ao link
Affino
Search Teiss
My Account
Remember Login
My Account
Remember Login

teissAwards2025

18:00 - 21:00
Convene 155 Bishopsgate, London

The teissAwards2025 recognise excellence in cyber and information security, with a particular focus on the contributions of vendors and technologies in relation to the use, development, and deployment of information security in the past 12 months.

 

The categories within the teissAwards2025 are assessed by an independent panel of distinguished judges, and the winners will be announced at the teissAwards2025 gala dinner, held on the 27th February 2025.

 

The teissAwards2025 are part of a broader portfolio of information security events, which have taken place over the last decade, and represents the largest and most comprehensive cyber security gathering of experts in Europe

Linked InTwitterFacebook

Judging Information

There are two Judging Rounds.
 
Judging Round 1 will take place in December 2024.  At least two judges will review and score the Submission for all shortlisted entries.
 
Judging Round 2 will take place in the week commencing 13th January 2025.  Each shortlisted entry will send a 3 minute recording to be scored by at least two judges.
 
The winners and runners up will be the entries with the highest combined score from both Judging Rounds.

For more information about the teissAwards2025, please get in touch with us on awards@teiss.co.uk

Key Dates

Here are all the key dates you need to know for the teissAwards2025! 

 

1st July 2024 - Submissions open

August 2024 - Table Sales open

1st December 2024 - Submissions close

9th December 2024 - Shortlist announced

5th January 2025 - Judging Round 1 completed

24th January 2025 - Judging round 2 completed

27th February 2025 - teissAwards2025 winners announced!

Round 2 Judging Criteria

Linked InTwitterFacebook

Round 2 Guidelines

Recordings must be no longer than 3 minutes. Each category will be scored within the guidelines below: 

Categories


Best Cloud Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Email Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Incident Response Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Endpoint Protection Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Mobile Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best AI and ML Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Threat Intelligence Technology

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Vulnerability Management Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Cyber-Security Training and Awareness Product or Service

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?

 


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Penetration Testing Product or Service

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best IoT Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Security Compliance Product

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber-Security New Launch Product of the Year

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber Start-up Company of the Year

Innovation and Vision

 

How innovative is the company's approach to cyber-security? Do you have a clear and compelling vision for the future of the industry?

 

Market Impact

 

How significant is the company's impact on the cyber-security market? Have you disrupted the industry or addressed a specific market need?


 

Customer Satisfaction

 

How satisfied are the company's customers? Does it have a strong reputation for customer service and support?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber-Security Evangelist of the Year

Impact and Influence

 

How significant is the individual's impact on the cybersecurity community? Have they raised awareness of important cyber-security issues?

 

Community Engagement

 

How actively does the individual engage with the cybersecurity community? Do they participate in conferences, meetups, and online forums?


 

Inspiration and Motivation

 

How inspiring and motivating is the individual? Do they inspire others to pursue careers in cyber-security?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Ransomware Protection Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Network Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Zero Trust Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?

 

 


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Security Operations Automation Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber-Security Company of the Year (Enterprise)

Innovation and Product Development

 

How innovative is the company's product development process? Does it consistently deliver innovative and effective solutions?

 

Market Leadership

 

How strong is the company's market position? Is it a leader in its industry?


 

Customer Satisfaction

 

How satisfied are the company's customers? Does it have a strong reputation for customer service and support?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber-Security Company of the Year (Small and Medium-sized Enterprises)

Innovation and Product Development

How innovative is the company's product development process? Does it consistently deliver innovative and effective solutions?

Market Leadership

How strong is the company's market position? Is it a leader in its industry?


 

Customer Satisfaction

 

How satisfied are the company's customers? Does it have a strong reputation for customer service and support? 

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber-Security Marketing Team of the Year

Innovation and Creativity

 

How creative and innovative is the team's marketing approach? Do they use cutting-edge marketing techniques?

 

Campaign Effectiveness

 

How effective are the team's marketing campaigns? Do they generate leads, drive revenue, and build brand awareness?


 

Customer Engagement

 

How effectively does the team engage with customers? Do they build strong relationships with customers?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?

Linked InTwitterFacebook

Categories

Linked InTwitterFacebook

The teissAwards2025 has 22 categories that celebrate the achievement of cyber security vendors over the last 12 months. Please see our shortlisted organisations below:

Categories


Best Cloud Security Solution

The entrant must be an organisation that offers a cloud security solution that mitigates risks associated with the protection of information and applications in the cloud environment.

 

Shortlist:

  • Hyve
  • Delinea
  • Uptycs
  • Wiz
  • Censornet

Best Email Security Solution

The entrant must be an email security vendor who offers a solution that safeguards the privacy of email messages by filtering against spam, malware and other malicious emails, while providing integrated protection against sophisticated email attacks.

 

Shortlist: 

  • Proofpoint
  • VIPRE
  • Abnormal Security
  • Zivver
  • Censornet
  • Trellix

Best Incident Response Solution

The entrant must be an incident response provider with a service or software that provides users with the tools to identify and respond to security breaches, as well as reporting and analysing incident data.

 

Shortlist: 

  • NormCyber
  • Solis
  • Performanta
  • CSIS
  • Pentest People
  • Secureworks
  • DigitalXRAID

Best Endpoint Protection Solution

The entrant must be a provider whose solution continuously analyses endpoints to detect and respond to potential threats in real time.

 

Shortlist:

  • Ivanti
  • Solis
  • WithSecure
  • Jamf
  • ESET
  • VIPRE
  • Quest
  • Blackberry
  • Secureworks

Best Mobile Security Solution

The entrant must be an organisation that offers a mobile security solution that mitigates cyber-risk and threats associated with the protection of corporate data and applications on mobile devices.

 

Shortlist:

  • Jamf
  • Yubico

Best AI and ML Security Solution

The entrant must have an existing or new AI- and ML-driven solution aimed at detecting, preventing or resolving current cyber-threats.

 

Shortlist:

  • CloudSek
  • Performanta
  • Devoteam
  • Gatewatcher
  • BlackFog
  • Abnormal Security
  • Blackberry

Best Threat Intelligence Technology

The entrant must be a threat intelligence technology supplier whose solution or product provides organisations with timely intelligence on the latest cyber-threats affecting their IT infrastructure, as well as techniques to combat these threats.

 

Shortlist:

  • CloudSek
  • Jamf
  • Performanta
  • Devoteam
  • ESET
  • Gatewatcher
  • Netscout
  • Silobreaker
  • Armis
  • SecAlliance
  • Intel 471

Best Vulnerability Management Solution

The entrant must be a vulnerability management provider whose solution helps organisations identify and manage vulnerabilities associated with system configurations, patches and other information security challenges.

 

Shortlist:

  • WithSecure
  • ManageEngine
  • ESET
  • Armis
  • Hackuity
  • Secureworks
  • ACDS

Best Cyber-Security Training and Awareness Product or Service

The entrant must be a security awareness training specialist offering ready-to-use security training and awareness campaigns to better equip organisations against real-world cyber-threats.

 

Shortlist:

  • CyberGuardian
  • Layer 8
  • KnowBe4
  • Immersive Labs
  • Culture Gem
  • Bob's Business
  • SoSafe
  • MetaCompliance

Best Penetration Testing Product or Service

The entrant must be a penetration testing services provider or software vendor that helps organisations detect exploitable vulnerabilities within their IT systems, networks and applications through simulated cyber-attacks.

 

Shortlist:

  • Pentest People
  • LRQA
  • Pentera
  • DigitalXRAID

Best IoT Security Solution

The entrant must be an organisation that offers an IoT security solution which protects IoT devices from unwanted access, manipulations and vulnerabilities resulting in data loss, software corruption or commands override.

 

Shortlist:

  • Claroty

Best Security Compliance Product

The entrant must be a security compliance vendor whose product enables organisations to manage their security processes, systems and policies to identify areas of compliance and non-compliance.

 

Shortlist:

  • SureCloud
  • Obrela
  • C2 Risk Ltd
  • Proofpoint
  • ManageEngine
  • Delinea
  • ISMS.online
  • Scytale
  • DigitalXRAID

Cyber-Security New Launch Product of the Year

The entrant must be a security vendor with a new product or service focused on protecting organisations’ networks, systems and applications from threats. The product or service must have been launched after 1 July 2023.

 

Shortlist:

  • SureCloud
  • Solis
  • WithSecure
  • SentinelOne
  • Devoteam
  • ESET
  • Yubico
  • ProcessUnity
  • Gigamon
  • Panaseer
  • Quest
  • ACDS

Cyber Start-up Company of the Year

A company less than three years old who wishes to gain credibility, build industry connections, and establish itself as a rising star.

 

Shortlist:

  • CloudSek
  • SQR
  • Gritera Security

Cyber-Security Evangelist of the Year

The entrant must be a security evangelist recognised by their peers and industry practitioners as facilitating change and transformation through storytelling that enable growth and evolution.

 

Shortlist:

  • The Cyber Safety Force
  • KnowBe4
  • ESET
  • Gritera Security

Best Ransomware Protection Solution

The entrant must be an organisation which offers a ransomware protection that assesses and mitigates ransomware risks while aiding enterprises’ understanding of their ransomware response capabilities.

 

Shortlist:

  • BlackFog
  • ThreatLocker
  • ExtraHop
  • DigitalXRAID

Best Network Security Solution

The entrant must be an organisation which offers a network security solution that defends all forms of information from cyber-attacks, unauthorised access and data loss.

 

Shortlist:

  • Cato Networks
  • ManageEngine
  • Gatewatcher
  • Netscout
  • ExtraHop

Best Zero Trust Security Solution

The entrant must be an organisation who leverages Zero Trust principles to help enterprises reduce their attack surface.

 

Shortlist:

  • ThreatLocker
  • Blackberry

Best Security Operations Automation Solution

The entrant must be an organisation who leverages a programmatic security automation solution to detect threats, analyse, group and prioritise alerts to accelerate investigation, and enforces pre-defined actions to contain and remediate issues.

 

Shortlist:

  • Blackberry
  • ComCast India

Cyber-Security Company of the Year (Enterprise)

Entrant must be a cyber-security company with a demonstrable history of offering enterprise-level innovative and comprehensive cyber-security solutions with a significant growth in adoption, client base or product/service effectiveness over the past 12 months

 

Shortlist:

  • Cato Networks
  • Obsidian
  • SentinelOne
  • KnowBe4
  • ESET
  • Netscout
  • Yubico
  • SQR
  • Immersive Labs
  • Armis
  • Black Duck

Cyber-Security Company of the Year (Small and Medium-sized Enterprises)

Entrant must be a cyber-security company with a demonstrable history of offering innovative and comprehensive cyber-security solutions for small and medium-sized enterprises (SMEs) with a significant growth in adoption, client base or product/service effectiveness over 12 months

 

Shortlist:

  • Solis
  • Obrela
  • CyberSmart
  • C2 Risk Ltd
  • Quod Orbis
  • Performanta
  • ThreatLocker
  • LRQA
  • ESET
  • Pentest People
  • Secureworks
  • Censornet
  • DigitalXRAID

Cyber-Security Marketing Team of the Year

The entrant must be a cyber-security marketing team who sells cyber-security products and services directly or through channel partners to drive business growth and revenue.

 

Shortlist:

  • Delinea
  • Black Duck
  • Panaseer
Linked InTwitterFacebook

Judges

Linked InTwitterFacebook

Our judges are industry-renowned experts in their field. Each brings their expertise to bear to judge the teissAwards2025. 

Judges

Thom Langford

Thom Langford

Founder, (TL)2 Security

 

Thom is an industry engaged and sought after information security subject matter expert, speaker, and award-winning security blogger. He is the sole founder of Host Unknown, a loose collective of three infosec luminaries combined to make security education and infotainment films.

Lisa Ventura

Lisa Ventura

Editor & Founder, Cyber Security Unity

 

Lisa is a keynote speaker, moderator and panellist, and has taken part in numerous conferences and events, both in-person and virtual. She is often asked to write articles, blogs and press features about cyber security, neurodiversity, mental health issues and more.

Danny Dresner

Danny Dresner

Professor of Cyber Security, University of Manchester

 

Danny is a respectable Professor of Cyber Security at the University of Manchester and a Fellow of the Institute of Information Security Professionals. Whilst at the NCSC, he created the core of SANS' training for BS 7799, edited national security breaches surveys, and wrote the first standards for source code escrow. He has contributed to books, conferences, and appeared on numerous TV channels including the BBC.

Steve Furnell

Steve Furnell

Professor of Cyber Security, University of Nottingham

 

Steven is a Professor of Cyber Security at the University of Nottingham. His main research interests are broadly linked to the intersection of human, technological and organisational aspects of cyber security, and has authored over 330 papers in refereed international journals and conference proceedings, as well as various books, chapters, and professional articles.

Edd Hardy

Edd Hardy

SVP Cyber Security, AlixPartners

 

Edd is a highly experienced consultant assisting organisations, investors and C-suite to manage cyber risk and foster growth. Some of his previous roles include a pentester, ISO27001 Auditor, QSA, Risk Analyst, and advisor.

