To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Thought Leader
HP creates technology that makes life better for everyone, everywhere. Through our portfolio of printers, PCs, mobile devices, solutions, and services, we engineer experiences that amaze.
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers’ most complex challenges in every region of the world.
Printer security is a topic of growing importance and HP recently announced the new Laser Jet Printer portfolio that delivers increased protection against malicious attacks. The stronger security is part of a broader HP strategy to provide the deepest security across PCs and printers. More information about the new HP LaserJet Enterprise portfolio is available at www.hp.com/go/PrintersThatProtect.
HP will continue to focus on security for its printing portfolio by delivering market leading security technology for new and existing printers, helping customers better protect their devices, data and documents.
Learn more at www.hp.ca
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the "central nervous system" for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
Learn more at www.tanium.com
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere — in the cloud, on the road, in the office — simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.
Learn more at www.forcepoint.com
LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
Learn more at www.logrhythm.com/
RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events. RedSeal helps customers understand their network from the inside out — providing actionable intelligence, situational awareness and a Digital Resilience Score to help enterprises measure and improve their resilience.
Learn more at www.redsealnetworks.com
Arbor Networks is the leading provider of network security and management solutions for enterprise and service provider networks. Arbor Networks protects enterprises from distributed denial of service attacks and advanced malware using Arbor’s global network intelligence. Arbor's proven solutions help grow and protect customer networks, businesses and brands.
Learn more at www.arbornetworks.com/
Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT™ stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Visit www.cylance.com or call 877-973-3336 for more information.
Learn more at www.cylance.com/
FireEye protects the most valuable assets in the world from those who have them in their sights. Its combination of technology, intelligence and expertise—reinforced with the most aggressive incident-response team—helps eliminate the impact of security breaches. With FireEye, you’ll detect attacks as they happen, you’ll understand the risk these attacks pose to your most valued assets, and you’ll have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000. For more information, visit www.FireEye.com.
Learn more at www.fireeye.com
Netskope™ is the leader in cloud security. Trusted by the world’s largest companies, Netskope’s cloud-scale security platform enables security professionals to understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work. Netskope — security evolved.
Learn more at www.netskope.com
Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP and Oracle cyber-security, Onapsis’ patented solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Headquartered in Boston, MA., Onapsis serves over 180 Global 2000 customers and are the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.
Learn more at www.onapsis.com
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this we safely enable applications, users and content and deliver visibility, automation and control, as well as the ability to detect and prevent breaches at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.
Learn more at www.paloaltonetworks.com
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management.
Learn more at www.securonix.com
Your enterprise needs to move faster, but lack of process and legacy tools hold you back. Every day, thousands of customer requests, IT incidents, and HR cases follow their own paths—moving back and forth between people, machines, and departments. Unstructured. Undocumented. Unimproved for years. With the ServiceNow System of ActionTM you can replace these unstructured work patterns of the past with intelligent workflows of the future. Now every employee, customer, and machine can make requests on a single cloud platform. Every department working on these requests can assign and prioritize, collaborate, get down to root cause issues, gain real-time insights, and drive to action. Your employees are energized, your service levels improve, and you realize game-changing economics. Work at LightspeedTM.
Learn more at www.servicenow.com
Bitdefender is a global security technology company that provides cutting edge end-to-end cyber security solutions and advanced threat protection to more than 500 million users in more than 150 countries. Since 2001, Bitdefender has consistently produced award-winning security technology, and is a provider of choice in both hybrid infrastructure security and endpoint protection. Through R&D, alliances and partnerships, Bitdefender is trusted to be ahead and deliver robust security you can rely on.
Learn more at www.bitdefender.com/business
CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies — including 40 of the Fortune 100 — to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Learn more at www.cyberark.com
Cybereason was founded in 2012 by a team of ex-military cyber security experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel and Tokyo, Japan.
Learn more at www.cybereason.com/
Dimension Data is a USD 7.5 billion ICT solutions and services provider with over 26,000 employees and with operations in 58 countries. Its security business delivers broad technical and integration expertise across a variety of IT disciplines to over 6,000 security clients globally. www.dimensiondata.com
Learn more at www.dimensiondata.com
Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Its EnCase® platform provides the foundation for government, corporate and law enforcement organizations to respond to eDiscovery requests; conduct internal investigations; respond to regulatory inquiries or perform data and compliance auditing; and defend the network and secure sensitive data. There are more than 30,000 licensed users of the EnCase technology worldwide, and thousands attend Guidance Software's renowned training programs annually.
