To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Thought Leader
HP creates technology that makes life better for everyone, everywhere. Through our portfolio of printers, PCs, mobile devices, solutions, and services, we engineer experiences that amaze.
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers’ most complex challenges in every region of the world.
Printer security is a topic of growing importance and HP recently announced the new Laser Jet Printer portfolio that delivers increased protection against malicious attacks. The stronger security is part of a broader HP strategy to provide the deepest security across PCs and printers. More information about the new HP LaserJet Enterprise portfolio is available at www.hp.com/go/PrintersThatProtect.
HP will continue to focus on security for its printing portfolio by delivering market leading security technology for new and existing printers, helping customers better protect their devices, data and documents.
Learn more at www.hp.com
National Presenting Sponsors
SentinelOne is transforming endpoint security to protect organizations against advanced, nation state and known threats. The company uses dynamic execution inspection to detect and protect devices against targeted, zero day threats in real time. SentinelOne was formed by an elite team of cyber security and defense experts from Intel, McAfee, Checkpoint, IBM and the Israel Defense Forces. The company’s investors include Accel Partners, Data Collective, Granite Hill Capital Partners, Tiger Global Management and The Westly Group.
Learn more at www.sentinalone.com
Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP and Oracle cyber-security, Onapsis’ patented solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Headquartered in Boston, MA., Onapsis serves over 180 Global 2000 customers and are the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.
Learn more at www.onapsis.com
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this we safely enable applications, users and content and deliver visibility, automation and control, as well as the ability to detect and prevent breaches at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.
Learn more at www.paloaltonetworks.com
Cybereason was founded in 2012 by a team of ex-military cyber security experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel and Tokyo, Japan.
Learn more at www.cybereason.com/
Netskope™ is the leader in safe cloud enablement. Only the Netskope Active Platform™ enables you to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Netskope is headquartered in Los Altos, California. Follow us on twitter @Netskope. To learn more, visit www.netskope.com
Learn more at www.netskope.com
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Since data has no natural defenses, it requires protection that’s as close to it as possible. This is precisely what Vormetric provides. Trusted by businesses and governments for over a decade, Vormetric’s data-cen¬tric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through: Access Policies and Privileged User Control - Fine-grained control to determine who can access specific data in order to block privileged users such as root as well as Advanced Persistent Threats (APTs). Data Encryption and Centralized Key Management - Lock down data using strong industry approved algorithms coupled with a security appliance for key and policy management. Security Intelligence - Compliance reports and continuous monitoring provide visibility and sophisticated analytics on access to sensitive data.
Learn more at www.vormetric.com