TEISS Awards 2019

The European Information Security Summit

The TEISS Awards will take place on 7th November and is the premier opportunity to celebrate excellence in cyber and information security across Europe.

With over 300 attendees, the awards focus on the contribution of organisations, projects, individuals and technologies that have excelled in the use, development and deployment of information security in the past 12 months.


Products & Vendors

  • Explain your product or service in simple, non-technical language.
  • Is this a new product or service, or an updated version?  For example, does it do something new, or does it use existing technology in a new way?
  • Is this product practical to implement? Does it need extra resources to support it, or new skills, or is it largely a stand-alone product?
Download entry form
  • Explain your product or service in simple non-technical language
  • How usable is the product by non-specialists?  Does this product help non-specialists address a single problem or a large number of problems?
  • How expensive is this product? Is it something that a small business turning over say £1 million could afford?
  • What differentiates your product from your competitors and why is your product/service the best?
Download entry form
  • Simply put, what does your start-up do?  Does it or you do anything genuinely new and different?
  • What sort of backing has this start- up attracted? Has investment been offered more widely than family and friends?
  • Does the start-up have any major paying clients as yet?
  • What is your USP and ultimate goal?
Download entry form
  • Outline your compliance product and how it works
  • How does this product address a compliance issue that is currently under served? What does it do different or better?  Has the product been recognised as effective by any regulators?
  • Does the product deliver a box ticking compliance approach, or does it also address the spirit of compliance (e.g. does the product help you to keep on the right side of GDPR or does it help preserve end user privacy?)
  • Why do you consider your product the best compliance product on the market?
Download entry form
  • Please explain how your detection platform works in simple and instructive language
  • How wide a range of threats does this product detect? Does it show a wide picture of the threat environment, or is it narrowly-focused?
  • Does the product address emerging threats? Is it adaptable for new types of threat? Does the product detect new threats rapidly?
  • Why do you consider your detection platform the best on the market?
Download entry form
  • Please outline and explain how you are using machine learning or security automation
  • To what extent does the product save analysts’ time?  What degree of skill is required to use the product, or to integrate it with other tools and systems?
  • Is the product genuinely adaptive to a changing threat landscape? To what extent is human intervention needed?
  • Why do you consider your use of machine learning or security automation, the best?
Download entry form
  • Please explain your IoT security solution
  • What are the limitations of the solution in terms of number of IoT devices and types of device it can handle?
  • What threats does the service handle?  Can it actively increase the security of IoT devices?
  • Why do you consider your IoT security solution the best, compared to your competitors?
Download entry form
  • Please explain your managed security solution in simple, non-technical language
  • What level of customer service is offered? Does it provide 24/7 operation?  What skill level is required by its users?
  • What sort of service or help is offered in the event of an incident?  Are researchers and industry specialists employed by the organisation?
  • Why do you believe your managed security solution is the best?
Download entry form
  • Please explain your risk management product in simple, non-technical language
  • How does the product help the user to define risk appetite and evaluate different risks and types of risk?  How easy is the product to use, for non-risk specialists, on a scale of 1-10?
  • How does the system offer different choices about responding to particular risks?  Does the system map choices against outcomes and enable users to build up knowledge about the choices they have made in the past?
  • Why do you consider your risk management product the best on the market?
Download entry form
  • Please explain your cyber insurance product, including parameters and any particular innovative factors
  • How genuinely innovative is this product?  In the event of a breach, what support does the product provide?
  • What is the width of cover and are there any get out clauses that would render the product less than useful?
  • Why do you believe your product is genuinely more innovative than your competitors?
Download entry form
  • Please outline your training product or service, including any testimonials from existing clients
  • How does the product offer different content for different levels for different people and roles?  How does the product allow for different learning styles?
  • What level of quality assurance has been applied to this product?
  • Why do you consider your training product or service the best on the market, what sets it apart?
Download entry form
  • Please explain your penetration testing product or service in simple, non-technical language
  • How do you prove your trustworthiness?  For example, how do you vet your staff?
  • Are your methods largely automated or do you employ human skills as well?  Do you offer solutions as well as identifying problems?
  • Why do you believe your product or service is the best on the market, compared to competitors?
Download entry form

