Enter TechRound’s Cybersecurity40 2025!

TechRound is proud to announce our third Cybersecurity40 campaign, an annual competition that celebrates the most exciting companies in the cybersecurity space across the UK and Europe.

Whether your business has been innovating in the space for 20 years or just 2 months, this is an opportunity to share your story with thousands of readers.

Entry is completely free, and all those featured will get a full-page write up, giving you great exposure to our network of readers, investors, founders and industry leaders.

Since launching in 2016, TechRound has become the UK’s best-known and fastest-growing startup and tech news site. Our platform is where decision-makers, investors and startups of all sizes and nature come to find out the latest developments and trends within the industry.

Looking to enter? Find all the details below!

 

Entries Open: 8th October 2024

Entry Cost: Free

Entry Deadline: 22nd October, 5pm GMT

Winners To Be Announced: 30th October 2025, 10am GMT

 

 

cybersecurity-logo

 

 

Why Enter?

 

  • Featured in front of an audience of 150,000+ visitors per month
  • Top 40 placements get a full-page write-up (see example)
  • Recognised by VCs, investors, journalists and industry leaders
  • Free to enter

 

Our Criteria

 

  • All companies must have a cyber security angle
  • Revenue not a deciding factor
  • New businesses and established businesses welcome

 

Meet The Judges

 

Chris 2

Chris Newton-Smith, CEO at IO

Chris has spent my career leading technology businesses through growth and transformation, with a focus on scaling globally, driving innovation, and helping organisations adapt in fast-moving industries. Before joining IO, I held senior leadership roles atBoku, iRiS Software Systems, and Redknee Solutions, which provided me with a front-row view of how technology can unlock resilience and opportunity when applied effectively.

Find out what Chris is looking for from entrants here.

 

AJ-thompson-northdoor

AJ Thompson, Chief Commercial Officer at Northdoor plc

With nearly three decades of cyber security leadership at Northdoor plc, AJ Thompson has combined technical expertise with commercial strategy to help shape the industry’s evolution. As Chief Commercial Officer since 1997, he has guided organisations through changing security landscapes, from data protection to advanced cloud security and supply chain risk management

Jacob W. Anderson, Owner at Beyond Ordinary

Jacob W. Anderson is a seasoned professional with extensive experience in software development, cybersecurity, and artificial intelligence, particularly within the insurance industry. As the President of Beyond Ordinary Software Solutions since 2000, Anderson has been instrumental in developing software solutions for the property and casualty insurance sector.

Dana Leigh

Dana Leigh, Editor at TechRound

Dana has been working at TechRound for over 5 years, taking a keen interest in the cybersecurity industry.

She has run the cybersecurity40 three years in a row, showing her commitment to spotlighting companies in the space.

Cynthia

Cynthia Overby, Director of Strategic Security Solutions, ZCOE at Rocket Software

As director of security, customer solutions engineering at Rocket Software, Cynthia leads the company’s suite of solutions, focusing on mainframe security, cyber defence, and data protection, positioning Rocket Software as a leader in the compliance and risk management space.

With over 40 years of industry expertise in sectors including financial services, healthcare, IT, and cybersecurity, Cynthia brings a wealth of knowledge in security strategy, executive leadership, and business case development. As a dedicated advocate for women in cybersecurity and diversity in tech, Cynthia also serves on the Board of Directors at SHARE, where she leads the Women in IT initiative, mentoring and developing the next generation of female tech leaders.

 

How Is the Competition Judged?

 

Our judges are the experts, so we ask them to rank all the companies that enter based on their own criteria. We then cross-reference their rankings to generate our top 40 companies in cybersecurity.

 

Important! Advice From The Judges

 

Use the first line to describe your business, what it does and what you are about in two sentences…what makes you tick?

With our judges reading through hundreds of applications, we are looking for a clear description of your business, its concept, its success and plans for growth.

Try to avoid waffle, and discuss your business clearly and concisely.

Model application example 1 >>
Model application example 2 >>

 

 

Enter TechRound's Cybersecurity40 2025

  • Separate multiple founders by commas
  • Note: Duplicate agency email addresses may lead to the entry not being processed
  • Use The TechRound Linkedin address if you don't have one
  • Use The TechRound Twitter address if you don't have one
  • Max. file size: 64 MB.
  • Max. file size: 64 MB.
  • When did you start? What challenges have you overcome? What impact on the cybersecurity industry has the company had? Avoid using apostrophes and quotation marks, as well as the word "execute", "executive" in the description as this triggers the spam filter.