27-28 SEPTEMBER 2022




  • A vCISO is a cost-effective replacement for having a full time CISO, enabling your organisation to benefit from board-level expertise in the latest cyber security developments. 

  • Cybersixgill’s Dynamic Vulnerability Exploit (DVE) Score reflects the likelihood of a vulnerability getting exploited in the next 90 days, allowing security teams to rank vulnerabilities and prioritize patching decisions to enable efficient, data-backed security decisions.

  • A continuous, automated feed of malicious indicators of compromise (IOCs), seamlessly incorporated into your existing security stack via partnerships with leading security vendors from TIP, SIEM, SOAR, EDR and IPS IDS.


  • Exclusive, real-time and ad-hoc visualized access to the largest data lake of deep and dark web activity.


  • Assess the security of your remote working solution, ensuring that configuration issues are not exposing your corporate data and systems to unauthorised users.

  • Let Pentest People perform a thorough test on your mobile applications, for both IOS & Android operating systems.


  • Let Pentest People research, develop and manage a Social Engineering assessment of the security of your people and processes utilising the latest techniques.


  • Pentest People are a CHECK accredited organisation and can scope and perform your IT Health Check (ITHC) for access to the Public Services Network (PSN).

  • Let Pentest People perform an email phishing campaign in either a broad scale or targeted based attack.


  • Protect your organisation from external threats by continuously monitoring where your assets are exposed both on the regular and Dark Web.

  • Let Pentest People assess your businesses Ransomware defences through a 3 part extensive assessment.


  • Understanding Your Weaknesses and Threats With a Pentest People Red Team Engagement


  • Let Pentest People measure your security posture through Infrastructure Penetration Testing to allow you to manage the identified issues.


  • Let Pentest People assess your critical Web Applications for Security Vulnerabilities with a Web Application Penetration Test.


  • Inzpire offers highly experienced former military personnel with extensive cyber expertise, to manage all aspects of cyber exercise design, exercise delivery and the facilitation and leadership of the lessons identified process.

  • Inzpire provides highly experienced former military intelligence specialists to carry out contracted intelligence analysis.

  • Bespoke or off-the-shelf training courses in Intelligence and Cyber practice from introduction to advanced levels.

  • Inzpire’s highly qualified and experienced subject matter experts  can offer a current operational perspective and consultancy services in support of any Intelligence project or programme.

  • Guard

    26 Aug 2021 Martin Smith

    A unique, ‘smart’ network and device segregation unit containing our proprietary software, allowing it to operate safely and effectively within industrial control systems.  Guard allows devices to communicate solely for the intended purpose, blocking or alerting spurious or dangerous traffic and protecting your Operational Technology.


    Find out more:

  • CyberMonitor

    26 Aug 2021 Martin Smith

    A ground-breaking data comparison system which provides visibility into your networks:  traffic; devices; logs.  Works with all OEMs’ equipment, performs a full suite of SOC/NOC functions.  A balance of machine learning and human intervention.  CyberMonitor reduces costs and optimises network operations.

    Find out more:

  • Inzpire offers highly experienced former-military unmanned air systems operators as a contractor operated managed service. 

  • Bespoke or off-the-shelf training courses in Intelligence, Surveillance and Reconnaissance (ISR) operations, planning and management.

  • Unmanned Air Systems Operational Training

    26 Aug 2021 Inzpire Limited

    Bespoke or off-the-shelf training courses for planning and operating Unmanned Air Systems (UAS) or Remotely Piloted Air Systems (RPAS) and their associated Sensors. Inzpire trains the mind as well as the hands in the art of using ‘drones’ operationally.

  • Inzpire can provide expertise and consultancy services to any ISR or UAS project or programme to provide an Operational perspective from one of our highly qualified and experienced subject matter experts.

  • CASE (Compact Agile Simulator Equipment) is optimised for UAS and RPAS synthetic training which can be delivered and operated anywhere, supported by our expert ex-military instructor staff and optional immersive White Force wrap. 

  • The Cyber Prism Platform reduces the resources required to re-establish safety and security in the face of current threats to vulnerable Operational Technology. 


  • The Darkbeam Platform is an agile, user-friendly solution that gives you actionable, relevant threat intelligence, helping you close your security gaps before they can be exploited.

    Using your domain as a starting point, we look at your content, hosting, code and database records to identify vulnerabilities that make your organisation a target to attackers. Our process is non-invasive, and gives you results in just seconds.

  • Businesses who gain the Cyber Essentials accreditation can demonstrate their cyber security credentials to customers and clients, providing them with confidence and assurance in any business relationship.

