Skip To Main Content
International Cyber Expo 2025
  • VISIT
    • REGISTER NOW
    • WHY VISIT?
    • GENERATE YOUR EVENT JOURNEY
    • WHEN & WHERE
    • FAQS
  • EXHIBIT
    • WHY EXHIBIT
    • EXHIBITING BROCHURE
    • REQUEST LATEST FLOORPLAN
    • PAVILIONS
    • EXHIBITOR ZONE
  • WHAT'S ON
    • SASIG AT INTERNATIONAL CYBER EXPO
    • NETWORKING
    • PAVILIONS
    • IMMERSIVE LIVE DEMONSTRATIONS
    • GOVERNMENT ZONE
    • START UP ZONE
    • NATIONAL MUSEUM OF COMPUTING
  • SUMMIT/ CONFERENCES
    • OVERVIEW
    • GLOBAL CYBER SUMMIT
    • TECH HUB STAGE
    • DIVERSITY AND SKILLS STAGE
  • EXHIBITORS
    • EXHIBITOR LIST
    • PRODUCT SHOWCASE
  • INSIGHTS
  • EVENT PARTNERS
  • FAQs
  • SASIG AT INTERNATIONAL CYBER EXPO
  • AD COUNCIL
  • CONTACT THE TEAM
    BOOK A STAND
    REGISTER NOW

    Exhibitor Products

    Loading
    RevBits Privileged Access Management

    RevBits Privileged Access Management

    12 Jul 2022 RevBits
    A comprehensive access management solution that includes: privileged access management; privileged session management; password management; service account management; key management and certificate m …
    Read More
    Tanium Endpoint Security & Risk Management

    Tanium Endpoint Security & Risk Management

    11 Jul 2022 PointWire
    Typical solutions for endpoint security require various tools and databases, meaning lots of manual reconciliation. By bringing all essential asset data together into one console, Tanium’s solution pr …
    Read More
    AttackTree Software

    AttackTree Software

    08 Jul 2022 Rachel Evans
    Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a suc …
    Read More
    Network Device Security Review

    Network Device Security Review

    Assess the critical network devices that make up your corporate network looking for software and configuration vulnerabilities.
    Read More
    VPN Configuration Assessment

    VPN Configuration Assessment

    Assess the security configuration of your VPN to ensure a misconfiguration or vulnerability is not allowing external access to your corporate network.
    Read More
    Microsoft Cloud Readiness Assessment

    Microsoft Cloud Readiness Assessment

    Let Pentest People review your cloud security posture through a consultant-led audit service.
    Read More
    Phishing Email Assessment

    Phishing Email Assessment

    Let Pentest People perform an email phishing campaign in either a broad scale or targeted based attack.
    Read More
    Social Engineering

    Social Engineering

    Let Pentest People research, develop and manage a social engineering assessment of the security of your people and processes utlising the latest techniques. 
    Read More
    Zero Day Response Service

    Zero Day Response Service

    Let Pentest People scan your assets for 0-day vulnerabilities and let you know if you’re at potential risk.
    Read More
    Firewall Ruleset Review

    Firewall Ruleset Review

    Assess your Firewall Rule Configuration looking for security issues and unnecessary rules that could lead to a breach of your network.
    Read More
    • 1
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • 31
    • 32
    • 33

    CO-LOCATED WITH

    ISE24 Logo

     

    Cyber Essentials Certified

    WHEN

    Tuesday 30 September 2025
    09:30 - 17:30

    Wednesday 1 October 2025
    09:30 - 16:00

    WHERE

    Olympia London – National Hall
    Hammersmith Road,
    Kensington,
    London,
    W14 8UX
    United Kingdom

    ORGANISED BY

    Nineteen Logo

    IN PARTNERSHIP WITH

    SASIG

    A Nineteen Company

    • © Copyright 2025
    • Privacy Policy
    • Cookies Policy
    • Terms Of Use
    ASP Events Logo Website by ASP