teissAwards2020

The European Information Security Summit

teissAwards2020 will take place on 12th February 2020 and is the premier opportunity to celebrate excellence in cyber and information security across Europe.

With over 150 attendees, the awards focus on the contribution of organisations, projects, individuals and technologies that have excelled in the use, development and deployment of information security in the past 12 months.

Categories

Products & Vendors

  • Explain your product or service in simple, non-technical language.
  • Is this a new product or service, or an updated version?  For example, does it do something new, or does it use existing technology in a new way?
  • Is this product practical to implement? Does it need extra resources to support it, or new skills, or is it largely a stand-alone product?

Download entry form

  • Explain your product or service in simple non-technical language
  • How usable is the product by non-specialists?  Does this product help non-specialists address a single problem or a large number of problems?
  • How expensive is this product? Is it something that a small business turning over say £1 million could afford?
  • What differentiates your product from your competitors and why is your product/service the best?

Download entry form

  • Simply put, what does your start-up do?  Does it or you do anything genuinely new and different?
  • What sort of backing has this start- up attracted? Has investment been offered more widely than family and friends?
  • Does the start-up have any major paying clients as yet?
  • What is your USP and ultimate goal?

Download entry form

  • Outline your compliance product and how it works
  • How does this product address a compliance issue that is currently under served? What does it do different or better?  Has the product been recognised as effective by any regulators?
  • Does the product deliver a box ticking compliance approach, or does it also address the spirit of compliance (e.g. does the product help you to keep on the right side of GDPR or does it help preserve end user privacy?)
  • Why do you consider your product the best compliance product on the market?

Download entry form

  • Please explain how your detection platform works in simple and instructive language
  • How wide a range of threats does this product detect? Does it show a wide picture of the threat environment, or is it narrowly-focused?
  • Does the product address emerging threats? Is it adaptable for new types of threat? Does the product detect new threats rapidly?
  • Why do you consider your detection platform the best on the market?

Download entry form

  • Please outline and explain how you are using machine learning or security automation
  • To what extent does the product save analysts’ time?  What degree of skill is required to use the product, or to integrate it with other tools and systems?
  • Is the product genuinely adaptive to a changing threat landscape? To what extent is human intervention needed?
  • Why do you consider your use of machine learning or security automation, the best?

Download entry form

  • Please explain your risk management product in simple, non-technical language
  • How does the product help the user to define risk appetite and evaluate different risks and types of risk?  How easy is the product to use, for non-risk specialists, on a scale of 1-10?
  • How does the system offer different choices about responding to particular risks?  Does the system map choices against outcomes and enable users to build up knowledge about the choices they have made in the past?
  • Why do you consider your risk management product the best on the market?

Download entry form

  • Please explain your cyber insurance product, including parameters and any particular innovative factors
  • How genuinely innovative is this product?  In the event of a breach, what support does the product provide?
  • What is the width of cover and are there any get out clauses that would render the product less than useful?
  • Why do you believe your product is genuinely more innovative than your competitors?

Download entry form

  • Please outline your training product or service, including any testimonials from existing clients
  • How does the product offer different content for different levels for different people and roles?  How does the product allow for different learning styles?
  • What level of quality assurance has been applied to this product?
  • Why do you consider your training product or service the best on the market, what sets it apart?

Download entry form

  • Please explain your penetration testing product or service in simple, non-technical language
  • How do you prove your trustworthiness?  For example, how do you vet your staff?
  • Are your methods largely automated or do you employ human skills as well?  Do you offer solutions as well as identifying problems?
  • Why do you believe your product or service is the best on the market, compared to competitors?

Download entry form

The Judges

The teissAwards2020 judges are an independent panel of experts. They must disclose any pre-existing relationship with any entrants, and are not allowed to cast a vote in that category. They cannot enter any of the categories themselves.

Paul Taylor
Partner & UK Lead for Cyber in the Boardroom, KPMG
Martin Smith MBE
Chairman & Founder, The Security Company
Deborah Haworth
CISO, Penguin Random House UK
Nick Nagle
CISO, Condé Nast International
Titta Tajwer
CISO, News UK
Andy Wall
CSO, Office for National Statistics
Paul Watts
CISO, Domino's Pizza
Thom Langford
Founder, TL(2) Security
Sue Milton
Chair of the Nominations Committee and Past President, ISACA

The Evening

The teissAwards2020 will take place on 12th of February 2020 in London, at etc Venues, Bishopsgate, the location for teissLondon2020. The evening will begin at 6.30pm and will commence with a champagne reception, include a three course meal with wine, and will be accompanied by a celebrity MC  and entertainment.

Over 150 attendees will convene for an evening of celebration, as the information security industry discover as finalists gather to hear who will take the silverware.