ao link
Affino
Search Teiss
My Account
Remember Login
My Account
Remember Login

teissAwards2026

18:00 - 21:00
Convene 155 Bishopsgate, London, EC2M 3YD

The teissAwards2026 recognise excellence in cyber and information security, with a particular focus on the contributions of vendors and technologies in relation to the use, development, and deployment of information security in the past 12 months.

 

The categories within the teissAwards2026 are assessed by an independent panel of distinguished judges, and the winners will be announced at the teissAwards2026 gala dinner, held on the 26th February 2026.

 

The teissAwards2026 are part of a broader portfolio of information security events, which have taken place over the last decade, and represents the largest and most comprehensive cyber security gathering of experts in Europe.

Linked InXFacebook

Judging Information

There are two Judging Rounds.
 
Judging Round 1 will take place in December 2025.  At least two judges will review and score the Submission for all shortlisted entries.
 
Judging Round 2 will take place in January 2026. Further information can be found on the Round 2 criteria page. 
 
The winners and runners up will be the entries with the highest combined score from both Judging Rounds.

For more information about the teissAwards2026, please get in touch with us on awards@teiss.co.uk

Key Dates

Here are all the key dates you need to know for the teissAwards2026! 

 

1st July 2025 – Round 1 Entry and Round 2 Video Submissions open

23rd November 2025 – Round 1 Entry Submissions close

11th January 2026 – Round 2 Video Submissions close

26th February 2026 - teissAwards2026 winners announced!

 


 

Round 1

Submission of the online entry by midnight on the 23rd November 2025. 

 

Round 2

Submission of a 2min video supporting the Round 1 submission, by midnight on the 11th January 2026.

Categories

Linked InXFacebook

The teissAwards2026 has 19 categories that celebrate the achievement of cyber security vendors over the last 12 months. Please see category information below:

Categories


Best Cloud Security Solution

The entrant must be an organisation that offers a cloud security solution that mitigates risks associated with the protection of information and applications in the cloud environment.

 


Best Email Security Solution

The entrant must be an email security vendor who offers a solution that safeguards the privacy of email messages by filtering against spam, malware and other malicious emails, while providing integrated protection against sophisticated email attacks.

 


Best Incident Response Solution

The entrant must be an incident response provider with a service or software that provides users with the tools to identify and respond to security breaches, as well as reporting and analysing incident data.

 


Best Endpoint Protection Solution

The entrant must be a provider whose solution continuously analyses endpoints to detect and respond to potential threats in real time.

 


Best AI Security Solution

The entrant must have a AI-powered solution aimed at detecting, preventing or resolving current cyber-threats.

 


Best Threat Intelligence Technology

The entrant must be a threat intelligence technology supplier whose solution or product provides organisations with timely intelligence on the latest cyber-threats affecting their IT infrastructure, as well as techniques to combat these threats.


Best Vulnerability Management Solution

The entrant must be a vulnerability management provider whose solution helps organisations identify and manage vulnerabilities associated with system configurations, patches and other information security challenges.


Best Human Risk Solution

The entrant must be a security awareness training and/or bahavioural science specialist offering ready-to-use security training and awareness campaigns and/or behavioural science to better equip organisations against real-world cyber-threats.


Best Penetration Testing Solution

The entrant must be a penetration testing services provider or software vendor that helps organisations detect exploitable vulnerabilities within their IT systems, networks and applications through simulated cyber-attacks.


Best Security Compliance Solution

The entrant must be a security compliance vendor whose product enables organisations to manage their security processes, systems and policies to identify areas of compliance and non-compliance.


Best New Launch Product

The entrant must be a security vendor with a new product or service focused on protecting organisations’ networks, systems and applications from threats. The product or service must have been launched after 1 July 2024.


Best Ransomware Solution

The entrant must be an organisation which offers a ransomware protection that assesses and mitigates ransomware risks while aiding enterprises’ understanding of their ransomware response capabilities.

 


Best Network Security Solution

The entrant must be an organisation which offers a network security solution that defends all forms of information from cyber-attacks, unauthorised access and data loss.


