2025 Sponsors
2025 Strategic Sponsors

Abnormal Security is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability.
You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. Additional protection will be available soon for Slack, Workday, Salesforce, ServiceNow, Zoom, Amazon Web Services and multiple other cloud applications.

BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners. Learn more at www.beyondtrust.com.

CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stop breaches.

CultureAI is an innovative Human Risk Management Platform that integrates seamlessly into organisational tech stacks, empowering security teams to identify human-related security risks and automate fixes. CultureAI’s comprehensive platform encompasses multiple solutions, including automated phishing simulations, SaaS security, IM security, and generative AI security. CultureAI provide businesses with a comprehensive 360° view of workforce risks in real time via a single dashboard, enabling them to effectively detect, manage, and fix employee risks.
Learn more: https://www.culture.ai/

DeleteMe lives at the intersection of privacy and security. The company was established in 2010 when their founders realised the difficulty of navigating privacy issues in today’s interconnected and digital world. Over the past 15 years DeleteMe has pioneered the data deletion product category, successfully removing over 100 million individual pieces of data. What started as a consumer service quickly evolved into an enterprise business solution for employees and executives. DeleteMe’s core mission is to simplify the process of managing personal data online, ensuring that individuals and businesses can minimise risks to their safety.
Learn more at: https://joindeleteme.com/.

As the world’s leading breach recovery firm, Fenix24 has an unparalleled understanding of the tactics used by modern threat actors. Backed by the most comprehensive cyber resilience program in the industry, our team stands ready to defend—and rebuild—your business at a moment’s notice. We are the world’s first civilian cybersecurity force.
Fenix24’s Securitas Summa program provides a true assurance of recoverability, something no other solution offers. Designed with proprietary knowledge from 300+ ransomware recoveries, this all-in-one cyber resilience program combines automated infrastructure mapping, resistance, recovery, and ongoing managed protection. When a crisis hits, we deliver what others can’t. Rapid one-hour response. Zero-cost recovery. And the world’s leading recovery team on your side.
Fenix24 and its battalions were founded as part of the Conversant Group and continue to operate under its legal entity.
Founded in 2009 by John Anthony Smith, Conversant Group began by helping organizations build security-based infrastructure and create resilient IT environments. As a thought leader for more than 15 years, the company has guided 500+ customers and entire industries in solving complex security challenges—even the ones they didn’t know they had. Over time, Conversant Group deepened its expertise, grew its team, and expanded its services, eventually evolving into Fenix24 with a focus on breach recovery and cyber resilience.

Data is at the heart of every organisation; it’s invaluable and keeping information secure has become more critical than ever. HANDD Business Solutions (HANDD) is passionate about simplifying data security delivery. We offer comprehensive data security services, safeguarding data throughout its lifecycle and enabling organisations worldwide to secure their data during creation, in use, in transit and when at rest. By proactively addressing technology adoption risks, we accelerate compliance with data security regulations through our comprehensive range of managed and professional services, consulting, and technology solutions. Operating globally, HANDD has implemented its data security approach for over 1,000 customers in 27 countries. This includes major players in finance, insurance, manufacturing, healthcare, and the public sector.
Find out more at handd.co.uk

Hoxhunt is a global leader in Human Risk Management. The innovative Hoxhunt AI driven human risk platform scales your security culture and behaviour change that enables people to detect and report cyberattacks that have bypassed your technical security layers, reducing the risk to organizations from sophisticated cyberattacks targeting humans. Leading organizations of all sizes, including Bird & Bird, Airbus, Docusign, IGT, Nokia and Qualcomm all rely on Hoxhunt for their Human Risk Management solutions that mitigate their most critical risks across email, cloud, social media, and the web.

Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.
The Illumio ZTS Platform visualises all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-valueassets and compromised systems to proactively or reactively stop the spread of a breach.
ZTS is proven to help organisations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects.
Assume breach. Minimise impact. Increase resilience.

