All Archives - Page 2 of 79 - Cyber Secure Forum | Forum Events Ltd

All

Will you be joining us at the Cyber Secure Forum on June 25th in London?

960 640 Stuart O'Brien

This unique event will provide you with a rare full working day of industry networking, learning and connection building, through 1-2-1 meetings – The Summit will cover all of your cyber security needs.

Your pass will be fully funded, and includes:

  • A personalised 1-2-1 itinerary of relaxed business meetings with leading industry suppliers
  • A seat at our inspiring and educational seminar* programme
  • Lunch and refreshments provided throughout the day
  • Multiple networking breaks to maximise your business connections and connect with peers at the event

Confirmed seminar sessions include:

“How do dark actors use LinkedIn against you?”

Data is precious, access even more, but many have a LinkedIn “blind” spot. This talk will highlight how it is used against you and how you might use it to help.

Presented by: James Potter, Director – The LinkedIn Man

“Protecting organisations & interests through social engineering threat awareness, managing predominant cyber risks & cyber insurance premiums whilst embedding cyber CSR, next generational awareness and human risk management”

Presented by: Graham Day, Program Manager – CyberGuardian

📢 Further seminar sessions to be announced – Keep an eye out!

Book Online Here, or alternatively, if you would like more information on what to expect at the event, please contact us here.

If you specialise in Intrusion Detection & Prevention we want to hear from you!

960 640 Stuart O'Brien

Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in March we’re focussing on Intrusion Detection & Prevention solutions.

It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today.

So, if you’re an Intrusion Detection & Prevention solutions specialist and would like to be included as part of this exciting new shop window, we’d love to hear from you – for more info, contact Jenny Lane on j.lane@forumevents.co.uk.

Here’s our full features list:

Mar 2024 – Intrusion Detection & Prevention
Apr 2024 – Phishing Detection
May 2024 – Advanced Threat Dashboard
Jun 2024 – Browser/Web Security
July 2024 – Authentication
Aug 2024 – Penetration Testing
Sep 2024 – Vulnerability Management
Oct 2024 – Employee Security Awareness
Nov 2024 – Malware
Dec 2024 – Network Security Management
Jan 2025 – Anti Virus
Feb 2025 – Access Control

5G leads business investment, though general wireless network security concerns remain high

960 640 Stuart O'Brien

Businesses expect wireless technology investment to boost their productivity by 32% on average in the three years after implementation, but latent concerns remain around security and interoperability.

36% of respondents to a Panasonic Connect Europe survey say that 5G is the most important wireless technology investment for their business, with private campus networks more popular than public networks.

One in five (22%) view WiFi 6 as the most important type of wireless technology. A substantial upgrade over its predecessor, it offers faster connections and improved resilience for networks with a high connected device load. Interest in Bluetooth and Long-Range Wide Area Networks (LoRaWAN) were similarly high (21% respectively), as organisations seek the right technology for specialist applications in their own sectors, such as supply chain logistics and manufacturing.

Overall, there is rapid progress being made with investment in wireless technology, with 41% of decision makers having already made the decision to invest in wireless projects, or are in the planning process. An additional 38% of respondents are already at the implementation stage.

However, there are challenges to overcome, with 24% of those surveyed admitting to concerns around IT security, while 22% are worried about interoperability and connectivity issues with their existing IT infrastructure. One in five are troubled about the manageability of the wireless network technology and a similar percentage report a lack of confidence in IT resources, knowledge, and skills.

“This research highlights that this is a crucial period in wireless technology investment and decision making. The advent of 5G, the evolution of WiFi, and the innovation around Bluetooth and LoRaWAN are all driving the connected world in ways that would have been unimaginable just a few years ago. Clearly, business leaders believe wireless connectivity presents enormous opportunities, but there are also challenges to overcome,” said Jan Kaempfer, Marketing Director for Panasonic Connect Europe.

“Businesses have a lack of internal expertise and resources and there is a role for technology providers to play in supporting organisations with expertise and education to instil greater confidence and plug some of the resource gaps. But overall, the picture for wireless is very positive, with a strong appetite for innovation and advanced deployment. At Panasonic Connect Europe, we’re committed to helping business leaders understand the dominant drivers for wireless technology investment, the key technologies and their applications, and how to overcome barriers.”

The survey, carried out by independent research company Opinion Matters and commissioned by Panasonic Connect Europe, questioned over 300 senior decision makers with responsibility for wireless and network technologies, across the UK, France, and Germany, in the following sectors: Retail; Logistics & Supply Chain; Manufacturing; Education; Location-based Media and Entertainment; and Public Sector and Emergency Services.