Cyber Security Company of the Year

Entrant must be a cyber-security company with a demonstrable history of offering enterprise-level innovative and comprehensive cyber-security solutions with a significant growth in adoption, client base or product/service effectiveness over the past 12 months.

 


Cyber Security Start-up Company of the Year

A company less than three years old who wishes to gain credibility, build industry connections, and establish itself as a rising star.


Best SIEM Solution

The entrant must offer a SIEM solution designed to recognise and address security threats and vulnerabilities while meeting compliance requirements using advanced AI/ML and UEBA features.


Best Identity and Access Management Solution

The entrant must offer an IAM solution designed to manage users, applications, and users’ access to applications within organisations using authentication and single sign-on (SSO) capabilities.


Best SaaS Security Posture Management Solution

The entrant must offer a SaaS Security Posture Management solution providing visibility into the security posture of SaaS environments and remediating security concerns via automation capabilities.


Best Emerging Security Technology

The entrant must offer an emerging security technology including AI/ML, blockchain, IoT and quantum computing aimed at enabling organisations to enhance their security posture, mitigate potential risks and safeguard sensitive data.

Linked InXFacebook

Round 2 Info

Linked InXFacebook

Round 2 Guidelines

Recordings must be no longer than 2 minutes. Each category will be scored according to the criteria below. You are free to submit a video in any format you prefer.  We accept entries from mobile device recordings in portrait of a single speaker, to landscape recordings with slides/additional data. Our recommendation is authenticity and originality to support your Round 1 entry.

 

Each category will be scored within the guidelines below: 

Categories


Best Cloud Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Email Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Incident Response Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Endpoint Protection Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best AI Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Threat Intelligence Technology

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Vulnerability Management Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Human Risk Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Penetration Testing Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?

 


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Security Compliance Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best New Launch Product

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Ransomware Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Network Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber Security Company of the Year

Innovation and Vision

 

How innovative is the company's product development process? Does it consistently deliver innovative and effective solutions?

 

Market Leadership

 

How strong is the company's market position? Is it a leader in its industry?


 

Customer Satisfaction

 

How satisfied are the company's customers? Does it have a strong reputation for customer service and support?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Cyber Security Start-up Company of the Year

Innovation and Vision

 

How innovative is the company's approach to cyber-security? Do you have a clear and compelling vision for the future of the industry?

 

Market Impact

 

How significant is the company's impact on the cyber-security market? Have you disrupted the industry or addressed a specific market need?


 

Customer Satisfaction

 

How satisfied are the company's customers? Does it have a strong reputation for customer service and support?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best SIEM Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Identity and Access Management Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem? How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices? Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance? What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Zero Trust Security Solution

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?

 

 


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?


Best Emerging Security Technology

Innovation and Uniqueness

 

How innovative is the product - does it offer a unique solution to a specific cyber-security problem?  How does the product differentiate itself from existing solutions in the market?

 

Technical Feasibility and Security

 

Is the product's technical foundation solid - does the product adhere to industry-standard security principles and best practices?  Can the product scale to accommodate an evolving threat landscape?


 

Product Performance

 

Does the product have a proven track record of effectively mitigating cyber-security threats – what are the metrics that demonstrate performance?  What are the product's real-world impacts?

 

Presentation and Communication Skills

 

Is the pitch clear, concise, and easy to understand? Is the pitch engaging and visually appealing?

Linked InXFacebook

Judges

Linked InXFacebook

Our judges are industry-renowned experts in their field. Each brings their expertise to bear to judge the teissAwards2026. 

Judges

Thom Langford

Thom Langford

Founder, (TL)2 Security

 

Thom is an industry engaged and sought after information security subject matter expert and speaker. Currently the EMEA CTO for Rapid7, Thom collaborates with customers, businesses and the media as a whole, further exploring his passion of communicating and educating on information security topics to audiences through storytelling, humour and plain language.

 

He founded (TL)2 Security to offer strategic information security consultancy that focuses on Virtual CISO, strategic business alignment and public speaking/advocacy for hire. Thom has also been Chief Information Security Officer at Velonetic (insurance) and Publicis Groupe (communications and marketing), building global teams and security capabilities from the ground up.