Process, Teams and  People

  • Briefly outline your training, awareness and cultural change programme and how it works
  • How is the effect of the campaign tracked?  Does the process go beyond knowledge transfer (training) and promote changes in perception, attitude and behaviour?
  • How does the process adapt to different roles and levels of experience with differing needs, or is it a one size fits all approach?
  • To what extent is the programme aligned with the strategic goals of the organisation?
Download entry form
  • Briefly explain your breach response process
  • How many different playbooks are there?  Are all the main likely threats planned for?
  • How regular are response practice sessions (simulations) held involving different levels of the organisation?  What is the involvement of senior management in specifying process and in simulations, especially around communications?
  • What learning and feedback is included in the planned response processes?
Download entry form
  • Please explain how you are using technology most effectively and optimally
  • What effect has the security technology had on the business and how widely across the business has it had an effect?
  • Has the ROI or effectiveness of the use of security technology been measured and proven?  How relevant are the metrics and KPIs to organisation’s strategy?
  • How are strategic metrics communicated widely across the organisation and especially upwards to top management?
Download entry form
  • Please outline how you are using metrics effectively to aid your cyber security work
  • How regularly are metrics collected and to what extent can these metrics be trusted?  Do the metrics collected have business and strategic relevance?
  • How well are the metrics presented to stakeholders? Are they presented simply with good data visualisation that communicates their messages clearly?
  • What changes has your organisation made as a result of the metrics?
Download entry form
  • What is the skills level and knowledge shown by the team? How are they updated?
  • What level of innovation has the team shown and how?  Does the team’s understanding focus on IT, on wider operational issues or on a strategic understanding and approach?
  • What has the team’s effect been on the business overall? Have they done anything particularly special to help the organisation?
  • Why do you believe you deserve team of the year, what sets your team apart?
Download entry form
  • How does remuneration, holidays and perks compare with industry benchmarks?
  • To what extent is training and career progression a priority for the organisation?
  • What is the management culture like? Is management open to suggestions and comments? Is there a blame culture?
  • What is your ‘X factor’ that you believe makes your company the best place to work?
Download entry form
  • Please outline the make-up of your team. What does the diversity balance (especially around gender and disability) look like?
  • What steps does the organisation take to achieve diversity when recruiting staff?
  • What steps does the organisation take to achieve diversity when managing the internal career progression of staff?
  • Does the organisation offer flexibility in working to allow for the needs of a diverse workforce?
Download entry form
  • Who are you nominating for this award? How well thought of is this leader among their colleagues? What is the evidence for this?
  • Has the leader been successful in growing the size of the team, their budget and/or the services they offer?
  • How effective is the team that the leader is leading? Have they achieved anything of major importance for their organisation or the industry?
  • What has this leader done that inspires the team and makes them deserve this award?
Download entry form

The Judges

Our TEISS Awards judges are an independent panel of experts. They must disclose any pre-existing relationship with any entrants, and are not allowed to cast a vote in that category. They cannot enter any of the categories themselves.

Paul Taylor
Partner & UK Lead for Cyber in the Boardroom, KPMG
Martin Smith MBE
Chairman & Founder, The Security Company
Deborah Haworth
CISO, Penguin Random House UK
Craig Rice
Titta Tajwer
Andy Wall
CSO, Office for National Statistics
Paul Watts
CISO, Domino's Pizza
Thom Langford
CISO, Publicis Groupe
Nick Nagle
CISO, Condé Nast International
Sue Milton
Chair of the Nominations Committee and Past President, ISACA
Allan Boardman
CyberAdvisor.London and past International Vice President, ISACA

The Evening

The TEISS Awards 2019 will take place on 7th November in London, at a location to be confirmed in the coming weeks. The evening will begin at 6.30pm and will commence with a champagne reception, include a three course meal with wine, and will be accompanied by a celebrity MC  and entertainment. 

Over 300 attendees will convene for an evening of celebration, as the information security industry discover as finalists gather to hear who will take the silverware.

Check back in the coming weeks for more information on an unforgettable evening.