  • Cloud security is about achieving the benefits of outsourced computing and storage while maintaining the security of your data and the integrity of your networks

  • Secure DevOps seeks to move the traditional security team closer to DevOps to ensure appropriate security measures are factored in at every stage of app development

  • Infrastructure security is a process for ensuring your network is configured for maximum security by managing Active Directory, monitoring network activity and pen testing

  • Application security starts with an understanding of your business and its risk context to create protective policies, procedures and culture for application development

  • Isograph’s AttackTree software provides a powerful and user-friendly environment to construct and analyze attack trees. It gives the user a method to model the threats against a system in a graphical, easy-to-understand manner. The effectiveness of internet security, network security, banking system security, installation and personnel security may all be modeled using AttackTree.

  •   The Counter Fraud Fundamentals scheme was developed by IASME in partnership with the Open Banking Implementation Entity. Organisations of all sizes can prove that they have the fundamental counter f ...
  • IASME have developed the IoT Security Assured scheme to provide an essential opportunity for manufacturers to improve the security of their internet-connected devices and to show they are compliant wi ...
  • The IASME Governance standard was developed over several years during a government funded project to create a cyber security standard which would be an affordable and achievable alternative to the int ...
  • Cyber Essentials is a simple but effective, government approved scheme. Businesses implement just five technical controls which have been proven to help defend them against most common cyber attacks / ...
  • A Build Configuration Security Review provides system administrators with a comprehensive overview of the security of their assets, whereby the local policies and settings of a device are examined to ...
  • Firewalls are designed to be the first line of defence against cyber attacks, making them a fundamental security system that all organisations should be reviewing on a regular basis. Upon initial inst ...
  • Secarma’s Cloud Configuration Security Review tests the configuration of the chosen cloud providers management interfaces for security misconfigurations. This should be considered a critical requireme ...
  • Modern organisations face a range of cybersecurity risks and whilst every effort may be made to prevent a breach, if one does occur an organisation must be prepared to respond to that breach quickly a ...
  • We teach your staff why and how cyber-criminals may target your organisation, and arm them with the skills to protect your business. You may have invested in the latest technology to keep your systems ...
  • We believe that all businesses, regardless of size should be given the opportunity to develop a thorough understanding of the risks they face. Our Cyber Security Maturity Assessment is an evaluation y ...
  • Developing and maintaining a robust cybersecurity posture can be challenging for organisations who don't have a full time Security Manager in-house. That's why we've developed our Virtual Information ...
  • Our Hacking & Defending Networks training course is designed to upskill your systems administrators by teaching them the tools and techniques we use when targeting network infrastructure; from zero ac ...
  • Our Hacking & Defending Web Apps training course is designed to upskill your web developers by taking them step by step through a web application pentest. This provides them with the hacker's point-of ...
  • Our core services are focused around in-depth manual penetration testing, but robust security also requires 24/7 Vulnerability Scanning. We partner with environment vulnerability scanning experts AppC ...
  • Wireless networks are a potential weak point in the corporate perimeter, and an enticing entry point for cybercriminals. If an attacker can gain access to one of your wireless networks (which may incl ...
  • Just as bespoke web apps can create paths in for threat actors, so can mobile applications. Our Mobile App Security Testing service finds vulnerabilities, exploits them, and is followed up with recomm ...
  • Need to know the security weaknesses in your Internet-facing IT systems? If your networks and servers (email servers, routers, or web servers that host e-commerce websites) need testing, book an Infra ...
  • Looking to test the security of your organisation's web apps? We offer a wide range of Web Application Penetration Tests; from simple security reviews of your CMS, to deep-dive assessments of bespoke ...
  • Redflags real-time security awareness

  • Keep visual hackers in the dark with 3M privacy products. Protecting data is now a serious concern for organisations, with many now including privacy filters as a mandatory part of their IT data secur ...
  • Network Encryption

    29 Jul 2021 Graham Wallace

    Why Encrypt?

    High-speed data networks are not inherently secure. Public and private network infrastructure is exposed to a multitude of cyber-threats and two thirds of all data theft occurs while it is moving across the network.

  • In design, features and functionality, SureDrop addresses the issues associated with secure file-sharing and collaboration, to the highest standards required by governments and large enterprises.

  • Build cyber readiness with team-based threat exercises.

    Is your team prepared for its next cyber threat? Train together during real-world cyber range scenarios.

  • Take your cybersecurity skills to the next level. Upskill continuously in an on-demand training ground with interactive self-paced modules, skills assessments, and real-world challenges.

  • With the help of Whisply, data can be sent simple and protected by end-to-end encryption. The created link can be adjusted with an expiration date or one-time download permission. For additional security, the link is optionally provided with a PIN and password. This prevents unauthorized persons from accessing the sent files.

  • Boxcryptor is an encryption solution for cloud storages, such as Dropbox, Google Drive or Microsoft OneDrive, as well as for Microsoft Teams, NAS or local data. It is available on all platforms — for example, Windows, Mac, iOS, Android. It is optimized for team work and gives you full control over your data. There are various features for businesses, such as two-factor authentication, custom policies and a master key provided from an administration panel.

