To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Thought Leader
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software-as-a- Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage — even malware-free intrusions. Falcon’s patented lightweight endpoint sensor can be deployed to over 100,000 endpoints in hours providing visibility into billions of events in real-time. CrowdStrike operates on a highly scalable subscription-based business model that allows customers the flexibility to use CrowdStrike-as-a-Service to multiply their security team’s effectiveness and expertise with 24/7 endpoint visibility, monitoring, and response.
Learn more at www.crowdstrike.com
PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Learn more at www.Phishme.com
Saviynt is the leading provider of access and data governance & intelligence solutions across Cloud, Critical Enterprise Applications, and Big Data platforms (e.g. Office 365, Workday, Box, SAP, Epic, SAP HANA, Hadoop, Oracle EBS, PeopleSoft, etc.) Saviynt combines application access management, usage analytics, data access governance, and security & compliance controls to secure enterprise applications & data assets.
Learn more at saviynt.com/
Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—keys and certificates—so they can’t be misused by bad guys in attacks. Venafi constantly assesses which keys and certificates are trusted, protects those that should be trusted, and fixes or blocks those that are not.
Learn more at www.venafi.com
Since data has no natural defenses, it requires protection that’s as close to it as possible. This is precisely what Vormetric provides. Trusted by businesses and governments for over a decade, Vormetric’s data-cen¬tric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through: Access Policies and Privileged User Control - Fine-grained control to determine who can access specific data in order to block privileged users such as root as well as Advanced Persistent Threats (APTs). Data Encryption and Centralized Key Management - Lock down data using strong industry approved algorithms coupled with a security appliance for key and policy management. Security Intelligence - Compliance reports and continuous monitoring provide visibility and sophisticated analytics on access to sensitive data.
Learn more at www.vormetric.com
FireEye® has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,000 customers across more than 40 countries, including over one-third of the Fortune 100.
Learn more at www.fireeye.com
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere — in the cloud, on the road, in the office — simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.
Learn more at www.forcepoint.com
Security Intelligence. Think Integrated
The threat landscape continues to challenge organizations with increases in advanced attacks resulting in more security breaches, while mobile, social and cloud initiatives create greater IT complexity and expose new vulnerabilities. To keep pace, you need a proactive, big-picture approach to protecting users, data and infrastructure in an integrated manner.
IBM Security offers a framework of integrated security intelligence capabilities, backed by industry-leading experience and supported by world-renowned IBM X-Force research and development.
These capabilities and services are delivered through a comprehensive and robust set of tools and best practices delivering distinct value through Intelligence, Expertise, and Integration
Learn more at ibm.com/security
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. More than 2,000 customers, including Adobe, Allergan, Chiquita, LinkedIn, MGM Resorts International and Western Union, trust Okta to help their organizations work faster, boost revenue, and stay secure.
Learn more at www.okta.com
Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.
Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.
Learn more at www.optiv.com
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.
Learn more at www.paloaltonetworks.com
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management.
Learn more at www.securonix.com
ServiceNow is changing the way people work. With a service-orientation toward the activities, tasks and processes that make up day-to-day work life, we help the modern enterprise operate faster and be more scalable than ever before. Customers use our service model to define, structure and automate the flow of work, removing dependencies on email and spreadsheets to transform the delivery and management of services for the enterprise. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more. We deliver a ‘lights-out, light-speed’ experience through our enterprise cloud — built to manage everything as a service.
Learn more at www.servicenow.com
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.
Learn more at www.bluecoat.com
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyber-attacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Learn more at www.checkpoint.com/
Cisco is the worldwide leader in networking that transforms how people connect, communicate, and collaborate. Since 1984, Cisco has led in the innovation of IP-based networking technologies, including routing, switching, security, TelePresence systems, unified communications, video, and wireless. The company's responsible business practices help ensure accountability, business sustainability, and environmentally conscious operations and products.
Learn more at www.cisco.com
Contrast Security is the world’s only application security software that quickly and accurately stops hackers from stealing data via web applications — the most successful attack vector. Industry research shows that application security flaws are the leading source of successful data breaches yet more than 90% of applications are not secure. Unlike legacy security products that do not defend applications, Contrast employs patented, deep security instrumentation to strengthen applications before they’re deployed, protect them in production and provide visibility throughout the application lifecycle. As a result, organizations can act faster against threats and immediately reduce their attack surface. More information on Contrast Security can be found at http://www.contrastsecurity.com/
CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies — including 40 of the Fortune 100 — to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Learn more at www.cyberark.com
Cybereason was founded in 2012 by a team of ex-military cyber security experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel and Tokyo, Japan.
Learn more at www.cybereason.com/
Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT™ stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Visit www.cylance.com or call 877-973-3336 for more information.
Learn more at www.cylance.com/
Can I give my organization what it wants without putting it at risk?
Yes. With Dell Security, you can govern every identity, inspect every packet, and say yes to helping your organization innovate securely. When network security and identity management work together, you can keep productivity high and vulnerability low.
Learn more at security.dell.com/
Gemalto delivers digital security software, devices and services to many of the world's best known businesses and governments. 14,000 employees serve customers in 180 countries including thousands of enterprises, national administrations, mobile operators, financial institutions, transport operators and a vast number of other industries. They use Gemalto’s technology to deliver personal mobile services, payment security, authenticated cloud access, data encryption, border & visa management, software monetization, machine-to-machine applications and much more.