 

An international public speaker and award-winning security blogger and podcaster, Thom is also the sole founder of Host Unknown, a loose collective of three infosec luminaries combined to make security education and infotainment films. Google is your friend if you want to find out more about Thom.

Lisa Ventura

Lisa Ventura

Editor & Founder, Cyber Security Unity

 

Lisa is a keynote speaker, moderator and panellist, and has taken part in numerous conferences and events, both in-person and virtual. She is often asked to write articles, blogs and press features about cyber security, neurodiversity, mental health issues and more.

Danny Dresner

Danny Dresner

Professor of Cyber Security, University of Manchester

 

Danny is a respectable Professor of Cyber Security at the University of Manchester and a Fellow of the Institute of Information Security Professionals. Whilst at the NCSC, he created the core of SANS' training for BS 7799, edited national security breaches surveys, and wrote the first standards for source code escrow. He has contributed to books, conferences, and appeared on numerous TV channels including the BBC.

Steve Furnell

Steve Furnell

Professor of Cyber Security, University of Nottingham

 

Steven is a Professor of Cyber Security at the University of Nottingham. His main research interests are broadly linked to the intersection of human, technological and organisational aspects of cyber security, and has authored over 330 papers in refereed international journals and conference proceedings, as well as various books, chapters, and professional articles.

Edd Hardy

Edd Hardy

Director of Cyber security,  AlixPartners

 

Edd has worked in most roles in cyber, from pentesting and audit through to risk management and CISO roles.  

 

He is a highly experienced consultant, manage cyber risk to enable organization growth and security. Working with investors and the C-suite to ensure security is adding value to the organization.

 

He has helped large organizations transform their cyber programs from reactive functions that inhibit the business into proactive value creating teams.  Not only aligning cyber with the organizations risk requirements but using it to deliver business objectives, create flexibility and enable the organization to safely embrace risk. 

Andrea Cullen

Andrea Cullen

CEO & Co-Founder, CAPSLOCK

 

Andrea has years of industrial experience as a  computer programmer and systems analyst working on projects throughout the UK where she has been responsible for the development and implementation of many software systems. She co-authored, developed, and delivered the GCHQ-certified Cyber Security Master’s degree at the University of Bradford, and is also the Co-founder and Head of Research & Development at CAPSLOCK. 

Paul Watts

Paul Watts

Distinguished Analyst, Information Security Forum

 

Paul is a senior Information Security and Technology professional with over twenty-six years’ experience covering vertical markets including Transportation, Banking and Finance, Manufacturing, Retail and Telecommunications both in Europe and the UK. He was named as one of the top 100 global CISOs in the HotTopics.ht “CISO 100 2017” in 2017 and 2020.

David Cartwright

David Cartwright

CISO, Santander International

 

Dave has been based in Jersey since 2009, and is presently head of IT security for an international bank. He is the co-founder and chairman of the Jersey Charitable Skills Pool; deputy chairman of the Channel Islands Information Security Forum; a committee member of the Jersey branch of the BCS; and the Digital Committee of the Jersey Chamber of Commerce.

Ed Tucker

Ed Tucker

CyberSecurity CTO, Telefonica Tech 

 

Ed is a recognised expert, with a rich history of creating high performance teams, world class capabilities, driving business resilience and confidence. He is a pragmatic, yet passionate individual with a demonstrable record of defining and executing transformational change into businesses of varying maturities.

Jonathan Craven

Jonathan Craven     

Data privacy and cyber security consultant, XRHA

 

After first training as a psychologist, Jonathan has spent most of his career working in the ‘Holy Trinity’ of public sector employers – local authority, NHS and the police service – in privacy, data protection and information governance. Throughout that time, he has led organisational change to raise awareness, improve training, and
promote better governance and security processes and behaviours.
 