  • Votiro Secure File Gateway

    22 Jul 2021 Graham Wallace

    Votiro Secure File Gateway leverages patented, next gen CDR anti-malware technology to proactively protect your files from the most advanced, persistent cyber-attacks.

  • RevBits Zero Trust Network (ZTN) is a gamechanger in reducing the potential cyber-attack surface and providing secure, auditable remote access to specific business critical assets. Through considered ...
  • RevBits Cyber Intelligence Platform (‘CIP’) is a single sign-on environment that allows administrators to manage all solutions through a custom-built unified analytics dashboard.  CIP offers cross-pla ...
  • RevBits Deception Technology, an effective early warning notification system, is the only deception solution on the market with dual-layer virtualisation and real honeypot servers. Numerous honeypots ...
  • RevBits Privileged Access Management (PAM) is a comprehensive access management solution that includes: privileged access management; privileged session management; password management; service accoun ...
  • RevBits Endpoint Security/EDR conducts a three-phased analysis (signature, machine learning and behavioural) on new executables and includes the most comprehensive robust EDR solution in the market. A ...
  • RevBits Email Security serves as a ‘second layer’ of protection, compatible with existing Email gateway solutions. By using patented technology, endpoint-based algorithmic analysis detects and blocks ...
  • No organisation, big or small, is immune from a devastating cyber-attack. Cyber Exploits are more sophisticated, elusive, and targeted than ever before. It is vital for organisations to understand what controls are required to protect the business and its information assets.

    Here at iSTORM® Privacy - Security - Pentesting our specialist information security team works with you to support your organisation's current and
    future security needs.

  • When determining the potential impact that data protection could have on your organisation, it is important to remember that there is more to consider than just GDPR.

    iSTORM® Privacy - Security - Pentesting can help you to navigate and understand the additional regulations and supporting standards which are relevant to your business and can help you map out what your compliance journey looks like.


    iSTORM® Privacy - Security - Pentesting is an Approved CREST Penetration Testing Provider. Penetration testing is an important part of an organisation's security strategy.

    Our experienced testers can help prevent unauthorised access to your systems and data by exposing the vulnerabilities and weaknesses in your infrastructure and applications before anyone else does.

  • Properly maintaining configuration parameters and identifying changes to your environment are among the most fundamental IT controls. They are also among the most difficult to achieve, requiring const ...
  • Managing and securing endpoints, across thousands of employees in multiple locations, is highly complex. PointWire, with the power of Tanium can reduce the complexity and increase visibility. 

  • Cyber attacks are becoming more and more frequent and the damage caused to companies is correspondingly greater. Exposed entry points for hackers (Microsoft Exchange, SolarWinds, etc.) are just the tip of the iceberg. Phising activities on employees are also becoming increasingly sophisticated. In short, whether hackers are active in your network is only a matter of time - if they're not already in it. 

  • Mobile Application Testing is a software assessment process that is specially designed to identify security issues in mobile applications and related services. CENSUS assessments go well beyond the id ...
  • Source Code Auditing is an assessment process that identifies security issues in software projects by examining the project's source code line-by-line. If your company is developing software, or purch ...
  • Security Testing service tests the security of your organization with the insight of a real attacker using an arsenal of offensive methods. The scope of the tests is not limited only to hardware and s ...
  • CENSUS heavily invests in vulnerability research to identify and expose unknown vulnerabilities in today's computing systems. Our vulnerability research services ensure that a software product, a syst ...
  • A Secure SDLC is a development lifecycle that has been augmented by a special set of processes, whose goal is the development of products meeting high security standards. CENSUS provides specialized s ...
  • ExeonTrace:
    The alarm system for IT networks. Finding attackers in billions of data points 
    every day.  ​

    • Supervised and unsupervised machine learning algorithms ​
    • ​Pre-defined use cases ​​
    • Visualizations ​
    • Graph database​
  • Dencrypt secure communication

    10 May 2021 Jørgen Andersen
    Dencrypt Communication Solution provides secure mobile voice & video calls and secure instant messaging on the end-user’s daily smartphone (iOS or Android). The solution prevents eavesdropping as well ...
  • Active Directory holds the “keys to the kingdom,” and if not safeguarded properly, it will compromise your entire security infrastructure. Purple Knight is a free Active Directory security assessment ...
  • Recover an entire Active Directory forest with just a few clicks. Automate every aspect of forest recovery, such as cleaning up metadata, rebuilding the Global Catalogue, and restructuring site topolo ...
  • Active Directory is difficult to secure given its constant flux, sheer number of settings, and the proliferation of powerful hacking and discovery tools. Semperis DSP puts AD security on autopilot wit ...