering industry and public sector community. Pearl continues to grow the security profession through her work in BAE Systems, professional speaking and through her STEM Ambassador activities.

 

Richard Wright
Richard Wright | Stream Two, Session Two, Wednesday 15th March

Richard works for the National Crime Agency, with responsibility for security policy, guidance and education. He is a passionate believer that people should be placed at the heart of the security programme, instead of the weakest control to be designed out by technology. 

Richard decided to change the NCA’s password strategy over two years ago to align it with human behaviour. Password expiry settings were extended and user-generated passwords adopted to allow employees to create complex passwords that are easy to remember. Richard is a qualified information security and training professional with over eight years’ experience in HMG security.

Contact: nationalcrimeagency.gov.uk or Twitter

 

Rod Chapman Smart
Rod Chapman | Stream Four, Session Two, Wednesday 15th March

Rod is a Principal Engineer in the Intelligent Systems Expertise Centre of Altran UK. He specializes in the design, implementation and verification of high-integrity software.

For many years, Rod led the programming language and software verification research group at Altran, and has more recently led Altran's efforts to merge the best of the Lean, Agile and Formal development approaches to form a single coherent whole. He is a regular and renowned speaker on these topics, and is a Fellow of both the BCS and the IET.

Contact: www.altran.co.uk or  Twitter

 

Sarah Rudge
Sarah Rudge | Stream Three, Session One, Wednesday 15th March

Sarah Rudge works hard to make sure Ofqual’s information is safe. She is an advocate for effective  information management and security practices, with a keen interest in data protection. Sarah is a certified data protection practitioner and has worked at Ofqual for 6 years. She spends quite a lot of her time working closely with colleagues to develop Ofqual’s information assurance maturity, and making sure the Security Policy Framework and effective information behaviours are embedded in the work that they do.  

Contacts: OFQUAL, Twitter or LinkedIn

 

Lead Sponsors

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.

NCC Group

Northrop Grumman

Northrop Grumman has more than thirty years’ experience in cyber security and information assurance, and brings unparalleled expertise in managing and protecting networks and delivering complex information assurance and security solutions to high-risk customers including government and critical infrastructure industries.

Northrop Grumman is developing the next-generation of advanced cyber solutions which touch on policy, governance requirements, software application, network development, training and operational support, and is responsive to emerging cyber security needs. The company invests in leading edge research & development, and accesses cutting-edge technology through affiliation with academia and SMEs. Northrop Grumman has its own Cyber Research Consortium with leading universities, and is a leader in cyber education, offering its own Cyber Academy worldwide. The company is a major sponsor of school, university and professional cyber competitions worldwide; and sponsors Cyber Security Challenge in the UK.

Northrop Grumman operates in a number of locations throughout the UK (London, Cheltenham, Chester, Coventry, Fareham, Hendon, New Malden, Peterborough, and RAF Waddington). Its Cyber business, which includes state-of-art cyber research & development and the UK CSOC, is located in the new Cheltenham facilities. The company also operates a cyber range in Australia with the Australian Defence Academy and last year acquired M5 Network Security, a provider of cyber security and secure mobile communications to military and intelligence organisations. Northrop Grumman is a leading global security company providing innovative systems, products and solutions in autonomous systems, cyber, strike, C4ISR and logistics and modernization to government and commercial customers worldwide.

Northrop Grumman

Networking Sponsors

SANS

Networking Sponsor

SANS is a Cyber Security Supplier to HM Government and runs the Cyber Retraining Academy in partnership with HM Government.

Established in 1989, SANS Institute is the largest information security training organisation in the world. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats - the ones being actively exploited.

SANS training is led by world-renowned, expert instructors and the curriculum covers all the most crucial areas of security. Courses are updated frequently to ensure they remain current and feature the latest, hands-on lab work.

Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. SANS training is aligned to GIAC certification and represents the ideal preparation for a GIAC exam.

SANS also provides CyberTalent assessments and Securing The Human awareness programmes.

In addition, SANS supports the global security community by providing many free resources, operates the Internet Storm Centre, is the founder sponsor of the UK Cyber Security Challenge and provides expert speakers for conferences, events and the media worldwide.

See www.sans.org  www.cyber-academy/retraining or contact SANS via emea@sans.org

SANS

Atkins

Networking Dinner Sponsor

Atkins delivers cyber resilience expertise to the critical national infrastructure, government, national security and defence sectors. We are the largest supplier of client-side advisory in the UK security and intelligence sector and accredited to the Cyber Suppliers to UK Government scheme.

We view cyber resilience as the ability of an organisation to understand the cyber threats it’s facing, to inform the known risks, to put in place proportionate protection, and to recover quickly from attack. Depending upon the client, robust cyber resilience ultimately provides cost-effective business or service continuity, sustained revenue, or the uninterrupted delivery of military effects. It also contributes toward the ongoing protection of the UK.

By combing a deep understanding of the digital ecosystem that surrounds and supports our nation’s critical infrastructure with our experience of working in secure and mission-critical environments, we can offer unrivalled insight into an organisation’s digital vulnerabilities.

Atkins

Stream sponsors

Nominet

Strategy Stream 1 | Economy and Society

Nominet is an internet company delivering public benefit and is the trusted guardian of the UK namespace – one of the world’s largest country code registries. Nominet manages and runs the infrastructure for over 10 million domain names that end in .uk as well as Welsh Top Level Domains (TLDs) .cymru and .wales and 35 other branded and generic TLDs, including .bbc and .london. Over 3 million businesses, and millions more consumers, rely on its domain registry services. It has a team of 150 people based in Oxford and London and over 2,500 members.

Through its work keeping the .uk namespace secure Nominet’s R&D team is exploring the further potential of the Domain Names System (DNS) and the challenges and opportunities around emerging internet technologies. As a result it operates in a number of business areas, from providing internet connectivity and analytics for Internet of Things (IoT) devices to selling complex data analytics software, including its ground-breaking network analytics tool called turing, for tackling cyber threats. Nominet is also working with the UK government to protect its Public Service Network, in partnership with the National Cyber Security Centre.

With the proceeds of its successful registry business, Nominet set up and supports the charitable foundation Nominet Trust, the UK’s leading social tech funder.

Nominet

Trend Micro

Strategy Stream 2 | Government and Public Sector

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro

BAE Systems

Strategy Stream 3 | Critical National Infrastructure

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies  use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE Systems

QinetiQ

Strategy Stream 4 | Defence and Security Strategy

QinetiQ is a world leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions and human performance. 

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

Roke Manor Research

In Practice Stream 1 | Managing Threat

Roke delivers technology research, development and consultancy services to solve the world’s most complex technical challenges in data science, sensing, communications and cyber security. We assist and advise our government and corporate clients by providing effective and efficient information security services, especially when addressing information security for complex or niche systems and emerging technologies.

Focusing on the efficient use of budgets whilst increasing security and usability of IT systems, we are the ideal product independent partner for identifying and assuring your Information Security needs.

  • Research and Development of new Cyber Security ideas and solutions
  • Security Architecture and Risk Assessment
  • Product and Service Assurance
  • Information Security Management
  • High Grade and High Assurance Systems

Trusted by government and corporate partners worldwide, we deliver technology-based R&D services, provide independent advice, and solve technically challenging problems across the entire technology acquisition and assurance lifecycle.

Roke Manor Research

Leonardo

In Practice Stream 2 | People are the Strongest Link

Leonardo, NATO Global Cyber Defence Mission Partner, delivers confidence in the Cyber Space.

Leonardo is a Global high-tech company and a key player in the Aerospace, Defence and Security sector, with headquarters in Italy and a strong presence in the United Kingdom, the United States and Poland, and more than 47000 employees.

Leonardo has more than 25 years’ experience working in cyber security. Drawing on a dedicated organisation, a consolidated approach and constant investment in resources and technology, we provide public and private organisations with a comprehensive security strategy and solutions set, covering organisational, technological and compliance issues.

  • real-time services designed to protect, deter, detect and respond to the most advanced and persistent cyber-attacks.
  • integrated cyber security solutions for the protection of information and data, mobile infrastructures, Industrial Control/SCADA systems
  • highly secure collaboration and information solutions delivering on the ‘the need to share’.
  • a wide range of solutions for interception, capture, management and processing of information.
  • cyber intelligence services aimed at monitoring and analysing Open Sources, Darknets & Big Data.
Leonardo

Thales

In Practice Stream 3 | Proactive Defence

Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company.  Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual, and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.

Thales

Lockheed Martin

In Practice Stream 4 | Securing Agile Delivery

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 98,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

Lockheed Martin

Amazon Web Services

In Practice Stream 5 | Cyber Insights

Amazon Web Services offers a broad set of global compute, storage, database, analytics, application, and deployment services that help organizations move faster, lower IT costs, and scale applications. These services are trusted by the largest enterprises and the hottest start-ups to power a wide variety of workloads including: web and mobile applications, IoT, game development, data processing and warehousing, storage, archive, and many others.

Government, education and nonprofit organizations face unique challenges to accomplish complex missions with limited resources. Amazon Web Services now serves more than 2,000 government, 5,000 education and 17,500 nonprofit organizations worldwide.

Amazon Web Services

Sponsors

DCMS

SME Innovation Zone Sponsor

The Department for Culture, Media & Sport (DCMS) is making Britain the world’s most creative and exciting place to live, visit & do business.

DCMS is also the department for digital - we support digital enterprise, digital skills, telecoms, the Internet, data protection & cyber security.

Our work to connect the UK and support the digital economy includes protecting industry and society, and helping the UK become the most secure place to do business online. We support the UK cyber security industry, encouraging growth, exports and innovation, especially amongst SMEs. We help improve cyber security skills so industry and Government have the people, knowledge and capability to protect the UK.

DCMS

Microsoft

Bursary Sponsor

Technology is a disruptive force – enabling new business models, opening new sources of revenue and shaping industry landscapes. Ensuring security, privacy, and compliance is key to digital transformation.

Microsoft is building a platform that looks across all the critical end-points of today’s cloud & mobile world. Our investments are across four categories: identity, apps & data, devices, and infrastructure – with an approach that is inclusive of the technologies our customers are using. We act on intelligence from our security-related signals and insights, and foster a vibrant ecosystem of partners who help us raise the bar across the industry – helping to securely enable our customers’ digital transformation.

Microsoft

Skybox Security and BT

Bursary Sponsor

Skybox Security and BT are working together to provide a powerful set of security management solutions that, by extracting insights from security data silos, give unprecedented visibility of the attack surface.  Jointly, we can provide a comprehensive risk assessment on customers’ ICT estates, offering real-time analysis on their security and compliance levels, known vulnerabilities and threat exposures. We work with our customers providing regular, comprehensive recommendations on best security practice procedures to help them plan and implement their journey in mitigating risks for their businesses.

Skybox Security and BT

Airbus Defence and Space

Workshop Sponsor

Airbus DS CyberSecurity is a trusted partner of Governments, Military and Security organisations across Europe.  Through our Cyber Defence Centres in the UK, France and Germany, we offer a range of services and solutions, dynamically combining monitoring, early detection and investigation of attacks, drastically reducing the incident response time.

We have developed a range of trusted products and solutions for securing infrastructure, in order to ensure the protection of our customers’ networks, data and endpoints. We also have one of the largest teams of CESG registered consultants providing Cyber Security consulting and managed services from our secure premises in Cheltenham.

Airbus Defence and Space

Forescout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including Internet of Things devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Forescout

MWR

Workshop Sponsor

Established in 2003, MWR works with clients to deliver security assurance, incident response, managed detection and response, security behaviour training and numerous other cyber defence services to businesses, critical infrastructure and government to strengthen the nation’s cyber security and resilience.

MWR is pleased to be sponsoring and supporting CYBERUK 2017 - come and visit stand A15 to meet the team. Paul Pratley, Associate Director and Head of Global Investigations & Incident Response at MWR will be delivering an Incident Management Workshop at CYBERUK Strategy, showing real world data breach incidents in a simulation exercise to assist crisis management teams in preparing and responding to cyber attacks.