He is currently the Data Privacy and Cyber security consultant at XRHA.
Paul Holland

Paul Holland      

Cyber Capability Manager, Royal Mail

Paul has worked in Information Security and IT for over 25 years, across financial, consultancy and managed services, retail, education, manufacturing and logistics plus more, before joining the ISF in 2019 and presently at Royal Mail. He was previously responsible for technical security, including architecture and penetration testing, and awareness programs as well as managing senior stakeholders and incident response. 
Stuart Frost

Stuart Frost

Head of Enterprise Security and Risk Management    Department for Work and Pensions (DWP)

Stuart Frost, BEM, is head of Enterprise Security and Risk Management within the UK Government. A vastly experienced, highly certified Security and Governance, Risk & Compliance (GRC) professional with extensive sector knowledge and significant experience of delivering successful risk-based security programmes, across large scale, multi-disciplined and geographically dispersed organisations. He is also a leading voice on managing risks faced by the burgeoning use of interconnected supply chains. An accomplished speaker, he has taken part in events across the UK, Europe, USA and Asia.

Stuart has won multiple industry global awards for his work in the GRC space and is adept at integrating all security disciplines to enable a holistic approach in support of business objectives. He was named as one of the UK’s top 50 Tech Leaders and a top 30 Transformational Change Leader in May 2024 for his role in driving innovation and change across the security sector.

He was awarded the British Empire Medal (BEM) in 2017 for his services to the local community and in 2023 was also the proud recipient of the Coronation medal in recognition of his security input to the Coronation of King Charles III.
Chuck Brooks

Chuck Brooks     

Adjunct Professor, Georgetown University

 

Chuck Brooks serves as President of Brooks Consulting International. He also serves as an Adjunct Professor at Georgetown University, teaching graduate courses on risk management, and cybersecurity.


Chuck was named “Top 5 Tech Person to Follow" by LinkedIn” where he has almost  118,000 followers on his profile.he also owns and manages 10 LinkedIn security oriented groups.As a thought leader, blogger, and event speaker, he has briefed the G20 on energy cybersecurity, the US Embassy to the Holy See and Vatican on global cybersecurity cooperation. He has served on two National Academy of Science Advisory groups, including one on digitalizing the USAF, and another on securing BioTech.  He has also addressed USTRANSCOM on cybersecurity and serves on an industry/government Working group for CISA focused on security space systems. 


Chuck's is also a contributor to Forbes, The Washington Post, Dark Reading, Homeland Security Today, Security Information Skytop Media, GovCon, Barrons, The Hill, and Federal Times on cybersecurity and emerging technology topics. He has  57,000 subscribers to his newsletter "Security and Tech Insights." He is also the author of two books on cybersecurity and tech coming out this year. 

Chuck has received presidential appointments for executive service by two U.S. Presidents, and served in executive leadership roles at public companies General Dynamics, Xerox, and Rapiscan. 


He has an MA from the University of Chicago, a BA from DePauw University, and a certificate in International Law from The Hague Academy of International Law.

Keil Hubert

Keil Hubert

Head of Security Awareness & Training, OCC

 

Keil Hubert is the head of Security Training and Awareness for OCC, the world’s largest equity derivatives clearing organization, headquartered in Chicago, Illinois. Prior to joining OCC, Keil has been a U.S. Army medical IT officer, a U.S.A.F. Cyberspace Operations officer, a small businessman, an author, and several different variations of commercial sector IT consultant. Keil deconstructed a cybersecurity breach in his presentation at TEISS 2014, and has served as Business Reporter’s resident U.S. ‘blogger since 2012. His books on applied leadership, business culture, and talent management are available on Amazon.com. Keil is based out of Dallas, Texas.

 

He knows he is only as good as the teams he leads, so he takes time to train, coach, and mentor each person for career growth and success, As a result, can create an environment of cohesion with optimal performance.


His key areas of expertise include Strategic Planning & Execution, Cyber Security, Financial Management, Policy Development & Execution, Project Management, Fraud Management, Staff Development & Leadership, ISO27001, NIS-OES, PCI/DSS & SoX, SOC/SIEM/SIAM/SOAR, ISO25999, NIST CSF, UK/EU Data Protection/GDPR and FCA/EBA Regulation.