Learn more at www.gemalto.com
Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. The company’s award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. Their software solution discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.
Learn more at www.identityfinder.com
LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC) and information security (InfoSec) software. Built on the patented Dynamic Content Framework (DCF), LockPath’s flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. LockPath serves a client base of global organizations ranging from small and midsize companies to Fortune 10 enterprises in more than 15 industries. LockPath is headquartered in Overland Park, Kansas.
Learn more at www.lockpath.com
Malwarebytes provides software designed to protect consumers and businesses against advanced threats that consistently escape detection by other antivirus solutions. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts.
Learn more at www.malwarebytes.org/
MobileIron is a leader in mobile enterprise security. The MobileIron platform is designed to secure data-at-rest on the mobile devices, in apps, and in cloud storage, and secure data-in-motion as it moves between the corporate network, devices, and storage repositories. With MobileIron, IT can secure corporate information wherever it lives while preserving the sanctity of employee privacy.
Learn more at www.mobileiron.com
Netskope™ is the leader in safe cloud enablement. Only the Netskope Active Platform™ enables you to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Netskope is headquartered in Los Altos, California. Follow us on twitter @Netskope. To learn more, visit www.netskope.com
Learn more at www.netskope.com
Founded in 2013, Palerra was the first Cloud Access Security Broker (CASB) to automate the entire security lifecycle, from threat detection to remediation, in order to effectively combat cyber crime and keep enterprises secure. Palerra enables organizations to protect business-critical cloud infrastructure and data with LORIC™, the cloud security automation platform. LORIC is delivered as a service and can be deployed in minutes.
Learn more at www.palerra.com
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including 4 of the 5 largest U.S. financial institutions. PhishLabs combines proprietary technology, intelligence, and human expertise to rapidly detect, analyze, and stop targeted cyberattacks before they impact organizations. Additionally, the company provides robust threat intelligence that strengthens existing cyber defenses and optimizes threat prevention. Leading organizations partner with PhishLabs to more effectively disrupt targeted cyberattacks, prevent data breaches, and reduce online fraud.
Learn more at www.phishlabs.com/
ProtectWise™ is disrupting network security with its Cloud Network DVR, a virtual camera in the cloud that records everything on the network. The service allows security professionals to see threats in real time and continuously goes back in time to discover previously unknown threats automatically. ProtectWise harnesses the power of the cloud to provide complete visibility and detection of enterprise threats and accelerated incident response. The Cloud Network DVR delivers an unlimited retention window with full-fidelity forensic capacity, the industry’s only automated smart retrospection, advanced security visualization, and the ease and cost-savings of an on-demand deployment model. ProtectWise is led by a team of security SaaS industry veterans from McAfee, IBM, Mandiant and Proofpoint.
Learn more at www.protectwise.com
SecureAuth is the leader in adaptive authentication and information security solutions that deliver secure access control across cloud, mobile, web and VPN resources. With multi-factor authentication and single sign-on in one solution, SecureAuth’s unique architecture enables organizations to leverage their legacy infrastructures while embracing next generation technologies. This preserves existing investments while also meeting today’s security challenges. SecureAuth is deployed -- and trusted -- by over one thousand enterprise customers worldwide. For the latest insights on secure access control visit www.secureauth.com.
Learn more at www.secureauth.com
SertintyONE has revolutionized the way data can be protected. SertintyONE SmartData technology takes normal data and makes it self-protecting, self-governing and self-administrating. Once protected, SmartData requires no external controls to ensure that the data protects itself regardless of its location inside or outside your firewalls. Our SmartData technology embeds an intelligence engine (a brain) inside your data, enabling full authentication, access and governance controls to stay with your data. We don’t just embed the intelligence (brain) inside your data; we actually encrypt and amalgamate the data together. This unique data mixture process allows us to ensure that no two files are ever mixed the same way, yet we make the encryption process transparent to any user of the data. In essence, we remove the complexity of encryption and provide you with a data file that protects itself against unwanted use at any level.
Learn more at www.Sertintyone.com
Solutionary is the leading pure-play managed security service provider (MSSP), focused on delivering managed security services and global threat intelligence. Comprehensive Solutionary security monitoring and security device management services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Solutionary clients are able to optimize current security programs, make informed security decisions, achieve regulatory compliance and reduce costs. The patented, cloud-based ActiveGuard® service platform uses multiple detection technologies and advanced analytics to protect against advanced threats. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extension of clients’ internal teams, providing industry-leading client service to global enterprise and mid-market clients in a wide range of industries, including financial services, healthcare, retail and government. Services are delivered 24/7 through multiple, state-of-the-art Security Operations Centers (SOCs) in North America.
Learn more at www.solutionary.com
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the "central nervous system" for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
Learn more at www.tanium.com
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Veracode’s cloud-based service is a simpler and more scalable approach to reduce application-layer risk across your entire global software infrastructure -- including web, mobile and third-party applications -- without hiring more consultants or installing more servers and tools. With Veracode's smart approach to application security, you can drive your innovations to market faster -- without sacrificing security in the process.
Learn more at www.veracode.com
WhiteHat Security has been in the business of securing web applications for 15 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company’s flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments.
Learn more at www.whitehatsec.com