MWR

Palo Alto Networks

Workshop Sponsor

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this, we safely enable applications, users and content; deliver visibility, automation and control; and detect and prevent threats at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.

Palo Alto Networks

PwC

Workshop Sponsor

PwC has one of the largest and most comprehensive cyber security practices with a in the market today, offering a full range of services including consulting, cyber threat intelligence and incident response; cyber crisis management; and threat and vulnerability management. We are unique amongst the large service providers in having an integrated cyber legal practice that is able to offer leading expert legal advice.

Our cyber security practice has industry-recognised certifications (including CHECK, CREST, CIR and CCSC) giving confidence that our security testing, threat intelligence & incident response services as well as cyber security consultancy is undertaken by experts.  

PwC

Titania

Workshop Sponsor

Titania develop cyber security auditing software. Our security and compliance tools enable auditors and end user organisations to harden their systems and produce expert level reports on their networks at a fraction of the time and cost of manual testing, helping them stay secure in the face of cyber threats.

Our tools, Nipper Studio and Paws Studio, generate fast & thorough, security & compliance reports that enable you to act on fact.   

Trusted by organisations in over 80 countries (Inc. U.S DoD, Treasury, FBI) our award-winning products have been recognised by the Govies, PwC & the British Chambers of Commerce.

Titania

PA Consulting

Collateral Sponsor (Delegate brochure)

An independent firm of over 2,600 people, we operate globally from offices across the Americas, Europe, the Nordics, the Gulf and Asia Pacific.

We have extensive experience in designing and delivering digital trust and cyber security programmes for public and private sector clients, in some of the most challenging environments. We offer market-leading, end-to-end capability across the cyber security life cycle, including technical, people and physical security.

Our experts bring together an in-depth understanding of the cyber threat, world-class capability in a range of key digital trust and cyber security disciplines and deep industry knowledge.

Our clients choose us because we don’t just believe in making a difference. We believe in making the difference.

PA Consulting

Symantec

Collateral Sponsor (Delegate lanyards)

Symantec’s mission is to make the world a safer place. Cybercriminals are leveraging stealthy, persistent methods to bypass traditional security and exploit vulnerabilities faster than companies can defend against them. IT teams need improved detection tools to identify and remediate these advanced persistent threats. Our leading threat protection technologies correlate intelligence across the network, endpoints and email to provide the most comprehensive security layer enabling you to respond to threats with precision and helping you build custom security solutions—on premise, in the cloud, and everywhere data travels.

Symantec

Ultra Electronics

Collateral Sponsor (Delegate bag)

Ultra Electronics is a leading supplier of CESG-certified encryption solutions at all grades, with a long-established reputation for providing exceptional levels of manageability and reliability.

Ultra Electronics is an internationally successful defence & aerospace, security & cyber, transport and energy company with a consistent track record of development and growth.

Ultra Electronics

Pavilion Exhibitors

IBM

Pavilion Stand & Workshop Sponsor

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services, and operates one of the world’s broadest security research, development and delivery organisations, monitoring 35 billion security events per day. In the UK IBM has 20,000 employees and IBM Security supports UK Critical National Infrastructure across a range of industries. IBM Security delivers proven outcomes for UK Government with Government trained and cleared consultants in UK based List-X facilities. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

IBM

Intel

Intel Security, with its McAfee product line, is dedicated to making the digital world safer and more secure for everyone.  Intel Security is a division of Intel Corporation. Learn more at www.intelsecurity.com

We are very pleased to be attending CyberUK 2017 with Fujitsu, SCC, Softcat and Trustmarque, four of our valued and trusted partners, all of which can help you to simplify the Threat Defence Lifecycle and offer unique advice and solutions to enable you to reduce the threats that get through, find them faster, and use fewer resources in the process.

fujitsu scc softcat logos

Visit us on stand C1 and discover how an integrated security approach can help you achieve your business goals.

Intel

Premium Exhibitors

4Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. For over a decade we have worked in the UK and overseas to create secure end to end systems. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions.

4Secure

Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Anomali

APMG International

APMG International is a global examination institute specialising in professional certifications. In response to mounting risks in a digital age, APMG has designed a broad portfolio of world-class cyber security products. We've partnered with GCHQ to deliver the Certified Professional (CCP) and GCHQ Certified Training (GCT) schemes and the Defence Science and Technology Laboratory (Dstl) to develop CDCAT(®) the unique Cyber Defence Capability Assessment tool.  APMG is an Accreditation Body for NCSC's Cyber Essentials scheme and offers a host of industry recognised certifications including; ISO/IEC 20000, ISO/IEC 27001, COBIT(®)5, IAITAM(®), RESILIA(™) and OBASHI(®).

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android, BlackBerry and Windows Mobile.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Fortinet

From IoT to the Cloud, Fortinet protects some the most sensitive government organisations across the globe.

Fortinet is the only company with security solutions for network, endpoint, application, data centre, cloud and access. These work together as a cooperative fabric, spanning the entire network, linking different sensors and tools to collect, coordinate, and respond to potential threats. This is further strengthened by the industry's highest level of threat research and analytics.

This means Fortinet is the only company that can truly provide a powerful, integrated security fabric across the entire attack surface and at any point along the kill chain.

Fortinet

Frazer-Nash Consultancy

Premium Exhibitor & Meeting Space Sponsor

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains.

We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise.

We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

L3 TRL Technology

L3 TRL Technology is an agile, UK-based company which designs, develops and delivers advanced electronic systems for the protection of people, infrastructure and assets. Working in partnership with global defence, government organisations, and business partners, we defend against evolving and emerging threats worldwide. 

We provide scalable and resilient Cyber Security and Electronic Warfare solutions across a range of markets including: Land, Littoral and Maritime, Government, and CNI.

L3 TRL is part of the UK Cyber Growth Partnership. Our award-winning IP encryption solutions successfully secure and protect the integrity, confidentiality and availability of sensitive and highly classified information.

L3 TRL Technology

Raytheon

Raytheon UK Advanced Cyber Solutions is a dedicated cyber security company providing proactive threat hunting, security engineering, assessment and customised security training.  Raytheon UK has extensive experience pro-actively identifying trends in adversary capabilities, as well as unique relationships with partners who have visibility into adversary planning/staging infrastructure and activities.  Our team of highly qualified and experienced engineers create in-demand security programmes, end-to-end architectures and security operations centres for global financial organisations, power/utility companies, technology providers, and government agencies.

Raytheon

Quintessence Labs

Quintessence Labs helps keep all your data safe, even in the event of a breach. Our Trusted Security Foundation delivers best in class, interoperable key and policy management, with high speed truly random keys and the strength of a hardware security module. Integration with flexible encryption solutions and our client software development kit enable seamless deployments and enterprise-wide data protection.

Quintessence Labs

Exhibitors

2T Security

RiskTree is a new, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2, and supported by innovative browser-based software. It’s been used by both public and private sector clients to reduce the cost of accreditation and support ISO27001 certification.

2T Security

Armour Communications

Armour Communications Limited provides secure communications solutions for voice, video and messaging on everyday smartphones and tablets. CPA approved to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

Armour Communications

Bridewell Consulting

Bridewell Consulting are an NCSC Certified Cyber Security Consultancy. Our teams have a proven track record working with local and central government across the UK. Bridewell specialise in Information Audit, Assurance, Cyber Security, Technology Risk, Security Testing and Data Privacy, providing pragmatic cost effective solutions for our clients.

Bridewell Consulting

BSI Info-Assure

BSI Info-Assure is a leading provider of cyber security and information assurance services.

BSI Info-Assure is a member of key industry cyber security schemes including:

  • CREST (Penetration Testing, Star Testing, CSIR & Cyber Essentials)
  • PCI DSS QSA
  • CESG (CHECK, CCSC, CAS, CTAS & CPA)
  • Common Criteria Lab
     
BSI Info-Assure

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

CompTIA

CompTIA is the global, non-profit IT trade association and creator of vendor neutral IT certifications. CompTIA certifications are developed with the support of leading technology companies and organisations and validated by industry experts around the world. Our portfolio enables the development of Cybersecurity Professionals’ skills from entry to expert.

CompTIA

Context

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from penetration testing and assurance to rapid incident response and intrusion analysis, training and technical security research. Context is focused on helping clients manage their cyber risk, avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks.

Context

Deep Secure

Spotting a gap in the global market for truly preventing the unknown (zero-day) cyber threat, Deep Secure pioneered 'Content Threat Removal' a technique which completely eliminates content threat; enabling organisations - to Click, Share, and Transact in perfect safety - to counter even the most sophisticated attacks.

Deep Secure

Deep Sky Blue

At Deep Sky Blue we believe in making a difference in the world. We do this by combining our passions for leading-edge technology and software delivery. We are trusted by our customers to deliver innovation in secure and sensitive environments. Currently, we are building a Next-Generation Cyber Defence capability - Sherpa.

Deep Sky Blue

E&T

E&T is the IET's award-winning magazine and associated website for professional engineers, covering all aspects of engineering.  Our E&T Cyber Security Hub offers a combination of expert-reviewed, cyber security-specific content, practical advice and networking tools. It is a perfect platform for security engineers and specialists to learn about new solutions, share knowledge, connect or just ask questions.

E&T

e2e-assure

e2e-assure - a world-class cyber security company.

e2e-assure provide secure cloud and cyber defence services.

e2e-assure have developed an industry leading SOC-as-a-Service to protect your organisation.

See our live cyber hacking demos: Ransomware in action, hack and take control of a fully patched Windows10 laptop and steal your Office365 credentials!

e2e-assure

EclecticIQ 

EclecticIQ is an applied cyber threat intelligence (CTI) technology provider, enabling enterprise security programs and governments to mature a CTI practice. EclecticIQ Platform is a Threat Intelligence Platform that enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of intelligence detection, prevention and response capabilities.

EclecticIQ 

Egress Software Technologies

Egress Software Technologies is the leading provider of encryption services designed to secure all forms of electronic information. The Egress Switch portfolio of products includes email and document classification, the only CESG CPA-certified email and file encryption service, secure automation, secure online collaboration, and Switch Secure Vault for email archiving, compliance and auditing.

Egress Software Technologies

Euro Recycling

Euro Recycling is a mobile CPNI, CESG & MoD approved ICT media destruction company. We destroy computer hard discs and other mass storage devices at our client’s site to 6mm/2mm particles in accordance with HMG IA Standard No 5. We are ISO 27001, 14001, 18001 and 9001 accredited.

Euro Recycling

IRM

Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining more than 17 years of consultancy with advanced software technology.  By covering all aspects of cyber security from PCI compliance to automated threat intelligence, IRM supports organisations at every step of their cyber maturity journey.

IRM

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security.

(ISC)²

Leidos

Leidos is a global science and technology solutions leader working to solve the world’s toughest challenges in the defence, intelligence, homeland security, civil, and health markets. The company’s 32,000 employees support vital missions for government and commercial customers.

Leidos

Naimuri

Naimuri is a north-west based company with a focus on technology, cyber and information security, and business change. Our aim is to enhance the security, ability and efficiency of our partners and customers and create a continuous competitive edge driven by ever-improving technology, culture and processes.

Naimuri

Nexor

Nexor provides solutions to get information into and out of secure networks. This enables organisations to perform more efficiently and effectively. The connection of secure networks is achieved by using people, process and technologies that align to best cyber security practice established by national authorities.

Nexor

Outsource UK

Outsource UK are an award winning IT Recruitment agency with a specialist cyber division with a proven reputation in highly regulated industries. We can supply SOC / SIEM specialists, IAs, Pen testers, Cyber PMs and Managers and Cyber Security Architects on a contract, permanent or consultancy basis.

Outsource UK

Salesforce

Salesforce enables companies to connect to their customers in a whole new way, leveraging the combined power of cloud, social, mobile, data science, and IoT technologies. With its innovative Customer Success Platform, Salesforce sets the global standard for customer relationship management, engagement, and intelligence by integrating sales, service, marketing, community, analytics, IoT, and app development in a trusted cloud for businesses of every size and industry.

