ao link
Affino
Search Teiss
My Account
Remember Login
My Account
Remember Login

teissLondon2025 | The European Information Security Summit

09:00 - 17:00
Convene 155 Bishopsgate, London

Staying ahead of threat actors and malicious use of AI is essential.  How can security leaders guide their organisations through the positives of the AI revolution, whilst protecting from the negative and the harmful?

 

teissLondon2025 | The European Information Security Summit returns on the 27th February 2025 and will focus on how to protect yourself, your colleagues and your organisation from the latest tactics and techniques in the threat actors’ toolbox.

 

teissLondon2025 | The European Information Security Summit will again be divided in three main conference streams; CISOs and Leadership; Culture & Education; Threat Landscape.  The day will maximise delegate engagement and feature interactive presentations, in-depth panel discussions, facilitated roundtables and practical workshops. 

 

Join over 400 of your peers in cyber security leadership at teissLondon2025 | The European Information Security Summit.

 

 

Delegate passes are priced at £495 (All tickets will have 20% VAT applied at checkout)

The Questions we will explore

Throughout the course of the day we will address the following:

CISO & Leadership Stream

 

For CISOs and infosec leaders, teissLondon2025 offers insights into developing a proactive approach to GenAI, aligning cybersecurity investments with business objectives, and attracting diverse talent.  Panel discussions will cover;

  • Matching your planned cyber security investments with your organisation's business objectives
  • Strategies to attract the next, representative and diverse generation of infosec talent
  • What the impact of the UK's AI and cyber-security reforms will be on your security posture
  • Streamlining risk management whilst developing a proactive approach to GenAI

Culture & Education Stream

 

For security awareness leads, teissLondon2025 will focus on human cyber-risk mitigation, AI-led social engineering awareness, and cyber-skills development.  Panel discussions will cover;

  • Real-time, data-led, interventions that mitigate human cyber-risks
  • Educating and preparing colleagues to recognise, identify and respond to AI-led social engineering attacks
  • How mentorship and apprenticeship programmes can accelerate cyber-skills development
  • Whether your cyber-security culture matches your organisational goals, and how to foster the right behaviours

Threat Landscape Stream

 

For Cyber-Threat Intelligence leads, teissLondon2025 will explore emerging threats, AI-driven incident response, IAM with GenAI, and the possibilities automated security operations brings.  Panel discussions will cover;

  • Staying up-to-date with the threat trends which might affect your organisation most significantly
  • Drafting, testing and practising with an AI-driven incident response playbook
  • Implementing an identity and access management programme with GenAI
  • How automated security operations is achievable, and where the limitations lie

Plenary and Presentations

 

For all security leaders, teissLondon2025 will explore both the latest techniques and tactics of AI-enabled threat actors, as well as the cutting-edge AI-powered solutions being deployed to keep organisations safe. Presentations will cover;

  • Predicting threat actors' advanced use of AI in reconnaissance and social engineering
  • What the limitations are on security leaders deploying AI to respond to threats and incidents
  • How increased personal legal risks faced by security leaders can be mitigated by shared accountability
  • Using threat intelligence to mitigate risks posed by 3rd parties

Who will attend?

teissLondon2025 | The European Information Security Summit will bring together the leaders and decision-makers in cyber-security, security awareness and threat intelligence from major enterprises, as well as key stakeholders from government and regulators.

 

Attending job titles include: CISOs; CIOs; CTOs; CROs; Directors and Heads of Cyber Security; Directors and Heads of Information Security; Directors and Heads of Information Technology; Directors and Heads of Cyber Resilience; Directors and Heads of Incident Response; SOC Leads and Managers; Cyber Threat Intelligence Leads and Managers; Data Protection Leads and Managers; Security Education and Awareness Leads and Managers; and Business Information Security Managers

Featured SpeakersView All


Featured Speakers


Thom Langford

Thom Langford

CISO, Security Executive and Advisor
teissTalk Host
Jonathan Craven

Jonathan Craven

Data privacy and cyber security consultant
XRHA
A senior representative, NCSC

A senior representative, NCSC

Neil King

Neil King

European Business & Information Security Specialist
Canon Europe
Cameron Brown

Cameron Brown

Director- Cyber Security
Deloitte UK
Danny Dresner

Danny Dresner

Professor of Cyber Security
University of Manchester
Mike Johnson

Mike Johnson

Global Cyber Threat, Incident Response, and Security Operations Manager
Verifone
Penny Jackson

Penny Jackson

Director of Strategy, Awareness & Engagement (Human Risk Management)
Aristos Partnership
Andrea Cullen