Andrea Cullen

Andrea Cullen

CEO & Co-Founder, CAPSLOCK

 

Andrea has years of industrial experience as a  computer programmer and systems analyst working on projects throughout the UK where she has been responsible for the development and implementation of many software systems. She co-authored, developed, and delivered the GCHQ-certified Cyber Security Master’s degree at the University of Bradford, and is also the Co-founder and Head of Research & Development at CAPSLOCK. 

Paul Watts

Paul Watts

Distinguished Analyst, Information Security Forum

 

Paul is a senior Information Security and Technology professional with over twenty-six years’ experience covering vertical markets including Transportation, Banking and Finance, Manufacturing, Retail and Telecommunications both in Europe and the UK. He was named as one of the top 100 global CISOs in the HotTopics.ht “CISO 100 2017” in 2017 and 2020.

David Cartwright

David Cartwright

CISO, Santander International

 

Dave has been based in Jersey since 2009, and is presently head of IT security for an international bank. He is the co-founder and chairman of the Jersey Charitable Skills Pool; deputy chairman of the Channel Islands Information Security Forum; a committee member of the Jersey branch of the BCS; and the Digital Committee of the Jersey Chamber of Commerce.

Ed Tucker

Ed Tucker

CyberSecurity CTO, Telefonica Tech 

 

Ed is a recognised expert, with a rich history of creating high performance teams, world class capabilities, driving business resilience and confidence. He is a pragmatic, yet passionate individual with a demonstrable record of defining and executing transformational change into businesses of varying maturities.

Keil Hubert

Keil Hubert

Associate Principal, Security Human Risk Management, OCC

 

Keil Hubert is the head of Security Training and Awareness for OCC, the world’s largest equity derivatives clearing organization, headquartered in Chicago, Illinois. Prior to joining OCC, Keil has been a U.S. Army medical IT officer, a U.S.A.F. Cyberspace Operations officer, a small businessman, an author, and several different variations of commercial sector IT consultant. Keil deconstructed a cybersecurity breach in his presentation at TEISS 2014, and has served as Business Reporter’s resident U.S. ‘blogger since 2012. His books on applied leadership, business culture, and talent management are available on Amazon.com. Keil is based out of Dallas, Texas.

Daniela Almeida Lourenço

Daniela  Almeida Lourenço    

Chief Information Security Officer, Tinka 

 

Daniela Lourenço is currently the Business Information Security Officer for CarNext. In this role, she bridges the gap between business needs and security requirements, by translating the security roadmap to an organization-wide project.
 
Daniela holds a Master’s Degree in Communication & Cultural Studies and an Executive Master’s Degree in Cybersecurity. With multinational experience in Compliance and Information Security, her ultimate objective is to embed Information Security in the organisation’s model and culture as an inherent feature, understood by everyone throughout a supply chain.
Jonathan Craven

Jonathan Craven     

Global Privacy Operations Lead, iRhythm Technologies Ltd

 

After first training as a psychologist, Jonathan has spent most of his career working in the ‘Holy Trinity’ of public sector employers – local authority, NHS and the police service – in privacy, data protection and information governance. Throughout that time, he has led organisational change to raise awareness, improve training, and promote better governance and security processes and behaviours. He is currently the Privacy and Compliance Lead for the UK for iRhythm Technologies Ltd, a US-based healthcare tech company, leading on privacy strategy and compliance process implementation, as well as championing the “Digital First” approach. 
Paul Holland

Paul Holland      

Head of Information Security Research, Information Security Forum (ISF)

 
Paul has around 15 years security experience and 23 years in IT with security always a key feature. He has worked with companies of all sizes and sectors helping with IT security, network security, cyber and information security issues.
 
Paul has a drive and passion around awareness, training, security behaviours and security culture; and enjoys evangelising security at all levels.
Tiago Rosado

Tiago Rosado 

Chief Information Security Officer, Asite

 
Tiago is a seasoned strategic thinker and tactical implementer with more than 25 years of experience in Information/Cyber Security in EMEA, APAC and the Americas with a positive and motivational posture.

