Skip To Main Content
International Cyber Expo 2026
  • EXHIBIT
    • WHY EXHIBIT
    • BOOK A STAND
    • DOWNLOAD EXHIBITING BROCHURE
    • DOWNLOAD SPONSORSHIP BROCHURE
    • REQUEST LATEST FLOORPLAN
    • REQUEST VISITOR SAMPLES
    • TESTIMONIALS
    • EXHIBITOR ZONE
  • VISIT
    • REGISTER YOUR INTEREST FOR 2026
    • WHY VISIT?
    • WHEN & WHERE
    • FAQS
  • WHAT'S ON
    • GLOBAL MEETINGS & DELEGATIONS PROGRAMME
    • NETWORKING
    • SUMMIT/ CONFERENCES
      • GLOBAL CYBER SUMMIT
      • TECH HUB STAGE
    • IMMERSIVE LIVE DEMONSTRATIONS
    • PAVILIONS
      • ADS & TECHUK PAVILION
      • DSIT PAVILION
      • IASME PAVILION
    • GOVERNMENT ZONE
    • INTERNATIONAL SECURITY EXPO
  • EXHIBITORS
    • EXHIBITOR LIST
    • PRODUCT SHOWCASE
    • EXHIBITOR PRESS RELEASES
  • EVENT PARTNERS
  • INSIGHTS REPORTS
  • CONTACT THE TEAM
    BOOK A STAND (opens in a new tab)
    REGISTER YOUR INTEREST (opens in a new tab)

    Exhibitor Products

    Loading
    Tanium Endpoint Security & Risk Management

    Tanium Endpoint Security & Risk Management

    11 Jul 2022 PointWire
    Typical solutions for endpoint security require various tools and databases, meaning lots of manual reconciliation. By bringing all essential asset data together into one console, Tanium’s solution pr …
    Read More (opens in a new tab)
    AttackTree Software

    AttackTree Software

    08 Jul 2022 Rachel Evans
    Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a suc …
    Read More (opens in a new tab)
    Network Device Security Review

    Network Device Security Review

    Assess the critical network devices that make up your corporate network looking for software and configuration vulnerabilities.
    Read More (opens in a new tab)
    VPN Configuration Assessment

    VPN Configuration Assessment

    Assess the security configuration of your VPN to ensure a misconfiguration or vulnerability is not allowing external access to your corporate network.
    Read More (opens in a new tab)
    Microsoft Cloud Readiness Assessment

    Microsoft Cloud Readiness Assessment

    Let Pentest People review your cloud security posture through a consultant-led audit service.
    Read More (opens in a new tab)
    Phishing Email Assessment

    Phishing Email Assessment

    Let Pentest People perform an email phishing campaign in either a broad scale or targeted based attack.
    Read More (opens in a new tab)
    Social Engineering

    Social Engineering

    Let Pentest People research, develop and manage a social engineering assessment of the security of your people and processes utlising the latest techniques. 
    Read More (opens in a new tab)
    Zero Day Response Service

    Zero Day Response Service

    Let Pentest People scan your assets for 0-day vulnerabilities and let you know if you’re at potential risk.
    Read More (opens in a new tab)
    Firewall Ruleset Review

    Firewall Ruleset Review

    Assess your Firewall Rule Configuration looking for security issues and unnecessary rules that could lead to a breach of your network.
    Read More (opens in a new tab)
    Dark Web Monitoring

    Dark Web Monitoring

    Protect your organisation from external threats by continuously monitoring where your assets are exposed both on the regular and Dark Web.
    Read More (opens in a new tab)
    • 1
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • 31

    CO-LOCATED WITH

    ISE24 Logo

     

    Cyber Essentials Certified

    WHEN

    Tuesday 29 September 2026
    09:30 - 17:30

    Wednesday 30 September 2026
    09:30 - 16:00

    WHERE

    Olympia London, The Grand Hall
    Hammersmith Road,
    Kensington,
    London,
    W14 8UX
    United Kingdom

    ORGANISED BY

    Nineteen Logo

    • © Copyright 2026
    • Privacy Policy
    • Cookies Policy
    • Terms Of Use
    ASP Events Logo Website by ASP