The Network Group UK Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
Solution Partners

Solution partners for 2021 include:

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

Platinum Partners
Cybereason

Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.

F-Secure Countercept

F-Secure Countercept provides a complete managed service for the detection of, and response to, cyber-attacks, specializing in the ability to detect and respond to state-sponsored attacks (APT groups).

Unlike the traditional style of intrusion detection, based on purely ‘alert driven’ monitoring, F-Secure Countercept offers a 24/7/365 proactive threat-hunting service built around Endpoint Detection and Response (EDR) that utilizes security professionals with real-world experience in attack simulation and incident response.

Proofpoint

Proofpoint, Inc. is a leading next-generation security and compliance company that provides cloud-based solutions for comprehensive threat protection, incident response, secure communications, social media security, compliance, archiving and governance.

Organisations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system.

Proofpoint protects against phishing, malware and spam, while safeguarding privacy, encrypting sensitive information, and archiving and governing messages and critical enterprise information.

More information is available at www.proofpoint.com

SailPoint

SailPoint, the leader in identity management, delivers an innovative approach to securing access across the enterprise with the SailPoint Predictive IdentityTM platform. With SailPoint, enterprises can ensure that everyone and everything has the exact access they need, exactly when they need it, intuitively and automatically. Powered by patented Artificial Intelligence (AI) and Machine Learning( ML) technologies, the SailPoint Predictive IdentityTM platform is designed to securely accelerate the business while delivering adaptive security, continuous compliance and improved business efficiency. As an identity pioneer and market leader serving some of the world’s most prominent global companies, SailPoint consistently pushes the industry to rethink identity to the benefit of their customers’ dynamic business needs.

Stay up-to-date on SailPoint by following us on Twitter and LinkedIn and by subscribing to the SailPoint blog.

SentinelOne

SentinelOne is a pioneer in delivering zero-touch endpoint security to help business secure their assets with speed and simplicity. It unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial-intelligence, behavioral analysis and intelligent automation to enable organizations to minimize their time to protection.

More information is available at www.sentinelone.com

Skybox Security

Skybox arms security leaders with a comprehensive cybersecurity management platform to address the security challenges of large, complex networks. The Skybox® Security Suite breaks down data silos to build a dynamic network model that gives complete visibility of an organization’s attack surface and the context needed for informed action across physical, multi-cloud and operational technology networks. We leverage data by integrating with 120 security technologies, using analytics, automation and advanced threat intelligence from the Skybox® Research Lab to continuously analyze vulnerabilities in your environment and correlate them with exploits in the wild. This makes the prioritization and mitigation of imminent threats an efficient and systematic process, decreasing the attack surface and enabling swift response to exposures that truly put your organization at risk.

Our award-winning solutions in vulnerability and threat management, firewall and security policy management, and attack surface visibility automate as much as 90 percent of manual processes and are used by the world’s most security-conscious enterprises and government agencies, including Forbes Global 2000 companies.

Find out more: www.skyboxsecurity.com.

Tufin

Tufin® is the leader in Network Security Policy Orchestration. We serve over 2,000 customers worldwide including more than half of the top 50 companies in the Forbes Global 2100 who employ Tufin solutions to simplify management of some of the largest, most complex networks in the world.

XM Cyber

XM Cyber is the global leader in Attack-Centric Risk Prioritization, which is also known as Risk-Based Vulnerability Management (RBVM). The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. XM Cyber helps to eliminate 99% of the risk by focusing allowing IT and Security Operations to focus on the 1% of the exposures before they get exploited to breach the organization’s “crown jewels” – its critical assets. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel.

Gold Partners
CyberVadis

CyberVadis is the first scalable solution for managing the full third-party cybersecurity risk assessment process. The CyberVadis platform is based on a methodology that maps to all major international compliance standards and combines the speed of automation with the accuracy and effectiveness of a team of experts.

This includes engaging vendors directly with assessments, validating results with an in-house team of security analysts, and issuing companies a standardized cybersecurity rating that they can share with others. We also provide a detailed improvement plan for increasing their score and the ability to collaborate with clients and vendors on implementing better practices.

CyberVadis was developed by EcoVadis, the world’s most trusted provider of businesses sustainability ratings, intelligence and collaborative performance improvement tools for global supply chains. EcoVadis counts industry leaders like AstraZeneca, Lloyds Banking Group, Unilever and Virgin Atlantic, among the more than 55,000 businesses on its network.

Illusive Networks

Illusive Networks empowers security teams to reduce the business risk created by today’s advanced, targeted threats by destroying an attacker’s ability to move laterally toward critical assets. Illusive reduces the attack surface to preempt attacks, detects unauthorized lateral movement early in the attack cycle, and provides rich, real-time forensics that enhance response and inform cyber resilience efforts. Agentless and AI-driven, Illusive technology enables organizations to proactively intervene in the attack process and avoid operational disruption and business losses, while functioning with greater confidence in today’s complex, hyper-connected world.

Immersive Labs

Immersive Labs is the world’s first fully interactive, on-demand, and gamified cyber skills platform. Our technology delivers challenge-based skills content developed by cyber experts with access to the latest threat intelligence. Our unique approach engages and measures entire workforces, so all employees are equipped with critical skills and practical experience in real-time.