Photo by Frederik Lipfert on Unsplash

ACCESS CONTROL MONTH: Establishing the key pillars of best practice

960 640 Stuart O'Brien

Implementing an effective access control regime is paramount for IT security professionals in the UK’s public and private sectors. Access control systems are essential for protecting sensitive information, ensuring that only authorised users can access specific data and systems. Here are the key pillars for establishing a robust access control regime, based from input from attendees at the Cyber Secure Forum…

1. Comprehensive Risk Assessment: The foundation of any effective access control regime is a thorough risk assessment. IT security professionals need to identify the critical assets within their organisation, understand the potential vulnerabilities, and assess the threats. This comprehensive evaluation helps in determining the appropriate level of access control required to protect these assets.

2. Least Privilege Principle: One of the cornerstones of access control is the principle of least privilege. This means granting users only the access rights they need to perform their job functions and no more. Implementing the least privilege principle minimises the risk of accidental or intentional data breaches, as it limits the amount of data and systems to which any given user has access.

3. Multi-factor Authentication (MFA): Relying solely on passwords for user authentication is increasingly seen as inadequate. Multi-factor authentication adds an additional layer of security by requiring two or more verification methods to gain access. This could include something the user knows (a password), something the user has (a security token or mobile device), or something the user is (biometric verification).

4. Regular Audits and Reviews: To ensure that access controls remain effective and relevant, regular audits and reviews are essential. This involves checking who has access to what and ensuring that this access is still required. It also includes reviewing the access control policies and procedures to ensure they are up to date with the latest security threats and technological advancements.

5. User Training and Awareness: An often-overlooked aspect of access control is user training and awareness. Users need to understand the importance of access control measures and how to comply with them. This includes recognising phishing attempts, safeguarding their credentials, and reporting any suspicious activity.

6. Integration and Scalability: As organisations grow and evolve, so too do their access control needs. IT security professionals should seek access control solutions that can integrate seamlessly with existing systems and scale as the organisation expands. This ensures a consistent and manageable access control regime across all areas of the business.

An effective access control regime is built on thorough risk assessment, adherence to the principle of least privilege, the implementation of multi-factor authentication, regular audits, user training, and scalable, integrated solutions. By focusing on these key pillars, IT security professionals in the UK can safeguard their organisations against unauthorised access and the myriad of security threats that accompany it.

Are you searching for Access Control solutions for your organisation? The Cyber Secure Forum can help!

Photo by rc.xyz NFT gallery on Unsplash

These are the top trends impacting tech providers in 2024

960 640 Stuart O'Brien
Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider, but ESG and buyer pessimism are also high on the agenda.

Eric Hunter, Managing Vice President at Gartner, said: “[GenAI] technology reshapes a tech provider from its growth and product strategy down to the everyday tools used by its associates. Despite the potential for GenAI to reshape providers, it is not the only influence facing technology leaders. There are new points of friction in growth plans, new points of fusion in marketing and sales, and new relationships opening up to technology and service providers (TSPs).”

The immediate and long-term implications of these issues require product leaders to balance between short-term opportunity and long-term advantage and strategies based on economic recovery or recession. Gartner’s top trends for 2024 reflect these dualities (see Figure 1).

Figure 1: 2024 Gartner Tech Provider Top Trends

Note: The bubble size for each trend conveys the relative magnitude of disruption for a given trend, relative to the other top trends. Source: Gartner (February 2024)

Efficient Growth for High Tech

Significant growth in IT spending over the last decade benefited high-tech companies. Capturing that growth led high-tech firms to pursue growth without a full measure of the costs. This is a “growth at all costs” strategy. High-tech firms anchored their product, organization and employment plans on a hypothesis of continued strong growth.

As macroeconomic conditions create uncertainty among buyers and increasing costs of capital shift investor focus to margin growth, Gartner analysts see a trend toward tech providers focusing on efficient growth. Efficient growth strategies recognize the value in growing in ways that strengthen current margins and future revenue opportunities.

New Enterprise IT-Provider Relationships

Increased business and technical demands require enterprise IT to cover more ground at a deeper level and a faster pace, eroding enterprise IT’s capacity and capabilities. This creates a trend for product leaders at tech providers to create new relationships and revenue opportunities across the enterprise, including expanded provider roles within enterprise IT and the business, outcome-centric provider-enterprise relationships and enterprise-wide tier-1 relationships.

