Sponsors

Strategic Sponsors

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn.


The internationally active company SEPPmail, with its headquarters in Switzerland and Germany, is a manufacturer in the field of secure messaging. The 100% promise that every e-mail marked as confidential is encrypted is enabled by a sophisticated, flexible ruleset, the use of standard encryption methods and the multiple award-winning technology developed by SEPPmail for spontaneous secure e-mail traffic. In addition, outgoing emails can be provided with a digital signature if desired. The secure transmission of oversized data is also solved. The solution, which is available as a cloud service or as an appliance, can be implemented quickly, easily and without additional training, regardless of the mail system used, e.g. MS365. The company has more than twenty years of experience in the secure sending of digital messages. When developing its email security technology, SEPPmail pays particular attention to user-friendliness and reduces complexity to an absolute minimum. Meanwhile, thousands of small, medium and large companies have upgraded their existing e-mail communication with security. 

 


Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.

 

 

 

 


Education Seminar Sponsors

Abnormal Security provides a leading cloud-native email security platform that leverages AI-based behavioral data science to stop business email compromise (BEC) and never-seen-before attacks that evade traditional secure email gateways (SEGs). Abnormal delivers a fundamentally different approach that precisely detects and protects against the widest range of attacks including phishing, malware, social engineering, spam and graymail, supply chain compromise, and internal account compromise. 


The Abnormal platform delivers inbound email security, internal and external account takeover protection, and full SOC automation. Abnormal’s API-based approach enables customers to get up and running in 15 minutes and can augment a SEG or be used standalone to enhance native Microsoft security protection. Abnormal Security is based in San Francisco, CA. More information is available at abnormalsecurity.com.


Cisco offers an industry-leading portfolio of technology innovations. With networking, security, collaboration, cloud management, and more, Cisco helps to securely connect industries and communities. Cisco drives security resilience, enabling organizations to protect the integrity of their business amidst unpredictable threats and emerge stronger. With the Cisco Security Cloud, organizations see across multicloud environments, anticipate what's next, take action, close security gaps, and improve every day to support the success of broader resilience investments.  Learn more at cisco.com/go/secure


Fortem Information Technology acts as your dedicated Technology Partner, placing a foremost focus on fortifying cybersecurity. We specialise in delivering bespoke IT solutions tailored precisely to your unique needs. Whether your priority is strengthening cybersecurity, upgrading hardware, or seamlessly migrating digital assets to the cloud, Fortem Information Technology can assist with all your IT needs.


Our team of experts go beyond traditional support; we become strategic allies, ensuring your technology strategy seamlessly aligns with your business objectives, with a steadfast emphasis on cybersecurity. What sets Fortem-IT apart is our resolute commitment to a vendor-agnostic approach – rejecting the one-size-fits-all mentality prevalent in the industry. We invest time to intimately understand your distinct business needs, handpicking cybersecurity solutions that not only meet but exceed industry standards.


In a world where cyber threats loom large, finding the right cybersecurity partner is crucial. Fortem Information Technology transcends the role of a service provider; we're your trusted ally in navigating the intricacies of IT security. With us, your technology becomes more than functional – it evolves into an impenetrable fortress against cyber threats. Seeking a reliable partner to propel your cybersecurity forward? Fortem Information Technology is here to make that journey with you, ensuring your technology aligns, adapts, and stands as an impregnable shield for your business success.
 


Hoxhunt is a global leader in Human Risk Management.  The innovative Hoxhunt AI driven human risk platform scales your security culture and behaviour change that enables people to detect and report cyberattacks that have bypassed your technical security layers, reducing the risk to organizations from sophisticated cyberattacks targeting humans. Leading organizations of all sizes, including Bird & Bird, Airbus, Docusign, IGT, Nokia and Qualcomm all rely on Hoxhunt for their Human Risk Management solutions that mitigate their most critical risks across email, cloud, social media, and the web. 


Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world. Visit infoblox.com, or follow us on LinkedIn or Twitter.


Red Helix is a leading provider of managed cyber security services that protect businesses of all sizes against ever-evolving cyber threats. Our team of experienced cyber security professionals is dedicated to helping organisations implement robust security measures that keep their data safe and secure.