Learn more at www.guidancesoftware.com
Illumio delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. The company’s Adaptive Security Platform™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, and container in data centers and public clouds. Using Illumio, enterprises such as Morgan Stanley, Plantronics, NTT, and Creative Artists Agency have achieved secure application and cloud migration, environmental segmentation, high-value application protection from breaches and threats, and compliance with no changes to applications or infrastructure.
Learn more at www.illumio.com
Learn more at www.oneidentity.com
Proficio is a leading provider of next-generation managed security services. We are changing the way organizations meet their IT security and compliance goals by providing the most advanced cloud-based solutions to monitor and scan critical assets without the need for added headcount or costly software or hardware systems. Proficio’s ProSOC is a Next-Generation Security Operations Center (SOC) subscription service that logs, monitors and analyzes organizations’
security events. Staffed 24×7 by security experts and using industry leading SIEM technology, ProSOC helps organizations address critical security and compliance needs, prevents data breaches, and reduce costs. Our customers value our insight, experience and unrelenting passion for defending their networks and applications from cyber attacks.
Learn more at www.proficio.com
Rapid7 is the leading provider of unified vulnerability management and penetration testing solutions, delivering actionable intelligence about an organization’s entire IT environment. Rapid7 offers the only integrated threat management solution that enables organizations to implement and maintain best practices and optimize their network security, Web application security and database security strategies.
Recognized as the fastest growing vulnerability management company in the U.S. by Inc. Magazine, Rapid7 helps leading organizations such as Liz Claiborne, the United States Postal Service, Carnegie Mellon University and Red Bull to mitigate risk and maintain compliance for regulations such as PCI, HIPAA, FISMA, SOX and NERC. Rapid7 also manages the Metasploit Project, the leading open-source penetration testing platform with the world’s largest database of public, tested exploits. To obtain a free download of NeXpose or Metasploit, please visit http://www.rapid7.com/resources/free-downloads.jsp.
Learn more at www.rapid7.com
RiskRecon brings greater transparency, accountability and productivity to your third-party risk management process. Our SaaS platform delivers frequent, comprehensive and actionable security performance measurements and management tools.
Unlike alternative providers, we originate our own information by directly measuring the ever-changing attack surface area of any organization.
Learn more at www.riskrecon.com
SecureWorks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, predict emerging threats, and prioritize and respond rapidly to security breaches.
Learn more at www.secureworks.com/
Skyhigh Networks, the world’s leading Cloud Access Security Broker (CASB), enables enterprises to safely adopt cloud services, while meeting their security, compliance and governance requirements. With more than 600 enterprise customers globally, Skyhigh provides organizations the visibility and management for all their cloud services, including enforcement of data loss prevention policies; detecting and preventing internal and external threats; encrypting data with customer-controlled keys; and implementing access-control policies. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia Capital, Thomvest Ventures, Tenaya Capital and other strategic investors.
Learn more at www.skyhighnetworks.com
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Thales is a global technology leader for the Aerospace, Transport, Defense and Security markets. With 62,000 employees in 56 countries, Thales reported sales of €14 billion in 2015. With over 22,000 engineers and researchers, Thales has a unique capability to design and deploy equipment, systems and services to meet the most complex security requirements.
Positioned as a value-added systems integrator, equipment supplier and service provider, Thales is one of Europe’s leading players in the security market. The Group’s security teams work with government agencies, local authorities and enterprise customers to develop and deploy integrated, resilient solutions to protect citizens, sensitive data and critical infrastructure.
Thales offers world-class cryptographic capabilities and is a global leader in cybersecurity solutions for defence, government, critical infrastructure providers, telecom companies, industry and the financial services sector. With a value proposition addressing the entire data security chain, Thales offers a comprehensive range of services and solutions ranging from security consulting, data protection, digital trust management and design, development, integration, certification and security maintenance of cybersecured systems, to cyberthreat management, intrusion detection and security supervision through cybersecurity Operation Centres in France, the United Kingdom, The Netherlands and Hong Kong.
Learn more at www.thalesesecurity.com/
Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves application security from inception through production so that businesses can confidently innovate with the applications they build, buy and deploy as well as the components they integrate into their environments.
Learn more at www.veracode.com