logotype
  • HOME
  • ABOUT
    • ETHOS
    • STEERING BOARD
  • EVENTS
  • PARTNERS
  • CONTACT
Register now
Login

Login

Lost your password?

Register

A link to set a new password will be sent to your email address.

Your personal data will be used to support your experience throughout this website, to manage access to your account, and for other purposes described in our privacy policy.

logotype
  • HOME
  • ABOUT
    • ETHOS
    • STEERING BOARD
  • EVENTS
  • PARTNERS
  • CONTACT
Register now
Login

Login

Lost your password?

Register

A link to set a new password will be sent to your email address.

Your personal data will be used to support your experience throughout this website, to manage access to your account, and for other purposes described in our privacy policy.

  • HOME
  • ABOUT
    • ETHOS
    • STEERING BOARD
  • EVENTS
  • PARTNERS
  • CONTACT
logotype
Register Now
  • HOME
  • ABOUT
    • ETHOS
    • STEERING BOARD
  • EVENTS
  • PARTNERS
  • CONTACT
Login
TEAM
HomeTeamMark Walmsley
Chair

Mark Walmsley

Mark is an experienced and award-winning security professional. His early career was as an investigator before studying law and eventually moving into security where he has held senior positions for the past 15 years.
EMAIL:
example@email.com

enquiry@s4sclub.co.uk

4th Floor

205 Regent Street

Mayfair

London

W1B 4HB

Linkedin

About S4S Club

Home
Events
Partners
My Bookings
Ethos
Steering Board
Contact

Legal & Policies

Privacy Policy
Cookie Policy
Terms and Conditions
logotype

Copyright © 2025 S4S by RAWR. All Rights Reserved

S4S Club X
Manage Consent

We use cookies to enhance your experience. Accepting them lets us process data like browsing behavior. You can withdraw consent anytime, but some features may not work properly.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Cyberfort

At Cyberfort we are passionate about the cyber security services we deliver for our customers which keeps their people, data, systems and technology infrastructure secure, resilient and compliant.

Our business offers National Cyber Security Centre assured Consultancy services, Identification and Protection against cyber-attacks, proactive Detection and Response to security incidents through our security operations centre and a Secure and Recover set of Cloud solutions which keeps data safely stored, managed and available 24/7/365.

Over the past 20 years we have combined our market leading accreditations, peerless cyber security expertise, strong technology partnerships, investment in our future cyber professionals and secure locations to deliver a cyber security experience for customers which enables them to achieve their business and technology goals in an ever-changing digital world.

Visit us at www.cyberfortgroup.com to find out more.

    Verizon Business

    Verizon is one of the world’s leading providers of technology and communications services, with a presence around the world. The company offers data, video and voice services and solutions on its award-winning networks and platforms, delivering on customers’ demand for mobility, reliable network connectivity, security and control.

    We provide network security, managed detection and response and investigative response services to some of the world’s largest organisations. Our in-house expertise, threat intelligence and partnerships with many leading security technology vendors enable us to provide flexible and technologically advanced solutions.

    We have an award-winning consulting services organisation providing strategic and architectural consulting and security assurance services, and are one of the world’s largest PCI QSAs.

    View Website

    Synack

    Synack’s premier security testing platform enables a vetted community of security researchers to deliver continuous penetration testing and vulnerability management, with transformational results. We are committed to reducing cybersecurity risk for our customers, bridging the cybersecurity talent gap and giving organizations on-demand access to improved security testing capacity and analytics on a single platform.

    As your organization’s digital footprint scales and transforms, so too must your security testing. Whether driven by initiatives such as business transformation or more secure code deployments, truly strategic security testing requires on-demand access to scarce, highly skilled and diverse testing talent.

    As you scale it becomes challenging to ensure vulnerabilities don’t exist and, oftentimes, to obtain the security testing coverage that matters most to your organization. This is due to noisy results, managing a high number of vendors and inefficient and disruptive reporting. In an ideal scenario, testing results are clearly communicated in ways that are actionable to internal teams, promote efficient remediation and help security leaders identify the root causes of vulnerabilities.

    Furthermore, digital transformation brings with it a more dynamic attack surface: code deployments introduce new vulnerabilities, cloud environments evolve, compliance and regulatory requirements remain a priority, and APIs abound. Because of this dynamism, point-in-time security assessments are no longer representative of your holistic security posture over time. Plus, with the rising complexity of application architectures, it is unlikely that one or two testers will have sufficient expertise to cover complex architecture variations. More diverse skill sets are required.