Sustainable Business Grows Up

Sustainability efforts and managing the ESG impact have been unilaterally focused on mitigating internal risk and ensuring compliance. Product leaders must evolve by embracing double materiality and holistic leverage of emerging technologies to meet sustainability objectives.

AI Safety 

Responsible AI and AI safety are not new concepts, but the unprecedented rapid development of GenAI technologies has fueled the discussion around risk management and how to address growing issues such as content provenance and hallucination. Product leaders must build solutions that incorporate safety principles with a focus on model transparency, traceability, interpretability and explainability aspects. Preempting regulatory and compliance issues will be critical to staying competitive in this vibrant GenAI market by creating trust.

Rising Buyer Pessimism 

Over the past three years, tech providers have increasingly observed negative sales pipeline effects due to new buyer behaviors that are colliding with outdated go-to-market (GTM) models. Without adapting sales and marketing approaches to detect and respond to buyer pessimism, technology providers will see their own GTM operations decline in both internal and external perspectives.

Vertical Generative AI Models

While general-purpose models perform well across a broad set of GenAI applications, they can be impractical for many enterprise use cases that require domain-specific data. Tech providers must explore industry-focused models that can be adapted to specific user requirements using available resources more efficiently. Those failing to do so will face increased costs and complexity in the creation and leverage of models.

Personalized Marketplace Experiences  

Specialized, niche, digital marketplaces are emerging to help buyers navigate the complexity of procuring, implementing and integrating solutions. Product leaders who do not offer their services through personalized digital marketplaces limit their findability for their target customers. Gartner predicts that

80% of sales interactions between suppliers and buyers will occur in digital channels by 2025.

Industry Cloud Delivers Growth

Service providers, hyperscalers, ISVs and SaaS providers are turning to vertical solutions to deliver the customer outcomes that will drive provider growth. By 2027, Gartner predicts that more than 50% of tech providers will use industry cloud platforms to deliver business outcomes, up from less than 5% in 2023.

PLG and Value Converge for Hybrid GTM

Product-led-growth (PLG) focuses on showing value to product users, creating intent signals that go-to-market (GTM) teams can use with prospective buyers. But most companies using a PLG GTM have begun to realize that, in most cases, a 100% self-serve GTM motion isn’t tenable. At some point, sellers must be involved to convert deals. Buyer needs for business value and outcome justification — for new or expansion business — will meld PLG tactics with value management and realization initiatives in hybrid GTM strategies.

Precision Marketing and Sales

Rapidly evolving technology advances, such as GenAI, digital buying and the metaverse, are changing how tech providers market and sell technology. Tech providers failing to adopt new approaches will see the erosion of overall deal quality combined with the loss of relevance and limited growth within established accounts.

Photo by Christina @ wocintechchat.com on Unsplash

Asset financing – and how to avoid getting stung by unexpected costs from hyperscalers

960 640 Guest Post

“To hyperscale or not to hyperscale” remains a key question for any CIO. And, while the majority of large organisations have already taken that step, for some, if not all, they question whether their IT infrastructure strategy is delivering the  cost and flexibility benefits expected. At a time when capex budgets are coming under ever greater pressure, pushing CIOs even harder towards the hyperscale opex alternative, Mark Grindey, CEO, Zeus Cloud calls on CIOs to read the small print – or pay the price…

Escalating Costs

Drivers for the adoption of public cloud platforms vary, but for many larger organisations, the agility, innovation and scalability have outweighed the expected cost benefits. The ability to spin up new systems has improved time to market, accelerated digital transformation and enhanced business resilience. For CIOs, the shift away from on premise to the hyperscalers has met objectives – in the main. There is one, very notable exception: cost. While cost control may not have been the priority, it is always a factor in any IT strategic change. Few businesses expected to incur the level of ‘additional’ costs associated with the public cloud. And, given the on-going economic challenges, this upward trend is raising serious concerns.

The biggest problem is that, despite the perception, the price of public cloud service is not ‘known’. Monthly costs are not consistent. The subscription model is just one element in a sliding scale of usage- based costs. Companies are discovering the additional fees demanded for extra security and support. They are incurring far greater storage costs, due to the tendency to charge for both storing and deleting data. Even a user inadvertently changing Active Directory settings can lead to an unexpected hike in costs.

Add in the limitations on bandwidth, the additional charges for cpu or RAM, plus the fact that if the business is using VMWare, it will be paying again based on those same usage factors. Therefore, it’s these further hidden costs of the cloud that have caught many companies by surprise.   

