To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Thought Leader
PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Learn more at www.Phishme.com
Since data has no natural defenses, it requires protection that’s as close to it as possible. This is precisely what Vormetric provides. Trusted by businesses and governments for over a decade, Vormetric’s data-cen¬tric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through: Access Policies and Privileged User Control - Fine-grained control to determine who can access specific data in order to block privileged users such as root as well as Advanced Persistent Threats (APTs). Data Encryption and Centralized Key Management - Lock down data using strong industry approved algorithms coupled with a security appliance for key and policy management. Security Intelligence - Compliance reports and continuous monitoring provide visibility and sophisticated analytics on access to sensitive data.
Learn more at www.vormetric.com
Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium’s technological innovations have earned the company numerous industry awards. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers.
Learn more at www.bromium.com
Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs.
Learn more at www.secureworks.com/
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere — in the cloud, on the road, in the office — simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.
Learn more at www.forcepoint.com
Security Intelligence. Think Integrated
The threat landscape continues to challenge organizations with increases in advanced attacks resulting in more security breaches, while mobile, social and cloud initiatives create greater IT complexity and expose new vulnerabilities. To keep pace, you need a proactive, big-picture approach to protecting users, data and infrastructure in an integrated manner.
IBM Security offers a framework of integrated security intelligence capabilities, backed by industry-leading experience and supported by world-renowned IBM X-Force research and development.
These capabilities and services are delivered through a comprehensive and robust set of tools and best practices delivering distinct value through Intelligence, Expertise, and Integration
Learn more at ibm.com/security
Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.
Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.
Learn more at www.optiv.com
ServiceNow is changing the way people work. With a service-orientation toward the activities, tasks and processes that make up day-to-day work life, we help the modern enterprise operate faster and be more scalable than ever before. Customers use our service model to define, structure and automate the flow of work, removing dependencies on email and spreadsheets to transform the delivery and management of services for the enterprise. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more. We deliver a ‘lights-out, light-speed’ experience through our enterprise cloud — built to manage everything as a service.
Learn more at www.servicenow.com
Solutionary is the leading pure-play managed security service provider (MSSP), focused on delivering managed security services and global threat intelligence. Comprehensive Solutionary security monitoring and security device management services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Solutionary clients are able to optimize current security programs, make informed security decisions, achieve regulatory compliance and reduce costs. The patented, cloud-based ActiveGuard® service platform uses multiple detection technologies and advanced analytics to protect against advanced threats. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extension of clients’ internal teams, providing industry-leading client service to global enterprise and mid-market clients in a wide range of industries, including financial services, healthcare, retail and government. Services are delivered 24/7 through multiple, state-of-the-art Security Operations Centers (SOCs) in North America.
Learn more at www.solutionary.com
Founded in 2012 by a team of security experts, Bluebox Security offers the first mobile data security solution to safeguard corporate data across the device, application, and network. The cloud-based solution provides complete visibility and security of corporate data, while providing employees the freedom, ease of use, and privacy that ensures widespread adoption. Bluebox Security has received a total of $27.5 million in funding from Andreessen Horowitz, Tenaya Capital, Sun Microsystems co-founder, Andreas Bechtolsheim, SV Angel, and Google Board member Ram Shriram. The company is headquartered in San Francisco. For more information visit www.bluebox.com or follow us on Twitter @blueboxsec.
Learn more at www.bluebox.com
Contrast Security is the world’s only application security software that quickly and accurately stops hackers from stealing data via web applications — the most successful attack vector. Industry research shows that application security flaws are the leading source of successful data breaches yet more than 90% of applications are not secure. Unlike legacy security products that do not defend applications, Contrast employs patented, deep security instrumentation to strengthen applications before they’re deployed, protect them in production and provide visibility throughout the application lifecycle. As a result, organizations can act faster against threats and immediately reduce their attack surface. More information on Contrast Security can be found at http://www.contrastsecurity.com/
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software-as-a- Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage — even malware-free intrusions. Falcon’s patented lightweight endpoint sensor can be deployed to over 100,000 endpoints in hours providing visibility into billions of events in real-time. CrowdStrike operates on a highly scalable subscription-based business model that allows customers the flexibility to use CrowdStrike-as-a-Service to multiply their security team’s effectiveness and expertise with 24/7 endpoint visibility, monitoring, and response.
Learn more at www.crowdstrike.com
CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies — including 40 of the Fortune 100 — to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Learn more at www.cyberark.com
Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. The company’s award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. Their software solution discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.
Learn more at www.identityfinder.com
Netskope™ is the leader in safe cloud enablement. Only the Netskope Active Platform™ enables you to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Netskope is headquartered in Los Altos, California. Follow us on twitter @Netskope. To learn more, visit www.netskope.com
Learn more at www.netskope.com
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. More than 2,000 customers, including Adobe, Allergan, Chiquita, LinkedIn, MGM Resorts International and Western Union, trust Okta to help their organizations work faster, boost revenue, and stay secure.
Learn more at www.okta.com
Saviynt is the leading provider of access and data governance & intelligence solutions across Cloud, Critical Enterprise Applications, and Big Data platforms (e.g. Office 365, Workday, Box, SAP, Epic, SAP HANA, Hadoop, Oracle EBS, PeopleSoft, etc.) Saviynt combines application access management, usage analytics, data access governance, and security & compliance controls to secure enterprise applications & data assets.
Learn more at saviynt.com/
SecureAuth is the leader in adaptive authentication and information security solutions that deliver secure access control across cloud, mobile, web and VPN resources. With multi-factor authentication and single sign-on in one solution, SecureAuth’s unique architecture enables organizations to leverage their legacy infrastructures while embracing next generation technologies. This preserves existing investments while also meeting today’s security challenges. SecureAuth is deployed -- and trusted -- by over one thousand enterprise customers worldwide. For the latest insights on secure access control visit www.secureauth.com.
Learn more at www.gosecureauth.com
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—keys and certificates—so they can’t be misused by bad guys in attacks. Venafi constantly assesses which keys and certificates are trusted, protects those that should be trusted, and fixes or blocks those that are not.
Learn more at www.venafi.com
Veracode’s cloud-based service is a simpler and more scalable approach to reduce application-layer risk across your entire global software infrastructure -- including web, mobile and third-party applications -- without hiring more consultants or installing more servers and tools. With Veracode's smart approach to application security, you can drive your innovations to market faster -- without sacrificing security in the process.
Learn more at www.veracode.com
WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company's flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.
Learn more at www.whitehatsec.com