    Additionally, adversaries are becoming more sophisticated as breaches and ransomware increase in frequency. Announced vulnerabilities can be deployed as attacks by adversaries in minutes, faster than most organizations can respond.

    These challenges give rise to the need for continuous, agile and effective security testing that can combat today’s adversaries with offensive techniques.

    Synack has the experience and capabilities to help organizations at every stage of their digital transformation.

    View Website

    Qualys

    Qualys, Inc (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100.

    Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings.

    The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices.

    Founded in 1999 as one of the first SaaS security companies, Qualys has strategic partnerships and seamlessly integrates its vulnerability management capabilities into security offerings from cloud service providers, including Amazon Web Services, the Google Cloud Platform and Microsoft Azure, along with a number of leading managed service providers and global consulting organizations.

    View Website

    Illumio

    Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.

    The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-value assets and compromised systems to proactively or reactively stop the spread of a breach.

    ZTS is proven to help organizations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects.

    Assume breach. Minimize impact. Increase resilience.

    View Website

    Halcyon

    Halcyon is the industry’s first dedicated, adaptive security platform that combines multiple proprietary advanced prevention engines along with AI models focused specifically on stopping ransomware.

    View Website

    Google Cloud Security

    Transform your cybersecurity with frontline intelligence, expertise and AI-powered cloud innovation.

    With Google Cloud, you can prevent, detect, investigate and respond to security incidents before they impact your business, and build on the most trusted, secure cloud to drive your organization’s digital transformation.

    View Website

    DTEX Systems

    As the trusted leader of insider risk management, DTEX transforms enterprise security by displacing reactive tools with a proactive solution that stops insider risks from becoming data breaches.

    DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforce.

    Backed by behavioral science, powered by AI, and used by governments and organizations around the world, DTEX is the trusted authority for protecting data and people at scale with privacy by design.

    View Website

    Cyber Vigilance

    Cyber Vigilance are a UK based cyber security solutions and services provider, focused on supporting our customers through industry leading, disruptive technologies and expert level skills.

    In the heart of everything we do is a consultative-led approach to working with our customers, partnering with them on their long-term strategy to ensure they are making the right decision for their unique business needs.

    Our focus is protecting People, Email, Web and Endpoints no matter where they are.

    View Website

    Cyderes

    Cyderes (cyber-defense-and-response) provides best-in-class managed security services on a global scale, for the modern digital workforce.

    Born from the best of two award-winning cybersecurity companies, Herjavec Group and Fishtech Group, Cyderes provides the people, processes, and technology to manage risk, and detect and respond to any threats – in ways that are better, faster, more scalable, and more cost-effective than traditional in-house solutions.

    View Website

    Gigamon

    Gigamon® offers a deep observability into your network data that helps supercharge cloud, security, and observability tools with real-time network-derived intelligence and insights so you can eliminate security and performance blind spots, proactively mitigate security and compliance risk, deliver a superior digital experience, and manage your hybrid and multi-cloud IT infrastructure with greater ease, efficiency, and effectiveness.
    Gigamon delivers tangible business benefits across three dimensions:

    • Ensure cloud security by eliminating blind spots and detecting vulnerabilities across NorthSouth, East-West container, and encrypted traffic
    • Enhance business agility by accelerating cloud migration and re-platforming projects through a common tools stack
    • Contain hybrid cloud cost and complexity by simplifying monitoring and compliance by providing access to all network traffic across any hybrid or multi-cloud infrastructure

    Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.

    To learn more, please View Website

    Acora

    Acora is a progressive technology services provider that is leading the industry with its Experience Led ApproachTM. Their mission is to unleash the potential of people, through outstanding IT experiences, striking the right balance between frictionless user experience and best-in-class security. Acora continually invests in the right people, processes and platforms, that enable businesses to excel and reach their full potential.

    There is an ever-increasing need to be better than our adversaries, which means detecting threats and enacting containment strategies instantaneously to reduce the impact of cyber-attacks.

    At Acora, we know that CISOs are spending most of their time trying to fix cyber problems instead of focusing on innovating within their business. We also know that CISOs spend 80% of their time managing suppliers to ensure they do their job. Wouldn’t it be nice if 20% is spent on supplier management and 80% is spent focused on their CISO role?

    By choosing a cyber security partner like Acora, we enable the CISO to be more successful. As a trusted supplier, we want our customers to put their faith in Acora and our capabilities.

    View Website