Edewede Oriwoh 

Edewede Oriwoh 

Group IT Information and Cyber Security Manager, Zigup Plc

 

Edewede has worked in various areas of Information and Cyber Security including in Data, Identity and Access Management, Asset, Cloud, Vulnerability Management, Cyberphysical, Security Awareness, Threat Hunting and Threat Intelligence, Incident Management and Disaster Recovery, among others. She has a keen interest in Proactive, Continuous, Responsive and Reactive Security.

She encourages the support of end users with security awareness guidance, well-configured and managed tools as well as clear Policies, Processes and Procedures so they can play their part as an essential link in any organisation's Cyber Security chain.

She also promotes the importance of remembering the fundamentals such as making security a habit and, more broadly, remembering that, "If it does not exist, there's nothing to secure".

Sandra Bell

Sandra Bell   

Experienced Cyber Security Leader

 

Sandra is an experienced leader with over 30 years’ experience of helping organisations develop the skill, will and grit to succeed regardless of what happens. She has a track record of facilitating organisations achieve and maintain standards together with firsthand experience of managing crisis, emergency and disaster recovery activities.


Sandra is also a strong influencer who is able to rapidly assimilate complex regulatory and stakeholder environments and ensure risk and compliance solutions are intimately aligned to corporate strategy. An excellent communicator and business builder who has created and led successful business units and consulting practices.

Edward Starkie

Edward Starkie 

Director of Cyber Risk, Thomas Murray 

Edward adopts a business-centric approach to cyber security, data protection, and digital operational resilience. He leverages best practices gained from interacting with a diverse set of organisations and clients.

Edward is confident in his ability to engage effectively with both technical experts and Board-level stakeholders and ultimately deliver tailored services that empower organisations to identify, assess, and sustainably manage cyber security risks in a pragmatic, results-driven manner.
Moona Ederveen-Schneider

Moona Ederveen-Schneider

Advisory Board Member, Cyber London

 

Moona Ederveen, is a Board Advisor and Innovative Tech Influencer, and most recently, served as Executive Director EMEA in financial services. Visiting international security conferences from age 16, she consulted at global banks and advised on cyber security and risk for nearly two decades. As a multi-lingual brand ambassador to financial services, other sectors, and government stakeholders, she is an avid builder of trusted communities. A strong advocate for cross-sector crisis preparedness and resilience, she also works to encourage the next generation of talent into tech careers.

Lessie Skiba

Lessie Skiba

Deputy Managing Director, Cyber Readiness Institute

 
Lessie is Global Director of Outreach and Partner Engagement for the Cyber Readiness Institute. Most recently, she worked for a cybersecurity start-up, Nisos, as Chief of Staff and Interim Director of Marketing. She also brings experience in working with new and emerging technology and cybersecurity companies from her previous role with an early-stage venture capital firm.
Laurie Gibbett

Laurie Gibbett

Cyber Risk Quantification Manager, KPMG

 
Laurie specialises in security strategy and risk. More specifically, she looks to understand cyber risk exposure in financial terms and identify the priority defence mechanisms to reduce cyber risk. She uses Design Thinking techniques to assess situations and scenarios before deep diving into potential solutions.

Laurie is creative at heart, so like to incorporate visual design into her personal and work life. She has an eye for detail however, she likes to bring out key messages and present the bigger picture. She has a strategic approach to most things and purposefully get involved in projects outside her day-to-day work on deals to ensure, she is
working on the strategy of the security business unit, implementing initiatives for purposeful change.
Janet Bastiman

Janet Bastiman

Chief Data Scientist, Napier AI

Dom Lucas

Dom Lucas

Head of Security Technology and Security, British International Investment plc

 

Dom is Head of Security for British International Investment', the UK's Development Finance Institution.  He leads on both security strategy and security operations and has responsibility for cyber, information, physical and travel security. Dom has a broad experience across cyber security having worked across wide range of public and private institutions.  Prior to joining BII, Dom led the client facing security assurance functions for several Magic Circle Law Firms, whilst he has previously held the position of Cyber Specialist Supervisor within the FCA, overseeing the cyber resilience preparedness of UK retail Banks. Dom has a background in Law Enforcement and is currently a member of the Chartered Institute for Information Security and the Security Institute.

