Supplier Directory

  • Cognosec

    View Profile

    Cyber resilience is our business We PROVIDE specialist products and professional services that help organizations reduce cyber risks and become resilient to attacks We ASSESS organizations’ processes, procedures and systems for non-compliance and vulnerabilities, including the supply chain We IDENTIFY and EVALUATE risks across the three core organizational dimensions of technology, processes and people, and across the supply chain We ASSESS, DESIGN, IMPLEMENT and MANAGE solutions that protect critical IT infrastructure and data assets We OPERATE across the public and private sectors in Europe, the Middle East and Africa We ARE a NASDAQ-listed, agile EMEA company, capable of responding quickly to rapid changes

  • Column Technologies

    View Profile

    Column Technologies is a global technology and software provider specializing in business service and process management for public and commercial markets. Column’s success comes from long-term relationships, aligning goals with its customers, and a collaborative approach that integrates people, process, technology, and support. Find out more about Column Technologies

  • Commissum

    View Profile

    Commissum provide expert independent information security & consulting services to commercial & government organisations.

  • Condatis

    View Profile

    Condatis focuses on building new solutions and integrating existing solutions and infrastructure in the Azure environment.

  • Context Information Security

    View Profile

    Context Information Security is a cyber security consultancy, specialising in assurance, incident response & investigations, and technical security research.

  • Control Risks Group Limited

    View Profile

    Control Risks Group Government Services, Inc. provides consulting services. Find out more about Control Risks Group Limited

  • Cronus Cyber Technologies

    View Profile

    Cronus Cyber Technologies is a global provider of Automated Penetration Testing solutions called CyBot. CyBot provides a live map of validated Attack Path Scenarios on a global scale so you can efficiently focus on the vulnerabilities that threaten your core business process. Find out more about Cronus Cyber Technologies

  • CS Risk Management and Compliance Ltd

    View Profile

    With experience in multiple sectors we have the comprehensive knowledge of business processes and IT systems crucial to ensuring compliance with standards and legislation, such as the Data Protection Act, PCI Data Security Standards, ISO27001 and BS25999