To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Presenting Sponsors
PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Learn more at www.Phishme.com
RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.
Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.
Learn more at www.EMC.com/RSA
Accuvant + FishNet Security is the nation’s premier cyber security solutions provider delivering information security and risk products and services to help enterprises combat the growing cyber threat. The combined organization helps security leaders, their teams, boards and customers more successfully achieve peace of mind. For more information, please visit www.fishnetsecurity.com or www.accuvant.com.
Learn more at www.fishnetsecurity.com
CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike’s next-generation threat protection platform leverages real-time Stateful Execution Inspection (SEI) at the endpoint and Machine Learning in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform is a combination of big data technologies and endpoint security driven by advanced threat intelligence. CrowdStrike Falcon enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.
Learn more at www.crowdstrike.com
Since data has no natural defenses, it requires protection that’s as close to it as possible. This is precisely what Vormetric provides. Trusted by businesses and governments for over a decade, Vormetric’s data-cen¬tric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through: Access Policies and Privileged User Control - Fine-grained control to determine who can access specific data in order to block privileged users such as root as well as Advanced Persistent Threats (APTs). Data Encryption and Centralized Key Management - Lock down data using strong industry approved algorithms coupled with a security appliance for key and policy management. Security Intelligence - Compliance reports and continuous monitoring provide visibility and sophisticated analytics on access to sensitive data.
Learn more at www.vormetric.com
CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies — including 40 of the Fortune 100 — to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Learn more at www.cyberark.com
Delivering complete and connected solutions Dell Software empowers organizations of all sizes to experience Dell’s “power to do more” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results.
Learn more at www.dellsoftware.com
HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today’s applications and IT infrastructures from sophisticated cyber threats.
Learn more at www.hpenterprisesecurity.com
NetIQ is a global, enterprise software company with a relentless focus on customer success. Customers and partners choose NetIQ to regain control over the persistent challenges of change, complexity and risk. Our portfolio includes scalable, automated solutions for Identity, Security, Access, Governance, Systems and Application, Service, and Workload Management that help organizations securely deliver, manage and measure computing services across physical, virtual and cloud computing environments. Our in-depth understanding of how highly distributed enterprises deliver IT services drives us to develop intelligent IT solutions that deliver reliable and cost-effective results.
Learn more at www.netiq.com
Gartner recommends that automated incorporation of security requirements into the overall requirements management process should be sought out and leveraged wherever possible. Security Compass will guide you through the current way security requirements are handled and how you can mitigate risks during the earliest stages of the software development lifecycle saving your team time and money.
Learn more at securitycompass.com/
Solutionary is the leading pure-play managed security service provider (MSSP), focused on delivering managed security services and global threat intelligence. Comprehensive Solutionary security monitoring and security device management services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Solutionary clients are able to optimize current security programs, make informed security decisions, achieve regulatory compliance and reduce costs. The patented, cloud-based ActiveGuard® service platform uses multiple detection technologies and advanced analytics to protect against advanced threats. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extension of clients’ internal teams, providing industry-leading client service to global enterprise and mid-market clients in a wide range of industries, including financial services, healthcare, retail and government. Services are delivered 24/7 through multiple, state-of-the-art Security Operations Centers (SOCs) in North America.
Learn more at www.solutionary.com
WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company's flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.
Learn more at www.whitehatsec.com
AT&T delivers a suite of performance and protection services for web sites and applications globally through its partnership with Akamai Technologies. AT&T leverages its Global Internet Data Centers, as well as the extended reach of its Global IP network coupled with Akamai’s Intelligent Platform. As one of the world’s largest Internet providers, AT&T uses its unmatched global view and intelligence of the threat landscape to identify, predict and thwart DDoS application layer attacks and expand protection from new and emerging threats. To learn more, visit us at att.com/cdn
Learn more at www.att.com/cdn
Bay Dynamics is the market leader in providing cybersecurity solutions to protect organizations across the world from evolving security threats and to reduce their business risk with its innovative next generation machine learning and predictive analytics technology.
Learn more at www.baydynamics.com
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.
Learn more at www.bitsighttech.com
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.
Learn more at www.bluecoat.com
Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium’s technological innovations have earned the company numerous industry awards. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers.
Learn more at www.bromium.com
CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive cloud application and data discovery, protection — strong encryption, tokenization, data loss prevention, key management and malware detection — and activity and anomaly monitoring services.
