Our vision is to build intelligence solutions for the regulatory technology world, empowering domestic and commercial users globally to freely move their data with confidence, knowing that they will be immune from threats.
With over thirteen years experience as a professional consultant working with senior leadership teams, Charles has helped blue chip organisations to reach complex standards and industry best practices, both internal and international, through integrating multi discipline management systems. He developed and designed the Integrated Risk Management platform and is recognised as an industry visionary and leader in the specific fields of information security, business continuity and international standards.
Charles has worked in the regulatory and compliance field for the past 18 years. His early career of 10 years with Kimberly-Clark, founded his experience and knowledge in global methodology deployments.
Stephen with 30 years’ experience in software design, development and marketing, as well as being a leading operational practitioner & consultant with certifications as a data protection officer (CDPO, CIPP/E, CIPM). He pioneered the development of concepts and SaaS products for IT GRC from 2002, managing both internal and external software development resources. He has held multiple company directorships since 1990 and been employed by clients as heads of governance, information security, cyber security and data management.
Chief Information Security Officer (CISO) at Acuity with over 20 years’ experience as an enterprise security specialist with an MSc in cyber security and ethical hacking. He is an offensive security professional leading our technical interface between Acuity RegTech and our UK leading academic collaboration research staff, in the testing and assurance of our iSoS [iDIS (IoT Detect Inspect and Secure) SoS (Security Operating System) cyber threat reference architecture, and design and build demonstrator.
Neurotechnology, Artificial Intelligence, Machine learning, D-S Evidence Theory, Behavioural Analysis, Blockchain Technology, Deep Learning, Quantum Computing, Quantum Programming (Q#, Q), Robotic’s. Offensive and defensive enterprise security operations, primarily focusing on identifying security gaps, threat modelling, security architecture and military technology’s.
In this capacity Duane advices on market growth, scalability and exit strategies. Based in the UK since 2003, Duane brings with him successful runs leading both high-growth SMEs and mid-market publically-traded global technology and service businesses. A business and finance graduate of the University of Notre Dame in the US, Duane has a track record spanning nearly three decades in technology-solution sales, operations and Executive Management.
A chartered accountant in charge of finance and investor relations. He is a successful entrepreneur and former Global Program Manager at HSBC Global Banking & Markets. Bill leads our project’s financial planning and accounting direction.
A reader in cyber security. Dr Epiphaniou is a cyber security consultant with high engagement with several industry partners in information security domains. He delivers a broad range of technical and bespoke consultancy and has worked with several government agencies including the MoD in cyber security related projects.
An international, sector-focused law firm with more than 1,400 legal professionals in 18 cities around the world. They provide global leadership and regulatory compliance counsel on privacy issues and develop functional compliance programs for national and international clients. Gowling WLG work with Acuity to protect and patent our innovations in IoT threat detection, visualisation and remediation architecture.
WCRI consists of 24 academics and based at the University of Wolverhampton city campus and the Hereford Centre for Cyber Security (HCCS). WCRI validate our high-quality impacted research and in turn will result in the University of Wolverhampton being a leader in world class research/innovation within cyber security.
M-O-H is a cyber security and information security provider delivering technical assurance. M-O-H increases our clients cyber security maturity, establishing a relationship of trust throughout the entire cyber life-cycle of vulnerability discovery and remediation. Their service is underpinned by a highly configurable technology platform, through an innovative ‘Pentest-as-a-Service’ model.