He has a holistic perspective on security, always as vendor-agnostic as possible aiming to achieve a highly secure environment that would be, by default, compliant with any known standard and/or frameworks - NIST, PCI-DSS, ISO 27001, HIPAA, UK Cyber Essentials, OWASP, Cloud Security Alliance, CIS, MITRE ATT&CK and others.
Dom Lucas

Dom Lucas 

Head of Security, British International Investment

 
Dom is a security leader with over 25 years professional experience, working across a range of public and private sector organisations, leading others to success. He has worked for numerous large firms including,  Barclays, Allen & Overy, Clifford Chance and also Financial Conduct Authority in the field of Information and Cyber Security. He is currently Head of Security at British International Investment. Dom is passionate as to the discipline and has been a a leading participant in the development of information sharing across the domain. Outside of work, Dom is a keen supported of  non-professional Theatre, having performed in, stage managed and directed seven theatrical shows over the past 15 months.
Cameron Brown

Cameron Brown 

Director, Cyber Security, Deloitte UK

 
Cam is a cyber defense advisor and information security strategist who has worked for the United Nations, governments and law enforcement agencies, as well as leading multinational corporations. He has collaborated on multi-taskforce investigations and factfinding missions on a global scale. Cam practices in the area of Risk Advisory in Europe with focus on Information Security, Cyber Governance, Security Intelligence, Adversary Profiling, Active Defense, Vulnerability Identification, Data Protection & Privacy (GDPR, Data Transfers and Controls, LEDP, ePrivacy, Standard Contractual Clauses, Data Protection Act) and Countermeasures to Insider Threats. Cam is also an author and contributor to books and articles on many aspects of cybercrime, data risk and information security, as well as a regular speaker on the subject at international conferences and seminars. He has led commentary on cybersecurity and cyberwarfare in the Financial Times, Forbes Special Reports, The Telegraph, Raconteur Reports, SC Magazine, IDG Connect, CSO Online, Computer Business Review, International Business Times, amongst others.
Stuart Frost

Stuart Frost

Head of Enterprise Security and Risk Management    Department for Work and Pensions (DWP)

Stuart Frost, BEM, is head of Enterprise Security and Risk Management within the UK Government. A vastly experienced, highly certified Security and Governance, Risk & Compliance (GRC) professional with extensive sector knowledge and significant experience of delivering successful risk-based security programmes, across large scale, multi-disciplined and geographically dispersed organisations. He is also a leading voice on managing risks faced by the burgeoning use of interconnected supply chains. An accomplished speaker, he has taken part in events across the UK, Europe, USA and Asia.

Stuart has won multiple industry global awards for his work in the GRC space and is adept at integrating all security disciplines to enable a holistic approach in support of business objectives. He was named as one of the UK’s top 50 Tech Leaders and a top 30 Transformational Change Leader in May 2024 for his role in driving innovation and change across the security sector.

He was awarded the British Empire Medal (BEM) in 2017 for his services to the local community and in 2023 was also the proud recipient of the Coronation medal in recognition of his security input to the Coronation of King Charles III.
Don Baham

Don Baham

Chief Information Security Officer, Germantown Technologies

 
Don is a business-focused Chief Information Security Officer and Security Technologist with 20+ years of experience in enterprise technology, with over 12 of those years in information security. He is highly skilled in the planning and development of information cybersecurity strategy and best practices in support of the information technology architecture. In his current role as Chief Information Security Officer at Germantown Technologies, Don oversees Information Security and IT Risk & Compliance for the Rubicon Founders portfolio of companies, prioritizing investments that strengthen defenses, achieve compliance, increase cybersecurity maturity, and reduce risk.

Don has earned a Bachelor of Science degree from Western Governors University and several industry certifications including Digital Directors Network Qualified Technology Expert (QTE), EC-Council Certified Chief Information Security Officer (CCISO), ISC2 Certified Information Systems Security Professional (CISSP), and ISACA Certified Information Systems Auditor (CISA).
Garrett Smiley

Garrett Smiley

Vice President of Digital Infrastructure and Technology Strategy / Chief of Staff to CDIO, Maximus

 
Accomplished and recognized global executive with 26 years of operational, technical, educational, and managerial experience in federal, military, and private industries, with 12+ years as leader at the MD/VP level at 4 different Fortune 100 to 1000 companies and 18+ years of international experience. 

Organizational leader with expertise in developing and leading highly engaged teams across the U.S., Canada, U.K., EMEA, and ASPAC. Effective collaborator, adept in establishing and cultivating rapport, confidence, and trust with Board members, senior executives, business units, customers, vendors, and colleagues. 