Andrea Cullen

Co Founder/Co CEO
CAPSLOCK
Dom Lucas

Dom Lucas

Head of Security
British International Investment
Johann van Duyn

Johann van Duyn

Chief Information Security Officer
Do & Co
Edewede Oriwoh

Edewede Oriwoh

Group IT Information and Cyber Security Manager
Zigup Plc
Mike Gillespie

Mike Gillespie

Founder & Thought Leader
Advent IM
Tiago Rosado

Tiago Rosado

Chief Information Security Officer
Asite
Mark Ward

Mark Ward

Senior Research Analyst
Information Security Forum (ISF)
Sandra Bell

Sandra Bell

Group head of Organisational Resilience
Novuna
Mike YEOMANS

Mike YEOMANS

Manager, Cyber Risk Quantification Service Delivery Lead
KPMG LLP
Sarah Janes

Sarah Janes

Owner and CEO,
Layer 8
Dr. Zia Ush Shamszaman

Dr. Zia Ush Shamszaman

Senior Lecturer in Computer Science
Teesside University
Edward Starkie

Edward Starkie

Director, GRC
Thomas Murray
Peter East

Peter East

Head of Cyber Security, ISRD EMEA
Hitachi
Daniela Lourenço

Daniela Lourenço

Chief Information Security Officer
Rich Davies

Rich Davies

Senior Director of Solutions & Strategy
Netskope
Alan Jenkins

Alan Jenkins

Trusted Advisor & Interim CISO
Cyber Security Navigator Ltd
Dan Bridges

Dan Bridges

Technical Director – International
Cyware
Rebecca Stephenson

Rebecca Stephenson

Specialist Lead Lecturer in Digital Pedagogy
Government of Jersey
Lessie Skiba

Lessie Skiba

Global Director of Outreach and Partner Engagement
Cyber Readiness Institute
Janet Bastiman

Janet Bastiman

Chief Data Scientist
Napier AI
Lee Munson

Lee Munson

Principal Research Analyst
Information Security Forum
Lukas Weber

Lukas Weber

Vice President
AlixPartners
Lisa Ventura

Lisa Ventura

Cyber Security Specialist & Founder
Cyber Security Unity
Stuart Frost

Stuart Frost

Head of Enterprise Security & Risk Management
Department for Work & Pensions
Emma Jones

Emma Jones

Global Manager, Cyber Incident Response Readiness
Crowdstrike
Satyam Rastogi

Satyam Rastogi

Director of Information Security & DevOps
BAMKO
Kevin Breen

Kevin Breen

Senior Director Cyber Threat Research
Immersive Labs
Olena Shumska

Olena Shumska

Senior Research Analyst
Information Security Forum (ISF)
Edd Hardy

Edd Hardy

Director Cyber and Risk
AlixPartners
Enis Sahin

Enis Sahin

Head of Information Security
Federated Hermes - International
Michela Resta

Michela Resta

Solicitor
CyXcel
Perry de Caux Resta

Perry de Caux Resta

IT Lecturer
Highlands College
Jacqueline Hanson-Kotei

Jacqueline Hanson-Kotei

Senior Manager Enterprise Information Security & Governance
MTN Ghana
Steven Furnell

Steven Furnell

Professor of Cyber Security
University of Nottingham
Richard Absalom

Richard Absalom

Principal Research Analyst
ISF
Garrett Smiley

Garrett Smiley

Chief of Staff to CDIO / VP of Digital Infrastructure & Tech Strategy
MAXIMUS
Jean Carlos

Jean Carlos

Group Head of Cyber Architecture & Engineering
TP ICAP
Lee Howard

Lee Howard

Group Head of Cyber & Data Protection
Vue International  
Zac Butler

Zac Butler

Senior Cyber Security Analyst
British International Investment plc
Stuart Davis

Stuart Davis

Senior Director, Professional Services
Crowdstrike
Jonathan Pearson

Jonathan Pearson

Professional Services Principal Consultant
Crowdstrike
Keith Robinson

Keith Robinson

Vice President of Sales
MetaCompliance
Don Baham

Don Baham

CISO
Rubicon Founders
Edward Tucker

Edward Tucker

Cyber Security CTO
Telefónica Tech UK&I

Attendees

Linked InTwitterFacebook

Our attendees come from a range of backgrounds - take a look at a cross-section of our 2025 attendees!