Salesforce

Satisnet Ltd

Founded in 2004, Satisnet Ltd is a leading IT Security Reseller dedicated to providing the highest level of customer care and technical support.

With 900+ customers across a multitude of market sectors from FTSE 250, Finance, Legal, Gaming and Local Government.
We have been part of the product creations that is SOCAutomation and CyberKombat.

Satisnet Ltd

Security Risk Management

Security Risk Management’s (SRM) specialists cover the full scope of the Governance, Risk and Compliance agenda such as information assurance to UK Government, NATO, PCI DSS, N3 and ISO 27001 standards, business continuity, operational risk management and computer & network forensics.

Security Risk Management

SolarWinds

SolarWinds provides powerful and affordable IT management software to government agencies worldwide, including the UK’s National Health Service, European Parliament, NATO, and nearly every U.S. civilian agency, DoD branch, and intelligence agency. SolarWinds products are designed to solve the problems government IT professionals face every day and eliminate complexity from every IT process imaginable.

SolarWinds

Surevine

Described by the Financial Times at its launch as a “secure Facebook for cyber-threats”, Threatvine is a next generation cyber security information sharing platform.

Surevine, the company behind Threatvine, build secure, scalable collaboration solutions for security conscious organisations; joining people up and enabling collaboration on their most highly sensitive information.

Surevine

Thinklogical

Thinklogical manufactures secure video distribution and KVM signal extension and switching solutions for C4ISR and command and control applications. Thinklogical products increase cyber security and enable multi-domain isolation in visual computing environments, and are IA-accredited to Common Criteria EAL4, NATO NIAPC, TEMPEST Level B, and the U.S. JITC UC APL.

Thinklogical

TNP

TNP provide network security solutions and specialise in public sector organisations and businesses with large/complex internet connectivity requirements. We assist them to develop, implement and manage their network security and work with vendors such as Fortinet to deliver network security solutions across the UK using a team of highly trained consultants and engineers. 

TNP

Trustonic

Trustonic is a leading player in mobile device and application security. Almost a billion devices have Trustonic security embedded at the manufacturing stage, providing smart devices with an embedded root of trust and a hardware-protected environment for secure storage and processing. Trustonic also offer application-level security across multiple platforms, including smartphone (iOS and Android) and IoT.

Trustonic

SME Showcase

Ascentor

Ascentor helps organisations improve performance through our cyber security services. Customers rely on our business focused approach to their information security challenges. We will be joined by foreseeti, showing their cyber security modelling tool.

Ascentor

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

Covata

Covata protects enterprises from data security threats intrinsic to conducting business in the digital age. In today’s connected ecosystem, security risks to enterprises are greater and more costly than ever.

Covata

DigitalXRAID

DigitalXRAID is a Yorkshire based Cyber Security company. Accredited by CREST, IASME GOLD, Cyber Essentials PLUS and ISO. We have the expertise to help you with your Cyber Security needs.

DigitalXRAID

Dome recruitment

Dome are a long-established cyber and technology resourcing and recruitment firm, with 15+ years’ experience of providing contractors, project teams and skilled FTE’s for Central Government, Corporates & SI’s.

Dome recruitment

GeDaP

Printix, Microsoft Certified Cloud Print Management for Azure & 365 secures print reduces cost. KeyTalk strong authentication without tokens or software, seamlessly distributes short term certificates for applications or IoT.

GeDaP

Intruder

Intruder is a proactive security monitoring platform for internet-facing systems. Intruder regularly scans your digital assets, provides notifications for critical vulnerabilities and outlines remediation advice in the simplest terms.

Intruder

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Templar Executives

The pre-eminent Cyber Security and Information Assurance strategic advisory company, Templar Executives has been at the forefront of HM Government, FTSE100-350, SME and international services for more than 10 years.

Templar Executives

Topsec

Topsec are leading providers of cloud-based email security solutions. Our services include email security (anti-spam, anti-virus and content filtering), email continuity, URL sandboxing, email archiving, file-sharing and domain name management.

Topsec

DCMS Innovation Zone Exhibitors

Abatis

Abatis for Windows is a patented, award-winning, tiny-footprint technology in NCSC evaluation.
Stops persistent malware without signature/whitelist updates.
Extends legacy equipment lifetime and reduces energy consumption by 7%.
Protects SCADA/ICS/Medically-Certified/Safety-Critical/CNI.
Abatis

CheckRecipient

CheckRecipient is a next-generation email security technology that uses machine learning and NLP to prevent highly sensitive information being sent to the wrong people

CheckRecipient

Citicus

Citicus provides security, risk and compliance management software for commercial IT, industrial control systems and supplier assessment. Manage risk faster, better and more efficiently than with traditional GRC tools.

Citicus

Cyberlytic

Cyberlytic is revolutionising web application security. Our software applies patented cognitive machine learning and risk analytics to detect, prioritise and prevent the most sophisticated web attacks.

Cyberlytic

CyNation

CyNation provides security & compliance automation solutions and services utilising artificial intelligence and machine learning behavioural analysis to improve cyber resilience & visibility across entire organisation

CyNation

Distributed Management Systems

Patented, Identity Assurance with no fixed secrets - keys are changed dynamically and so immune from insider attacks and manufacturer compromise.
NCSC certified, it provides military assurance at commercial prices.

Distributed Management Systems

drie

drie is the fastest way to get secure cloud infrastructure for your web applications. Our platform saves you the time that you currently spend provisioning, managing or configuring servers.

drie

ICURe

ICURe (comprising 12 participating UK Universities) presents cutting edge cyber security solutions from research and development offering resolutions to a plethora of cyber threats, promoting risk mitigation and enhanced security. Visit stand I1.

ICURe

Immersive Labs

Immersive Labs operate an online cyber skills development platform. Innovative and creative cyber challenges entice technical staff and enables their organisation to identify, measure and develop practical cyber skills.

Immersive Labs

iProov

iProov delivers usable, secure online authentication by network-based face verification. It protects against forged replicas, replay attacks & compromised devices, creating One Time Biometrics using patented Flashmark technology.  

iProov

My1Login

My1Login is a UK-Based Identity and Access Management company that enables seamless user access to web, mobile and legacy desktop applications delivering operational savings and protecting against the financial and reputational damage of a data breach.

My1Login

Post-Quantum

Post-Quantum provides access control, authentication, and patented quantum computing-secure encryption solutions addressing government and industry’s data protection, insider threat, and data flow auditing needs.

Post-Quantum

RedSift

OnDMARC provides a step by step process to implement and maintain your domain’s DMARC configuration, effectively blocking cyber attacks that start with un-authorised emails.
OnDMARC is a RedSift product.

RedSift

Event partners

CYBERUK_2017_Agenda.pdf

PDF, 694.3KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Agenda

CYBERUK 2017 E-Brochure.pdf

PDF, 6675.75KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Double page spreads

CYBERUK 2017 E-Brochure Print Friendly.pdf

PDF, 3761.83KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Print Friendly

CyberUK 2017 Sponsorship Brochure.pdf

PDF, 4337.24KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Sponsorship brochure

CYBERUK 2017 E-Bulletin 1.pdf

PDF, 561.51KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 1

CYBERUK E-Bulletin 2.pdf

PDF, 3086.82KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 2

CYBERUK 2017 E-Bulletin 3.pdf

PDF, 2691.58KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 3

CYBERUK 2017 e-bulletin 4.pdf

PDF, 3815.51KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 4

CYBERUK 2017 logo
    

CYBERUK 2017 will be the Government’s biggest and most influential IA and Cyber Security event to date. It will be hosted by the National Cyber Security Centre (NCSC) five months after the organisation’s launch. It will share the vision for achieving a step change in UK cyber resilience.  

CYBERUK 2017 will be two events in one. It will include the Government’s IA and Cyber Security Flagship event, which for the past decade has been the principal vehicle for engaging with IA and Cyber Security leaders. It will also combine CYBERUK In Practice, the event for the professional community.

CYBERUK Strategy (14 March 2017) will be the Government’s primary conference for briefing 800+ cyber security and IA leaders from across Government, CNI, Industry and Academia. It will feature a Networking Dinner at Liverpool’s historic St George’s Hall on the evening of Monday 13 March.

CYBERUK In Practice (15 – 16 March 2017) will bring together the professional communities. This will include specialists in the design and development of online services and systems, procurement and all areas of ICT delivery. It will be an opportunity to share insights, updates and engagement over the cyber security challenges we all face.

At CYBERUK 2017 you will hear from senior Government Ministers, Key GCHQ Senior, Key NCSC Senior and Technical Director. Streams will be shaped by NCSC Deputy Directors and Technical Directors.  They will be supported by a line-up of UK and international cyber security experts from Government, Industry, the CNI and Academia.

The Rt Hon Ben Gummer MP
“The first duty of the government is to keep the nation safe. Any modern state cannot remain secure and prosperous without securing itself in cyberspace. That is why we are taking the decisive action needed to protect the UK, our economy and our citizens from cyberattacks.

“CYBERUK 2017 is a great opportunity to work closely with partners across government, industry, academia and the critical national infrastructure on which the UK depends. It is a focal point in the Government’s Cyber Security calendar and will play a key role in the update on the new National Cyber Security Centre (NCSC) and the National Cyber Security Strategy.”

The Rt Hon Ben Gummer MP
Minister for the Cabinet Office and Paymaster General

STREAMS

Streams offer participants an opportunity to share information, explore case studies and take part in debates impacting on Government and CNI information security.

WORKSHOPS

To allow you to achieve a deeper understanding of key issues, exchange ideas and form/create effective action plans for the future, a strong workshop programme is offered at CYBERUK 2017.

SPOTLIGHT TALKS

Held during lunch breaks and during the Drinks Reception and Networking Evening within the exhibition hall, against the clock 5-minute spotlight talks give you a concise briefing on key topics, latest innovations and pioneering ideas.

AUDIENCE ENGAGEMENT

CYBERUK 2017 will include demo sessions, inspirational talks, tailored workshops and plenty of opportunity for discussion and debate. Issues, updates and approaches discussed during CYBERUK Strategy (Day One) will influence content over CYBERUK In Practice (Days Two and Three).

The event programme will be rich in real-world experience, using case studies and scenarios to bring to life challenges and solutions faced by event participants. There will be a mixture of high impact plenary talks, themed Streams and interactive activities centred on the informal networking area. Throughout the event you can add your challenges, feedback and questions, vote in Plenary or Stream sessions and chat to our graphic artist who will find visual ways to capture your insights

WHAT 2015/16 DELEGATES SAID

“The most informative, honest and current event I have attended for the industry” Nuclear Decommissioning Authority

“Involvement from UK Government decision makers sets these events apart. This is reflected in the strength of the agenda, calibre of speakers and the number and seniority of Government delegates.” Northrop Grumman

“The whole experience was fantastic - the venue, the number and pertinence of vendors and above all, the quality of the seminars were excellent. In my opinion it out-stripped every other UK cyber security conference in every respect.” University of Manchester

“One of the best and most useful events I have attended in a very long time, thanks!” Fujitsu

CyberUK Strategy logo

CYBERUK Strategy (14 March 2017)

CYBERUK 2017 begins with the relaunched Cyber Security and IA Flagship event, CYBERUK Strategy. It will be chaired by Key NCSC Senior. This will be a platform for Government Ministers and Key GCHQ Senior to provide their insights.

CYBERUK Strategy will set the agenda for UK cyber security. Held five months after the launch of the NCSC and the National Cyber Security Strategy, this event will provide clarity in the new organisation’s evolving strategy and delivery plans. It will give the leadership community the chance to debate priorities, challenges and opportunities.

Following short, high impact plenary keynotes and debates, delegates will divide into four Streams. Each will be chaired by the respective NCSC Deputy Director entrusted with shaping and leading the Team’s delivery.

