teissAwards2025
The teissAwards2025 recognise excellence in cyber and information security, with a particular focus on the contributions of vendors and technologies in relation to the use, development, and deployment of information security in the past 12 months.
The categories within the teissAwards2025 are assessed by an independent panel of distinguished judges, and the winners will be announced at the teissAwards2025 gala dinner, held on the 27th February 2025.
The teissAwards2025 are part of a broader portfolio of information security events, which have taken place over the last decade, and represents the largest and most comprehensive cyber security gathering of experts in Europe
Judging Information
For more information about the teissAwards2025, please get in touch with us on awards@teiss.co.uk
Key Dates
Here are all the key dates you need to know for the teissAwards2025!
1st July 2024 - Submissions open
August 2024 - Table Sales open
1st December 2024 - Submissions close
9th December 2024 - Shortlist announced
5th January 2025 - Judging Round 1 completed
24th January 2025 - Judging round 2 completed
27th February 2025 - teissAwards2025 winners announced!
Round 2 Judging Criteria
Round 2 Guidelines
Recordings must be no longer than 3 minutes. Each category will be scored within the guidelines below:
Awards Categories
- Best Security Compliance Product
- Cyber-Security New Launch Product of the Year
- Cyber Start-up Company of the Year
- Cyber-security Evangelist of the Year
- Best Ransomware Protection Solution
- Best Network Security Solution
- Best Zero Trust Security Solution
- Best Security Operations Automation Solution
- Cyber-Security Company of the Year (Enterprise)
- Cyber-Security Company of the Year (Small and Medium-sized Enterprises)
- Cyber-Security Marketing Team of the Year
Categories
Best Cloud Security Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Email Security Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Incident Response Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Endpoint Protection Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Mobile Security Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best AI and ML Security Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Threat Intelligence Technology
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Vulnerability Management Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Cyber-Security Training and Awareness Product or Service
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Penetration Testing Product or Service
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best IoT Security Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Security Compliance Product
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Cyber-Security New Launch Product of the Year
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Cyber Start-up Company of the Year
Innovation and Vision
How innovative is the company's approach to cyber-security? Do you have a clear and compelling vision for the future of the industry?
Market Impact
How significant is the company's impact on the cyber-security market? Have you disrupted the industry or addressed a specific market need?
Customer Satisfaction
How satisfied are the company's customers? Does it have a strong reputation for customer service and support?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Cyber-Security Evangelist of the Year
Impact and Influence
How significant is the individual's impact on the cybersecurity community? Have they raised awareness of important cyber-security issues?
Community Engagement
How actively does the individual engage with the cybersecurity community? Do they participate in conferences, meetups, and online forums?
Inspiration and Motivation
How inspiring and motivating is the individual? Do they inspire others to pursue careers in cyber-security?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Ransomware Protection Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Network Security Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Zero Trust Security Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Best Security Operations Automation Solution
Innovation and Uniqueness
How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?
Technical Feasibility and Security
Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?
Product Performance
Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Cyber-Security Company of the Year (Enterprise)
Innovation and Product Development
How innovative is the company's product development process? Does it consistently deliver innovative and effective solutions?
Market Leadership
How strong is the company's market position? Is it a leader in its industry?
Customer Satisfaction
How satisfied are the company's customers? Does it have a strong reputation for customer service and support?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Cyber-Security Company of the Year (Small and Medium-sized Enterprises)
Innovation and Product Development
How innovative is the company's product development process? Does it consistently deliver innovative and effective solutions?
Market Leadership
How strong is the company's market position? Is it a leader in its industry?
Customer Satisfaction
How satisfied are the company's customers? Does it have a strong reputation for customer service and support?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Cyber-Security Marketing Team of the Year
Innovation and Creativity
How creative and innovative is the team's marketing approach? Do they use cutting-edge marketing techniques?
Campaign Effectiveness
How effective are the team's marketing campaigns? Do they generate leads, drive revenue, and build brand awareness?
Customer Engagement
How effectively does the team engage with customers? Do they build strong relationships with customers?
Presentation and Communication Skills
Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?
Categories
The teissAwards2025 has 22 categories that celebrate the achievement of cyber security vendors over the last 12 months. Please see our shortlisted organisations below:
Awards Categories
Select a category to learn more about it, and find instructions on how to enter.
- Best Security Compliance Product
- Cyber-Security New Launch Product of the Year
- Cyber Start-up Company of the Year
- Cyber-security Evangelist of the Year
- Best Ransomware Protection Solution
- Best Network Security Solution
- Best Zero Trust Security Solution
- Best Security Operations Automation Solution
- Cyber-Security Company of the Year (Enterprise)
- Cyber-Security Company of the Year (Small and Medium-sized Enterprises)
- Cyber-Security Marketing Team of the Year
Categories
Best Email Security Solution
The entrant must be an email security vendor who offers a solution that safeguards the privacy of email messages by filtering against spam, malware and other malicious emails, while providing integrated protection against sophisticated email attacks.
Shortlist:
- Proofpoint
- VIPRE
- Abnormal Security
- Zivver
- Censornet
- Trellix
Best Incident Response Solution
The entrant must be an incident response provider with a service or software that provides users with the tools to identify and respond to security breaches, as well as reporting and analysing incident data.
Shortlist:
- NormCyber
- Solis
- Performanta
- CSIS
- Pentest People
- Secureworks
- DigitalXRAID
Best Threat Intelligence Technology
The entrant must be a threat intelligence technology supplier whose solution or product provides organisations with timely intelligence on the latest cyber-threats affecting their IT infrastructure, as well as techniques to combat these threats.
Shortlist:
- CloudSek
- Jamf
- Performanta
- Devoteam
- ESET
- Gatewatcher
- Netscout
- Silobreaker
- Armis
- SecAlliance
- Intel 471
Best Vulnerability Management Solution
The entrant must be a vulnerability management provider whose solution helps organisations identify and manage vulnerabilities associated with system configurations, patches and other information security challenges.
Shortlist:
- WithSecure
- ManageEngine
- ESET
- Armis
- Hackuity
- Secureworks
- ACDS
Best Cyber-Security Training and Awareness Product or Service
The entrant must be a security awareness training specialist offering ready-to-use security training and awareness campaigns to better equip organisations against real-world cyber-threats.
Shortlist:
- CyberGuardian
- Layer 8
- KnowBe4
- Immersive Labs
- Culture Gem
- Bob's Business
- SoSafe
- MetaCompliance
Best Penetration Testing Product or Service
The entrant must be a penetration testing services provider or software vendor that helps organisations detect exploitable vulnerabilities within their IT systems, networks and applications through simulated cyber-attacks.
Shortlist:
- Pentest People
- LRQA
- Pentera
- DigitalXRAID
Best Security Compliance Product
The entrant must be a security compliance vendor whose product enables organisations to manage their security processes, systems and policies to identify areas of compliance and non-compliance.
Shortlist:
- SureCloud
- Obrela
- C2 Risk Ltd
- Proofpoint
- ManageEngine
- Delinea
- ISMS.online
- Scytale
- DigitalXRAID
Cyber-Security New Launch Product of the Year
The entrant must be a security vendor with a new product or service focused on protecting organisations’ networks, systems and applications from threats. The product or service must have been launched after 1 July 2023.
Shortlist:
- SureCloud
- Solis
- WithSecure
- SentinelOne
- Devoteam
- ESET
- Yubico
- ProcessUnity
- Gigamon
- Panaseer
- Quest
- ACDS
Best Security Operations Automation Solution
The entrant must be an organisation who leverages a programmatic security automation solution to detect threats, analyse, group and prioritise alerts to accelerate investigation, and enforces pre-defined actions to contain and remediate issues.
Shortlist:
- Blackberry
- ComCast India
Cyber-Security Company of the Year (Enterprise)
Entrant must be a cyber-security company with a demonstrable history of offering enterprise-level innovative and comprehensive cyber-security solutions with a significant growth in adoption, client base or product/service effectiveness over the past 12 months
Shortlist:
- Cato Networks
- Obsidian
- SentinelOne
- KnowBe4
- ESET
- Netscout
- Yubico
- SQR
- Immersive Labs
- Armis
- Black Duck
Cyber-Security Company of the Year (Small and Medium-sized Enterprises)
Entrant must be a cyber-security company with a demonstrable history of offering innovative and comprehensive cyber-security solutions for small and medium-sized enterprises (SMEs) with a significant growth in adoption, client base or product/service effectiveness over 12 months
Shortlist:
- Solis
- Obrela
- CyberSmart
- C2 Risk Ltd
- Quod Orbis
- Performanta
- ThreatLocker
- LRQA
- ESET
- Pentest People
- Secureworks
- Censornet
- DigitalXRAID
Judges
Our judges are industry-renowned experts in their field. Each brings their expertise to bear to judge the teissAwards2025.