Serves as an industry thought leader, well-connected across public and private sectors, and offering insights through publications, presentations, and programs of instruction to the community. Client-facing strategist, expertly skilled in pursuing, implementing, and integrating leading-edge technologies and solutions to proactively position ironclad global protection programs against criminal activity.
Chuck Brooks

Chuck Brooks     

Adjunct Professor, Georgetown University

 

Chuck Brooks serves as President of Brooks Consulting International. He also serves as an Adjunct Professor at Georgetown University, teaching graduate courses on risk management, and cybersecurity.


Chuck was named “Top 5 Tech Person to Follow" by LinkedIn” where he has almost  118,000 followers on his profile.he also owns and manages 10 LinkedIn security oriented groups.As a thought leader, blogger, and event speaker, he has briefed the G20 on energy cybersecurity, the US Embassy to the Holy See and Vatican on global cybersecurity cooperation. He has served on two National Academy of Science Advisory groups, including one on digitalizing the USAF, and another on securing BioTech.  He has also addressed USTRANSCOM on cybersecurity and serves on an industry/government Working group for CISA focused on security space systems. 


Chuck's is also a contributor to Forbes, The Washington Post, Dark Reading, Homeland Security Today, Security Information Skytop Media, GovCon, Barrons, The Hill, and Federal Times on cybersecurity and emerging technology topics. He has  57,000 subscribers to his newsletter "Security and Tech Insights." He is also the author of two books on cybersecurity and tech coming out this year. 

Chuck has received presidential appointments for executive service by two U.S. Presidents, and served in executive leadership roles at public companies General Dynamics, Xerox, and Rapiscan. 


He has an MA from the University of Chicago, a BA from DePauw University, and a certificate in International Law from The Hague Academy of International Law.

Matt	Hardy

Matt Hardy 

SVP Cyber Security, AlixPartners

 

Matt is a results driven IS/Cyber Security Executive with 20+ years of experience in security, compliance and technology roles in a variety of sectors such as Telecommunications, healthcare, Fast Moving goods, Bank and finance , including more than eight years in the capacity as CISO. Working with the mantra of building security in by design, ensure security is business benefit with a good Return on investment.

 

Adept at managing Governance, Risk, and Controls, orchestrating all facets of Resilience & Third-party risk management, and managing Cyber Security risks in all levels of the business functions.

 

I am only as good as the teams I lead, so I take time to train, coach, and mentor each person for career growth and success, As a result, can create an environment of cohesion with optimal performance.

Edewede Oriwoh 

Edewede Oriwoh 

Group IT Information and Cyber Security Manager, Zigup Plc

 

Edewede has worked in various areas of Information and Cyber Security including in Data, Identity and Access Management, Asset, Cloud, Vulnerability Management, Cyberphysical, Security Awareness, Threat Hunting and Threat Intelligence, Incident Management and Disaster Recovery, among others. She has a keen interest in Proactive, Continuous, Responsive and Reactive Security.

She encourages the support of end users with security awareness guidance, well-configured and managed tools as well as clear Policies, Processes and Procedures so they can play their part as an essential link in any organisation's Cyber Security chain.

She also promotes the importance of remembering the fundamentals such as making security a habit and, more broadly, remembering that, "If it does not exist, there's nothing to secure".

Linked InTwitterFacebook

Ceremony & Tables

Linked InTwitterFacebook
teissAwards2025 will take place on the evening of the 27th of February 2025, immediately after teissLondon2025 | The European Information Security Summit.  
Both the summit during the day and the awards in the evening will be held at ETC Venues, 155 Bishopsgate, Liverpool Street, London, EC2M 3YD.
 
Our table sales programme is now open, and for a limited period we are offering early bird table discounts at 10% reduction (offer expires 20th December 2024). For all enquiries please email n.riza@teiss.co.uk 

 

 

Special Early Bird sale now on, save 10% on tables

Offer expires 17:00 (UK time) on Friday 20th December 2024.

 

Reserve VIP Table Reserve Standard Table Reserve Individual Seat

 

Our Host

teissAwards is delighted to confirm that our Host this year will be Emmanuel Sonubi.
 
