To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Presenting Sponsors
PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Learn more at www.Phishme.com
CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike’s next-generation threat protection platform leverages real-time Stateful Execution Inspection (SEI) at the endpoint and Machine Learning in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform is a combination of big data technologies and endpoint security driven by advanced threat intelligence. CrowdStrike Falcon enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.
Learn more at www.crowdstrike.com
Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine technology, services, support, and training. FishNet Security solutions have enabled 4,500 clients to better manage risk, meet compliance requirements, and reduce costs while maximizing security effectiveness and operational efficiency.
Learn more at www.fishnetsecurity.com
Since data has no natural defenses, it requires protection that’s as close to it as possible. This is precisely what Vormetric provides. Trusted by businesses and governments for over a decade, Vormetric’s data-cen¬tric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through: Access Policies and Privileged User Control - Fine-grained control to determine who can access specific data in order to block privileged users such as root as well as Advanced Persistent Threats (APTs). Data Encryption and Centralized Key Management - Lock down data using strong industry approved algorithms coupled with a security appliance for key and policy management. Security Intelligence - Compliance reports and continuous monitoring provide visibility and sophisticated analytics on access to sensitive data.
Learn more at www.vormetric.com
CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies — including 40 of the Fortune 100 — to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Learn more at www.cyberark.com
HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today’s applications and IT infrastructures from sophisticated cyber threats.
Learn more at www.hpenterprisesecurity.com
NetIQ is a global, enterprise software company with a relentless focus on customer success. Customers and partners choose NetIQ to regain control over the persistent challenges of change, complexity and risk. Our portfolio includes scalable, automated solutions for Identity, Security, Access, Governance, Systems and Application, Service, and Workload Management that help organizations securely deliver, manage and measure computing services across physical, virtual and cloud computing environments. Our in-depth understanding of how highly distributed enterprises deliver IT services drives us to develop intelligent IT solutions that deliver reliable and cost-effective results.
Learn more at www.netiq.com
Gartner recommends that automated incorporation of security requirements into the overall requirements management process should be sought out and leveraged wherever possible. Security Compass will guide you through the current way security requirements are handled and how you can mitigate risks during the earliest stages of the software development lifecycle saving your team time and money.
Learn more at securitycompass.com/
Solutionary is the leading pure-play managed security service provider (MSSP), focused on delivering managed security services and global threat intelligence. Comprehensive Solutionary security monitoring and security device management services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Solutionary clients are able to optimize current security programs, make informed security decisions, achieve regulatory compliance and reduce costs. The patented, cloud-based ActiveGuard® service platform uses multiple detection technologies and advanced analytics to protect against advanced threats. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extension of clients’ internal teams, providing industry-leading client service to global enterprise and mid-market clients in a wide range of industries, including financial services, healthcare, retail and government. Services are delivered 24/7 through multiple, state-of-the-art Security Operations Centers (SOCs) in North America.
Learn more at www.solutionary.com
WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company's flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.
Learn more at www.whitehatsec.com
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.
Learn more at www.bitsighttech.com
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.
Learn more at www.bluecoat.com
Box provides a secure way to share content and improve collaboration on any device. Desktop, tablet or mobile. From huge corporations to mom and pop stores, Box believes technology should never limit anything you do. Businesses of any size can be more productive, inventive and powerful on Box. The company is well funded by top VC firms like Andreessen Horowitz, Draper Fisher Jurvetson and U.S. Venture Partners. Box is proud to be on Forbes’ list of America’s Most Promising Companies, is used in 225,000 businesses - including 99% of the Fortune 500 — and is the go-to product of 25 million people.
Learn more at www.box.com
Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium’s technological innovations have earned the company numerous industry awards. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers.
Learn more at www.bromium.com
CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive cloud application and data discovery, protection — strong encryption, tokenization, data loss prevention, key management and malware detection — and activity and anomaly monitoring services.
Learn more at www.ciphercloud.com
Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs.
Learn more at www.secureworks.com/
Delivering complete and connected solutions Dell Software empowers organizations of all sizes to experience Dell’s “power to do more” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results.
