The Network Group UK Financial Services Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
Solution Partners

Solution partners for 2025 included:

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

Platinum Partners
Exponential-e - in partnership with Cato

Innovation is at the core of Exponential-e, and has been since our inception in 2002. We wholly own our superfast Network, and our fusion of complementary technologies - a carrier-class Network and Cloud infrastructure - means we can deliver enterprise applications at wire speed for a superior end-user experience.

Technology is the beating heart of your business, and is undoubtedly fuelling your growth and sustaining your competitive advantage. What you don’t need is the complexity that comes with multiple service providers and varying service levels. At Exponential-e, we strive to constantly exceed expectations in innovation and service; what’s more we can provide a single end-to-end SLA.

At Exponential-e, our Cloud services do not transcend the public Internet. Instead, they reside on a customer's LAN, on the clean side of the firewall, so security and privacy concerns are negated.

Our vast product portfolio enables us to create tailored solutions for each individual customer, ensuring that we meet their exact needs and requirements – whether that be for Data Centre, Cloud, Unified Communications, Security, or IT Services.

Gold Partners
Adarma

We are Adarma, independent leaders in detection and response services. We specialise in designing, building and managing cybersecurity operations that deliver a measurable reduction in business risk. We are on a mission to make cyber resilience a reality for organisations around the world.

Our team of passionate cyber defenders work hand in hand with you to mitigate risk and maximise the value of your cybersecurity investments. Powered by the Adarma Threat Management Platform and optimised to your individual needs, we deliver an integrated set of services that improve your security posture, including best-in-class Managed Detection and Response.

We operate with transparency and visibility across today’s hybrid-SOC environments to protect your business as you transform, innovate and grow. Adarma delivers the cybersecurity outcomes you need to make a remarkable difference.

Illumio

Illumio, the Zero Trust Segmentation Company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small businesses, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

SentinelOne

SentinelOne (NYSE:S) is the world’s most advanced, autonomous AI-powered cybersecurity platform. Built on the first unified Data Lake, SentinelOne empowers the world to run securely by creating intelligent, data-driven systems that think for themselves, stay ahead of complexity and risk, and evolve on their own. Leading enterprises around the world trust SentinelOne to Secure Tomorrow™.

Talion

At Talion, we’re changing the way organisations interact with their Managed Security Service Provider. Born out of BAE Systems, our service is built on first-hand knowledge of military engineering and defence-grade security, together with an in-depth understanding of the threat landscape facing the commercial world today.

When it comes to cyber security, we believe every organisation deserves full visibility and complete control over how threats are monitored, how decisions are made, and how their business is protected. That’s why we prioritise transparency and collaboration across our service lines, implementing security programs that give businesses the control and freedom to pursue ambitions and realise goals, safe in the knowledge that we’ve got their back, 24 hours a day, 7 days a week.

ThreatLocker

Stop Ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Detect EDR and MDR solutions.

Veracode

Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans and a proprietary AI-generated remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. Thousands of the world’s leading development and security teams use Veracode every second of every day to get accurate, actionable visibility of exploitable risk, achieve real-time vulnerability remediation, and reduce their security debt at scale. Veracode is a multi-award-winning company offering capabilities to secure the entire software development life cycle, including Veracode Fix, Static Analysis, Dynamic Analysis, Software Composition Analysis, Container Security, Application Security Posture Management, and Penetration Testing.
Learn more at www.veracode.com, on the Veracode blog, and on  Linkedln and Twitter

Copyright © 2024 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.
Blog | Veracode

Level up your AppSec knowledge with research, news, and guidelines for enterprise application security programs from the world-class minds at Veracode.

Twitter
Veracode (@Veracode) / Twitter

Silver Partners
42Crunch

42Crunch is the leading API security platform in the market, deployed at Allianz, Travellers, Resolution Life, Frost Bank, Vanguard, BT, Verizon, Ford and used by over 1.6 million developers globally. We help teams build better and more secure APIs, through good API security governance.

With 42Crunch, companies leverage the combined resources of their security and development teams to build more secure APIs, avoid the costly impact of API breaches by identifying and remediating vulnerabilities at design time and accelerate the time to market of API-driven services.

Our API security platform enables companies to fix API vulnerabilities at design time and block attacks at runtime. Risk assessment, risk scoring and security quality testing tools help developers build secure APIs and security teams retain governance and policy enforcement throughout the API lifecycle. More info www.42crunch.com and our community site www.apisecurity.io

BlueFort Security & F5

BlueFort Security:
BlueFort is the UK’s only Full-Service Security Integrator, specialising in identity and cloud security. As the security team for security teams, we combine expert knowledge with cutting-edge technology to help organisations secure their digital identities and cloud environments while navigating the complexities of compliance and regulatory requirements (NCSC CAF, NIS2, ISO 27001, and GDPR to name a few). With a curated suite of tools, products, and skills, BlueFort partners with CISOs and Security Operations teams to consolidate, optimise, and transform their security landscape - ensuring seamless protection against evolving threats in an increasingly cloud-driven world.

F5:
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app - on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com. (NASDAQ: FFIV)

Cyberbit

Cyberbit addresses the cybersecurity experience gap by enhancing the proficiency of security teams and executives. Through ActiveExperiences, we provide hyper-realistic Live-Fire Exercises, Labs, Quests, and Crisis Simulations that replicate real-world cyber threats, ensuring teams gain the hands-on experience necessary to respond effectively.