Security and Latency Risks

Of course, unexpected IT costs are nothing new. Big companies have deep pockets – if the public cloud is delivering the required agility and flexibility, is the higher price tag worth it? The problem is that the escalating level of security attacks on these high profile hyperscalers is also causing serious concerns, especially for organisations dependent upon 100% uptime and very low latency.

Financial services organisations cannot endure the increasing latency associated with essential additional levels of security. Key infrastructure providers, including telecommunications and utilities, are justifiably concerned about the risks associated with Distributed Denial of Service (DDoS) attacks occurring almost continuously on these organisations.

But what is the alternative? At a time of economic and geopolitical uncertainty, there is little if any desire to revert to the traditional IT finance model, however deep an organisation’s pockets. Add in new compliance demands and the need to adapt to a changing marketplace, and capex projects are already oversubscribed. Further, large businesses have embraced the flexibility and agility associated with scaling up and down in line with demand. New business innovation is now predicated on the ability to accelerate IT development.

Retaining Flexibility

The cloud model works on so many levels. The issue that organisations have to address is how to retain a cloud-based infrastructure without incurring unacceptable costs. Clearly, it is vital to read the small print. But it is also important to consider the alternatives. Would an on-premise private cloud option work, for example?

Using flexible financing, Service Integration & Management (SIAM) vendors can offer the agility of the cloud with the benefit of locating the kit either on premise or in a dedicated co-location centre. Unlike Managed Service Providers (MSPs), a SIAM doesn’t mark up the equipment. It will simply use its market buying power to access the best prices for the kit required.

Critically, when compared head-to-head with the equivalent hyperscaler cost, this model is typically 50% cheaper. And, with simpler, transparent contracts, companies can – finally – achieve the known monthly cost model that was one of the original promises of the cloud.

Photo by John Vid on Unsplash

ANTI-VIRUS MONTH: Establishing the best protocols for your organisation

960 640 Stuart O'Brien

At a time when cyber threats are increasingly sophisticated and pervasive, establishing robust antivirus defences is crucial for IT professionals in the public and private sectors. The right antivirus strategy can protect critical data and systems, ensuring organisational resilience and compliance with regulatory standards. Here are some top tips for IT professionals to fortify their antivirus defences…

  1. Understand Your Threat Landscape: Begin with a thorough analysis of your organisation’s specific threat landscape. Understanding the types of threats you are most likely to encounter, based on your sector and IT infrastructure, is critical for selecting the right antivirus solutions.
  2. Choose a Comprehensive Antivirus Solution: Opt for antivirus software that offers comprehensive protection. This includes not only traditional signature-based detection but also heuristic analysis, behaviour monitoring, and AI-driven threat detection. A multi-layered approach is key to defending against a wide range of threats, including viruses, malware, ransomware, and zero-day attacks.
  3. Regularly Update and Patch Systems: Ensure that all systems and software, including your antivirus solutions, are regularly updated and patched. Cyber attackers often exploit vulnerabilities in outdated software, so keeping everything up-to-date is a crucial line of defence.
  4. Implement Network Segmentation: Segmenting your network can prevent the spread of viruses if they breach your initial defences. By dividing your network into smaller, controlled zones, you can limit access to sensitive information and contain potential infections.
  5. Educate and Train Staff: Human error is a common entry point for viruses and malware. Regular training and awareness programs for staff can significantly reduce the risk of accidental breaches. Teach employees about safe browsing practices, email hygiene, and the importance of reporting suspicious activities.
  6. Regular Backups and Data Recovery Plans: Regularly back up critical data and ensure you have a robust data recovery plan in place. In the event of a virus attack, having up-to-date backups can be the difference between a minor setback and a major crisis.
  7. Use Firewalls and Email Filters: Complement your antivirus solutions with strong firewalls and email filtering systems. These can help block malicious traffic and phishing attempts before they reach your network or inboxes.
  8. Monitor Systems and Networks Continuously: Implement continuous monitoring of your systems and networks. Early detection of unusual activities can allow you to respond to threats before they cause significant damage.
  9. Conduct Regular Security Audits and Testing: Regular security audits and penetration testing can help identify vulnerabilities in your antivirus defences. These exercises can provide valuable insights for strengthening your security posture.
  10. Stay Informed About Latest Threats: The world of cybersecurity is constantly evolving. Stay informed about the latest threats and trends in antivirus defence, and be prepared to adapt your strategies accordingly.

Establishing robust antivirus defences in today’s digital age requires a comprehensive, informed, and proactive approach. By understanding the threat landscape, choosing comprehensive antivirus solutions, keeping systems updated, educating staff, and continuously monitoring and testing their systems, IT professionals in the UK can create a strong defence against a wide range of cyber threats.

Are you on the hunt for Anti-Virus solutions for your organisation? The Cyber Secure Forum can help!

Photo by Sigmund on Unsplash

How businesses can protect their most valuable asset this Data Privacy Day and beyond

960 640 Stuart O'Brien

With last weekend marking the 18th Data Privacy Day, we sat down with some of the industry’s experts to find out more about why this event is still so important and how organisations can get one step ahead when it comes to protecting their increasingly precious data. Here’s what they had to say…

Samir Desai, Vice President at GTT  

“This year’s Data Privacy Day provides us with yet another reminder of just how important it is for businesses to protect their most valuable asset. However, this is something that, unfortunately, has also never been more difficult.  

“The rapid adoption of cloud computing, IoT/IIoT, mobile devices and remote work has increased both the size and complexity of the networking landscape and cybercriminals are taking advantage of this. Alongside common threats – such as phishing – businesses today must defend against a whole new host of potential risks, such as how generative AI can potentially super-charge phishing attempts by making it easier and faster for bad actors to craft convincing content.  

“To ensure data security for cloud-based apps while still providing reliable connectivity for hybrid workplaces and remote workers, the modern enterprise needs to invest in the right solutions. This may require further collaboration with managed security and service partners to identify and implement the right technologies to protect the ever-expanding perimeter. 

“For example, a Zero-trust networking approach which also combines network security and software-defined connectivity  into a single cloud-based service experience, could be transformative. It’s ‘always-on’ security capabilities means that data is protected, regardless of where resources or end-users reside across the enterprise environment.” 

Ajay Bhatia, Global VP & GM of Data Compliance and Governance, Veritas

“Ironically, Data Privacy Day is a reminder that data privacy isn’t something a business can achieve in a single day at all. Far from that, it’s a continual process that requires vigilance 24/7/365. Top of mind this year is the impact artificial intelligence (AI) is having on data privacy. AI-powered data management can help improve data privacy and associated regulatory compliance, yet bad actors are using generative AI (GenAI) to create more sophisticated attacks. GenAI is also making employees more efficient, but it needs guardrails to help prevent accidentally leaking sensitive information. Considering these and other developments, data privacy in 2024 is more important than ever.” 

Martin Hodgson, Director Northern Europe at Paessler AG

“As our reliance on data continues to grow, protecting it and ensuring the only those who we trust have access to it has never been more important.  

 “Many businesses assume their IT infrastructure is sufficiently protected by a reliable firewall and an up-to-date virus scanner. However, cyber criminals are continually developing more sophisticated methods of accessing company systems and getting hold of sensitive data. Some of these methods – such as trojans – will often only be recognised when it’s already too late.  

“In order to get ahead and avoid the financial and reputational losses associated with such attacks, businesses need to invest in comprehensive security approaches which protect the entire infrastructure. Realtime IT Documentation alongside a network monitoring system – which enables a business to keep track of all devices and systems, regardless of location – can help to spot the early warnings signs of an attack and enable business to get on the front foot when it comes to protecting their increasingly valuable data.”   

Mike Loukides, Vice President of Emerging Tech at O’Reilly:

“How do you protect your data from AI? After all, people type all sorts of things into their ChatGPT prompts. What happens after they hit “send”? 

“It’s very hard to say. While criminals haven’t yet taken a significant interest in stealing data through AI, the important word is “yet.” Cybercriminals have certainly noticed that AI is becoming more and more entrenched in our corporate landscapes. AI models have huge vulnerabilities, and those vulnerabilities are very difficult (perhaps impossible) to fix. If you upload your business plan or your company financials to ChatGPT to work on a report, is there a chance that they will “escape” to a hostile attacker? Unfortunately, yes. That chance isn’t large, but it’s not zero. 