Amazon Web Services (AWS)

Enterprise Risk Management

Accenture

EMEA Cyber Strategy Lead & Global Cyber C-Suite & Board Lead

Barclays

AVP - Cyber Operations Analyst

BBC

Information Security Manager

JP Morgan Chase

Vice President

EY

Cybersecurity Architect- Manager
Partner & OT Cyber Security leader

KPMG

SecOps Lead

HSBC

Technology Third Party Risk Manager

Santander

CISO & Head of IT Risk & Governance

Mastercard

Head  of Operational Resilience
Vice President, Cyber Security & Resilience

VISA

Ecosystem Risk Director
Risk Management Analyst

London Stock Exchange Group

Senior Manager - Data, Risk & Compliance

Jaguar Land Rover

Digital Programme Manager

Hitachi

Head of Cyber Security

SKY

Group Head of Operational Resilience

Tesco Mobile

Cyber Security Manager
Head of Cyber Security & Business Resilience

deliveroo

Security Risk Specialist & Senior Security Incident Response Specialist

BT

CTO Team - Principal of Cyber Security

NatWest

Security & Resilience Audit Manager
IT Audit Manager

Standard Chartered

Director, Operations & Infrastructure

Linked InTwitterFacebook

Sponsors

Linked InTwitterFacebook

Sponsorship opportunities for teissLondon2025 | The European Information Security Summit are now open!

 

For sponsorship enquiries, please email grant.scheffer@teiss.co.uk or marc.morrow@teiss.co.uk.

 

Below is the list of our esteemed sponsors for 2025: 

Immersive Labs

Immersive Labs gives you the Human Edge so that you are ready for whatever’s next. We empower your entire organization to proactively detect, respond to, and neutralize cyber threats. Cutting-edge hands-on cybersecurity training, team exercises, and cyber drills help you continuously assess, build, and prove your cyber capabilities, relevant to individual roles, while keeping your team ahead of the latest threats.

 

We provide evidence of your people’s capabilities, giving you unparalleled visibility into your organization's cyber resilience, and proof that you can share with your Board, insurers, and customers.

 

With a single enterprise platform for individuals, teams, and your entire workforce, Immersive Labs helps you take a unified approach to cyber resilience.

 

Visit website

CovertSwarm

CovertSwarm redefines cybersecurity with relentless, subscription-based attack simulations that mirror the tactics of real-world adversaries. Unlike traditional penetration testing, our ethical hackers continuously exploit digital, social, and physical vulnerabilities, uncovering weaknesses before malicious actors do. Founded in 2020, we've never failed to breach clients' defences—earning their trust through results. By attacking from every angle, we provide a constantly evolving understanding of risk, enabling organisations to fortify their defences effectively. Powered by a team of innovative minds, CovertSwarm's mission is simple yet disruptive: outpace cyber threats by making attack the best defence. Welcome to the future of cybersecurity—relentless red team services via subscription.

 

Visit website

Rubrik

Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organisations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organisations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.For more information please visit www.rubrik.com and follow @rubrikInc on Twitter and Rubrik, Inc. on LinkedIn.

 

Visit website

CrowdStrike

CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

 

CrowdStrike: We stop breaches.

 

 

Visit website

MetaCompliance

MetaCompliance: Helping Organisations Stay Secure

 

With over 18 years of experience in Cyber Security and Compliance, MetaCompliance provides a smart, practical solution for managing human risk. Our platform brings everything together in one place, helping organisations handle Cyber Security, Data Protection, and Compliance more effectively.

We’re constantly innovating to stay ahead of the challenges organisations face. Our platform includes Risk Scores to measure and reduce staff-related security risks, alongside tools for eLearning, phishing simulations, policy management, and incident reporting. This gives cyber professionals the insights they need to track progress and improve employee awareness.

We make training engaging and relevant, using behavioural insight to deliver role-specific content that resonates with employees and drives real behaviour change. Trusted by organisations worldwide, MetaCompliance is committed to helping businesses build a stronger, safer workforce.

 

 

Visit website

Veracode

Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans and a proprietary AI-assisted remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. Thousands of the world’s leading development and security teams use Veracode every second of every day to get accurate, actionable visibility of exploitable risk, achieve real-time vulnerability remediation, and reduce their security debt at scale. Veracode is a multi-award-winning company offering capabilities to secure the entire software development life cycle, including Veracode Fix, Static Analysis, Dynamic Analysis, Software Composition Analysis, Container Security, Application Security Posture Management, and Penetration Testing.

 

Learn more at www.veracode.com, on the Veracode blog, and on LinkedIn  and  Twitter.

 

 

Visit website

Checkmarx

Checkmarx is the leader in application security and ensures that enterprises worldwide can secure their application development from code to cloud. Our consolidated platform and services balance the dynamic needs of enterprises by improving security and reducing TCO, while simultaneously building trust between AppSec, developers, and CISOs. At Checkmarx, we believe it’s not just about finding risk but remediating it across the entire application footprint and software supply chain with one seamless process for all relevant stakeholders. We are honored to serve more than 1,800 customers, including 40 percent of all Fortune 100 companies.

 

 

Visit website

Team Cymru

Since 2005, Team Cymru's mission has been to Save and Improve Human Lives by working with security teams around the world, enabling them to track and disrupt the most advanced bad actors and malevolent infrastructures. Government and Enterprise security teams rely on the Pure Signal™ platform with its inimitable access and visibility to close detection gaps, accelerate incident response, and detect threats and vulnerabilities across entire enterprises and third-party ecosystems. Its Community Services division provides no-cost threat detection, alerting, DDoS mitigation, and threat intelligence to more than 170+ CSIRT teams across 86+ countries.