Learn more at www.ciphercloud.com
Cisco is the worldwide leader in networking that transforms how people connect, communicate, and collaborate. Since 1984, Cisco has led in the innovation of IP-based networking technologies, including routing, switching, security, TelePresence systems, unified communications, video, and wireless. The company's responsible business practices help ensure accountability, business sustainability, and environmentally conscious operations and products.
Learn more at www.cisco.com
Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs.
Learn more at www.secureworks.com/
Dtex stops insider cyber threats. Mature global organizations deploy Dtex’s lightweight endpoint technology to get complete user visibility across their entire enterprise without any noticeable system or network impact. By gathering and analyzing anonymized metadata, Dtex's advanced user analytics identifies the highest risk users without violating employee privacy. Dtex ships with hundreds of patterns built from 10+ years of insider threat investigations that are highly effective in spotting malicious insiders, insiders colluding with external parties, and employees who accidentally expose the company to theft and loss.
Learn more at www.dtexsystems.com
Elastica is the leader in Data Science Powered™ Cloud Application Security. Its CloudSOC™ platform empowers companies to confidently leverage cloud applications and services while staying safe, secure and compliant. A range of Elastica Security Apps deployed on the extensible CloudSOC™ platform deliver the full life cycle of cloud application security, including auditing of shadow IT, real-time detection of intrusions and threats, protection against intrusions and compliance violations, and investigation of historical account activity for post-incident analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. Learn more about Elastica at http://www.elastica.net.
Learn more at elastica.net
Gurucul is transforming the enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms.
Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.
Learn more at www.gurucul.com
Hexis Cyber Solutions, Inc., a wholly-owned subsidiary of The KEYW Holding Corporation (NASDAQ: KEYW), based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC).
Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions' HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation's cybersecurity missions to ensure that your business or organization can operate at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail firstname.lastname@example.org.
Learn more at www.hexiscyber.com
Illumio reduces the surface area of attack by securing the 80 percent of data center and cloud traffic missed by the perimeter. The Illumio Adaptive Security Platform (ASP)™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, and container in data center and public cloud infrastructure. Organizations such as Morgan Stanley, Plantronics, NTT, and Creative Artists Agency are using Illumio to enable cloud migration, achieve DevOps speed and nano-segment applications for compliance or environmental separation. For more information, visit www.illumio.com or follow us @Illumio
Learn more at www.illumio.com
Lumension, a HEAT Software Company, is a global leader in endpoint management and security, delivering security software solutions that help businesses protect their vital information and manage risk across network and endpoint assets.
The award-winning Lumension solution portfolio includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus, and Reporting and Compliance offerings, addressing endpoint security, IT operations and compliance challenges, and providing crucial visibility into an organization’s IT environment.
More than 3,000 customers worldwide, across a wide range of industries, choose Lumension to achieve optimal security and IT success. Lumension is known for providing world-class customer support and services 24x7, 365 days a year.
Learn more at www.lumension.com
Malwarebytes provides software designed to protect consumers and businesses against advanced threats that consistently escape detection by other antivirus solutions. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts.
Learn more at www.malwarebytes.org/
Menlo Security protects organizations from cyber attack by eliminating the threat of malware. Menlo Security’s Isolation Platform isolates all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Its Adaptive Clientless Rendering™ (ACR) technology deploys within minutes and can easily scale to provide comprehensive protection across organizations of any size without impacting the user experience. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. The company was founded by security industry veterans, in collaboration with acclaimed researchers from the University of California, Berkeley. Backed by General Catalyst, Sutter Hill Ventures and Osage University Partners, Menlo Security is headquartered in Menlo Park, California. For more information, visit www.menlosecurity.com or twitter.com/menlosecurity.
Learn more at www.menlosecurity.com
The leader in Mobile Device Management software, MobileIron has been chosen by thousands of organizations that are transforming their businesses through Mobile IT. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls.
Learn more at www.mobileiron.com
Netskope™ is the leader in safe cloud enablement. Only the Netskope Active Platform™ enables you to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Netskope is headquartered in Los Altos, California. Follow us on twitter @Netskope. To learn more, visit www.netskope.com
Learn more at www.netskope.com
Okta is the market leading on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web based applications, both in the cloud and behind the firewall. Okta delivers a complete solution addressing the needs of IT, end users, and business leaders; no customization required.
With a catalog of pre-integrated applications and deep integration with Active Directory, Okta provides IT centralized user provisioning, access management, and reporting. Every end user gets a personalized, single sign-on home page for all of their applications, and business leaders get the insight they need to maximize ROI and track compliance.