STREAMS
 
Stream 1 • Economy and Society - The NCSC’s ambition to make the UK the safest place to live and work in cyberspace cannot be achieved by engaging only with the cyber security and IA community. Success depends on our reaching out to the wider economy, mainstream business, Academia and the citizen. This Stream will feature thought leaders from the information economy and key business segments in considering how the NCSC can best transform the overall resilience of the UK.
Stream 2  Government and Public Sector - Citizens expect the personal information they share with the public sector to be properly safeguarded. More and more they expect to access public services digitally. This stream examines how the NCSC Digital Team is making it easier for the public sector to secure digital services.
Stream 3 • Critical National Infrastructure - The merger of CPNI with CESG and CERT-UK brings support for the Critical National Infrastructure right into the heart of the NCSC’s service delivery. This stream will bring together case studies and commentators from across the CNI and those who own and operate industrial control systems connected to the internet.
Stream 4 • Defence and National Security - Establishing security solutions to meet the needs of the information risk owners in this sector continues to stretch the most capable minds in the UK both in HMG and industry. This stream will give you the opportunity to engage with the NCSC, its stakeholders and partners to explore how these challenges are being addressed collaboratively by this normally hidden mission area.
 

NETWORKING DINNER

A prestigious Networking Dinner will be held for the Strategy delegation on Monday 13 March, before the conference begins on Tuesday. The Dinner will be held at the spectacular St George’s Hall in Liverpool.

On Tuesday 14 March there will also be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

THE AUDIENCE

This is the Government’s strategic event for Information Assurance and cyber security leaders. Presented by the National Cyber Security Centre, CYBERUK Strategy provides delegates with a once a year opportunity to meet, understand their business needs, review the changing threat environment and clarify their responsibilities.

Numbering 800+, the audience will span Government Ministers, SIROs from Government Departments and IA and cyber security leaders from across central and wider Government. There will be senior IA and cyber security industry leaders and representatives from the Critical National Infrastructure and Academia.

CyberUK In Practice logo

CYBERUK In Practice (15 – 16 March 2017)

CYBERUK In Practice then brings together the professional community responsible for developing and implementing IA and cyber security across Government, Industry and the Critical National Infrastructure.

Over the two days, case studies and participative content will help delegates understand what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.

This event will combine short, compelling Plenary keynotes and panel debates, the following four Streams will span two days and will be led by NCSC Technical Directors.

STREAMS

The stream content is indicative at this stage. The stream sponsor will have the opportunity to interact with the NCSC Technical Director leading the stream on content although the NCSC retains overall responsibility for stream content

Stream 1 • Managing Threat - This Stream will focus on developing a deeper understanding of the threat landscape and approaches to managing it, handling incidents effectively to limit harm and preventing recurrence. 
Stream 2 • People are the Strongest Link - We need to recognise and treat people as the organisations biggest asset, not a security ‘weak link’. This stream will identify how we can better support users to work effectively and securely. What are the real barriers for users working securely?
Stream 3 • Proactive Defence - Our approach to cyber security must evolve to keep pace with new user requirements, technologies and threats. The stream will provide in-depth technical exploration of Active Cyber Defence measures.
Stream 4 • Securing Agile Delivery - Delivered by the NCSC in collaboration with the GDS, this Stream examines how security and resilience can be built into systems and services using a variety of development models, including Agile.
 

NETWORKING

On Tuesday 14 March there will be an evening Networking Drinks Reception in the CYBERUK exhibition hall following the Strategy conference. Strategy and In Practice delegates will have the opportunity to mingle in an informal environment.

A relaxed Networking Evening will take place in the exhibition hall following the first day of CYBERUK In Practice on Wednesday 15 March. Activities will centre around the Spotlight Stage with additional entertainment planned throughout the evening. This will be a prime time to network within the exhibition whilst enjoying food and refreshments.

THE AUDIENCE

CYBERUK In Practice will attract technology and cyber security professionals at all levels from across the public sector, CNI and industry, providing an invaluable opportunity for networking and exchanging experience and technical insights. All those who work in technology, digital security, procurement and data will come together and share the information security challenges we all face. IA and cyber security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats.

CYBERUK Strategy

CYBERUK Strategy will be chaired by Key NCSC Senior. Attendees will have the opportunity to hear policy shaping speeches from Government Ministers and an important strategic update on the National Cyber Security Strategy from Key GCHQ Senior. Speakers will include senior IA and Cyber Security leaders from Government, Industry and Academia, who will share their experiences and perspectives.

Speakers

Beverley Keogh
Beverley Keogh | Stream Three, Session Two, Tuesday 14 March

I starting my working life back in 1984 as a meter reading administrator and over my 33 year career I have held a number of key roles in Customer Service and Engineering Operations across a number of the SSE groups companies.  I am currently the Director of Networks Business Assurance for Scottish and Southern Electricity Networks responsible for ensuring both the Transmission and Distribution companies that form SSEN are run in a compliant manner, a role I have held since early 2015. Reporting to the Managing Director the scope of my responsibility includes legal, regulatory, safety and internal compliance requirements including risk management and the emerging threat around Cyber Security.

Contacts:  SSENTwitter or Facebook

 

Dave Medwell
Dave Medwell | Stream Four, Session Three, Tuesday 14th March

Dave has been delivering defence capability for the last thirty five years. Originally joining the Ministry of Defence as a technician apprentice, he spent the early part of his career in the design and development of secure communications systems before transitioning to acquisitions. For the last twenty years he has undertaken a series of project, programme and portfolio management roles. He took up his current post in 2015 and leads a team responsible for the delivery of a portfolio of cyber resilience projects and services.

 

Hugo Rosemont
Hugo Rosemont Ph.D. | Stream One, Session Two , Tuesday 14 March

Hugo is Policy Adviser on Crime, Security and Risk issues at the British Retail Consortium, serving as policy lead for its work on tackling all forms of crime facing the retail industry including theft, fraud and cyber-crime. Prior to his current appointment, he served as Teaching Fellow and Assistant Director of the Centre for Defence Studies within the Department of War Studies at King’s College, London. Previously, Hugo served as Policy Adviser (Security and Resilience) to ADS - the trade organisation advancing the UK AeroSpace, Defence and Security Industries. He was a member of the Home Office’s Olympic and Paralympic Industry Advisory Group and served as Security Executive to the winning London 2012 Olympic bid team.

 

Ian Goslin | Stream Four, Session Three, Tuesday 14 March

A former RAF communications officer, Ian’s 28 year RAF career, saw him hold posts ranging from Satellite Operations Officer, through to Deployed Operations Base Commander in Al Udeid and on to commanding the UK’s Joint CIS Force in Afghanistan. He was also a UK liaison officer to the US Defense Information Services Agency through 9/11 and commanded a multinational NATO communications squadron in Germany. Upon leaving the RAF, he joined Airbus in 2012 as a Programme Manager and through good fortune and some effort progressed to become the Head of Cyber UK, responsible for Airbus’ cyber offerings into the UK.

 

Jane Cannon
Jane Cannon | Stream Four, Session Three, Tuesday 14 March

Jane has spent 30 years in industry and the last 12 years in the Security and Defence sector.  She joined OSCT from Amadeus Capital Partners. Previously Jane was a Partner in Ernst & Young and she was Group Managing Director for Lockheed Martin UK and Managing Director of QinetiQ’s Security Solutions business. Jane is currently Vice-Chair of the Engineering Council. Jane has been Chair of the ADS and was a founder member of RISC. Jane holds a bachelor’s degree in Electrical and Electronic Engineering from UCL and an MBA (Technology Management) from the Open University. She is a Fellow of the Institution of Engineering and Technology and is a Fellow of UCL. In 2003 Jane was awarded an MBE for services to business and engineering.

 

Lee Omar
Lee Omar | Stream Three, Session One Tuesday 14 March

Lee Omar, CEO, Red Ninja - Design led technology company, that co-creates technology using their expertise in data science, Internet of Things, smart cities, electrical engineering, app development and design. Led teams that created IoT products in healthcare, transport, energy and urban planning sectors. Co-chair of City Standards Institute - collaboration between Future Cities Catapult and British Standards Institution to drive Smart City Market. Worked with Chief Scientific Advisor to UK Government on Foresight Future Cities Project. Advises President of India on Smart Cities. Accompanied PM - Teresa May on trade delegation to India to participate in UK-India Tech Summit with Indian Prime Minister.

 

Matthew Rowe | Stream Three, Session One, Tuesday 14 March

Matthew is the Director of Security at Nationwide Building Society, having joined the organisation as Head of Cyber Security in 2014. Alongside his leadership of Nationwide's Security teams, Matthew is the current chair of the industry and NCSC group the Financial Services Information Exchange (FSIE), which shares information about the threats being faced across the financial services industry. Prior to Nationwide Matthew worked at the Bank of England, and before that in UK Government.

 

Mike StJohn-Green
Mike StJohn-Green | Stream Four, Session Three, Tuesday 14 March

Mike is an active consultant in cyber security with clients in the City of London and abroad as a subject matter expert. Mike retired in 2013 after 39 years in MoD, GCHQ and then the Cabinet Office. His roles in GCHQ included deputy director CESG. Mike is a frequent speaker and writer on cyber security. He is technical advisor to the Information Security Forum, which publishes the internationally-recognised Standard of Good Practice. He co-authored a book on Cyber Resilience, is a Fellow of the IET and an Honorary Fellow of the University of Warwick.

 

Nick Whidborne
Nick Whidborne | Stream Three, Session Two, Tuesday 14 March

Nick comes from an IT background and is currently the Group Head of Solution Architecture for SSE plc. He has held this role since joining SSE in October 2013 and has more recently held the role of interim Head of Information Risk and Security (acting CISO). In this latter role he had oversight for SSE’s Security Programme and its approach to Operational Technology. Prior to SSE, working for IBM and GE, he was the Chief Architect for a number of integration programmes that ran across central government and for advanced analytics solutions to support both aviation and public sector organisations.

 

Steve Wright
Steve Wright | Stream One, Session Two, Tuesday 14 March

Steve joined The John Lewis Partnership in April 2016 and is responsible for both the Information Security and Data Privacy, both of these enable the John Lewis Partnership to protect the personal data of our customers and partners, to be compliant with data protection laws and regulations, and to provide trust and transparency - resulting in greater brand experiences across our digital, mobile and ecommerce channels.

 

Thomas Seidling | Session One, Session One Tuesday 14 March

As an ex-olympian, Thomas knows that the tough path is often the right one. After completing a masters in Law, Thomas did what any reasonable professional would do and joined a startup. Ensuring seamless communications with partners, advisors and clients at CyberSmart, Thomas strives towards the mission of securing the worlds SMB's

Contacts: CyberSmart, @CyberSmartUK or LinkedIn

 

CYBERUK In Practice

CYBERUK In Practice will be chaired by Key NCSC Senior. Speakers will include leaders and innovators in the technology, digital, security, procurement and data sectors. Experienced IA and Cyber Security professionals will leave having been updated on latest practice, new innovations and emerging cyber threats. The informal event format will give event participants the opportunity to meet, network and interact with these individuals.

Speakers

Adam Joinson
Adam Joinson | Stream Two, Session One, Wednesday 15th March

Adam holds the post of ‘Professor of Information Systems’ at the University of Bath, School of Management. His research focuses on the interaction between psychology and technology, with a particular focus on how technology can be to shape behaviour, social relations and attitudes. He is principal investigator for the Cybersecurity across the Lifespan (www.cSALSA.uk) project, and co-investigator for the Centre for Research and Evidence on Security Threats (www.crestresearch.ac.uk). His personal website is: www.joinson.com

 

Ahana Datta
Ahana Datta | Plenary Panel, Thursday 16 March

Prior to her current role, Ahana has spent a few years breaking things around various government departments, ethically hacking cash machines, and reverse engineering catalytic converters. As a mathematician by trade, her ever-changing main interest lies specifically in lattice-based cryptography. Leading a team of assorted cyber security junkies at MoJ, she also spends time with the Foreign and Commonwealth Office, with the aim of making government a more secure place by deploying the most powerful security tool - common sense.