Founded in 1984, Red Helix has a long heritage of securing and optimising networks and applications. From enterprises to network operators, government departments to utility providers, we keep businesses running smoothly.


At Red Helix, we believe that every business, regardless of size or industry, deserves access to top-quality cyber security services. That's why we offer a range of flexible solutions that can be tailored to meet the specific needs of each client we work with.


Our team of cyber security experts is comprised of seasoned professionals with years of experience in the industry. From our Security Analysts to Technology Director, each member of our team brings a unique skill set to the table, allowing us to offer a wide range of services that cover everything from Security Awareness Training & Testing to a fully outsourced Security Operations Centre (SOC).


In an era of ever-increasing cyber threats, businesses need a trusted partner they can rely on to help keep their data safe and secure. At Red Helix, we're proud to be that partner for businesses of all sizes, providing them with the peace of mind they need to focus on what they do best - running their business.
 


Networking Sponsor

Appurity delivers best-in-class security solutions for legal firms of all sizes, endpoint to cloud, emphasising robust mitigation of sophisticated threats — including ransomware. Appurity’s expertise in bespoke security design ensures compliance with standards like ISO 27001 and Cyber Essentials Plus, enhancing both the security and efficiency of legal operations.
 
A key Appurity service offering is their Automated Security Validation (ASV) service, tailored specifically for law firms to test defences against ransomware attacks such as LockBit. By emulating real-world attacker behaviours and aligning with the MITRE framework, Appurity ensures a comprehensive evaluation of a firm’s cybersecurity resilience. This service provides regular, on-site validation of security controls.

In addition to ASV, Appurity employs advanced technologies and security frameworks like Zero Trust Network Access (ZTNA) and Secure Service Edge (SSE). Appurity is also an Android Enterprise Silver Partner and member of the Apple Consultant Network.

Appurity's specialist security and management solutions enable fee earners to maintain high productivity using platforms and applications like Microsoft Teams and iManage, while ensuring the protection of sensitive corporate data and reinforcing the firm’s overall security posture.


With the recent threat actor activity seen within the Legal Sector over recent weeks/months, it is now more important than ever for law firms to make sure that their devices are protected with preventative measures and not reliant on reactive capabilities - Don't let your endpoints be entry points. 


Well known threat actor groups including Lockbit 2.0 are using tactics mapped against the Mitre Attack Framework to target and exploit areas such as Log4J, Active Directory, Windows Event Logs, NIST standards, Group Policy configuration, NTLM, and more! 

Security risks due to misconfigurations are a major pain-point for all organizations. According to the Microsoft Cyber Signals Report over 80% of ransomware attacks are attributable to misconfigurations. 

Today, Secure Configuration Management is non-automated and very manual process. This is ineffective, costly and relies on having skilled resources available across multiple stakeholders. 
This lack of visibility is often why organizations suffer from poor cyber hygiene which leads to a successful attack.
 
Solution at Glance
 
Gytpol is a Security Configuration Management platform.
Providing continuous monitoring and automatic remediation with
zero disruption of security risks caused by misconfigurations and
non-compliance on endpoint devices. It’s fast, accurate & secure.
Gytpol stops breaches, reduces risk and saves organization
significant time and cost. Gytpol is already supporting over 3
million devices worldwide.
 
How It Works
 
Deployed as either a SaaS or On-Premises, Gytpol Validator will
monitor, detect and remediate misconfigurations on Windows,
Linux and Mac Devices (IoT support coming in 2023), whether they
are connected to the network or working from home remotely.
The dashboard is easy to use and intuitive. Gytpol also integrates with SIEM with API access for third-party applications.
 
Gytpol can be used for:
 

  • Ensuring security baselines are secure with the latest hardening requirements.
  • Validating Group Policies are applied on all endpoint devices.
  • Continuous audit and healing for regulatory compliance on all devices (CIS, NIS, Cyber Essentials etc)
  • Remediation of Zero Days without patching (where possible)
  • Detection of lateral movement
  • Detection of Active Directory misconfigurations

Trustack has experience across 4 major sectors, Legal, Architects, Manufacturing and Housing. We listen, are positively critical and deliver world leading technology solutions to help protect your business and customer base. Being at the cutting edge of technology for over 17 years has led Trustack to become leaders in its field. Our strength within the Legal Sector lies in our breadth and depth of expertise and experience, we’re trusted experts who nurture, educate, and enhance our client teams. Managed support services, Cyber threat management, patch management, connectivity, cloud, and on-premises services are all part of our service offering.