London based Emmanuel Sonubi's career in Comedy started only a few years ago and quickly grew from strength to strength earning himself a reputation as "one to watch out for". A regular favourite on the live comedy circuit, he has become one of the most sought after acts working today. As seen on the recent series of ‘Live at the Apollo' 'Comedy Centrals Stand-Up UK' and the 'ITV2’s Stand-up Sketch Show', Emmanuel’s credits continue to grow as does his popularity with audiences around the world. 
Linked InTwitterFacebook

FAQ

Linked InTwitterFacebook

Find a list of our most frequently asked questions below. Got a question that isn’t on this list? Drop us a line at awards@teiss.co.uk and we’ll get right back to you. 

 

 

When does Judging Round 2 take place, and what do I need to do for it? 

 

Judging Round 2 will take place in the week of Monday 20thJanuary. For this, shortlisted companies  will need to have provided a 3 min recording for this entryfor the Judges to review and score.

 

For full guidance on what to include in the 3 min recording, please visit and navigate to thesection for this category in the Round 2 Judging Criteria tab.www.teiss.co.uk/events/teissawards2025?tab=round-2-judging-criteria

 

How are the awards organised? 

There are 22 Categories within the teissAwards2025, all focused on recognising excellence amongst the information security vendor market.

 

Who is eligible?

The teissAwards2025 are open to all information security product, service and training providers. Each Category has defined eligibility criteria and guidance on who should apply.

 

How can we enter? 

For each Category, there are a set of questions you must answer in order to make your submission. Your organisation is allowed to enter as many categories as are applicable to you.

 

Where do we enter? 

You can email your completed submission form and supporting documents to awards@teiss.co.uk  

 

Who decides if we’ve won? 

A select panel of industry experts make up our judging panel. Their details can be seen on the following pages.  They will score all submitted entries that are shortlisted.

 

How much does it cost to enter? 

Entry is free.

 

What are the deadlines for entry? 

 

1st July 2024 - Submissions open

August 2024 - Table Sales open

1st December 2024 - Submissions close

25th November 2024 - Shortlist announced

31st December 2024 - Judging Round 1 completed

24th January 2025 - Judging round 2 completed

27th February 2025 - teissAwards2025 winners announced!

Linked InTwitterFacebook

Contact

Linked InTwitterFacebook

To find out more about teissAwards2025, please contact:

 

Submissions Manager: 

Joseph Yiadom | awards@teiss.co.uk 

 

Sponsorship Sales Manager:

Marc Morrow | T: +44 (0)20 8349 6453 | M: +44 (0)7977 926736

E: m.morrow@teiss.co.uk

 

Sponsorship Sales Manager:

Grant Scheffer | T: +44 (0)20 8349 6478 | M: +44 (0)7811010102

E: g.scheffer@teiss.co.uk

 

Sponsorship Sales Manager: 

Jean-Philippe Le Coq | T: +44 (0)20 8349 5592 | M: +44(0)7494 705170

Linked InTwitterFacebook

Previous Winners

Linked InTwitterFacebook

In preparation for the teissAwards2025, discover below our current teissAwards champions: 

 

Best Cloud Security Solution

Winner: Wiz

Runner Up: Comforte AG

 

Best Email Security Solution

Winner: Censornet

Runner Up: Cofense 

 

Best Incident Response Solution

Winner: Exabeam

 

Best Endpoint Protection Solution

Winner: Threatlocker

Runners Up: WithSecure & NinjaOne

 

Best Third-Party Risk Management Solution

Winner: Panorays

 

Best AI and ML Security Solution

Winner: Exabean

Runner Up: Fortra

 

Best Threat Intelligence Technology

Winner: Blackfog

 

Best Vulnerability Management Solution

Winner: Runecast Solutions

Runner Up: Heimdal Security

 

Best Cyber Security Training and Awareness Product or Service

Winner: ThinkCyber

Runners Up: Culture AI, KnowBe4 & MetaCompliance

 

Best Penetration Testing Product or Service

Winner: LRQA Nettitude

Runner Up: PenTest People

 

Best Security Compliance Product

Winner: Runecast Solutions

Runner Up: CyberSmart

 

Cyber Security New Launch Product of the Year

Winner: Keeper Security

Runner Up: Yubico

 

Cyber Security Company of the Year

Winner: Immersive Labs

Runners Up: NormCyber & Kyndryl

 

Cyber Security Vendors’ Personality of the Year

Winner: Sam Humphries, Exabeam

Linked InTwitterFacebook
Affino

Winston House, 3rd Floor, Units 306-309, 2-4 Dollis Park, London, N3 1HF

23-29 Hendon Lane, London, N3 1RT

020 8349 4363

© 2024, Lyonsdown Limited. teiss® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543