 

Prof Angella Sasse
Angela Sasse | Stream Two, Session One, Wednesday 15th March

M. Angela Sasse FREng is the Professor of Human-Centred Technology in the Department of Computer Science at University College London, UK.  A usability researcher by training, she started investigating the causes and effects of usability issues with security mechanisms in 1996.  In addition to studying specific mechanisms such as passwords, biometrics, and access control, her research group has developed human-centred frameworks that explain the role of security, privacy, identity and trust in human interactions with technology.  She was elected a Fellow of the Royal Academy of Engineering in 2015, and is currently the Director of the multidisciplinary UK Research Institute for Science of Cyber Security (RISCS).

 

Ben Houghton
Ben Houghton | Stream Three, Session Five | Stream Four, Session Four Thursday 16 March

Ben Houghton is a Microsoft Azure Solution Architect working with National Security customers.

Contact: LinkedIn

 

Dr Claudia Natanson
Claudia Natanson | Plenary Speaker, Wednesday 15th March

An Information and Cyber Security Leader with over 20 year’s global experience, Claudia is currently the Chief Security Officer at the Department for Works and Pensions. Dr Natanson has worked with Fortune 500, and FTSE 100 companies, helping them build cyber security resilience and embedding security into the cultural fabric of their organisations.  She has held positions at drinks giant Diageo responsible for implementing a global security programme across 85 countries and 120 markets.  At British Telecom she was responsible for setting up the UK’s first accredited commercial Computer Incident and Security Team and BT’s Secure Business Services. Claudia is currently the Chair of the Corporate Executive Programme (CEP) which brings together C-level leaders for whom risk, security, privacy are priority items on their agendas.  She is active across Europe in the area of networks, security and policy and a regular speaker and journal contributor in the security industry.

Dr Natanson holds a B.Sc. in Nuclear Chemistry, MSc. in Computer Science and a Ph.D. in Computers and Education. She is a CISSP, a Chartered IT Professional, ISO27001 Lead Auditor and a Fellow of the British Computing Society.

 

Diane Lovejoy
Diane Lovejoy | Stream Three, Session One, Wednesday 15th March

I got into the exciting dynamic arena of Information Technology in 1996 when I started working for a public school as a IT Technician, a role I thoroughly enjoyed and decided that this was the career for me. From there I moved into various IT positions, mainly with a support emphasis.

I have been employed at Ofqual for 3 and a half years. In the past 2 years I have been involved in the transition from on-premise hosted IT infrastructure to Azure Iaas, Saas, Paas and Office 365 technology solutions.

Contacts: OFQUAL, LinkedIn or FaceBook

 

Dan North
Dan North | Stream Four, Session One, Wednesday 15th March 

Dan uses his deep technical and organisational knowledge to help CIOs, business and software teams to deliver quickly and successfully. He puts people first and finds simple, pragmatic solutions to business and technical problems, often using lean and agile techniques. With twenty five years of experience in IT, Dan is a frequent speaker at technology conferences worldwide. The originator of Behaviour-Driven Development (BDD) and Deliberate Discovery, Dan has published feature articles in numerous software and business publications, and contributed to The RSpec Book and 97 Things Every Programmer Should Know.

He occasionally blogs at dannorth.net

 

Dave Rogers
Dave Rogers | Stream Two, Session Two, Wednesday 15th March | Stream Four, Session 5, Thursday 16th March

Dave is Head of Security & Architecture at the Ministry of Justice.

Contacts: Twitter or LinkedIn

 

Ed Tucker
Ed Tucker | Stream Three, Session Two, Wednesday 15th March

Ed has been working in IT and Security for over 15 years, with a broad spectrum of responsibilities and expertise, including Online Fraud, Hacking Analysis & Capability Scoring, Forensic Investigations, Cyber Threat. Ed currently leads HMRC’s Cyber Security capability. A regular speaker at events such as InfoSec Europe, European Information Security Summit, European CISO Conference, InfoCrime Summit, and now eCrime, Ed is a highly regarded industry expert in the UK on all aspects of cyber security.

Contacts: CISO-Central or Twitter

 

Gavin Rawson
Gavin Rawson | Stream Three, Session Four, Thursday 16th March

Gavin manages a team of technical experts and is responsible for Nominet’s turing solution. He is passionate about leveraging AI and security advances to detect malicious signals in DNS traffic. Gavin drives turing’s roadmap, ensuring the solution stays at the forefront of technological innovation. 

 

Graham Calladine | Stream Four, Session Four Thursday 16 March

Graham Calladine is Principal Lead Security Manager in the Trust Worthy Computing group at Microsoft, Redmond. Graham has been living security in Microsoft for past 10 years, with a deep focus on the security development lifecycle, security static analysis, security tooling, large scale security detection analytics, and large scale engineering education programmes. All for some of Microsoft’s most complex engineering products.

 

Imogen Hewing
Imogen Hewing, KPMG | Stream Two, Session Three, Wednesday 15 March

Imogen has worked with clients across the Security, Intelligence and Defence sector in a range of business transformation roles, assisting clients through problem identification, scoping and design through to planning and implementation, where she specialises in programme and project management. Her passion for security and intelligence is grounded in academic studies and she most recently completed a Postgraduate Diploma of Research in Security, Conflict and Justice in 2014 at the University of Bath. Imogen is a strong advocate for women’s issues in the sector and leads a KPMG internal group focussed on advancing women’s positions across the organisation and the industry.

 

Isobel Baylis
Isobel Baylis | In Practice Stream Two, Session Three, Wednesday 15 March

Isobel helps Public & Private Sector clients tackle organisational design issues, skills deficits and strategic challenges. Her experience and knowledge of performance improvement, process re-design, business planning, organisational design, change management and strategy development has been primarily within an Aerospace, Defence & Intelligence context. Most recent clients have been the Department for Exiting the EU, Ministry of Defence & Defence primes.

 

James Stewart
James Stewart | In Practice Stream Three, Session Five, Thursday 16th March

James Stewart is as an independent consultant supporting senior leaders in a range of sectors embed modern technology and security in their strategies, and helping organisations with digitally-enabled transformation.

Previously James was a co-founder of the Government Digital Service and Deputy CTO of the UK Government. He was responsible for the technical architecture of GOV.UK, building the acclaimed team behind it, supporting the delivery of dozens of projects across government and transforming the UK Government’s relationship with open source by “coding in the open.” He’s been instrumental in the UK government’s move to use of public cloud, reform of network policy and coordinating the network of senior technology leaders across government.

Contacts: jystewart.net, Twitter or LinkedIn

 

Jeremy Habberley
Jeremy Habberley | Stream Three, Session Five, Thursday 16th March

Jeremy is the UK Country manager for Axon Public Safety, part of TASER international. He is responsible for driving sales of CED, Axon body worn cameras, public safety organisations across the UK.

Jeremy has over 15 years experience selling technical solutions into the blue light market, having worked previously at Sepura PLC and Global RadioData Communications. He is passionate about providing innovative, leading edge solutions that allow the police to take advantage of the exponential growth in computing power available today.

Contact: Twitter

 

John Elliott
John Elliott, Easyjet | Stream Two, Session Three, Wednesday 15 March

John is a pragmatic cybersecurity, payments and privacy specialist. He is a passionate advocate for the integration of cybersecurity with business objectives at both a personal and organizational level. His current research aims to improve cybersecurity assurance in contractual and regulatory relationships. He is a Chartered Fellow of the BCS, holds professional certifications in risk, privacy and security, and is a Pluralsight Author.

 

Mahbubul Islam
Mahbubul Islam | Stream Three, Session Five, Thursday 16th March

Mahbubul is the Head of Secure Design at DWP for a Digital Project. He has over 8 years in IT Security experience spanning across Physical, Personnel, Policy and Technical security within HMG. His area of interest has focused mainly around Security Governance and Risk Management with particular focus on controls in the space of Respond and Recover. He is actively supporting the mentoring of students both within the Civil Service and outside. 

Contact: LinkedIn 

 

Lizzie Coles Kemp
Lizzie Coles-Kemp | Stream Two, Session Four | Stream Two, Session Five, Thursday 16 March

Lizzie Coles-Kemp is a Professor of Information Security at Royal Holloway University of London. She is a qualitative researcher who uses creative engagement methods to explore everyday practices of information production, protection, circulation, curation and consumption within and between communities. She took up a full-time academic post in 2008 and prior to joining Royal Holloway University of London she worked for 18 years as an information security practitioner. Lizzie’s particular focus is the intersection between human and technological security and she specialises in public and community service design, provision and consumption.

 

Matthew Atkinson
Matthew Atkinson | Stream Two, Session Two, Wednesday 15th March

I am the Information Security Manager for the Animal and Plant Health Agency, part of Defra. I’ve been a proper InfoSec manager within Defra for about 10 years, before that I ran a software development team and did information security as a sideline. I’ve never been a ‘just follow the rules’ person, but prefer to make my colleagues think about their actions, and so the latest NCSC guidance fits me really well. I’ve always thought that making people change their passwords regularly is wrong, and I’m so pleased I now agree with the official guidance.

Contact: APHA website, Twitter or LinkedIn

 

Mike Prettejohn
Mike Prettejohn | Stream Three, Session Two, Wednesday 15th March

Mike Prettejohn founded and runs Netcraft. Based in Bath, Netcraft provides Internet security services which are used by many of the World’s leading Internet infrastructure companies and banks. Since June the NCSC has contracted with Netcraft to disrupt phishing and malware attacks which are hosted in the UK or impersonate HMG, defending the country as if it was one very large enterprise.

Contact: netcraft.com

 

Nick Breeze
Nick Breeze | Stream Two, Session Five, Thursday 16 March

Research Lead for Common Technology Services, part of GDS. 15+ years research experience in the public and private sector.

 

Nick Woodcraft
Nick Woodcraft | Stream Three, Session Two Wednesday 15th March

Having worked previously at the Guardian, the Cabinet Office Technology Transformation, and Common Technology Services (CTS), Nick is now a Senior Technical Adviser at GDS covering email security and improving access to cloud applications. In February 2016 he published guidance on securing government email, working with the Cabinet Office and NCSC to promote the use of DMARC along with SPF and DKIM in all public sector organisations.

Contact: Twitter

 

Ollie Whitehouse
Ollie Whitehouse | Stream Three Session Three, Wednesday 15th March | Plenary Panellist Thursday 16th March

Ollie is Technical Director at NCC Group where he oversees group direction, research & development and cyber defence services. In a cyber security career spanning more than 20 years he has held roles in engineering, applied research and consultancy at organizations such as @stake, Symantec at BlackBerry. This career has resulted in various patents in software exploitation countermeasures, malicious code detection & containment along with numerous whitepapers and presentations. In addition to his role at NCC Group Ollie is an advisor to various organizations including the National Cyber Security Centre, EPSRC, UK Cyber Security Challenge and Cylon incubator.

Contacts: NCC WebsiteTwitter or LinkedIn

 

Pam Briggs
Pam Briggs | Plenary Panel Session, Thursday 16th March

Pam is a Professor in Applied Psychology at Northumbria University.  Her research addresses issues of identity, security, privacy and trust. Pam is a founder member of the UK’s Research Institute in the Science of Cybersecurity and is an investigator on current RCUK funded projects in digital identity; cybercrime and cybersecurity across the lifespan.  She has co-authored two UK Government Office for Science reports on cybersecurity and has over thirty scientific publications in this area. 

Contact: northumbria.ac.uk, Twitter or LinkedIn

 

Pear lNoble-Mallock
Pearl Noble-Mallock | Stream Two, Session Three, Wednesday 15 March

Pearl is a (cyber) security specialist providing assurance for BAE Systems Naval Ships Products and Services. Her role as Head of Product Information Assurance and Security requires close work with Customer, Government, and other Aerospace and Defence organisations to improve (cyber) security. Pearl is recognised as a leader in her field and has driven significant advances in the profession, influencing and progressing a future development areas; both within her organisation, the wider engineering industry and public sector community. Pearl continues to grow the security profession through her work in BAE Systems, professional speaking and through her STEM Ambassador activities.