Judges
Thom Langford
Founder, (TL)2 Security
Thom is an industry engaged and sought after information security subject matter expert, speaker, and award-winning security blogger. He is the sole founder of Host Unknown, a loose collective of three infosec luminaries combined to make security education and infotainment films.
Lisa Ventura
Editor & Founder, Cyber Security Unity
Lisa is a keynote speaker, moderator and panellist, and has taken part in numerous conferences and events, both in-person and virtual. She is often asked to write articles, blogs and press features about cyber security, neurodiversity, mental health issues and more.
Danny Dresner
Professor of Cyber Security, University of Manchester
Danny is a respectable Professor of Cyber Security at the University of Manchester and a Fellow of the Institute of Information Security Professionals. Whilst at the NCSC, he created the core of SANS' training for BS 7799, edited national security breaches surveys, and wrote the first standards for source code escrow. He has contributed to books, conferences, and appeared on numerous TV channels including the BBC.
Steve Furnell
Professor of Cyber Security, University of Nottingham
Steven is a Professor of Cyber Security at the University of Nottingham. His main research interests are broadly linked to the intersection of human, technological and organisational aspects of cyber security, and has authored over 330 papers in refereed international journals and conference proceedings, as well as various books, chapters, and professional articles.
Edd Hardy
SVP Cyber Security, AlixPartners
Edd is a highly experienced consultant assisting organisations, investors and C-suite to manage cyber risk and foster growth. Some of his previous roles include a pentester, ISO27001 Auditor, QSA, Risk Analyst, and advisor.
Andrea Cullen
CEO & Co-Founder, CAPSLOCK
Andrea has years of industrial experience as a computer programmer and systems analyst working on projects throughout the UK where she has been responsible for the development and implementation of many software systems. She co-authored, developed, and delivered the GCHQ-certified Cyber Security Master’s degree at the University of Bradford, and is also the Co-founder and Head of Research & Development at CAPSLOCK.
Paul Watts
Distinguished Analyst, Information Security Forum
Paul is a senior Information Security and Technology professional with over twenty-six years’ experience covering vertical markets including Transportation, Banking and Finance, Manufacturing, Retail and Telecommunications both in Europe and the UK. He was named as one of the top 100 global CISOs in the HotTopics.ht “CISO 100 2017” in 2017 and 2020.
David Cartwright
CISO, Santander International
Dave has been based in Jersey since 2009, and is presently head of IT security for an international bank. He is the co-founder and chairman of the Jersey Charitable Skills Pool; deputy chairman of the Channel Islands Information Security Forum; a committee member of the Jersey branch of the BCS; and the Digital Committee of the Jersey Chamber of Commerce.
Ed Tucker
CyberSecurity CTO, Telefonica Tech
Ed is a recognised expert, with a rich history of creating high performance teams, world class capabilities, driving business resilience and confidence. He is a pragmatic, yet passionate individual with a demonstrable record of defining and executing transformational change into businesses of varying maturities.
Keil Hubert
Associate Principal, Security Human Risk Management, OCC
Keil Hubert is the head of Security Training and Awareness for OCC, the world’s largest equity derivatives clearing organization, headquartered in Chicago, Illinois. Prior to joining OCC, Keil has been a U.S. Army medical IT officer, a U.S.A.F. Cyberspace Operations officer, a small businessman, an author, and several different variations of commercial sector IT consultant. Keil deconstructed a cybersecurity breach in his presentation at TEISS 2014, and has served as Business Reporter’s resident U.S. ‘blogger since 2012. His books on applied leadership, business culture, and talent management are available on Amazon.com. Keil is based out of Dallas, Texas.
Daniela Almeida Lourenço
Chief Information Security Officer, Tinka
Jonathan Craven
Global Privacy Operations Lead, iRhythm Technologies Ltd
Paul Holland
Head of Information Security Research, Information Security Forum (ISF)
Tiago Rosado
Chief Information Security Officer, Asite
He has a holistic perspective on security, always as vendor-agnostic as possible aiming to achieve a highly secure environment that would be, by default, compliant with any known standard and/or frameworks - NIST, PCI-DSS, ISO 27001, HIPAA, UK Cyber Essentials, OWASP, Cloud Security Alliance, CIS, MITRE ATT&CK and others.
Dom Lucas
Head of Security, British International Investment
Cameron Brown
Director, Cyber Security, Deloitte UK
Stuart Frost
Head of Enterprise Security and Risk Management Department for Work and Pensions (DWP)
Stuart has won multiple industry global awards for his work in the GRC space and is adept at integrating all security disciplines to enable a holistic approach in support of business objectives. He was named as one of the UK’s top 50 Tech Leaders and a top 30 Transformational Change Leader in May 2024 for his role in driving innovation and change across the security sector.
He was awarded the British Empire Medal (BEM) in 2017 for his services to the local community and in 2023 was also the proud recipient of the Coronation medal in recognition of his security input to the Coronation of King Charles III.
Don Baham
Chief Information Security Officer, Germantown Technologies
Don has earned a Bachelor of Science degree from Western Governors University and several industry certifications including Digital Directors Network Qualified Technology Expert (QTE), EC-Council Certified Chief Information Security Officer (CCISO), ISC2 Certified Information Systems Security Professional (CISSP), and ISACA Certified Information Systems Auditor (CISA).
Garrett Smiley
Vice President of Digital Infrastructure and Technology Strategy / Chief of Staff to CDIO, Maximus
Organizational leader with expertise in developing and leading highly engaged teams across the U.S., Canada, U.K., EMEA, and ASPAC. Effective collaborator, adept in establishing and cultivating rapport, confidence, and trust with Board members, senior executives, business units, customers, vendors, and colleagues.
Serves as an industry thought leader, well-connected across public and private sectors, and offering insights through publications, presentations, and programs of instruction to the community. Client-facing strategist, expertly skilled in pursuing, implementing, and integrating leading-edge technologies and solutions to proactively position ironclad global protection programs against criminal activity.
Chuck Brooks
Adjunct Professor, Georgetown University
Chuck Brooks serves as President of Brooks Consulting International. He also serves as an Adjunct Professor at Georgetown University, teaching graduate courses on risk management, and cybersecurity.
Chuck was named “Top 5 Tech Person to Follow" by LinkedIn” where he has almost 118,000 followers on his profile.he also owns and manages 10 LinkedIn security oriented groups.As a thought leader, blogger, and event speaker, he has briefed the G20 on energy cybersecurity, the US Embassy to the Holy See and Vatican on global cybersecurity cooperation. He has served on two National Academy of Science Advisory groups, including one on digitalizing the USAF, and another on securing BioTech. He has also addressed USTRANSCOM on cybersecurity and serves on an industry/government Working group for CISA focused on security space systems.
Chuck's is also a contributor to Forbes, The Washington Post, Dark Reading, Homeland Security Today, Security Information Skytop Media, GovCon, Barrons, The Hill, and Federal Times on cybersecurity and emerging technology topics. He has 57,000 subscribers to his newsletter "Security and Tech Insights." He is also the author of two books on cybersecurity and tech coming out this year.
Chuck has received presidential appointments for executive service by two U.S. Presidents, and served in executive leadership roles at public companies General Dynamics, Xerox, and Rapiscan.
He has an MA from the University of Chicago, a BA from DePauw University, and a certificate in International Law from The Hague Academy of International Law.
Matt Hardy
SVP Cyber Security, AlixPartners
Matt is a results driven IS/Cyber Security Executive with 20+ years of experience in security, compliance and technology roles in a variety of sectors such as Telecommunications, healthcare, Fast Moving goods, Bank and finance , including more than eight years in the capacity as CISO. Working with the mantra of building security in by design, ensure security is business benefit with a good Return on investment.
Adept at managing Governance, Risk, and Controls, orchestrating all facets of Resilience & Third-party risk management, and managing Cyber Security risks in all levels of the business functions.
I am only as good as the teams I lead, so I take time to train, coach, and mentor each person for career growth and success, As a result, can create an environment of cohesion with optimal performance.