Learn more at www.okta.com
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, steadfast commitment to innovation and game-changing next-generation security platform, more than 13,500 customers have chosen Palo Alto Networks and this number grows every day. Our platform natively brings together all key network security functions, including firewall, URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy products. As a result, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives like cloud, SDN and mobility, and protect the organization from the most basic to multi-faceted and complicated cyber attacks — known and unknown.
Learn more at www.paloaltonetworks.com
Proficio is a leading provider of next-generation managed security services. We are changing the way organizations meet their IT security and compliance goals by providing the most advanced cloud-based solutions to monitor and scan critical assets without the need for added headcount or costly software or hardware systems. Proficio’s ProSOC is a Next-Generation Security Operations Center (SOC) subscription service that logs, monitors and analyzes organizations’
security events. Staffed 24×7 by security experts and using industry leading SIEM technology, ProSOC helps organizations address critical security and compliance needs, prevents data breaches, and reduce costs. Our customers value our insight, experience and unrelenting passion for defending their networks and applications from cyber attacks. For more information see:http://www.proficio.com.
Learn more at www.proficio.com
PwC helps organizations and individuals create the value they’re looking for. We’re a network of firms in 158 countries with more than 180,000 people who are committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com.
PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.
Learn more at www.pwc.com
Raytheon Cyber Products’ portfolio of cyber security solutions provides unprecedented visibility into the enterprise and utilizes advanced analytics to enable a new level of cyber risk management. Through continuous monitoring of end points, user activity and other key assets, real-time data is collected and analyzed so decisions can be made instead of merely reacting to alerts. With over twenty years of experience in developing and implementing products for some of the most sensitive and critical enterprise systems operating in the world today, customers trust solutions from Raytheon Cyber Products because they are scalable, secure, architecturally superior and cost effective.
Learn more at www.raytheon.com/cyberproducts
RiskIQ detects online threats that exploit customers and damage enterprise brands. The company discovers and continuously analyzes web and mobile assets from the user perspective to detect malware, fraud and brand infringements. RiskIQ’s cloud service is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and is backed by Battery Ventures and Summit Partners.
Learn more at www.riskiq.com
Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Venrock, Norwest, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Oakley Networks, McAfee, and Google.
Learn more at www.shapesecurity.com
Organizations are increasingly concerned with how to bridge the gap between technology, risk management, and cyber security in preparation for the new wave of cyber attacks. Understanding this concern, industry veterans Gordon Shevlin and Jeff Bennett have established SiegeSecure. By bringing together Allgress, a Risk Based Big Data Platform, and its surrounding integration partners, SiegeSecure has developed a security-GRC ecosystem. SiegeSecure will leverage the technology integration with each partner to develop and promote comprehensive, best of breed security solutions. These partnerships bring a unique value story which lends itself to the overall context of risk and compliance, and the technology integration between these partners is what sets us apart in the industry.
Learn more at www.siegesecure.com
Splunk Enables Operational Intelligence
Splunk is software used to monitor, report and analyze machine data. This data is generated by all applications, systems and infrastructure - located on-premise or in the cloud. Machine data is massive in scale, unstructured and contains a definitive record of transactions, systems, applications and user activity. It’s also largely unused, trapped in rigid, silo-based systems. Only Splunk lets you capture and analyze real-time and historical machine data in one place, so you can unlock its value.
Learn more at www.splunk.com
Vulnerability discovery used to mean settling for automated solutions, overtaxing internal resources or a quarterly point-in-time test. Costs rose even as efficacy declined, and companies were unable to see themselves through an attacker’s eyes.
With Synack, that stops now.
Synack’s crowd security intelligence brings continuous, human-powered vulnerability intelligence to the enterprise. Our Security-as-a-Service model allows our customers to engage a global team of security researchers, vetted for trust and skill, for a fraction of the cost of a full-time equivalent.
Come by our booth to learn more about this exciting approach to vulnerability discovery.
Learn more at www.synack.com
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the "central nervous system" for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
Learn more at www.tanium.com
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc
Learn more at www.tripwire.com
Veracode’s cloud-based service is a simpler and more scalable approach to reduce application-layer risk across your entire global software infrastructure -- including web, mobile and third-party applications -- without hiring more consultants or installing more servers and tools. With Veracode's smart approach to application security, you can drive your innovations to market faster -- without sacrificing security in the process.
Learn more at www.veracode.com