 

Richard Wright
Richard Wright | Stream Two, Session Two, Wednesday 15th March

Richard works for the National Crime Agency, with responsibility for security policy, guidance and education. He is a passionate believer that people should be placed at the heart of the security programme, instead of the weakest control to be designed out by technology. 

Richard decided to change the NCA’s password strategy over two years ago to align it with human behaviour. Password expiry settings were extended and user-generated passwords adopted to allow employees to create complex passwords that are easy to remember. Richard is a qualified information security and training professional with over eight years’ experience in HMG security.

Contact: nationalcrimeagency.gov.uk or Twitter

 

Rod Chapman Smart
Rod Chapman | Stream Four, Session Two, Wednesday 15th March

Rod is a Principal Engineer in the Intelligent Systems Expertise Centre of Altran UK. He specializes in the design, implementation and verification of high-integrity software.

For many years, Rod led the programming language and software verification research group at Altran, and has more recently led Altran's efforts to merge the best of the Lean, Agile and Formal development approaches to form a single coherent whole. He is a regular and renowned speaker on these topics, and is a Fellow of both the BCS and the IET.

Contact: www.altran.co.uk or  Twitter

 

Sarah Rudge
Sarah Rudge | Stream Three, Session One, Wednesday 15th March

Sarah Rudge works hard to make sure Ofqual’s information is safe. She is an advocate for effective  information management and security practices, with a keen interest in data protection. Sarah is a certified data protection practitioner and has worked at Ofqual for 6 years. She spends quite a lot of her time working closely with colleagues to develop Ofqual’s information assurance maturity, and making sure the Security Policy Framework and effective information behaviours are embedded in the work that they do.  

Contacts: OFQUAL, Twitter or LinkedIn

 

Lead Sponsors

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape.

With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face.

We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.

Headquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.

NCC Group

Northrop Grumman

Northrop Grumman has more than thirty years’ experience in cyber security and information assurance, and brings unparalleled expertise in managing and protecting networks and delivering complex information assurance and security solutions to high-risk customers including government and critical infrastructure industries.

Northrop Grumman is developing the next-generation of advanced cyber solutions which touch on policy, governance requirements, software application, network development, training and operational support, and is responsive to emerging cyber security needs. The company invests in leading edge research & development, and accesses cutting-edge technology through affiliation with academia and SMEs. Northrop Grumman has its own Cyber Research Consortium with leading universities, and is a leader in cyber education, offering its own Cyber Academy worldwide. The company is a major sponsor of school, university and professional cyber competitions worldwide; and sponsors Cyber Security Challenge in the UK.

Northrop Grumman operates in a number of locations throughout the UK (London, Cheltenham, Chester, Coventry, Fareham, Hendon, New Malden, Peterborough, and RAF Waddington). Its Cyber business, which includes state-of-art cyber research & development and the UK CSOC, is located in the new Cheltenham facilities. The company also operates a cyber range in Australia with the Australian Defence Academy and last year acquired M5 Network Security, a provider of cyber security and secure mobile communications to military and intelligence organisations. Northrop Grumman is a leading global security company providing innovative systems, products and solutions in autonomous systems, cyber, strike, C4ISR and logistics and modernization to government and commercial customers worldwide.

Northrop Grumman

Networking Sponsors

SANS

Networking Sponsor

SANS is a Cyber Security Supplier to HM Government and runs the Cyber Retraining Academy in partnership with HM Government.

Established in 1989, SANS Institute is the largest information security training organisation in the world. SANS provides intensive, technical training designed to impart the skills and techniques necessary for defending systems and networks against the most dangerous threats - the ones being actively exploited.

SANS training is led by world-renowned, expert instructors and the curriculum covers all the most crucial areas of security. Courses are updated frequently to ensure they remain current and feature the latest, hands-on lab work.

Training can be delivered in a classroom at a SANS Training Event, Privately in the workplace or Online. SANS training is aligned to GIAC certification and represents the ideal preparation for a GIAC exam.

SANS also provides CyberTalent assessments and Securing The Human awareness programmes.

In addition, SANS supports the global security community by providing many free resources, operates the Internet Storm Centre, is the founder sponsor of the UK Cyber Security Challenge and provides expert speakers for conferences, events and the media worldwide.

See www.sans.org  www.cyber-academy/retraining or contact SANS via emea@sans.org

SANS

Atkins

Networking Dinner Sponsor

Atkins delivers cyber resilience expertise to the critical national infrastructure, government, national security and defence sectors. We are the largest supplier of client-side advisory in the UK security and intelligence sector and accredited to the Cyber Suppliers to UK Government scheme.

We view cyber resilience as the ability of an organisation to understand the cyber threats it’s facing, to inform the known risks, to put in place proportionate protection, and to recover quickly from attack. Depending upon the client, robust cyber resilience ultimately provides cost-effective business or service continuity, sustained revenue, or the uninterrupted delivery of military effects. It also contributes toward the ongoing protection of the UK.

By combing a deep understanding of the digital ecosystem that surrounds and supports our nation’s critical infrastructure with our experience of working in secure and mission-critical environments, we can offer unrivalled insight into an organisation’s digital vulnerabilities.

Atkins

Stream sponsors

Nominet

Strategy Stream 1 | Economy and Society

Nominet is an internet company delivering public benefit and is the trusted guardian of the UK namespace – one of the world’s largest country code registries. Nominet manages and runs the infrastructure for over 10 million domain names that end in .uk as well as Welsh Top Level Domains (TLDs) .cymru and .wales and 35 other branded and generic TLDs, including .bbc and .london. Over 3 million businesses, and millions more consumers, rely on its domain registry services. It has a team of 150 people based in Oxford and London and over 2,500 members.

Through its work keeping the .uk namespace secure Nominet’s R&D team is exploring the further potential of the Domain Names System (DNS) and the challenges and opportunities around emerging internet technologies. As a result it operates in a number of business areas, from providing internet connectivity and analytics for Internet of Things (IoT) devices to selling complex data analytics software, including its ground-breaking network analytics tool called turing, for tackling cyber threats. Nominet is also working with the UK government to protect its Public Service Network, in partnership with the National Cyber Security Centre.

With the proceeds of its successful registry business, Nominet set up and supports the charitable foundation Nominet Trust, the UK’s leading social tech funder.

Nominet

Trend Micro

Strategy Stream 2 | Government and Public Sector

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. 

Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, our solutions enable organizations to automate the protection of valuable information from today’s threats.  All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.

Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies.

With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.

Trend Micro

BAE Systems

Strategy Stream 3 | Critical National Infrastructure

At BAE Systems, we provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of some 83,400 people in over 40 countries. Working with customers and local partners, we develop, engineer, manufacture and support products and systems to deliver military capability, protect national security and people and keep critical information and infrastructure secure.

BAE Systems delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. Our key domains of expertise include: Cyber security; financial crime protection & compliance; communications intelligence; data & analytics and digital transformation.

Leading government departments and global companies  use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, sensitive information, reputation and customer relationships, competitive advantage and financial success.

BAE Systems

QinetiQ

Strategy Stream 4 | Defence and Security Strategy

QinetiQ is a world leading provider of best-in-class Cyber Security solutions, services and advice. We specialise in providing holistic solutions covering people, processes and technology to achieve appropriate levels of security and manage risk, enhance corporate resilience and maintain competitive advantage.

Our services range from high-end strategic consultancy, through technical architecture and managed security services, protective monitoring, advanced intrusion and penetration testing, cross domain solutions and human performance. 

We serve Governments, Government ministries and agencies and help to secure key elements of the Critical National Infrastructure, including Utilities, Financial Services, Transport and Communications.

QinetiQ’s business is based on the technical expertise, deep domain knowledge, application and commitment of our people. Our customers around the world rely on our ideas, innovations and rigour to help them meet their goals – often in environments where their mission has no second chance for success. Our most prized possession is their trust.

QinetiQ

Roke Manor Research

In Practice Stream 1 | Managing Threat

Roke delivers technology research, development and consultancy services to solve the world’s most complex technical challenges in data science, sensing, communications and cyber security. We assist and advise our government and corporate clients by providing effective and efficient information security services, especially when addressing information security for complex or niche systems and emerging technologies.

Focusing on the efficient use of budgets whilst increasing security and usability of IT systems, we are the ideal product independent partner for identifying and assuring your Information Security needs.

  • Research and Development of new Cyber Security ideas and solutions
  • Security Architecture and Risk Assessment
  • Product and Service Assurance
  • Information Security Management
  • High Grade and High Assurance Systems

Trusted by government and corporate partners worldwide, we deliver technology-based R&D services, provide independent advice, and solve technically challenging problems across the entire technology acquisition and assurance lifecycle.

Roke Manor Research

Leonardo

In Practice Stream 2 | People are the Strongest Link

Leonardo, NATO Global Cyber Defence Mission Partner, delivers confidence in the Cyber Space.

Leonardo is a Global high-tech company and a key player in the Aerospace, Defence and Security sector, with headquarters in Italy and a strong presence in the United Kingdom, the United States and Poland, and more than 47000 employees.

Leonardo has more than 25 years’ experience working in cyber security. Drawing on a dedicated organisation, a consolidated approach and constant investment in resources and technology, we provide public and private organisations with a comprehensive security strategy and solutions set, covering organisational, technological and compliance issues.

  • real-time services designed to protect, deter, detect and respond to the most advanced and persistent cyber-attacks.
  • integrated cyber security solutions for the protection of information and data, mobile infrastructures, Industrial Control/SCADA systems
  • highly secure collaboration and information solutions delivering on the ‘the need to share’.
  • a wide range of solutions for interception, capture, management and processing of information.
  • cyber intelligence services aimed at monitoring and analysing Open Sources, Darknets & Big Data.
Leonardo

Thales

In Practice Stream 3 | Proactive Defence

Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company.  Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual, and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.

Thales

Lockheed Martin

In Practice Stream 4 | Securing Agile Delivery

Lockheed Martin is a global leader delivering full spectrum Cyber capabilities - supporting the offensive and defensive efforts of our Defence and Intelligence customers globally.  Cyber is ingrained in all aspects of the modern battlespace, and our Cyber Solutions team has the expertise to help defend and harden enterprise IT networks, radiofrequency spectra and military platforms on land, sea and air.

Lockheed Martin remains committed to strengthening our focus on Defence Cyber resiliency. Embedded security is at the forefront of every one of our designs and platform protection is compulsory across air, land, sea and space.  Cyber is the new warfighting domain and the Lockheed Martin Cyber Solutions team is Battle Ready.

Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 98,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

Lockheed Martin

Amazon Web Services

In Practice Stream 5 | Cyber Insights

Amazon Web Services offers a broad set of global compute, storage, database, analytics, application, and deployment services that help organizations move faster, lower IT costs, and scale applications. These services are trusted by the largest enterprises and the hottest start-ups to power a wide variety of workloads including: web and mobile applications, IoT, game development, data processing and warehousing, storage, archive, and many others.

Government, education and nonprofit organizations face unique challenges to accomplish complex missions with limited resources. Amazon Web Services now serves more than 2,000 government, 5,000 education and 17,500 nonprofit organizations worldwide.

Amazon Web Services

Sponsors

DCMS

SME Innovation Zone Sponsor

The Department for Culture, Media & Sport (DCMS) is making Britain the world’s most creative and exciting place to live, visit & do business.

DCMS is also the department for digital - we support digital enterprise, digital skills, telecoms, the Internet, data protection & cyber security.

Our work to connect the UK and support the digital economy includes protecting industry and society, and helping the UK become the most secure place to do business online. We support the UK cyber security industry, encouraging growth, exports and innovation, especially amongst SMEs. We help improve cyber security skills so industry and Government have the people, knowledge and capability to protect the UK.

DCMS

Microsoft

Bursary Sponsor

Technology is a disruptive force – enabling new business models, opening new sources of revenue and shaping industry landscapes. Ensuring security, privacy, and compliance is key to digital transformation.

Microsoft is building a platform that looks across all the critical end-points of today’s cloud & mobile world. Our investments are across four categories: identity, apps & data, devices, and infrastructure – with an approach that is inclusive of the technologies our customers are using. We act on intelligence from our security-related signals and insights, and foster a vibrant ecosystem of partners who help us raise the bar across the industry – helping to securely enable our customers’ digital transformation.

