Sponsors
July 2025 Strategic Sponsors

Bytes Software Services is a leading provider of IT solutions, offering a wide range of services to help businesses enhance their digital presence and improve operational efficiency. Their services include cloud solutions, security, end-user computing, data management, licensing, asset management, storage, virtualisation, training, and deployment.
The company has been in operation since 1982 and has grown rapidly. Bytes Software Services is known for its strong partnerships and commitment to delivering world-class IT solutions. They have a significant focus on cyber security, providing threat intelligence and rapid threat assessments to help organizations stay ahead of emerging risks.

CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stop breaches.

CyberProof delivers better security operations and drives superior experiences for enterprise customers. Our cloud-first, AI-powered approach to security, delivers industry-leading security services to drive real business results. We believe that working closely with our customers and partners through a better security, together services model, jointly empowers us to defend against the greatest of threats.

Cyderes is a global cybersecurity powerhouse offering comprehensive solutions around managed security, identity and access management, and professional services. Cyderes provides the people, process, and technology modern enterprises rely on to manage risk, maintain compliance, and respond to security threats with greater speed, scale, and cost-efficiency than traditional in-house solutions. Born from the merger of two award-winning cybersecurity firms, Herjavec Group and Fishtech Group, Cyderes has six security operations centers and three offices across the United States, Canada, the United Kingdom, and India.

Mimecast is an AI-powered, API-enabled connected Human Risk Management platform, purpose-built to protect organizations from the spectrum of cyber threats. Integrating cutting-edge technology with human-centric pathways, our platform enhances visibility and provides strategic insight that enables decisive action and empowers businesses to protect their collaborative environments, safeguard their critical data and actively engage employees in reducing risk and enhancing productivity. More than 42,000 businesses worldwide trust Mimecast to help them keep ahead of the ever-evolving threat landscape. From insider risk to external threats, with Mimecast customers get more. More visibility. More insight. More agility. More security.

Searchlight Cyber provides organizations with relevant and actionable dark web intelligence to help them prevent cybercriminal activity. Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. Today we provide governments, law enforcement agencies, and enterprises around the world with dark web investigation and monitoring capabilities - empowering them in their fight against criminal activity on the dark web.

Stop Ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Detect EDR and MDR solutions.
July 2025 Education Seminar Sponsors

Contrast Security: Secure from Within
Static scans and firewalls leave AppSec blindspots. Contrast delivers real-time, always-on security embedded directly into your apps and APIs.
Why Choose Contrast Security?
Contrast Security redefines application security with transformative solutions that offer real-time visibility into threats and vulnerabilities, allowing organisations to detect and respond to application-layer attacks with unparalleled precision.
Contrast’s Products
Contrast Application Detection and Response (ADR)
Eliminates application blindspots, providing real-time protection against known vulnerabilities, exploits, and zero-day attacks.
• Detect and block unknown vulnerabilities without relying on outdated signatures.
• Stop attacks in real-time, reducing dwell time and mitigating damage.
• Gain deep visibility into application behaviour and security posture with real-time insights.
Contrast Application Vulnerability Monitoring (AVM)
Combines best-in-class vulnerability monitoring with ADR’s attack detection and response capabilities, empowering security operations teams to:
• Proactively manage live application risks.
• Accelerate detection and remediation workflows.
• Ensure continuous compliance and security in production environments.
Contrast Application Security Testing (AST)
Transforms application security testing by embedding intelligence directly into your applications and APIs.
• Security checks are added as applications load into memory, ensuring critical functions are secure.
• Developers are instantly notified of issues, with complete traceability provided directly from running code.
• Precise testing reduces false positives and keeps developers focused on innovation.
What Makes Contrast Different?
• Actionable Insights: Context-rich alerts enable faster triage and precise remediation.
• Seamless Integration: Integrates effortlessly into CI/CD pipelines, SOC tools, and existing workflows.
• Future-Ready Security: Secure cloud-native environments without slowing innovation.
• Proven Results: Improve mean time to detect (MTTD) and mean time to respond (MTTR), boosting your security posture.
For more information, please visit: www.contrastsecurity.com


Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

Vectra® is a leader in threat detection and response for hybrid and multi-cloud enterprises. The Vectra platform uses AI to detect threats at speed across public cloud, identity, SaaS applications, and data centers. Only Vectra optimizes AI to detect attacker methods—the TTPs at the heart of all attacks—rather than simplistically alerting on “different”. The resulting high-fidelity threat signal and clear context enables security teams to respond to threats sooner and to stop attacks in progress faster. Organizations worldwide rely on Vectra for resilience in the face of dangerous cyber threats and to prevent ransomware, supply chain compromise, identity takeovers, and other cyberattacks from impacting their businesses. For more information, visit vectra.ai.
July 2025 Networking Sponsor

Since 2020, we’ve been radically redefining how enterprise security risks are discovered. We exist to continually outpace the cyber threats faced by our clients, using a constant cyber attack methodology. For a simple monthly fee, our dedicated team of ethical hackers will constantly attack the full scope of your brand using digital, physical and social methods. And when we find a way to breach your organisation, we’ll raise the alarm before a real threat succeeds. Just as your security defences must evolve to keep pace with organisational change, so must your approach to cyber-attacks. With most security breaches occurring many days prior to detection, effective simulated assaults must be constant. It’s the only way to counteract an APT and avoid zero-day exploits. We are also among the few CREST-accredited for Simulated Targeted Attack and Response.