We understand that cyber security isn’t just about protecting data and networks, it’s also about building trust and fostering strong connections that provide peace of mind. This approach has helped us develop lasting client and vendor relationships spanning over a decade. Innovation is at the core of everything we do - It keeps us relevant, energised and laser focused on the future. We strive to be first-to-market when adopting new and exciting technologies. It’s an ambitious and relentless attitude towards improving our stack that keeps our clients’ businesses on the front foot.

“Trustack always stay one step ahead when it comes to providing the latest products and services.  They understand our business and work proactively with our IT team to ensure we always deliver the best service to the firm and our clients.”  Andrew Black - Director of IT, Muckle LLP

 

 


Formed in 2000, Wavenet has grown to become a respected, multi-award-winning provider of telecoms and technology solutions to thousands of businesses and enterprises across the UK. As a managed service provider, Wavenet has cultivated enduring partnerships with some of the foremost technology providers globally.


Renowned for its commitment to excellence, Wavenet specialises in delivering customised connectivity, communications, and IT solutions to the legal and financial sectors. Additionally, the company houses CyberGuard, its specialised cybersecurity division accredited by CREST. Operating from a 24/7 UK Security Operations Centre, CyberGuard offers a comprehensive suite of IT security services.


In addition to these services, Wavenet has diversified its range to encompass network intelligence services, thereby strengthening its capacity to optimise and secure the digital infrastructures of clients, ensuring heightened efficiency, resilience, and robust cybersecurity measures tailored to the unique demands of legal and financial sectors.


As a dedicated technology partner, Wavenet adopts a forward-looking approach, consistently planning, adapting, and empowering organisations to achieve brilliance through its core services. With an unwavering commitment to innovation and customer satisfaction, Wavenet remains at the forefront of providing cutting-edge solutions for the evolving needs of businesses.


For more information, visit: Wavenet.co.uk.
 


Branding Sponsor

Keepit delivers next-level data protection


What we do: Next-level data protection

We secure your data from your most relied-upon SaaS apps like Microsoft 365 and Azure AD. With the only vendor-independent cloud, we make future proofing all your company’s data not only possible, but extremely fast and easy.

How? Over 20 years ago, our founders and CTO predicted that all software would be in the cloud as a service, and that this data must be protected. Why does this vision matter? It lead to our solution being completely purpose built for cloud SaaS data.

And since we built our solution from scratch and own and operate our own data protection cloud, we can do exactly what we need to do — quickly. It doesn’t get more next level than that.

Keepit today

We’ve architected our own cloud via self-created and self-managed software and systems across global data centers. So, from a data processing standpoint, we're the only vendor involved. One vendor, one data processing. This level of simplicity is found everywhere across the Keepit solution.

And we’re purpose built for the cloud — a design decision that’s a major advantage and one that contributes to our software’s leading security, efficiency, ease of use, and reliability.

Find out more about our platform 
https://www.keepit.com/keepit-platform/


Keepit tomorrow

Secure by design, our role in your future is to stay two steps ahead of whatever comes along that could disrupt your business.

Altogether, Keepit defends your data against the growing list of threats that can disrupt business continuity, potentially costing you millions in downtime, lost revenue, fines from regulatory non-compliance, and damage to reputations.

That way, you can relax, be ambitious, and have peace of mind knowing that your data is always safe and always available.

Read about our security
https://www.keepit.com/security/

www.keepit.com


As advanced persistent threats continue to evolve, we recognize that people are the biggest risk to organizations’ security and are most vulnerable when using email. 

Egress is the only cloud email security platform to continuously assess human risk and dynamically adapt policy controls, preparing customers to defend against advanced phishing attacks and outbound data breaches before they happen. Leveraging contextual machine learning and neural networks, with seamless integration using cloud-native API architecture, Egress provides enhanced email protection, deep visibility into human risk, and instant time to value. 

Trusted by the world’s biggest brands, Egress is private equity backed with offices in London, Sheffield, Cheltenham, New York, Boston, and Toronto.