Microsoft

Skybox Security and BT

Bursary Sponsor

Skybox Security and BT are working together to provide a powerful set of security management solutions that, by extracting insights from security data silos, give unprecedented visibility of the attack surface.  Jointly, we can provide a comprehensive risk assessment on customers’ ICT estates, offering real-time analysis on their security and compliance levels, known vulnerabilities and threat exposures. We work with our customers providing regular, comprehensive recommendations on best security practice procedures to help them plan and implement their journey in mitigating risks for their businesses.

Skybox Security and BT

Airbus Defence and Space

Workshop Sponsor

Airbus DS CyberSecurity is a trusted partner of Governments, Military and Security organisations across Europe.  Through our Cyber Defence Centres in the UK, France and Germany, we offer a range of services and solutions, dynamically combining monitoring, early detection and investigation of attacks, drastically reducing the incident response time.

We have developed a range of trusted products and solutions for securing infrastructure, in order to ensure the protection of our customers’ networks, data and endpoints. We also have one of the largest teams of CESG registered consultants providing Cyber Security consulting and managed services from our secure premises in Cheltenham.

Airbus Defence and Space

Forescout

Workshop Sponsor

ForeScout Technologies is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including Internet of Things devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Forescout

MWR

Workshop Sponsor

Established in 2003, MWR works with clients to deliver security assurance, incident response, managed detection and response, security behaviour training and numerous other cyber defence services to businesses, critical infrastructure and government to strengthen the nation’s cyber security and resilience.

MWR is pleased to be sponsoring and supporting CYBERUK 2017 - come and visit stand A15 to meet the team. Paul Pratley, Associate Director and Head of Global Investigations & Incident Response at MWR will be delivering an Incident Management Workshop at CYBERUK Strategy, showing real world data breach incidents in a simulation exercise to assist crisis management teams in preparing and responding to cyber attacks.

MWR

Palo Alto Networks

Workshop Sponsor

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this, we safely enable applications, users and content; deliver visibility, automation and control; and detect and prevent threats at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.

Palo Alto Networks

PwC

Workshop Sponsor

PwC has one of the largest and most comprehensive cyber security practices with a in the market today, offering a full range of services including consulting, cyber threat intelligence and incident response; cyber crisis management; and threat and vulnerability management. We are unique amongst the large service providers in having an integrated cyber legal practice that is able to offer leading expert legal advice.

Our cyber security practice has industry-recognised certifications (including CHECK, CREST, CIR and CCSC) giving confidence that our security testing, threat intelligence & incident response services as well as cyber security consultancy is undertaken by experts.  

PwC

Titania

Workshop Sponsor

Titania develop cyber security auditing software. Our security and compliance tools enable auditors and end user organisations to harden their systems and produce expert level reports on their networks at a fraction of the time and cost of manual testing, helping them stay secure in the face of cyber threats.

Our tools, Nipper Studio and Paws Studio, generate fast & thorough, security & compliance reports that enable you to act on fact.   

Trusted by organisations in over 80 countries (Inc. U.S DoD, Treasury, FBI) our award-winning products have been recognised by the Govies, PwC & the British Chambers of Commerce.

Titania

PA Consulting

Collateral Sponsor (Delegate brochure)

An independent firm of over 2,600 people, we operate globally from offices across the Americas, Europe, the Nordics, the Gulf and Asia Pacific.

We have extensive experience in designing and delivering digital trust and cyber security programmes for public and private sector clients, in some of the most challenging environments. We offer market-leading, end-to-end capability across the cyber security life cycle, including technical, people and physical security.

Our experts bring together an in-depth understanding of the cyber threat, world-class capability in a range of key digital trust and cyber security disciplines and deep industry knowledge.

Our clients choose us because we don’t just believe in making a difference. We believe in making the difference.

PA Consulting

Symantec

Collateral Sponsor (Delegate lanyards)

Symantec’s mission is to make the world a safer place. Cybercriminals are leveraging stealthy, persistent methods to bypass traditional security and exploit vulnerabilities faster than companies can defend against them. IT teams need improved detection tools to identify and remediate these advanced persistent threats. Our leading threat protection technologies correlate intelligence across the network, endpoints and email to provide the most comprehensive security layer enabling you to respond to threats with precision and helping you build custom security solutions—on premise, in the cloud, and everywhere data travels.

Symantec

Ultra Electronics

Collateral Sponsor (Delegate bag)

Ultra Electronics is a leading supplier of CESG-certified encryption solutions at all grades, with a long-established reputation for providing exceptional levels of manageability and reliability.

Ultra Electronics is an internationally successful defence & aerospace, security & cyber, transport and energy company with a consistent track record of development and growth.

Ultra Electronics

Pavilion Exhibitors

IBM

Pavilion Stand & Workshop Sponsor

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services, and operates one of the world’s broadest security research, development and delivery organisations, monitoring 35 billion security events per day. In the UK IBM has 20,000 employees and IBM Security supports UK Critical National Infrastructure across a range of industries. IBM Security delivers proven outcomes for UK Government with Government trained and cleared consultants in UK based List-X facilities. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

IBM

Intel

Intel Security, with its McAfee product line, is dedicated to making the digital world safer and more secure for everyone.  Intel Security is a division of Intel Corporation. Learn more at www.intelsecurity.com

We are very pleased to be attending CyberUK 2017 with Fujitsu, SCC, Softcat and Trustmarque, four of our valued and trusted partners, all of which can help you to simplify the Threat Defence Lifecycle and offer unique advice and solutions to enable you to reduce the threats that get through, find them faster, and use fewer resources in the process.

fujitsu scc softcat logos

Visit us on stand C1 and discover how an integrated security approach can help you achieve your business goals.

Intel

Premium Exhibitors

4Secure

Delivering Cyber Security consultancy, training, hardware and software through an agile secure supply chain. For over a decade we have worked in the UK and overseas to create secure end to end systems. As the European home of Owl Data Diodes and Guards; next-generation cross domain transfer and perimeter defence solutions.

4Secure

Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Anomali

APMG International

APMG International is a global examination institute specialising in professional certifications. In response to mounting risks in a digital age, APMG has designed a broad portfolio of world-class cyber security products. We've partnered with GCHQ to deliver the Certified Professional (CCP) and GCHQ Certified Training (GCT) schemes and the Defence Science and Technology Laboratory (Dstl) to develop CDCAT(®) the unique Cyber Defence Capability Assessment tool.  APMG is an Accreditation Body for NCSC's Cyber Essentials scheme and offers a host of industry recognised certifications including; ISO/IEC 20000, ISO/IEC 27001, COBIT(®)5, IAITAM(®), RESILIA(™) and OBASHI(®).

APMG International

Becrypt

Becrypt has a long heritage of providing Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Data Protection, Secure Platforms and Cyber Security Services allow diverse platforms to be adopted with confidence. Combining extensive domain knowledge and technical expertise, Becrypt offer market-leading cyber security capabilities, helping organisations to optimise the use of new technologies, minimizing risk and complexity. A recognised cyber security supplier to the UK government, other public sector customers range from defence and intelligence communities to health providers, across UK, Europe and US.

Becrypt

Cryptify

Cryptify has established itself as a leading provider of secure voice and messaging applications for mobile phones. Cryptify provides a user friendly, field-proven and quickly deployed solution to government and enterprise customers who needs to protect sensitive phone conversations.

The innovative Cryptify Call solution is certified for both UK and NATO usage at security level RESTRICTED / OFFICIAL SENSITIVE. Using Cryptify Call, organisations manages their own cryptographic keys while continue using preferred standard phones like iPhone, Android, BlackBerry and Windows Mobile.

Advanced functionality, such as phone conferencing, messaging with attachments, group messaging and federation of independent systems is provided with full cryptographic protection.

Cryptify

Fortinet

From IoT to the Cloud, Fortinet protects some the most sensitive government organisations across the globe.

Fortinet is the only company with security solutions for network, endpoint, application, data centre, cloud and access. These work together as a cooperative fabric, spanning the entire network, linking different sensors and tools to collect, coordinate, and respond to potential threats. This is further strengthened by the industry's highest level of threat research and analytics.

This means Fortinet is the only company that can truly provide a powerful, integrated security fabric across the entire attack surface and at any point along the kill chain.

Fortinet

Frazer-Nash Consultancy

Premium Exhibitor & Meeting Space Sponsor

Frazer-Nash is a leading independent systems and engineering technology company. We apply our expertise to protect our customers' critical assets, systems and processes in the digital and physical domains.

We’re renowned for our work in the defence, nuclear, aerospace, transport, and energy sectors and our security, resilience and cyber expertise.

We understand the complex interaction between the external environment and people, technology and processes. We use our engineering domain expertise to focus our skills in cyber and information assurance to respond to our customers’ greatest challenges. We can deal with both cyber threats and their real-world consequences.

Frazer-Nash Consultancy

L3 TRL Technology

L3 TRL Technology is an agile, UK-based company which designs, develops and delivers advanced electronic systems for the protection of people, infrastructure and assets. Working in partnership with global defence, government organisations, and business partners, we defend against evolving and emerging threats worldwide. 

We provide scalable and resilient Cyber Security and Electronic Warfare solutions across a range of markets including: Land, Littoral and Maritime, Government, and CNI.

L3 TRL is part of the UK Cyber Growth Partnership. Our award-winning IP encryption solutions successfully secure and protect the integrity, confidentiality and availability of sensitive and highly classified information.

L3 TRL Technology

Raytheon

Raytheon UK Advanced Cyber Solutions is a dedicated cyber security company providing proactive threat hunting, security engineering, assessment and customised security training.  Raytheon UK has extensive experience pro-actively identifying trends in adversary capabilities, as well as unique relationships with partners who have visibility into adversary planning/staging infrastructure and activities.  Our team of highly qualified and experienced engineers create in-demand security programmes, end-to-end architectures and security operations centres for global financial organisations, power/utility companies, technology providers, and government agencies.

Raytheon

Quintessence Labs

Quintessence Labs helps keep all your data safe, even in the event of a breach. Our Trusted Security Foundation delivers best in class, interoperable key and policy management, with high speed truly random keys and the strength of a hardware security module. Integration with flexible encryption solutions and our client software development kit enable seamless deployments and enterprise-wide data protection.

Quintessence Labs

Exhibitors

2T Security

RiskTree is a new, agile risk management process developed by 2T Security and delivered with our partners 360 Defence and Help2, and supported by innovative browser-based software. It’s been used by both public and private sector clients to reduce the cost of accreditation and support ISO27001 certification.

2T Security

Armour Communications

Armour Communications Limited provides secure communications solutions for voice, video and messaging on everyday smartphones and tablets. CPA approved to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

Armour Communications

Bridewell Consulting

Bridewell Consulting are an NCSC Certified Cyber Security Consultancy. Our teams have a proven track record working with local and central government across the UK. Bridewell specialise in Information Audit, Assurance, Cyber Security, Technology Risk, Security Testing and Data Privacy, providing pragmatic cost effective solutions for our clients.

Bridewell Consulting

BSI Info-Assure

BSI Info-Assure is a leading provider of cyber security and information assurance services.

BSI Info-Assure is a member of key industry cyber security schemes including:

  • CREST (Penetration Testing, Star Testing, CSIR & Cyber Essentials)
  • PCI DSS QSA
  • CESG (CHECK, CCSC, CAS, CTAS & CPA)
  • Common Criteria Lab
     
BSI Info-Assure

CNS Group

CNS Group is one of the UK’s most highly-accredited, independent cyber security consultancies and service providers. As a PSN Service Provider for Managed Security Services (SRV_0220), CNS is a CHECK Consultancy focused on compliance and protecting the confidentiality, integrity and availability of its clients most critical data.

CNS Group

CompTIA

CompTIA is the global, non-profit IT trade association and creator of vendor neutral IT certifications. CompTIA certifications are developed with the support of leading technology companies and organisations and validated by industry experts around the world. Our portfolio enables the development of Cybersecurity Professionals’ skills from entry to expert.