Linked InXFacebook

Ceremony & Tables

Linked InXFacebook

teissAwards2026 will take place on the evening of the 26th of February 2026, immediately after teissLondon2026 | The European Information Security Summit.  

 

Both the summit during the day and the awards in the evening will be held at Convene, 155 Bishopsgate, Liverpool Street, London, EC2M 3YD.

 

Our table sales programme is now open. For all enquiries please email n.riza@teiss.co.uk

 

 

Book Seats

Book Individual Seat

 

individual seats are available at £524 per seat and include:

  • Welcome sparkling wine
  • 3 course dinner
  • Awards ceremony
  • Wine, beer, soft drinks with dinner

Book Standard Table

 

Standard tables are available at £4195 per table and include:

  • Welcome sparkling wine
  • 10 seats for you and your colleagues
  • 3 course dinner
  • Awards ceremony
  • Wine, beer, and soft drinks with dinner

Book VIP Table

 

We have two VIP tables available at £4720 per table and includes:

  • Welcome champagne
  • Preferential position in the awards room
  • 10 seats for you and your colleagues
  • 3 course dinner
  • Awards ceremony
  • Winer, beer, soft drinks with dinner
Linked InXFacebook

FAQ

Linked InXFacebook

Find a list of our most frequently asked questions below. Got a question that isn’t on this list? Drop us a line at awards@teiss.co.uk and we’ll get right back to you. 

 

How are the awards organised? 

There are 19 Categories within the teissAwards2026, all focused on recognising excellence amongst the information security vendor market.

 

Who is eligible?

The teissAwards2026 are open to all information security product, service and training providers. Each Category has defined eligibility criteria and guidance on who should apply.

 

How can we enter? 

For each Category, there are a set of questions you must answer in order to make your Round 1 Submission. Your organisation is allowed to enter as many categories as are applicable to you. 

 

You will then need to submit your Round 2 video recording.

 

Please download our Entry kit for full information on entering the teissAwards2025. 

 

Where do we enter? 

Entry is done via this site, by clicking “Enter now” and following the instructions.  You can start and save your entries before submitting.

 

Who decides if we’ve won? 

A select panel of industry experts make up our judging panel. Their details can be seen on the following pages.  They will score all submitted entries that are shortlisted.

 

How much does it cost to enter? 

Entry is free.

 

What are the deadlines for entry? 

1st July 2025 – Round 1 Entry and Round 2 Video Submissions open

23rd November 2025 – Round 1 Entry Submissions close

11th January 2026 – Round 2 Video Submissions close

26th February 2026 - teissAwards2026 winners announced!

 

You must submit your Round 1 Entry before midnight on November 23rd 2025. 

You must submit your Round 2 Video before midnight on the 11th of January. 

You can submit both Round 1 Entry and Round 2 Video at the same time.

Judging of Round 1 Entries takes place after the Round 1 Submissions close date.

Judging of Round 2 Entries takes place after the Round 2 Submissions close date.

Linked InXFacebook

Contact

Linked InXFacebook

To find out more about teissAwards2026, please contact:

 

Submissions Manager: 

Joseph Yiadom | awards@teiss.co.uk 

 

Sponsorship Sales Manager:

Marc Morrow | T: +44 (0)20 8349 6453 | M: +44 (0)7977 926736

E: m.morrow@teiss.co.uk

 

Sponsorship Sales Manager:

Grant Scheffer | T: +44 (0)20 8349 6478 | M: +44 (0)7811010102

E: g.scheffer@teiss.co.uk

 

Sponsorship Sales Manager: 

Jean-Philippe Le Coq | T: +44 (0)20 8349 5592 | M: +44(0)7494 705170

Linked InXFacebook
Affino

Winston House, 3rd Floor, Units 306-309, 2-4 Dollis Park, London, N3 1HF

23-29 Hendon Lane, London, N3 1RT

020 8349 4363

© 2025, Lyonsdown Limited. teiss® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543