Why Visit

CCSE

Stop them surfacing.

We’re living in a world where bespoke technology solutions rely on multi-cloud environments. A world of billions of interconnected devices. A world of total reliance on data. Which means a world of increased cyber crime and security breaches.

You can’t afford to let predators surface anywhere in your business. You can’t afford to lose the trust of your customers. 

The UK’s largest cloud and cyber security event...

Cloud & Cyber Security Expo again leads the way in delivering a programme of solutions-focused content, case studies, speakers and a huge exhibition floor of providers. It’s the only place that gives you all you need to know to stay safe in a hostile digital space

Don’t get attacked. Get smart. Don’t get breached. Get to Cloud & Cyber Security Expo.

  • Discover over 700 of the world’s leading suppliers, including Sophos, IRM, Darktrace, Tresorit, McAfee... (to name just a few), delivering services and solutions critical to security.

 

  • Hear from over 200 experts speakers sharing insight and inspiration which include number 1 rated CIOs, acclaimed global security leaders, IT gurus from Sainsbury's, Aldermore Bank, Hastings Direct, Royal Mencap Society, the Office for National Statistics, Halfords...

 

  • And then there will be your colleagues, friends and peers – simply thousands of attendees, all in one place at one time.

They’re out to get you. But we’re here to help you.

Cloud & Cyber Security Expo immerses you in the world of digital protection. It’s quite simply the industry-leading event for digital-age guardianship. It’s where you’ll draw from the latest thinking, all the leading suppliers and pioneers and mingle with all the people who matter. Over 150 exhibitors, offering you the services and solutions you’re looking for. Thousands of hours of free content from over 200 expert speakers. And over 21,000 of your peers, offering you an invaluable time of networking and idea-sharing.

Who Attends

Who Attends

Cloud & Cyber Security Expo attracts key security professionals from the enterprise and cloud service providers coming from these specialised fields/positions:

  • Advanced Authentication and Single Sign-On
  • Auditing Professionals
  • Chief Information Security Consultants
  • CISO/CTO/Chief Information Security Officers
  • Compliance/Legal Officers
  • Computer Security Incident Responders
  • Disaster Recovery/Business Continuity
  • Enterprise Internet of Things
  • Enterprise Mobility Management
  • Finance/Purchasing
  • Governance Officers
  • Heads of IT Security
  • Information Security Assurance Analysts
  • Information Security Officers
  • IT Forensics/Computer Crime
  • IT Management
  • IT Security & Privacy
  • IT Security Engineers
  • IT Security Professionals
  • Legal Professionals

 

  • Network/Infrastructure Management 
  • Outsourcing and Systems Integrators
  • Pen Testers 
  • Principal Cyber Security Managers 
  • Principal Information Assurance Officers 
  • Regional Information Security Analysts 
  • Research & Product Development 
  • Risk Management 
  • Security Administrators 
  • Security Analysts 
  • Security Architects 
  • Security Consultant/Specialists 
  • Security Engineers 
  • Security Software Developers 
  • Security Systems Administrators 
  • Senior Information Security Assurance Consultant 
  • Senior Information Security Risk Officers 
  • Senior IT Security Consultants 
  • Senior IT Security Operations Specialist 
  • Systems Design/Software Engineering
  Security and Solutions

  Security and Solutions

Cloud & Cyber Security Expo is packed with the latest security solutions and services including: 

  • Application Security as a Service
  • Application Security Testing
  • Cloud Access Security Brokers
  • Cloud Encryption Gateways
  • Cloud Managed File Transfer Services
  • Cloud Management Platforms
  • Cloud Security Frameworks
  • Cloud Services Brokerage
  • Cloud Testing Tools and Services
  • Cloud-Based Recovery Services
  • Cloud-Based Security Services
  • Compliance
  • Content-Aware Data Loss Prevention
  • Control
  • Data Centre Storage Encryption
  • Email Encryption
  • Email Security Services
  • Encryption as a Service
  • Encryption technologies
  • Federated Identity Management
  • High-Assurance Hypervisors
  • High-Assurance Public Identity Providers
  • Hypervisor Security Protection
  • IaaS Container Encryption
  • IAM
  • IAM Managed and Hosted Services
  • IDaaS
  • Identity-Proofing Services
  • Mobile Device Management Services
  • OAuth
  • OpenID Connect
  • Persona Management
  • Phone-as-a-Token Authentication Methods
  • Private Cloud Computing
  • Secure Web Gateways
  • Security Intelligence Engines
  • SIEM as a Service
  • Tokenisation
  • Virtual Data Rooms
  • Virtual Machine Recovery
  • Virtual Machine Resilience
  • Vulnerability Assessment Services
  • Web Application Firewall as a Service
  • Web Security Services
  • Website protection (Fraud, DOS)