Pindrop's solutions are leading the way to the future of voice by establishing the standard for identity, security, and trust for every voice interaction. Pindrop's solutions protect some of the world's biggest banks, insurers, and retailers using patented technology that extracts intelligence from every call and voice encountered. Pindrop solutions help detect fraudsters and authenticate genuine customers, reducing fraud and operational costs while improving customer experience and protecting brand reputation. Pindrop, a privately held company headquartered in Atlanta, GA, was founded in 2011 by Dr. Vijay Balasubramaniyan, Dr. Paul Judge, and Dr. Mustaque Ahamad and is venture-backed by Andreessen Horowitz, Citi Ventures, Felicis Ventures, CapitalG, GV, IVP, and Vitruvian Partners. For more information, please visit https://www.pindrop.com/.

Ping delivers unforgettable user experiences and uncompromising security. We are a single company that makes crafting digital experiences simple for any type of user—partners, customers, employees, and beyond. We are anti-lock-in. That means integration with existing ecosystems, clouds, and on-prem technologies is simple. Out-of-the-box templates let businesses leverage our identity expertise to give their users frictionless experiences. Whether they’re building a foundation of modern digital identity, or out-innovating their competitors with cutting-edge services like digital credentials, AI-driven fraud prevention and governance, Ping is the one-stop shop for game-changing digital identity.

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 80 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.
© Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners

Searchlight Cyber provides organizations with relevant and actionable dark web intelligence to help them prevent cybercriminal activity. Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. Today we provide governments, law enforcement agencies, and enterprises around the world with dark web investigation and monitoring capabilities - empowering them in their fight against criminal activity on the dark web.

SOCRadar, a leading cybersecurity company, offers an advanced Threat Intelligence (XTI) platform that empowers organisations to proactively defend against cyber threats. This comprehensive suite of customisable products includes Cyber Threat Intelligence, External Attack Surface Management, Brand Protection, Dark Web Monitoring, and Supply Chain Threat Intelligence. By harnessing the power of artificial intelligence and machine learning, SOCRadar enhances threat detection capabilities and promptly provides actionable intelligence, ensuring businesses stay ahead of cyber risks. In addition, SOCRadar offers a suite of free next-generation tools to investigate everyday incidents such as phishing, malware, account breaches, and more. These tools are built on SOCRadar’s big data platform and incorporate machine learning and advanced behavioral analytics. With a global presence, SOCRadar’s mission is to fortify organisational defences, mitigate external risks, and create a safer digital ecosystem worldwide. Start your free trial or learn more at https://socradar.io/

Stop Ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Detect EDR and MDR solutions.
2025 Education Seminar Sponsors

Commvault is the gold standard in cyber resilience, leading the charge to protect the world against ransomware and other cyber threats by helping companies reduce risk, minimize downtime, and control costs. The new Commvault® Cloud, powered by Metallic® AI, represents decades of innovation, industry leadership, customer trust, and a deep ecosystem of partnerships. It’s the only cyber resilience platform built for the hybrid world, offering the best data security for all workloads, anywhere combined with the rapid, enterprise-scale recovery. Commvault helps over 25,000 customers worldwide fight ransomware and achieve total resilience in face of tomorrow’s threats.