Veracode

Veracode is the leading AppSec partner for confidently and efficiently creating secure software that moves your business, and the world, forward.

Veracode empowers its customers to confidently develop software by reducing the risk of security breach through comprehensive analysis, developer enablement, and governance tools.

Our passion is providing an uncompromising commitment to making secure software your competitive advantage.

Together, we can confidently respond to change faster, confidently identify and address security flaws more quickly, and we give our customers the confidence to focus on work that creates the blueprint for the future.

With a combination of automation, integrations, process, and speed, Veracode helps companies get accurate and reliable results with fewer false positives so they can be confident in knowing their software is protected by the industry's best solution.

Veracode serves more than 2,500 customers worldwide across a wide range of industries. The Veracode Solution has assessed more than 14 trillion lines of code and helped companies fix more than 48 million security flaw.

SilverPartners
Agari

Agari is the market share leader in phishing defense solutions for the enterprise. Through applied science, the Agari Identity Graph™ delivers valuable business context to every email risk decision.

Agari ensures outbound email from the enterprise cannot be spoofed, increasing deliverability and preserving brand integrity. It also protects the workforce from devastating inbound BEC, VEC, spearphishing, and account takeover-based attacks, reducing business risk and restoring trust to the inbox.

Learn more at www.agari.com

Centrify

Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.

By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.

Open Systems

The digital transformation journey demands agility and defensibility from your IT infrastructure. Open Systems’ secure access service edge (SASE) solution unifies security and comprehensive networking capabilities, enabling organizations to connect their clouds, branches, applications and users anywhere in the world, in a secure and flexible way. Open Systems’ cloud-delivered Secure SD-WAN and Managed Detection and Response (MDR) services combine 24x7 experts with AIOps and an automation platform to deliver immediate peace of mind, and future-proof your business. For more information, visit open-systems.com.

ZIVVER

A fast-growing European scale-up, ZIVVER has become a market leader in the Netherlands with their innovative communication security platform. Trusted by more than 3000 organisations of all sizes to safeguard important data, the user-friendly platform helps to improve regulatory compliance as well as business performance.

ZIVVER’s smart technology platform is designed to prevent human errors, the cause of over 75% of data leaks. Users receive real-time awareness training when sending sensitive communications electronically. The service conveniently integrates with leading email clients such as Outlook and Gmail, so it’s easy to use.

With ZIVVER, many companies quickly see a positive business case. That’s why 98% of customers renew their service agreements, and the average rating on Gartner Peer Reviews is 4.6 out of 5.

Request an invitation
or book your place now

Request an invitation Book now

One of the best conferences for senior professionals.

CISO

Great networking event, lots of interesting cross-industry discussions.

CISO

Excellent opportunity to see emerging products, network with peers and take away ideas for improvement.

Head of IT Security - Policy & Risk Management

One of the best cyber security events I have attended.

Head of Cyber Security

Well organised event with real world experience presentations, vendor meetings and networking opportunities.

Information Security Director - IT

This event was highly focused around all elements of InfoSec, a good mix of mature vendors, and great organisation and communication by TNG staff.

Head of Information Security

Great event and great security audience sharing experiences from different sectors.

Head of Advanced Cyber Analytics

I think The Network Group hit a good balance between presentations, workshops and networking time. I enjoyed the meetings scheduled.

Information Security Compliance Lead

Excellent networking opportunities.

Group IT Security Awareness and Training Lead

Superb event – excellent informative speakers. Venue genuinely enabled productive networking.

Director of Information Security

Very good event, well run and good format allowing engagement between delegates and vendors.

Information Security Officer

Best GDPR workshop ever, quality questions.

CIO

Quality delegates, speakers & environment.

Group CISO

Extremely productive and informative.

Information Security Director International

Great opportunity for creative head space for planning ahead, inspired by networking during the event.

Head of Security Risk and Engagement

Good balance between informative presentations and opportunity to talk with relevant vendors.

Head of Security Assurance

Useful for networking and information sharing

Head of Information Security & Infrastructure Change

Very good!

Global Director, Governance, Frameworks & Analytics

Bona Officia!

Head of Architecture

Great event.......thanks for the opportunity to present

CISO

A very insightful and well executed event that touched on matters and challenges affecting the infosec/cyber space

Head of Information & Cyber Security

Very informative, pitched at the right level with the right peer group

Head of Information Security

Thank you for organising an excellent event

Head of IT Risk

Had a great two days at the Network Group "Info Security Network" conference this week in Windsor. Interesting subject matters and an excellent chance to catch up with others who have similar issues and thoughts to overcome them

Head of Service and Information Security

Excellent Security Knowledge Transfer seminar. Overall arrangements were good. Well organised. Thanks to you and the team for creating such a good event, it was well run and extremely efficient overall

IT Security Lead

Really good event both from presentation and networking. Compared with other events, the administration was painless and the conference app is the best I have seen.

Head of IS Governance

WINDSOR, UK
1-2 JUNE, 2021

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
45 Moorfields
Moorgate
London
EC2Y 9AE

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy