7th November 2024
Hilton London Canary Wharf
24th June 2025
Hilton London Canary Wharf
Search
Close this search box.

REVEALED: The most in-demand cybersecurity solutions of 2024

Cyber Strategy, Data Protection and Access Control top the list of solutions the UK’s cybersecurity professionals are sourcing in 2024, according to our exclusive research. The findings have been revealed in the run up to the Cyber Secure Forum, which takes place on June 25th at the Hilton London Canary Wharf. Delegates registering to attend […]

2023’s most in-demand cyber security solutions revealed

Access Control, Vulnerability Management and Application Security top the list of solutions and services the UK’s leading IT security professionals are sourcing in 2023 and beyond. The findings have been revealed ahead of next month’s Security IT Summit and are based on delegate requirements at the upcoming event. Delegates registering to attend were asked which areas they […]

IT security solutions: 2022/23 buying trends revealed

Employee Security Awareness, Cyber Strategy and Access Control top the list of services the UK’s leading IT security professionals are sourcing in 2022/23. The findings have been revealed ahead of next month’s Security IT Summit and are based on delegate requirements at the upcoming event. Delegates registering to attend were asked which areas they needed to invest […]

IT security solutions: 2021 buying trends revealed

Security Analytics, Cloud Web Security and Access Control top the list of services the UK’s leading IT security professionals are sourcing in 2021. The findings have been revealed by the Security IT Summit and are based on delegate requirements at this summer’s recent event. Delegates registering to attend were asked which areas they needed to […]

Access Control & Advanced Threat Dashboards top 2020 buying trends

Access Control and Advanced Threat Dashboards top the list of services the UK’s leading IT security professionals are sourcing in 2020. The findings have been revealed by the Security IT Summit and are based on delegate requirements at this summer’s recent event. Delegates registering to attend were asked which areas they needed to invest in […]