CompTIA

Context

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from penetration testing and assurance to rapid incident response and intrusion analysis, training and technical security research. Context is focused on helping clients manage their cyber risk, avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks.

Context

Deep Secure

Spotting a gap in the global market for truly preventing the unknown (zero-day) cyber threat, Deep Secure pioneered 'Content Threat Removal' a technique which completely eliminates content threat; enabling organisations - to Click, Share, and Transact in perfect safety - to counter even the most sophisticated attacks.

Deep Secure

Deep Sky Blue

At Deep Sky Blue we believe in making a difference in the world. We do this by combining our passions for leading-edge technology and software delivery. We are trusted by our customers to deliver innovation in secure and sensitive environments. Currently, we are building a Next-Generation Cyber Defence capability - Sherpa.

Deep Sky Blue

E&T

E&T is the IET's award-winning magazine and associated website for professional engineers, covering all aspects of engineering.  Our E&T Cyber Security Hub offers a combination of expert-reviewed, cyber security-specific content, practical advice and networking tools. It is a perfect platform for security engineers and specialists to learn about new solutions, share knowledge, connect or just ask questions.

E&T

e2e-assure

e2e-assure - a world-class cyber security company.

e2e-assure provide secure cloud and cyber defence services.

e2e-assure have developed an industry leading SOC-as-a-Service to protect your organisation.

See our live cyber hacking demos: Ransomware in action, hack and take control of a fully patched Windows10 laptop and steal your Office365 credentials!

e2e-assure

EclecticIQ 

EclecticIQ is an applied cyber threat intelligence (CTI) technology provider, enabling enterprise security programs and governments to mature a CTI practice. EclecticIQ Platform is a Threat Intelligence Platform that enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of intelligence detection, prevention and response capabilities.

EclecticIQ 

Egress Software Technologies

Egress Software Technologies is the leading provider of encryption services designed to secure all forms of electronic information. The Egress Switch portfolio of products includes email and document classification, the only CESG CPA-certified email and file encryption service, secure automation, secure online collaboration, and Switch Secure Vault for email archiving, compliance and auditing.

Egress Software Technologies

Euro Recycling

Euro Recycling is a mobile CPNI, CESG & MoD approved ICT media destruction company. We destroy computer hard discs and other mass storage devices at our client’s site to 6mm/2mm particles in accordance with HMG IA Standard No 5. We are ISO 27001, 14001, 18001 and 9001 accredited.

Euro Recycling

IRM

Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining more than 17 years of consultancy with advanced software technology.  By covering all aspects of cyber security from PCI compliance to automated threat intelligence, IRM supports organisations at every step of their cyber maturity journey.

IRM

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security.

(ISC)²

Leidos

Leidos is a global science and technology solutions leader working to solve the world’s toughest challenges in the defence, intelligence, homeland security, civil, and health markets. The company’s 32,000 employees support vital missions for government and commercial customers.

Leidos

Naimuri

Naimuri is a north-west based company with a focus on technology, cyber and information security, and business change. Our aim is to enhance the security, ability and efficiency of our partners and customers and create a continuous competitive edge driven by ever-improving technology, culture and processes.

Naimuri

Nexor

Nexor provides solutions to get information into and out of secure networks. This enables organisations to perform more efficiently and effectively. The connection of secure networks is achieved by using people, process and technologies that align to best cyber security practice established by national authorities.

Nexor

Outsource UK

Outsource UK are an award winning IT Recruitment agency with a specialist cyber division with a proven reputation in highly regulated industries. We can supply SOC / SIEM specialists, IAs, Pen testers, Cyber PMs and Managers and Cyber Security Architects on a contract, permanent or consultancy basis.

Outsource UK

Salesforce

Salesforce enables companies to connect to their customers in a whole new way, leveraging the combined power of cloud, social, mobile, data science, and IoT technologies. With its innovative Customer Success Platform, Salesforce sets the global standard for customer relationship management, engagement, and intelligence by integrating sales, service, marketing, community, analytics, IoT, and app development in a trusted cloud for businesses of every size and industry.

Salesforce

Satisnet Ltd

Founded in 2004, Satisnet Ltd is a leading IT Security Reseller dedicated to providing the highest level of customer care and technical support.

With 900+ customers across a multitude of market sectors from FTSE 250, Finance, Legal, Gaming and Local Government.
We have been part of the product creations that is SOCAutomation and CyberKombat.

Satisnet Ltd

Security Risk Management

Security Risk Management’s (SRM) specialists cover the full scope of the Governance, Risk and Compliance agenda such as information assurance to UK Government, NATO, PCI DSS, N3 and ISO 27001 standards, business continuity, operational risk management and computer & network forensics.

Security Risk Management

SolarWinds

SolarWinds provides powerful and affordable IT management software to government agencies worldwide, including the UK’s National Health Service, European Parliament, NATO, and nearly every U.S. civilian agency, DoD branch, and intelligence agency. SolarWinds products are designed to solve the problems government IT professionals face every day and eliminate complexity from every IT process imaginable.

SolarWinds

Surevine

Described by the Financial Times at its launch as a “secure Facebook for cyber-threats”, Threatvine is a next generation cyber security information sharing platform.

Surevine, the company behind Threatvine, build secure, scalable collaboration solutions for security conscious organisations; joining people up and enabling collaboration on their most highly sensitive information.

Surevine

Thinklogical

Thinklogical manufactures secure video distribution and KVM signal extension and switching solutions for C4ISR and command and control applications. Thinklogical products increase cyber security and enable multi-domain isolation in visual computing environments, and are IA-accredited to Common Criteria EAL4, NATO NIAPC, TEMPEST Level B, and the U.S. JITC UC APL.

Thinklogical

TNP

TNP provide network security solutions and specialise in public sector organisations and businesses with large/complex internet connectivity requirements. We assist them to develop, implement and manage their network security and work with vendors such as Fortinet to deliver network security solutions across the UK using a team of highly trained consultants and engineers. 

TNP

Trustonic

Trustonic is a leading player in mobile device and application security. Almost a billion devices have Trustonic security embedded at the manufacturing stage, providing smart devices with an embedded root of trust and a hardware-protected environment for secure storage and processing. Trustonic also offer application-level security across multiple platforms, including smartphone (iOS and Android) and IoT.

Trustonic

SME Showcase

Ascentor

Ascentor helps organisations improve performance through our cyber security services. Customers rely on our business focused approach to their information security challenges. We will be joined by foreseeti, showing their cyber security modelling tool.

Ascentor

Bob's Business

Bob's Business provides cyber security awareness training and simulated phishing campaigns with an approach that is memorable, engaging and entertaining. Bob's bite-sized modules help you achieve industry standards and a secure culture.

Bob's Business

Covata

Covata protects enterprises from data security threats intrinsic to conducting business in the digital age. In today’s connected ecosystem, security risks to enterprises are greater and more costly than ever.

Covata

DigitalXRAID

DigitalXRAID is a Yorkshire based Cyber Security company. Accredited by CREST, IASME GOLD, Cyber Essentials PLUS and ISO. We have the expertise to help you with your Cyber Security needs.

DigitalXRAID

Dome recruitment

Dome are a long-established cyber and technology resourcing and recruitment firm, with 15+ years’ experience of providing contractors, project teams and skilled FTE’s for Central Government, Corporates & SI’s.

Dome recruitment

GeDaP

Printix, Microsoft Certified Cloud Print Management for Azure & 365 secures print reduces cost. KeyTalk strong authentication without tokens or software, seamlessly distributes short term certificates for applications or IoT.

GeDaP

Intruder

Intruder is a proactive security monitoring platform for internet-facing systems. Intruder regularly scans your digital assets, provides notifications for critical vulnerabilities and outlines remediation advice in the simplest terms.

Intruder

Stratia Consulting

Stratia Consulting is an NCSC Certified Cyber Security Consultancy, providing cyber security and cloud assurance expertise, and technical assessment services through the Crown Commercial Services to Government, Defence and Industry.

Stratia Consulting

Templar Executives

The pre-eminent Cyber Security and Information Assurance strategic advisory company, Templar Executives has been at the forefront of HM Government, FTSE100-350, SME and international services for more than 10 years.

Templar Executives

Topsec

Topsec are leading providers of cloud-based email security solutions. Our services include email security (anti-spam, anti-virus and content filtering), email continuity, URL sandboxing, email archiving, file-sharing and domain name management.

Topsec

DCMS Innovation Zone Exhibitors

Abatis

Abatis for Windows is a patented, award-winning, tiny-footprint technology in NCSC evaluation.
Stops persistent malware without signature/whitelist updates.
Extends legacy equipment lifetime and reduces energy consumption by 7%.
Protects SCADA/ICS/Medically-Certified/Safety-Critical/CNI.
Abatis

CheckRecipient

CheckRecipient is a next-generation email security technology that uses machine learning and NLP to prevent highly sensitive information being sent to the wrong people

CheckRecipient

Citicus

Citicus provides security, risk and compliance management software for commercial IT, industrial control systems and supplier assessment. Manage risk faster, better and more efficiently than with traditional GRC tools.

Citicus

Cyberlytic

Cyberlytic is revolutionising web application security. Our software applies patented cognitive machine learning and risk analytics to detect, prioritise and prevent the most sophisticated web attacks.

Cyberlytic

CyNation

CyNation provides security & compliance automation solutions and services utilising artificial intelligence and machine learning behavioural analysis to improve cyber resilience & visibility across entire organisation

CyNation

Distributed Management Systems

Patented, Identity Assurance with no fixed secrets - keys are changed dynamically and so immune from insider attacks and manufacturer compromise.
NCSC certified, it provides military assurance at commercial prices.

Distributed Management Systems

drie

drie is the fastest way to get secure cloud infrastructure for your web applications. Our platform saves you the time that you currently spend provisioning, managing or configuring servers.

drie

ICURe

ICURe (comprising 12 participating UK Universities) presents cutting edge cyber security solutions from research and development offering resolutions to a plethora of cyber threats, promoting risk mitigation and enhanced security. Visit stand I1.

ICURe

Immersive Labs

Immersive Labs operate an online cyber skills development platform. Innovative and creative cyber challenges entice technical staff and enables their organisation to identify, measure and develop practical cyber skills.

Immersive Labs

iProov

iProov delivers usable, secure online authentication by network-based face verification. It protects against forged replicas, replay attacks & compromised devices, creating One Time Biometrics using patented Flashmark technology.  

iProov

My1Login

My1Login is a UK-Based Identity and Access Management company that enables seamless user access to web, mobile and legacy desktop applications delivering operational savings and protecting against the financial and reputational damage of a data breach.

My1Login

Post-Quantum

Post-Quantum provides access control, authentication, and patented quantum computing-secure encryption solutions addressing government and industry’s data protection, insider threat, and data flow auditing needs.

Post-Quantum

RedSift

OnDMARC provides a step by step process to implement and maintain your domain’s DMARC configuration, effectively blocking cyber attacks that start with un-authorised emails.
OnDMARC is a RedSift product.

RedSift

Event partners

CYBERUK_2017_Agenda.pdf

PDF, 694.3KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Agenda

CYBERUK 2017 E-Brochure.pdf

PDF, 6675.75KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Double page spreads

CYBERUK 2017 E-Brochure Print Friendly.pdf

PDF, 3761.83KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 E-Brochure - Print Friendly

CyberUK 2017 Sponsorship Brochure.pdf

PDF, 4337.24KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 Sponsorship brochure

CYBERUK 2017 E-Bulletin 1.pdf

PDF, 561.51KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 1

CYBERUK E-Bulletin 2.pdf

PDF, 3086.82KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 2

CYBERUK 2017 E-Bulletin 3.pdf

PDF, 2691.58KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 3

CYBERUK 2017 e-bulletin 4.pdf

PDF, 3815.51KB

This file may not be suitable for users of assistive technology.

CYBERUK 2017 e-bulletin 4

Share this page

Was this information helpful?

We need your feedback to improve this content.

Yes No