Contrast Security: Secure from Within
Static scans and firewalls leave AppSec blindspots. Contrast delivers real-time, always-on security embedded directly into your apps and APIs.
Why Choose Contrast Security?
Contrast Security redefines application security with transformative solutions that offer real-time visibility into threats and vulnerabilities, allowing organisations to detect and respond to application-layer attacks with unparalleled precision.
Contrast’s Products
Contrast Application Detection and Response (ADR)
Eliminates application blindspots, providing real-time protection against known vulnerabilities, exploits, and zero-day attacks.
• Detect and block unknown vulnerabilities without relying on outdated signatures.
• Stop attacks in real-time, reducing dwell time and mitigating damage.
• Gain deep visibility into application behaviour and security posture with real-time insights.
Contrast Application Vulnerability Monitoring (AVM)
Combines best-in-class vulnerability monitoring with ADR’s attack detection and response capabilities, empowering security operations teams to:
• Proactively manage live application risks.
• Accelerate detection and remediation workflows.
• Ensure continuous compliance and security in production environments.
Contrast Application Security Testing (AST)
Transforms application security testing by embedding intelligence directly into your applications and APIs.
• Security checks are added as applications load into memory, ensuring critical functions are secure.
• Developers are instantly notified of issues, with complete traceability provided directly from running code.
• Precise testing reduces false positives and keeps developers focused on innovation.
What Makes Contrast Different?
• Actionable Insights: Context-rich alerts enable faster triage and precise remediation.
• Seamless Integration: Integrates effortlessly into CI/CD pipelines, SOC tools, and existing workflows.
• Future-Ready Security: Secure cloud-native environments without slowing innovation.
• Proven Results: Improve mean time to detect (MTTD) and mean time to respond (MTTR), boosting your security posture.
For more information, please visit: www.contrastsecurity.com

CybSafe is the human risk management platform designed to reduce human cyber risk in the modern, remote, and hybrid work environment, by measuring and influencing specific security behaviors. CybSafe is powered by SebDB—the world’s most comprehensive security behaviors database—and built by the industry’s largest in-house team of psychologists, behavioral scientists, analysts, and security experts. An award-winning, fully scalable, and customisable solution, it’s the smart choice for any organisation.
- 91% Reduction in high-risk phishing behavior
- 55% Improvement in security behaviors
- 4x More likely to engage in cybersecurity initiatives

Hadrian is revolutionising offensive security through automation, enabling security teams to operate faster and scale effortlessly. Powered by advanced AI and machine learning, Hadrian continuously maps and monitors your organisation's attack surface 24/7, mimicking real-world hacker tactics to uncover vulnerabilities before they can be exploited.
Unlike static penetration tests, Hadrian offers a dynamic, evolving approach to security that adapts to your changing attack surface. With automated insights and prioritisation of critical risks, Hadrian equips security teams to stay ahead of threats and fortify their defenses before attacks occur.
Learn more at hadrian.io https://hadrian.io/

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace. We do this by bringing together all the steps of the intelligence cycle in one place; from the management of cyber, physical and geopolitical PIRs to the automated collection and processing of structured and unstructured data from open, deep and dark web and finished intelligence sources; to the analysis, production and dissemination of intelligence. This helps intelligence teams work more efficiently to identify and prioritise threats and supports decision-makers to act faster to mitigate risk, protect revenue and drive business results.
Learn more at silobreaker.com

Silverfort unifies identity security into a single platform, and is the only company proven to protect all identities, in the cloud, on prem, human, or machine and everything in between. We give businesses visibility into their entire network of identities and extend protection to resources that previously could not be protected— like service accounts, legacy systems, or command line tools. And this is all done via our unique platform architecture that won’t disrupt business operations, is lightweight on the devices it protects and effortless to use and deploy. Learn more by visiting www.silverfort.com.

Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium unifies teams and workflows and protects every endpoint from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for eight consecutive years and ranks on Fortune’s list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere. That’s the power of certainty. Visit www.tanium.com and follow us on LinkedIn and Twitter.

Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
Thousands of organizations worldwide trust Varonis to defend their data wherever it lives — across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management.
Varonis protects data first, not last. Learn more at www.varonis.com.
Blog: Varonis Blog | All Things Data Security
LinkedIn: (8) Varonis: Overview | LinkedIn
2025 Networking Sponsors

Since 2020, we’ve been radically redefining how enterprise security risks are discovered. We exist to continually outpace the cyber threats faced by our clients, using a constant cyber attack methodology. For a simple monthly fee, our dedicated team of ethical hackers will constantly attack the full scope of your brand using digital, physical and social methods. And when we find a way to breach your organisation, we’ll raise the alarm before a real threat succeeds. Just as your security defences must evolve to keep pace with organisational change, so must your approach to cyber-attacks. With most security breaches occurring many days prior to detection, effective simulated assaults must be constant. It’s the only way to counteract an APT and avoid zero-day exploits. We are also among the few CREST-accredited for Simulated Targeted Attack and Response.