 

Visit website

Cyware

Cyware is a cybersecurity company that specializes in threat intelligence-led automation and operationalization. Their platform integrates Threat Intelligence Platforms (TIP), low- and no-code automation, and bidirectional intel sharing solutions to improve threat detection, analysis, and response capabilities. By leveraging AI-capable intelligence and orchestrated response, Cyware helps organizations build virtual cyber fusion centers, enabling real-time situational awareness and collaboration across security teams. This approach aims to proactively prevent cyberattacks and simplify security operations.

 

 

Visit website

SureCloud

Keep your business secure and compliant with SureCloud. Our integrated GRC platform provides everything you need today and tomorrow, ensuring ease of use for everyone in your organization. SureCloud GRC is powered by Dynamic Risk Intelligence, enabling you to proactively manage your risk and compliance landscape by uncovering the full story behind your data. This allows you to analyze, predict, and respond to risks before they escalate, transforming compliance from a reactive burden into a strategic advantage. With real-time analytics, event-driven architecture, and automation, SureCloud delivers the future of GRC today—helping organizations stay ahead of emerging threats and regulatory challenges with certainty and control.

 

 

Visit website

Layer8

Layer 8 Champions® harnesses the collective power of people to reduce risk by enabling every person in every organisation to become Champions of Security Culture. 

 

Conversation is our catalyst for change, and by empowering your people to have good quality conversations about security, Layer 8 Champions® strengthens culture and builds measurable resilience to cybercrime.

Proven to equip people with the right security knowledge, behaviours and capabilities to be effective security champions, our blueprint is built on years of experience with brands recognised the world over and organisations with global reach.

 

Visit website

Hyperproof

Hyperproof is a risk and compliance management platform that empowers IT, security, and compliance teams to automate and scale their workflows without the burden of jumping between multiple legacy platforms and spreadsheets. The Hyperproof platform enables teams to get complete visibility into their organizational risks, streamline the audit process, and reduce their ever-growing compliance workloads. Hyperproof is trusted by leading organizations like Veeva Systems, Fortinet, Motorola, Outreach, and Solventum.

 

Visit website

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations. High-integrity data ingestion, powerful analytics, and workflow automation power the industry’s most advanced self-hosted and cloud-native security operations platform for threat detection, investigation, and response (TDIR). With a history of leadership in SIEM and UEBA, and a legacy rooted in AI, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline security operations.

 

Visit website

Synack

Synack’s premier security testing platform enables a vetted community of security researchers to deliver continuous penetration testing and vulnerability management, with transformational results. We are committed to reducing cybersecurity risk for our customers, bridging the cybersecurity talent gap and giving organizations on-demand access to improved security testing capacity and analytics – on a single platform.

 

 

Visit website

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. The Netskope platform provides optimized access and zero trust security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com

 

Visit website

Intruder

Founded in 2015, Intruder's mission is to help organizations be faster than attackers so they can stop breaches before they start. Now helping 3,000+ customers, Intruder unifies Attack Surface Management, Vulnerability Management and Cloud Security into one powerful, easy-to-use solution that focuses on fixing the weaknesses that matter most. Visit intruder.io to find out more.

 

 

Visit website

ThreatLocker

Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.

 

 

Visit website

Panorays

Panorays is a leading provider of third-party cyber risk management solutions, helping businesses optimize their defences for each unique third-party relationship. Trusted by the most complex supply chains in the world, Panorays provides businesses the tools to stay ahead of any emerging third-party threats and provides actionable remediations.

 

 

Visit website

Linked InTwitterFacebook

Location

Linked InTwitterFacebook

We are delighted to announce that teissLondon2025 | The European Information Security Summit will be taking place at etc.venues 155 Bishopsgate, London. 

Convene 155 Bishopsgate, Liverpool Street, London, EC2M 3YD. 

 

Convene 155 Bishopsgate is situated inf Zone 1 next to Liverpool Street station on the Circle, District, Metropolitan Lines, Central Line and the Elizabeth Line.  

 

Transport for London tube map.

Use the TfL Journey Planner for full public transport direction. 

 

Convene 155 Bishopsgate may be listed on your mapping application as etc.venues 155 Bishopsgate, these are the same venue, just rebranded. 

Linked InTwitterFacebook
£495.00 (+£99.00)
Register Now
Affino

Winston House, 3rd Floor, Units 306-309, 2-4 Dollis Park, London, N3 1HF

23-29 Hendon Lane, London, N3 1RT

020 8349 4363

© 2025, Lyonsdown Limited. teiss® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543