“So here are a few quick guidelines to be safe: 

  • Read the fine print of your AI provider’s policies. OpenAI claims that they will not use enterprise customers’ data to train their models. That doesn’t protect you from hostile attacks that might leak your data, but it’s a big step forward. Other providers will eventually be forced to offer similar protections.
  • Don’t say anything to an AI that you wouldn’t want leaked. In the early days of the Internet, we said “don’t say anything online that you wouldn’t say in public.” That rule still applies on the Web, and it definitely applies to AI.
  • Understand that there are alternatives to the big AI-as-a-service providers (OpenAI, Microsoft, Google, and a few others). It’s possible to run several open source models entirely on your laptop; no cloud, no Internet required once you’ve downloaded the software. The performance of these models isn’t quite the equal of the latest GPT, but it’s impressive. Llamafile is the easiest way to run a model locally. Give it a try

“I’m not suggesting that anyone refrain from using AI. So far, the chances of your private data escaping are small. But it is a risk. Understand the risk, and act accordingly.” 

Attila Török, Chief Security Officer at GoTo:

“As new ways of working and engaging with tech continue to expand the vulnerability landscape and create new pathways for hackers, you’d be hard-pressed to find an IT leader whose number one concern wasn’t cybersecurity. 

 “Bolstering cyber hygiene to stave off threats and protect sensitive data is a top agenda item, especially in a working world where hybrid, dispersed and remote-centric teams are commonplace. In “2024 businesses should be firing on all cylinders to scale up employee security, utilise zero trust products, continue to enforce a strong acceptable use policy (AUP), and move toward passwordless authentication. These are simple yet powerful ways we can improve and modernise current practices to ensure that cyber threats can’t breach company systems. 

“Cybersecurity is a top priority for all businesses—small and large. CTOs, working with CISOs, are responsible for protecting their business, customers, and employees from cyberattacks and data breaches. In 2024, CTOs must continue implementing robust security measures and invest in new cybersecurity technologies, including zero-trust architectures (ZTAs).”

Keiron Holyome, VP UKI and Emerging markets, BlackBerry Cybersecurity 

“AI continues to be a game-changer in data privacy and protection for businesses as well as individuals. We have entered a phase where AI opens a powerful new armoury for those seeking to defend data. When trained to predict and protect, it is cybersecurity’s most commanding advantage. But it also equips those with malicious intent. Its large scale data collection in generative business and consumer applications raises valid concerns for data and communication privacy and protection that users need to be alert to and mitigate.

“A big question at the moment is how legislation can be pervasive enough to offer peace of mind and protection against the growing generative AI threats against data privacy, while not hindering those with responsibility for keeping data safe. BlackBerry’s research found that 92% of IT professionals believe governments have a responsibility to regulate advanced technologies, such as ChatGPT…though many will acknowledge that even the most watertight legislation can’t change reality. That is, as the maturity of AI technologies and the hackers’ experience of putting it to work progress, it will get more and more difficult for organisations and institutions to raise their defences without using AI in their protective strategies.”

Photo by Jason Dent on Unsplash

Cyber Secure Forum: New name, same great concept

960 640 Stuart O'Brien

The Cyber Secure Forum, formerly known as the Security IT Summit, is specifically designed to help you build business relationships directly with pre-qualified, security buyers, via your own bespoke itinerary of 1-2-1 meetings.

All buyers attending will be looking for new suppliers for their upcoming plans and projects.

25th June 2024

Hilton London Canary Wharf

Our Event Partner Packages offer a range of benefits, including:

  • Access to pre-qualified senior delegates with active budgets
  • An itinerary of pre-scheduled 1-2-1 meetings
  • Fully furnished meeting stand (including furniture, lighting and electrics)
  • Networking opportunities throughout the event
  • Food and beverages throughout the event
  • Logo branding at event registration stand
  • Logo branding in the digital Event Guide
  • Social media promotion

Request Full Event Supplier Info

If you have any questions then you can contact Courtney Saggers here.

Access Control

If you specialise in Access Control for IT systems we want to hear from you!

960 640 Stuart O'Brien

Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in February we’re focussing on Access Control solutions.

It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today.

So, if you’re an Access Control solutions specialist and would like to be included as part of this exciting new shop window, we’d love to hear from you – for more info, contact Jenny Lane on j.lane@forumevents.co.uk.

Here’s our full features list:

Feb 2024 – Access Control
Mar 2024 – Intrusion Detection & Prevention
Apr 2024 – Phishing Detection
May 2024 – Advanced Threat Dashboard
Jun 2024 – Browser/Web Security
July 2024 – Authentication
Aug 2024 – Penetration Testing
Sep 2024 – Vulnerability Management
Oct 2024 – Employee Security Awareness
Nov 2024 – Malware
Dec 2024 – Network Security Management
Jan 2025 – Anti Virus