iZOOlogic is dedicated to providing niche Threat Intelligence and Digital Risk Protection solutions across the BFSI sector and any other entities with an online digital footprint. The iZOOlogic platform is an integrated suite of services allowing real time intelligence into the online threat landscape and provides a seamless 24x7x365 Global Incident Response with unlimited takedowns. From brand protection via domain name management to monitoring the deep dark web of stolen credentials, iZOOlogic presents a range of cutting-edge services to ensure your brand stays protected and mitigates any threats developing across the public web surface. We are a US-based company with our headquarter and GSOC team located in London, UK. Our proprietary SaaS-enabled solution allows services to run across the whole world, with key customers situated across Europe, the Middle East, Asia and Africa.
iZOOlogic business outcomes:
- Reduce fraud losses from online abuse, phishing and malware;
- Maintain integrity and assurance of eChannel services;
- Identify and mitigate compromised Accounts in real time;
- Prevent cybercriminals from hijacking the corporate brand;
- Reduce and mitigate reputational risk;
- Disrupt the cybercriminal ecosystem.
iZOOlogic Info Security outcomes:
- Real time monitoring and pro-active detection of phishing and abuse;
- End point protection from phishing and malware;
- Real time data feed and intelligence of compromised accounts;
- Identify end users and transactions compromised by malware;
- Security incident and event management;
- Web based portal with alerts and reports;
- 24x7x365 Global Security Incident Response.
iZOOlogic solutions:
- Security as a Service-Subscription based Services;
- Industry leading SLA’s;
- Proprietary and dedicated platform, Turn Key;
- Global Threat Intelligence Platform - intelliZOO;
- iZOOlabs Incident Management Portal;
- 24x7x365 Security Operation Centre & Malware Lab.
For more information, please visit our website: https://izoologic.com/

Since 1994, many of the world’s most prestigious banks and institutional investors have trusted Thomas Murray to deliver mission-critical information, risk analysis, advisory and technology to help them manage their global exposure. Today, we support organisations of all sizes from every industry to protect their data, assets, and reputations, wherever they operate in the world. Our clients use our risk, due diligence, and cyber security solutions to monitor thousands of markets and organisations that they might be exposed to. Our unified cyber risk team of experts will support clients as their needs evolve and requirements grow. We embed threat intelligence in all that we do and the language we speak. This ensures that you understand the relevance of our work and knowledge as they relate to the context of your business. We ensure that you are uniquely positioned to manage your cyber risk proactively. Our team is relentlessly focused on helping our clients identify and manage cyber risk: we are responsive, dependable, and of the highest integrity, ensuring that value is realised. We put your needs at the centre of everything we do.



Secon, dope.security, and Vicarius
Secon is a trusted UK-based cyber security partner that has dedicated the last 25 years to simplifying and strengthening the security posture of organisations in the public and private sector. Partnering with innovative vendors, we provide cutting-edge technologies and services to create secure environments that empower organisations to thrive with confidence. At the e-Crime & Cybersecurity Congress, Secon is proud to be representing two disruptive technologies, dope.security and Vicarius.
dope.security is streamlining cyber security. No stopovers. No outages. No re-routed traffic. Our Fly-Direct Secure Web Gateway and LLM-powered CASB Neural ensure a direct, invisible internet experience. Whether your company is small or large, they provide a first-class experience with the easiest deployment process in the industry. It’s not that they’re mad at yesterday’s solutions—just disappointed. So they made it dope.
Vicarius is committed to leading the pack in vulnerability remediation. Their product, vRx consolidates vulnerability management and offers cutting-edge remediation with patch management, patchless protection, and a scripting engine to safeguard business assets at all times.
Click here to learn more about dope.security and Vicarius through Secon.