Latest News

  • 07-Apr-2020
    10:25

    Separating this pandemic from predecessors is that information technology is firmly on our side. In the absence of sport, Netflix is keeping families entertained. FaceTime or Zoom are connecting us safely from a distance while ordinary socialising presents a risk. And a plethora of cloud-based workplace tools are channelling business productivity from newly-distributed workforces.

    Nobody doubted our dependency on connectivity before coronavirus, but the degree to which the thread of the internet holding the fabric of society together during the crisis is striking. While restaurants, pubs, cinemas, cafes and more turned off their lights, data centres, network operations centres and internet exchanges geared up for an unprecedented rise in traffic. 

    The post Network strain: The risks and the reality appeared first on Techerati.

  • 07-Apr-2020
    09:43
    ManageEngine

    Tune in to this free webinar and learn about the right tools and techniques to oversee your organization's remote workforce, facilitate optimum productivity, maintain cyber hygiene, and ensure peace of mind for you and your IT team.

    The post Tips to create an effective remote access plan appeared first on Techerati.

  • 07-Apr-2020
    09:36

    The Covid-19 pandemic has led many companies to alter the way they conduct business, in many cases evolving to a new way of running operations. Some businesses have been fortunate where operating models have stayed in line with "Business as Usual". However, in most cases businesses have either had to adapt or evolve into a new operating model.

    Information security and cyber defence teams have a challenge ahead of them, they will not only have to run normal day-to-day operations but now must understand the new threat vectors that are being introduced that widen the threat landscape, and work to minimise cyber risk so businesses stay protected.

    The post Adopting a new operating model? Don’t leave your business exposed appeared first on Techerati.

Sponsors

Diamond Sponsor

  • Sophos

Headline Sponsor

  • IBM

Lead Sponsor

  • Oracle

Keynote sponsor

  • Eset
  • Menlo security

 

Theatre sponsors

  • IMSM
  • appcheck
  • Trend Micro
  • Manage engine
  • Crowdstrike
  • AppGate

 

Platinum Sponsor

  • Tresorit
  • Barracuda
  • CrowdStrike
  • cloudflare
  • KnowBe4

Stream Sponsors

  • BigID
  • Bitdefender
  • Sophos
  • Cloudflare
  • snyk

 

Stream Sponsors

  • IRM
  • McAfee
  • DarkTrace
  • Sophos

Gold Sponsors

  • Darktrace
  • Distology
  • Heficed
  • Egnyte
  • DivvyCloud
  • Whitesource
  • Exclusive Networks
  • vm ware- carbon black

Gold Sponsors

  • Esentire
  • TripWire
  • Wandera
  • IRM
  • NCC Group
  • SafeGuard Cyber

 

Silver Sponsors

  • Global SIgn
  • Code42
  • illumio
  • VeraCode
  • Locke & Mccloud

 

Silver Sponsors

  • Istorage
  • Neustar
  • Owl

 

Silver Sponsors

  • SOTI
  • cloudbric
  • PCYSYS
  • SentinelOne

 

Partners

Security Education Partner

  • ISC2

 

Event Partner

  • CyberSecurotyJobsite

 

Event Partner

  • Crest
  • tech HQ
  • cisco

 

Media Partner

  • CIO Applications
  • Jicara

 

Media Partner

  • CIO Net
  • Frontier Enterprise

 

Media Partner

  • Cyber Security Europe
  • Cyber Defense Magazine
  • Elite Business Magazine

 

Media Partner

  • Computing Security
  • Network computing
  • Storage magazine

 

Media Partner

  • CPO Magazine
  • Brilliance security magazine

 

Media Partner

  • UK Cyber Security Association
  • Digital agency network

 

Media Partner

  • Tech Target
  • Silicon

 

Media Partner

  • Start up city
  • Gigabit

 

Media Partner

  • Admin Magazine
  • DevOps Online

 

Media Partner

  • Alphr.com
  • Cloud pro

 

Media Partner

  • channel pro
  • IT Pro

 

TV Partner

  • disruptive live