Find everything you need to know about Digital Transformation

Supplier Directory

  • Contributor
    Aujas

    View Profile

    We are a Global Information Risk Management company. We help manage information security risks by protecting data, software, people & identities, in-line with compliance requirements and best practices; we also help strengthen security governance and intelligence frameworks. Find out more about Aujas

  • Contributor
    Corix Partners

    View Profile

    Corix Partners is a Boutique Management Consultancy Firm, focused on assisting CIOs and other C-level executives in resolving Cyber Security Strategy, Organisation & Governance challenges. UK-based, and established since December 2008, we are Transformation Experts in the Security field with a sole focus on Strategy, Organisation & Governance. Find out more about Corix Partners

  • Contributor
    CREST

    View Profile

    CREST is a not-for-profit accreditation body that represents the technical information security industry. As part of this, CREST provides internationally recognised certifications for organisations and individuals providing penetration testing, cyber incident response, cyber threat intelligence and security architecture services. Find out more about CREST

  • Contributor
    Cyber Brokers

    View Profile

    Cyber Insurance CyberBrokers.co.uk is a specialist website to help understand this emerging form of insurance which is now gaining a much higher profile being relevant to both the consumer and businesses.

  • Contributor
    Cyber Safety Harbor

    View Profile

    Privacy is a basic right. Cyber Safety Harbor’s mission is to protect that right. Our CyberID and Active Access Control technology will prevent access to any activity monitoring or data mining. All CyberID Communities are completely closed to outside influences. The Active Access Control environment is always pristine, private and secure.

  • Contributor
    Cyber Security Capital (CS^)

    View Profile

    Providing innovative ways to serve the cyber security market

  • Contributor
    Fidelis Cybersecurity

    View Profile

    From automatically correlated telemetry to automatic threat and compromise validation to automated response, Fidelis ADR protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyberattacks.

  • Contributor
    Global Institute for IT Management (GIIM)

    View Profile

    The objective of the Global Institute for IT Management (GIIM) is to impart a complete, flexible, and immediately actionable set of best practices by an international group of over 250 prominent academics, practitioners, and management consultants, to prepare IT thought leaders and business executives for the challenges and opportunities that lie ahead. The institute provides a comprehensive set of 32 IT management certificates (over 130 courses), with each frequently considered as being the single most important educational experience in the attendees’ professional life. Find out more about Global Institute for IT Management (GIIM)