Learn more at www.dellsoftware.com
Elastica is the leader in Data Science Powered™ Cloud Application Security. Its CloudSOC™ platform empowers companies to confidently leverage cloud applications and services while staying safe, secure and compliant. A range of Elastica Security Apps deployed on the extensible CloudSOC™ platform deliver the full life cycle of cloud application security, including auditing of shadow IT, real-time detection of intrusions and threats, protection against intrusions and compliance violations, and investigation of historical account activity for post-incident analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. Learn more about Elastica at http://www.elastica.net.
Learn more at elastica.net
GuruCul is the leading provider of security and business intelligence solutions. GuruCul products will improve risk, threat, and compliance postures by applying a unique identity centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed industry’s most advanced patent pending algorithms for risk profiling and analyzing trends, to detect threats and anomalous behavior. GuruCul’s intelligent risk platform will help your organization efficiently protect intellectual property and effectively manage risk.
GuruCul Risk Analytics Capabilities
• 360 degree view of user Identity, Access, and Activity Profile Information
• Advanced Identity, Access, and Activity Analytics
• Insider and Advanced Persistent Threat Detection
• Risk Based Access Controls
• Privileged & Shared Account Monitoring
• Identity and Access Intelligence
• Risk Based Compliance
• Activity Self Audit Statements
• Forensic / Investigation Assistance
• Intelligent Roles Based Access
Learn more at www.gurucul.com
The leader in Mobile Device Management software, MobileIron has been chosen by thousands of organizations that are transforming their businesses through Mobile IT. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls.
Learn more at www.mobileiron.com
Okta is the market leading on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web based applications, both in the cloud and behind the firewall. Okta delivers a complete solution addressing the needs of IT, end users, and business leaders; no customization required.
With a catalog of pre-integrated applications and deep integration with Active Directory, Okta provides IT centralized user provisioning, access management, and reporting. Every end user gets a personalized, single sign-on home page for all of their applications, and business leaders get the insight they need to maximize ROI and track compliance.
Learn more at www.okta.com
PwC helps organizations and individuals create the value they’re looking for. We’re a network of firms in 158 countries with more than 180,000 people who are committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com.
PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.
Learn more at www.pwc.com
Raytheon Cyber Products’ portfolio of cyber security solutions provides unprecedented visibility into the enterprise and utilizes advanced analytics to enable a new level of cyber risk management. Through continuous monitoring of end points, user activity and other key assets, real-time data is collected and analyzed so decisions can be made instead of merely reacting to alerts. With over twenty years of experience in developing and implementing products for some of the most sensitive and critical enterprise systems operating in the world today, customers trust solutions from Raytheon Cyber Products because they are scalable, secure, architecturally superior and cost effective.
Learn more at www.raytheon.com/cyberproducts
Splunk Enables Operational Intelligence
Splunk is software used to monitor, report and analyze machine data. This data is generated by all applications, systems and infrastructure - located on-premise or in the cloud. Machine data is massive in scale, unstructured and contains a definitive record of transactions, systems, applications and user activity. It’s also largely unused, trapped in rigid, silo-based systems. Only Splunk lets you capture and analyze real-time and historical machine data in one place, so you can unlock its value.
Learn more at www.splunk.com
Vulnerability discovery used to mean settling for automated solutions, overtaxing internal resources or a quarterly point-in-time test. Costs rose even as efficacy declined, and companies were unable to see themselves through an attacker’s eyes.
With Synack, that stops now.
Synack’s crowd security intelligence brings continuous, human-powered vulnerability intelligence to the enterprise. Our Security-as-a-Service model allows our customers to engage a global team of security researchers, vetted for trust and skill, for a fraction of the cost of a full-time equivalent.
Come by our booth to learn more about this exciting approach to vulnerability discovery.
Learn more at www.synack.com
Tanium is the first and only security and systems management solution to allow truly real-time data collection and change at enterprise scale.
Learn more at www.tanium.com/
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc
Learn more at www.tripwire.com
Veracode’s cloud-based service is a simpler and more scalable approach to reduce application-layer risk across your entire global software infrastructure -- including web, mobile and third-party applications -- without hiring more consultants or installing more servers and tools. With Veracode's smart approach to application security, you can drive your innovations to market faster -- without sacrificing security in the process.
Learn more at www.veracode.com