Edewede Oriwoh
Group IT Information and Cyber Security Manager, Zigup Plc
Edewede has worked in various areas of Information and Cyber Security including in Data, Identity and Access Management, Asset, Cloud, Vulnerability Management, Cyberphysical, Security Awareness, Threat Hunting and Threat Intelligence, Incident Management and Disaster Recovery, among others. She has a keen interest in Proactive, Continuous, Responsive and Reactive Security.
She encourages the support of end users with security awareness guidance, well-configured and managed tools as well as clear Policies, Processes and Procedures so they can play their part as an essential link in any organisation's Cyber Security chain.
She also promotes the importance of remembering the fundamentals such as making security a habit and, more broadly, remembering that, "If it does not exist, there's nothing to secure".
Ceremony & Tables
Special Early Bird sale now on, save 10% on tables
Offer expires 17:00 (UK time) on Friday 20th December 2024.
Reserve VIP Table | Reserve Standard Table | Reserve Individual Seat |
Our Host
FAQ
Find a list of our most frequently asked questions below. Got a question that isn’t on this list? Drop us a line at awards@teiss.co.uk and we’ll get right back to you.
When does Judging Round 2 take place, and what do I need to do for it?
Judging Round 2 will take place in the week of Monday 20thJanuary. For this, shortlisted companies will need to have provided a 3 min recording for this entryfor the Judges to review and score.
For full guidance on what to include in the 3 min recording, please visit and navigate to thesection for this category in the Round 2 Judging Criteria tab.www.teiss.co.uk/events/teissawards2025?tab=round-2-judging-criteria
How are the awards organised?
There are 22 Categories within the teissAwards2025, all focused on recognising excellence amongst the information security vendor market.
Who is eligible?
The teissAwards2025 are open to all information security product, service and training providers. Each Category has defined eligibility criteria and guidance on who should apply.
How can we enter?
For each Category, there are a set of questions you must answer in order to make your submission. Your organisation is allowed to enter as many categories as are applicable to you.
Where do we enter?
You can email your completed submission form and supporting documents to awards@teiss.co.uk
Who decides if we’ve won?
A select panel of industry experts make up our judging panel. Their details can be seen on the following pages. They will score all submitted entries that are shortlisted.
How much does it cost to enter?
Entry is free.
What are the deadlines for entry?
1st July 2024 - Submissions open
August 2024 - Table Sales open
1st December 2024 - Submissions close
25th November 2024 - Shortlist announced
31st December 2024 - Judging Round 1 completed
24th January 2025 - Judging round 2 completed
27th February 2025 - teissAwards2025 winners announced!
Contact
To find out more about teissAwards2025, please contact:
Submissions Manager:
Joseph Yiadom | awards@teiss.co.uk
Sponsorship Sales Manager:
Marc Morrow | T: +44 (0)20 8349 6453 | M: +44 (0)7977 926736
Sponsorship Sales Manager:
Grant Scheffer | T: +44 (0)20 8349 6478 | M: +44 (0)7811010102
Sponsorship Sales Manager:
Jean-Philippe Le Coq | T: +44 (0)20 8349 5592 | M: +44(0)7494 705170
Previous Winners
In preparation for the teissAwards2025, discover below our current teissAwards champions:
Best Cloud Security Solution
Winner: Wiz
Runner Up: Comforte AG
Best Email Security Solution
Winner: Censornet
Runner Up: Cofense
Best Incident Response Solution
Winner: Exabeam
Best Endpoint Protection Solution
Winner: Threatlocker
Runners Up: WithSecure & NinjaOne
Best Third-Party Risk Management Solution
Winner: Panorays
Best AI and ML Security Solution
Winner: Exabean
Runner Up: Fortra
Best Threat Intelligence Technology
Winner: Blackfog
Best Vulnerability Management Solution
Winner: Runecast Solutions
Runner Up: Heimdal Security
Best Cyber Security Training and Awareness Product or Service
Winner: ThinkCyber
Runners Up: Culture AI, KnowBe4 & MetaCompliance
Best Penetration Testing Product or Service
Winner: LRQA Nettitude
Runner Up: PenTest People
Best Security Compliance Product
Winner: Runecast Solutions
Runner Up: CyberSmart
Cyber Security New Launch Product of the Year
Winner: Keeper Security
Runner Up: Yubico
Cyber Security Company of the Year
Winner: Immersive Labs
Runners Up: NormCyber & Kyndryl
Cyber Security Vendors’ Personality of the Year
Winner: Sam Humphries, Exabeam