Our platform rapidly deploys virtual cyber ranges, emulating complex network environments and security architectures. By engaging in high-pressure, scenario-based experiences, defenders develop real-world decision-making skills and operational muscle memory. With over 70% of our experts bringing military or first-responder experience, our approach is informed by an in-depth understanding of adversarial tactics, ensuring practice environments are both authentic and impactful.

Trusted by Fortune 500 companies, leading system integrators, government agencies, and higher education institutions, Cyberbit equips organizations with the operational cyber readiness required to defend against evolving cyber threats.

Cyderes

Cyderes is a global cybersecurity partner built for today's relentless threatscape. We specialise in identity-centric security, managed detection and response, and cloud defence-powered by AI and driven by expert operators. Our mission: arm organisations with the people, platforms, and perspective to "Be everyday ready."

Forescout

We envision a world where every cyber asset is seen, secure and compliant.

Forescout Technologies, Inc., a global cybersecurity leader, continuously identifies, protects and helps ensure the compliance of all managed and unmanaged cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale.

The Forescout Platform delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats.

Hadrian 

The hackers perspective
Defensive security should be validated by offensive security. Hadrian provides the hacker perspective, revealing the targets and methods that could be used in a real-world data breach. Hadrian’s continuous and comprehensive testing discovers and validates risks completely autonomously.

Hadrian’s platform combines attack surface discovery, automated penetration testing, and threat exposure management technologies in a cloud-based and agentless platform. The cutting-edge technology is constantly updated and improved by Hadrian’s in-house hacker team. Learn more: www.hadrian.io

Opentext

OpenText Cybersecurity provides comprehensive security solutions for companies of all sizes. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio.

Powered by actionable insights from our real-time contextual threat intelligence, our customers benefit from high efficacy products, a compliant experience, and simplified security to help manage business risk.

Palo Alto Networks

Palo Alto Networks is the world’s cybersecurity leader. Our next-gen security solutions, expert services, and industry-leading threat intelligence empower organizations across every sector to transform with confidence.

Pentera

Pentera is the global leader in Automated Security Validation, trusted by cybersecurity professionals in over 1200 organizations and service providers across more than 60 countries. The Pentera platform empowers organizations to proactively test their complete attack surface against the latest cyber-attacks and guides remediation priorities based on true and proven risk. Pentera provides the centerpiece of Continuous Threat Exposure Management (CTEM) operations at any scale. With Pentera, enterprises can effectively identify and reduce security exposure and improve their security teams' efficiency.

SafeBreach

SafeBreach is the leader in enterprise-grade exposure validation, providing the world’s largest brands with safe and scalable capabilities to understand, measure and remediate threat exposure and associated cyber risk. The award-winning SafeBreach exposure validation platform combines pioneering breach and attack simulation and innovative attack path validation capabilities to help enterprise security teams measure and address security gaps at the perimeter and beyond. Backed by a world-renowned original threat research team and world-class support, SafeBreach helps enterprises transform their security strategy from reactive to proactive safely and at scale. To learn more about how SafeBreach helps enterprises with end-to-end exposure visibility, visit www.safebreach.com

SEP2

SEP2 are an award-winning cyber security specialist service provider, delivering a complete suite of managed cyber security solutions from our UK based 24/7 SOC. We have built our reputation on creating strong partnerships with world-class vendors, including Google, Check Point, and CrowdStrike. SEP2 prides itself on a team of the very best engineers, analysis and consultants, driven by a genuine passion for delivering excellent service to our customers. That’s why we say we are Tech Driven, People Powered.

www.sep2.security

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 2,500+ customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce.

Request an invitation
or book your place now

Request an invitation Book now

Excellent opportunity to meet with key security vendors and meet peers across the industry

Head of Security Assurance

Excellent opportunity to effectively network with peers and share experiences. Particularly enjoyed being able to plan meetings to maximise the value from my attendance

IT audit Director

First class networking invaluable subject matter. A productive and enjoyable two-day conference

Director Global security

I was not sure what this event would be like as I have not been before. However, I was impressed with the session and the vendors I spoke to

Head of Information Security

This was my first one and I enjoyed it. Well organised. I loved the app!

IRM Security Lead

Well run, great format and great agenda

Group CISO

Great event, great people!

Head of IT

Well organised, good set of speakers, good insider, current topics discussed

Head of Security & Technology Risk Services - EMEA

Worthwhile use of two days in a busy schedule

Head of Engineering

Informative sessions, good breakout sessions

Head of Risk Domains

Really good event both from presentation and networking. Compared with other events, the administration was painless and the conference app is the best I have seen

Head of IS Governance

Great event, the formal allowed me to have really valuable conversations with both vendors and industry colleagues

Cybersecurity Operations Lead

This has been my first Network Group event and have been pleasantly surprised and impressed, excellent organisation

Head of Governance, Information Security

Great opportunity to share views, experiences&ideas plus hear from experienced security professionals

Head of Security Assurance

Very professional, well timed, good balance between sessions

Executive Director, Group Information Security Risk

A good event which covered ground known by some and shared with others. Well done!

Head of IT Security

I thought the format was excellent, much better than other one-day vendor centric events as I was able to have some quality conversations with peers and security vendors

CISO

CENTRAL LONDON, UK
12 MAY, 2026

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials

The Network Group
6 Snow Hill
London
EC1A 2AY

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy