Loading... Please wait...

Fall Current Sponsors

Platinum Sponsors

Booz Allen Hamilton has been at the forefront of strategy and technology for more than 100 years. Today, the firm provides management and technology consulting and engineering services to leading Fortune 500 corporations, governments, and not-for-profits across the globe. Booz Allen partners with public and private sector clients to solve their most difficult challenges through a combination of consulting, analytics, mission operations, technology, systems delivery, cybersecurity, engineering, and innovation expertise.

With international headquarters in McLean, Virginia, the firm employs more than 22,500 people globally, and had revenue of $5.27 billion for the 12 months ended March 31, 2015. To learn more, visit www.boozallen.com. (NYSE: BAH)

Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations to make better decisions and mitigate risk. The company's unique Deep & Dark Web data, expertise, and technology enable our customers to glean intelligence that informs risk and protects their ability to operate. Fortune 500 and government customers utilize Flashpoint's intelligence across the enterprise, including bolstering cybersecurity, confronting fraud, detecting insider threats, enhancing physical security, assessing M&A opportunities, and addressing vendor risk and supply chain integrity. For corporations with limited experience availing themselves of Deep & Dark Web intelligence, Flashpoint has tailored offerings that deliver comprehensive reporting and monitoring on their behalf. Flashpoint is backed by Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.


IBM is one of the world's largest information technology companies with over 100 years of leadership in helping institutions innovate. As a recognized security leader, we help protect clients from billions of security events each day. Our technologies assist in solving the most difficult security issues and enable secure access to people, data, applications and infrastructure. In today's world, companies are dealing with a massive volume of both structured and unstructured data and traditional security solutions are no longer sufficient. IBM's approach enables a more holistic, comprehensive perspective and can enhance your security maturity.

For more details on IBM Security Solutions visit: ibm.com/security
Follow @IBMSecurity on Twitter: www.twitter.com/ibmsecurity #ibmsecurity, #ibmbanking


Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Cisco, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia, and Salesforce.com.


Zscaler ensures that more than 15 million employees across thousands of enterprises and government organizations worldwide are protected against cyber-attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location. Zscaler effectively moves security into the Internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software. To learn more, visit www.zscaler.com

Gold Sponsors

Arbor Networks, the cyber security division of NETSCOUT, helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context so customers can solve problems faster and reduce the risks to their business. To learn more about Arbor products and services, please visit our website at arbornetworks.com. Arbor's research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.



We help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.

We do this using our unique set of solutions, systems, experience and processes - often collecting and analyzing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world, enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems.

We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA. For further information about BAE Systems, please visit www.baesystems.com/businessdefense.


Cisco delivers intelligent cybersecurity for the real world. This vision is based on a threat-centric approach to security that reduces complexity while providing superior visibility, continuous control, and advanced threat protection across the entire attack continuum. With this new security model, organizations can act smarter and more quickly before, during, and after an attack.


Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware at the endpoint, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Visit www.cylance.com or call 877-973-3336 for information.


Founded in 2014, Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Cymmetria's cyber deception solution, MazeRunner, is at the forefront of deception-based cybersecurity technology.

MazeRunner gives organizations a platform for creating effective deception stories, which create realistic environments for hunting cyber attackers. Deception stories are comprised of breadcrumbs and decoys; they lead attackers to believe that they have successfully gained access to a target machine. Having gained a false sense of security, attackers reveal their attack tools and methods, which defenders are then able to document and analyze. Finally, MazeRunner communicates with an organization's existing defense infrastructure, exporting information that allows for the creation of attack signatures.

Fully customizable and easily deployed, MazeRunner does not burden organizational networks or IT security teams. It is a dynamic solution that helps organizations defend their valuable assets from ever-changing cyber threats.
Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. The company is backed by leading investors such as Y Combinator and Sherpa Capital, and has already gained traction throughout the InfoSec community and global media.


Green Water Station Sponsor

 Edgile was founded in 2001 to deliver strategic cybersecurity and risk management services to the Fortune 500. What distinguishes Edgile in this arena is its business-aligned security approach coupled with the deep knowledge of its professionals and the active engagement of its leadership.

Edgile offers proven services to help solve complex security challenges across many industries including healthcare, financial services, energy, retail, et al. Among its diverse customer base, Edgile works with 45+ companies in the Fortune 500, including more than 12 in the Fortune 100. Edgile is known for the high-caliber of its team, thoughtful and well-structured strategic advice, and stellar execution through leading-edge practices in:

Cybersecurity strategy
Governance, risk and compliance (GRC)
Identity and access management (IAM)
Cloud services and virtual enterprise

With roots established in the Big Four, the leadership at Edgile is among the top professionals in the industry. Edgile has earned its reputation as a trusted advisor to the CSO by aligning security with the strategy, goals and demands of the business. This approach helps to redefine security in terms of strategic capabilities and transform the perception of security into a strategic imperative for the enterprise.
Edgile is headquartered in Austin, Texas, with offices across the U.S.


Invincea's endpoint protection minimizes the trade-off executives are forced to make between security and business performance. Over 25,000 customers rely on Invincea to prevent and detect threats while enabling their workforce to conduct business—in the office or on the road. Invincea protects endpoints by blocking known and unknown malware without signatures, including threats that originate from Weaponized Office docs and spear phishing emails. With Invincea, your workforce won't know it's there, but you will.


KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using mock attacks, engaging interactive training, continuous assessment through simulated phishing, vishing and smishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance.


Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. We enable this digital transformation on a foundation and capability for cybersecurity with products and services that have security built in from the start. Our unique approach combines a comprehensive, agile platform together with unparalleled intelligence and strategic partnerships in order to better protect your endpoints, move faster to detect threats, and respond to security breaches across even the largest of organizations.


Suite Meeting Space Sponsor

NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its Correlated VM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. More information is available at www.netspi.com.


Security teams are facing growing scrutiny.  Stakeholders such as executives, regulators, customers and business partners are asking for different information, more regularly. The finite time of security staff is being eaten up trying to make sense of data, often in spreadsheets, and generating robust reports.

Both security and business leaders are frustrated about how difficult it is to get meaningful, timely and accurate insights from their operating environment to inform risk decisions and justify priorities. Panaseer Limited is a London headquartered cyber security software company that solves this.

The Panaseer Security Data lake is an extensible platform for big data analytics that can ingest any security relevant data at any speed and volume. It is architected to enable any analysis technique, and adapt to changes in your size, scale, complexity and IT operating model.

'Out of the box' data analytics modules enable continuous risk measurement, simplifying and automating how you identify, prioritize, communicate and mitigate risk.

A data science interface enables your analysts to interrogate data on the fly and create their own analytics for repeated tasks.

The platform's front end interface provides interactive visualizations that communicate technical and operational data about security in a way that is tailored for different decision makers and their level of accountability.

You can find us at Stand 27, or hear us present on 7th Nov at 12:30pm, CISO Case Study with Simon Eggleton: Gaining continuous, data-driven visibility into cyber risk and security control performance. We look forward to meeting you.



PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.


Building trust in society and solving important problems
With offices in 157 countries and more than 208,000 people, PwC is among the leading professional services networks in the world. We help organisations and individuals create the value they’re looking for, by delivering quality in assurance, tax and advisory services.


RiskIQ detects online threats that exploit customers and damage enterprise brands. The company discovers and continuously analyzes web and mobile assets from the user perspective to detect malware, fraud and brand infringements. RiskIQ's cloud service is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and is backed by Battery Ventures and Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.


Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com


Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com.


Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire's portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at www.tripwire.com/state-of-security or follow us on Twitter @TripwireInc.

Silver Sponsors
Akamai Technologies

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.


Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.  For more information visit us at www.anomali.com

Attivo Networks

Attivo Networks® is the leader in deception for cybersecurity defense, providing real-time detection and forensic analysis of in-network threats and solutions for continuous threat management and incident response. The Attivo ThreatMatrix Deception Platform detects stolen credentials, ransomware, man-in-the-middle, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis, actionable alerts, and 3rd party integrations empower accelerated incident response and staff resource efficiency.

Brand Protect

In a world where the enterprise attack surface has extended far beyond the traditional security perimeter, BrandProtect addresses the critical security need for actionable intelligence about external cyber activity that directly threatens executives, employees, IP, physical locations and more. BrandProtect™ provides security operations teams with something they do not have today: visibility beyond the perimeter™

24/7/365, BrandProtect quickly identifies, accurately validates, thoroughly analyzes, and rapidly escalates or mitigates the cyber threats that could impact our clients' business and increase their exposure to potentially crippling reputational risks. Hundreds of banks, credit unions and financial institutions, including 11 of the top 35 banks in North America, depend on BrandProtect.

BrandProtect delivers an unmatchable cyber security platform comprised of advanced proprietary threat detection technology, accurate assessment and analysis by military-grade threat analysts and mitigation by a world-class rapid response team. Delivered as a customizable suite of services, the BrandProtect platform features comprehensive, multi-channel threat detection technology -- including surface and dark web monitoring -- machine and human based severity scoring and assessment, enterprise-class workflow, complete incident archiving and case management, multi-language capabilities, STIX/TAXII support, and much more.

For more than a decade, BrandProtect has provided CISOs, CIOs, and CFOs assurance that the potentially crippling cyberattacks -- including phishing scams, executive or agent impersonation, domain fraud, mobile app schemes, unauthorized social domains, threatening social media activity, and other criminal and threatening online activities -- are quickly detected, assessed, and escalated and/or mitigated.


Coalfire equips you to reduce risk and simplify compliance with a comprehensive cybersecurity solution to fit your unique business needs. Using a combination of IT experience, multi-industry knowledge, and technology, we provide expert advice, assessments, and testing to help you keep your environment secure while minimizing disruptions to your business. Using our proven methodology, you can identify and understand specific risks and threats, close gaps, meet your industry’s regulatory mandates, and keep business on track.

As your partner, we will arm you with the trusted insight you need to stay secure and in control today and in the years to come.



CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 40 of the Fortune 100 - to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to 1,800 global businesses, including 17 of the world's top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.


Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response. The Cybereason Detection and Response platform identifies and visually presents both known and unknown attacks using big data, behavioral analytics and machine learning, eliminating  the need for manual investigation and drastically reducing response time.

Easy Solutions

Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 94 million customers at 350 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.


Mobile App Sponsor

Endgame is leveling the playing field against adversaries by protecting national security and commercial interests from the most advanced cyber threats. Using its deep knowledge of the adversary, Endgame helps customers understand their defenses from the perspective of the attacker. This new approach allows organizations to instantly detect and actively respond to advanced threats, preventing damage and loss. Endgame’s technology and techniques are proven in the most extreme environments—from defending U.S. national security interests to protecting the world’s critical infrastructure.

Guidance Software

Guidance is the maker of EnCase®, the gold standard in digital investigations and forensic security, and now EnForce™, the first automated cyber risk management platform.  What that means is we provide mission-critical applications that offer deep 360-degree visibility across all endpoints, devices and networks, allowing proactive identification and remediation of threats.

Proven in the courtroom and trusted in the boardroom, Guidance provides smart and dependable solutions to problems that often go undetected or unsolved on the endpoint.  We know how to get a business back on track fast so you can restore order and feel confident. From retail to financial institutions, our field-tested and court-proven solutions are deployed on an estimated 33 million endpoints at more than 70 of the Fortune 100 and hundreds of agencies worldwide.


Gurucul is changing the way enterprises protect themselves against fraud, insider threats and external intruders. The company's user behavior analytics and identity access intelligence technology uses machine learning and predictive anomaly detection algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider fraud, IP theft, external attacks and more. Gurucul is based in Los Angeles. To learn more, visit us at www.gurucul.com

illusive networks

illusive networks is the first purpose-built Distributed Deception Platform. Its award winning, patent pending Deceptions Everywhere technology neutralizes targeted and Advanced Persistent Threats by creating a deceptive layer across the entire network – without agents deployed on every endpoint, server, and network component - with an endless source of false information. illusive networks disrupts and detects breaches with source-based and real time forensics and without interrupting business. For more information, please visit us at www.illusivenetworks.com


Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit us at www.malwarebytes.com/business.

Menlo Security

We believe that everyone should be able to enjoy the benefits of the Internet without the fear of risk or compromise. So we founded Menlo Security to eliminate the threat of malware from the Web.

Making the Internet safe requires a new approach. The prevailing methods of preventing attacks, all based on distinguishing "good" content from "bad", are not working and are increasingly being out-maneuvered by attackers. This is an arms race that we cannot win.

We've taken a different approach: Our Isolation Platform provides a new layer in the security stack that contains and eliminates all malware, every time, and delivers a completely native experience to your users. And it doesn't require any software on your user's devices, so it's incredibly easy to deploy and simple to manage across any size enterprise.

Our solution is trusted today by some of the world's largest enterprises, including Fortune 500 companies and financial services institutions. We invite you to learn more and enjoy a safer Web.


Off-Site Dinner Sponsor

Netskope is the leader in cloud security. Using patented technology, Netskope’s cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device. This means that security professionals can understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work today. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. Netskope — cloud with confidence. 

NSS Labs

NSS Labs, Inc. is the world's leading information security company. Focused exclusively on IT security, NSS is known as the world's security product testing laboratory, offering in-depth security product test reports, research, and analyst services. Upon this foundation, NSS has built the Cyber Advanced Warning SystemTM - a revolutionary cloud-based security and risk management platform that lets clients see where they are at risk.

Through these unique offerings, NSS delivers unparalleled cyber risk management guidance. CEOs, CIOs, CISOs, and information security professionals from many of the largest and most demanding enterprises around the world rely on NSS to help them succeed in getting the most out of their security investments.

For more information, go to www.nsslabs.com


Optiv is the largest holistic pure-play cybersecurity solutions provider in North America. The company’s diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security. Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv is a Blackstone (NYSE: BX)portfolio company that has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers. For more information, please visit www.optiv.com.


Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that couples User and Entity Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams. The company is  headquartered in San Francisco, CA. Learn more about us at www.preempt.com

Recorded Future

Recorded Future provides real-time threat intelligence for threat intelligence teams and security operations center (SOC) teams. Threat teams receive alerts on critical threats from the entire Web, spend less time manually collecting data and improve communication with interactive visualizations. SOC teams can quickly dismiss non-critical incidents, detect important incidents that are otherwise missed, and gain threat awareness beyond their network. Recorded Future’s Web Intelligence Engine technology, generates threat intelligence by harvesting the Entire Web, extracting and organizing threat information, and making it relevant and actionable with context-rich alerts, analysis and security integrations.


RiskRecon, your trusted source for third party risk information, provides a SaaS platform that delivers frequent, comprehensive and actionable security performance measurements to more effectively manage the risk reality of increasingly interconnected organizations.

Using proprietary data gathering techniques, RiskRecon enables a 360-degree risk management view of your extended enterprise’s public IT footprint. Clients rely on RiskRecon to bring greater transparency, accountability and productivity to their third-party risk management process. And, they trust that RiskRecon’s continuous monitoring solution employs only ethical techniques – no proprietary vendor data, no permissions and no invasive scans. Learn more at www.riskrecon.com


SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary cloud platform helps enterprises gain operational command of the security posture for themselves and across all of their partners and vendors. The platform offers a breadth and depth of critical data points not available from any other service provider and in a completely self-service and automated tool. The platform provides continuous, non-intrusive monitoring for any organization including third and fourth parties. Security posture is assessed and measured non-intrusively across a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering and Passwords Exposed.


The Synack platform leverages the best combination of humans and technology to create an offensive security service that delivers ongoing and on-demand vulnerability intelligence. Synack's security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment.


Through its Software Integrity Platform, Synopsys provides advanced solutions for improving the quality and security of software. This comprehensive platform of automated analysis and testing technologies integrates seamlessly into the software development process and enables organizations to detect and remediate quality defects, security vulnerabilities, and compliance issues early in the software development lifecycle, as well as gain security assurance and visibility throughout their software supply chain.


Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—cryptographic keys and digital certificates—so they can’t be misused by bad guys in attacks. Venafi constantly assesses which SSL/TLS, SSH, WiFi, VPN and mobile keys and certificates are trusted, protects those that should be trusted, and fixes or blocks those that are not. As the market-leading cybersecurity company in Next Generation Trust Protection (NGTP), the Venafi Trust Protection Platform™ protects keys and certificates and eliminates blind spots from threats hidden in encrypted traffic. Venafi customers include the world’s leading Global 5000 companies.

Bronze Sponsors

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.  The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management.  Acalvio enriches its threat intelligence by data obtained from internal and partner eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation. A Silicon Valley based company, Acalvio is led by an experienced team with a track record of innovation and market leadership and backed by marquee investors.


Booth Crawl Sponsor

Agari, a leading cybersecurity company, is trusted by leading Fortune 1000 companies, including 6 of the top 10 banks, to protect their enterprise, partners and customers from advanced email phishing attacks. The Agari Email Trust Platform™ is the industry’s only solution that ‘understands’ the true sender of emails, leveraging the company’s proprietary, global email telemetry network and patent-pending, predictive Agari Trust Analytics to identify and stop phishing attacks. The platform powers Agari Enterprise Protect, which help organizations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands. Agari is a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security. Learn more at http://www.agari.com and follow us on Twitter @AgariInc

Black Duck

Organizations worldwide use Black Duck’s industry-leading products to automate the process of securing and managing open source software, eliminating the pain related to security vulnerabilities, compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in San Jose, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul, Vancouver and Beijing. For more information, visit www.blackducksoftware.com.


Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.


Cigital is one of the world’s largest application security firms. We go beyond traditional testing services to help organizations identify, remediate, and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services, and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.


Door Hanger Sponsor

September Monthly Email Sponsor

Coronet is the first company to monitor the global wireless environment for threats, and automatically evaluate the risk associated with connecting to any wireless network anywhere. Coronet arms organizations with real-time visibility to wireless threats on networks around devices, and provides policy-based control on the users’ connectivity to networks and on users’ access to enterprise resources. Coronet’s cloud based solution is easy to deploy, runs on any device and requires no hardware. Coronet has been recognized by CISCO, Tech Trailblazers, and leading industry analysts.  Please stop by our booth #20 at the FS-ISAC Fall Summit.


The CyberGRX (Global Risk Exchange) third party cyber risk management platform enables enterprises to cost-effectively and collaboratively identify, assess, mitigate and monitor an enterprise’s cyber risk exposure across its entire vendor, partner and customer ecosystem. Founded by former CISO’s and Chief Risk Officers and backed by world-class investors, CyberGRX partners with some of the most trusted names and brands in cybersecurity.  Based in Denver, Colorado, we're backed by The Blackstone Group, Google Ventures, Allegis Capital, TenEleven Ventures, Rally Ventures and our design partners.

CyberSponse, Inc.

The CyberSponse platform automates and orchestrates security operations and the incident response lifecycle together under a single enterprise solution. The platform creates an impressive ROI by saving time, managing alerts and dramatically improving response times to incidents. The solution also provides enterprise metrics on team performance and the overall efficiency of the operating security operations environment while providing easy integrations to existing cyber security tool sets with its visual integration engine. Enterprise executives looking to increase cyber security capabilities while saving OPEX, CAPEX, time and knowledge developed in a in a SOC environment.


Deloitte Advisory’s cyber risk services help complex organizations more confidently pursue their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. With deep experience across a broad range of industries, Deloitte’s more than 2,500 cyber risk services practitioners provide advisory and implementation services, spanning executive and technical functions, to help transform legacy IT security programs into proactive, secure, vigilant and resilient cyber risk programs. For more information, visitwww.deloitte.com/us/CyberRisk.


Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass increase user productivity while solving the operational overhead and complexity of existing web gateways through defense-grade isolation. Trusted by Fortune 500 companies, Fireglass was founded by network security pioneers and military intelligence veterans and is backed by leading investors including Lightspeed Venture Partners and Norwest Venture Partners.


It is Fox-IT's mission to make technical and innovative solutions that ensure a more secure society. We do that through the development of advanced cybersecurity and cyberdefense services and solutions for our clients around the world. We achieve this through a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.

As advancements in Internet technology expand opportunities for misuse by increasingly sophisticated cyber criminals and terrorists, Fox-IT solutions improve surveillance, detection and prosecution of criminals, and harden the security of critical IT networks and systems. We focus on areas where systems are most vulnerable, and in sectors where security is most essential —including government systems up to “state secret level” sensitivity and in vital infrastructure industries like energy and banking.

Guardian Analytics

Guardian Analytics protects 40+ millions of accounts from financial fraud.  Our patented machine-learning algorithms and behavioral analytics detect threats, alert security staff, and help prevent fraudulent account activity, like account take over, and financial losses associated with real-time Wire and ACH solutions.

Our cloud delivery of behavioral analytics solutions allows for rapid and cost-effective deployment, significantly reduces fraud risk and losses, increases operational efficiency, enhances compliance, and enables a better customer experience.

Instead of relying on creating rules to determine how fraudsters will attack, our patented algorithms learn and understand good user behavior automatically, providing alerts based on activity that is inconsistent with customers’ behavior.

We offer one fraud management platform to detect account take over for vendor portals to real-time wire detection to identify and stop Business Email Compromise scams. The platform facilitates human intervention with omni-channel visual analytics or fully automated machine-to-machine logic.

Our behavioral analytics solutions:

  • Does not require “a priori” knowledge of fraud schemes

  • Includes automatic, and adaptive machine learning

  • Does not require maintenance

  • Produces less alerts and generates less false positive

We continue to innovate and recently announced the industry’s first Omni-Channel Fraud Prevention Platform, which includes a 360-degree view of customer behavior across multiple channels.

Learn more at www.GuardianAnalytics.com, or visit us on YouTube.


LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

LookingGlass Cyber Solutions

LookingGlass Cyber Solutions is the leader in threat intelligence and dynamic threat defense. LookingGlass solutions are uniquely architected to discover, understand, manage and mitigate threats both inside and outside an organization's infrastructure. LookingGlass empowers customers to confidently enable effective security decisions and efficient security operations throughout the threat lifecycle. For more information, please visit www.LGScout.com


Lookout is a cybersecurity company that makes it possible for individuals and enterprises to be both mobile and secure. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseen -- predicting and stopping mobile attacks before they do harm.


Room Drop Sponsor

Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar (NYSE: NSR) isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. As one of the few companies capable of knowing with certainty who is on the other end of every interaction, we’re trusted by the world’s great brands to make critical decisions some 20 billion times a day. We help marketers send timely and relevant messages to the right people. Because we can authoritatively tell a client exactly who is calling or connecting with them, we make critical realtime responses possible. And the same comprehensive information that enables our clients to direct and manage orders also stops attackers. We know when someone isn’t who they claim to be, which helps stop fraud and denial of service before they’re a problem. Because we’re also an experienced manager of some of the world’s most complex databases, we help clients control their online identity, registering and protecting their domain name, and routing traffic to the correct network address. By linking the most essential information with the people who depend on it, we provide more than 12,000 clients worldwide with decisions—not just data. More information is available at www.neustar.biz


PhishLabs™ is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including 4 of the 5 largest U.S. financial institutions. PhishLabs combines proprietary technology, intelligence, and human expertise to rapidly detect, analyze, and stop targeted cyberattacks before they impact organizations. Additionally, the company provides robust threat intelligence that strengthens existing cyber defenses and optimizes threat prevention. Leading organizations partner with PhishLabs to more effectively disrupt targeted cyberattacks, prevent data breaches, and reduce online fraud. To learn more about PhishLabs, visit www.phishlabs.com or email info[at]phishlabs[dot]com.


Pindrop is the pioneer in voice fraud prevention an authentication. Pindrop provides enterprise solutions to reduce fraud losses and authentication expense for some of the largest call centers in the world. Pindrop’s patented Phoneprinting™ technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Pindrop has been selected by the world’s largest banks, insurers, brokerages and retailers, detecting over 80% of fraud, even for attackers never seen before. Pindrop’s solutions are allowing customers to reduce call time and improve their customers’ experience even while reducing fraud losses. Pindrop was founded in 2011 and is venture backed by Andreessen Horowitz, Citi Ventures, Felicis Ventures, Google Capital, GV and IVP. In total, Pindrop has raised $122 million.


With Rapid7, technology professionals gain the clarity, command, and confidence to safely drive innovation and protect against risk. We make it simple to collect operational data across systems, unlocking the information required to securely develop, operate, and manage today’s sophisticated applications and services. Our analytics and science eliminate blind spots to quickly predict, deter, detect, and remediate attacks and anomalies. Armed with Rapid7, technology professionals finally gain the insights needed to safely move their business forward.

Resilient, an IBM Company

Resilient, an IBM Company, empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s industry-leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, smarter, and more efficiently.

Part of IBM Security, the Resilient IRP also integrates security technologies into a single hub and provides easy workflow customization and process automation. With Resilient, security teams can have best-in-class response capabilities.

Resilient has more than 100 global customers, including 30 of the Fortune 500 and partners in more than 20 countries. Learn more at www.resilientsystems.com.


ReversingLabs delivers solutions that drastically accelerate and broaden organizations’ ability to detect cyber threats, respond to incidents and verify file integrity. As traditional cyber defenses become increasingly ineffective, our solutions enable customers to implement new, proactive strategies to defeat cyber adversaries. We offer products that monitor files in network traffic, support incident responders, streamline malware analysis and provide comprehensive threat intelligence on files. Our solutions provide unequalled coverage and effectiveness by leveraging unique technology that extracts and evaluates files based on their internal DNA rather than looking at symptoms and behavior. Our customers include enterprises, security vendors, and government agencies.

Security Compass

Security Compass focuses on helping you deliver secure software through deliberate practice while maintaining the speed of your business. Our goal is to help you build secure software by seamlessly unifying your application security needs through eLearning, Security Requirements, and Verification.


In today’s SOC, there is no shortage of tools to monitor and detect threats; however, it takes security teams weeks and sometimes months to resolve security incidents. Security analysts are drowning in alerts and lack a centralized platform to effectively contextualize, prioritize, analyze, and respond to them all.

Siemplify’s ThreatNexus is the industry’s first complete cyber-security operations platform to seamlessly fuse the enterprise security fabric into a single pane of glass, and enable enterprise security teams to perform the full spectrum of threat management and incident response; from case management and analytics, to hunting, intelligence, automation and reporting.

Siemplify consolidates tools, reduces alerts by 90%, triples analyst capacity, and reduces the time from attack to remediation from months to minutes - becoming the de facto platform for the next-generation SOC.


ThinAir's mission is to provide companies security through simplicity. Using the platform, organizations instantly gain complete visibility, context and control over all their data no matter where it goes, without any user friction. ThinAir delivers security through simplicity against insider threats, automatic data exfiltration, and human error, and can be deployed in seconds by organizations of any size or architecture. Learn more at www.thinair.com.


ThreatConnect unites cybersecurity people, processes and technologies behind a cohesive intelligence-driven defense. Built for security teams at all maturity levels, the ThreatConnect platform enables organizations to benefit from their collective knowledge and talents; develop security processes; and leverage their existing technologies to identify, protect and respond to threats in a measurable way. More than 1,200 companies and agencies worldwide use ThreatConnect to maximize the value of their security technology investments, combat the fragmentation of their security organizations, and enhance their infrastructure with relevant threat intelligence. To register for a free ThreatConnect account or learn more, visit: www.threatconnect.com.


ThreatQuotient delivers an open and extensible threat intelligence platform (TIP) to provide defenders the context, customization and collaboration needed for increased security effectiveness.  ThreatQ accelerates the transformation of threat data into threat intelligence by giving defenders control through a threat library, an adaptive workbench and an open exchange to ensure that intelligence is accurate, relevant and timely to their business.  With ThreatQ, customers can get more out of existing security resources, both people and infrastructure. 


TITUS solutions enable organizations to discover, classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud. 

TopSpin Security

Key Card Sponsor

TopSpin Security is the leader in integrated deception and detection technologies which allow organizations to quickly and accurately detect breaches, engage attackers and neutralize advanced cyber-attacks. Its technology is based on a network of decoys that lure attackers by mirroring valuable network assets and are fully adaptive to organizations’ changing environments. Its unique traffic analysis engine and integration into organizations’ existing security infrastructure deliver the industry’s only deception solution that provides for strategic placement of traps and decoys; added security and internal correlation; and operational advantages such as automation, point-and-click configuration. Once engaged, the decoys interact with attackers, deceiving them and slowing their advances, while providing accurate, actionable alerts and forensics trails. TopSpin’s DECOYnet is already deployed by leading Global2000 companies. The company’s U.S. operations are headquartered in Mahwah, N.J., with its R&D center in Herzliya, Israel. Learn more at www.topspinsec.com.


Description Coming Soon!


Verodin is defining the emerging concept of Instrumented Security. Its revolutionary platform empowers customers to measure and continuously validate the cumulative effectiveness of layered security infrastructures, revealing true security posture. Through automated defense analysis, Verodin customers achieve maximum value from security spending, better leverage existing security investments, and measurably improve their cyber prevention, detection and response capabilities.

Innovative Technology Showcase Sponsors

Aqua Security

Booth Crawl Sponsor

Aqua Security enables enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security.

Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance. Aqua’s customers include Fortune 500 enterprises in the financial, retail, technology and healthcare sectors. For more information visit www.aquasec.com or follow us on Twitter: @aquasecteam.


Skycure offers the most complete, accurate and effective mobile threat defense (MTD) solution, delivering unparalleled depth of threat intelligence to predict, detect and protect against the broadest range of existing and unknown threats. Skycure's predictive technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and vulnerability exploits while preserving user privacy and experience. Skycure’s mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise.

The Media Trust

The Media Trust is the client-side malware scanner for the world’s largest, most heavily-trafficked websites, functioning as the security operations center for their public-facing web and mobile properties. Using a variety of mobile and desktop device/OS/browser, geographic, and user-behavior profile combinations, our proprietary technology continuously scans millions of websites and third-party advertising/content delivery code each day to detect and remove anomalous activity before it becomes overt. This extensive monitoring yields original source, 99.95% accurate, real-time malware data that allows enterprises to block specific malicious web-based activity to secure their networks and mitigate the risk of everyday employee internet use.

Whitehat Security

Booth Crawl Sponsor

WhiteHat Security has been in the business of securing web applications for 15 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company’s flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in Santa Clara, Calif., with regional offices across the U.S. and Europe. For more information on WhiteHat Security, please visit www.whitehatsec.com.

Additional Sponsors

Bay Dynamics

Totebag Sponsor

Bay Dynamics® is a cyber risk management company that enables enterprises to measure, communicate and reduce cyber risk. The company’s flagship analytics software, Risk Fabric®, delivers prioritized, high quality lists of the most critical threats to and vulnerabilities within enterprises’ most valued assets, to the stakeholders responsible for reducing risk. Risk Fabric also automates data collection and reporting so that up-to-date cyber risk information is readily available for compliance auditors, boards of directors and other stakeholders. For more information, please visit www.baydynamics.com.


Executive Women's Networking Event Sponsor

As the leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of over 35,000 security researchers to identify critical software vulnerabilities. Powered by Bugcrowd’s platform, companies of all sizes can run both private and public bounty programs to efficiently test their applications and reward valid vulnerabilities.

Dell SecureWorks

All Day Break Sponsor

SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.”

To learn more, visit www.secureworks.comand https://www.secureworks.com/about/partners


R&R Zone

Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success, generating $234 million in 2015, with over 4,800 customers and more than 500 partners in 100 countries worldwide. Learn more atwww.imperva.com.

Intel Security

Lanyard Sponsor

Intel Security solutions deliver the highest levels of threat visibility and antimalware protection, including comprehensive system and endpoint protection, network security, cloud security, database security, endpoint detection and response, and data protection. Our complete security solutions extend beyond virus software and antimalware protection to server security, SIEM, and intrusion prevention systems (IPS). Backed by McAfee Global Threat Intelligence, our solutions help companies enhance visibility into their security postures, allowing business to embrace virtualization, cloud services, and mobile devices, while protecting critical assets and sensitive data, and improving incident response.

• Our industry-leading security offerings include:
• McAfee Active Response: An endpoint detection and response technology helps find and respond to advanced threats.
• McAfee Complete Endpoint Protection: Advanced endpoint security with antivirus, antispam, anti-malware, whitelisting, web security, and desktop firewall works across Windows, Macs, smartphones, tablets, and virtual systems.
• McAfee SIEM: Bringing together event, threat, and risk data, McAfee SIEM solutions provide real-time visibility into all security activities to improve compliance management and speed up incident response times.
• McAfee Threat Intelligence Exchange: Get immediate visibility into the presence of advanced targeted attacks and optimize threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
• McAfee Network Security Platform (IPS): Our best-in-class intrusion prevention system delivers real-time defenses against known, zero-day, denial-of-service (DoS), distributed denial-of-service (DDoS), SYN flood, and encrypted attacks.


Intel 471 Inc.

Wifi Sponsor

Intel 471 is an actor-centric cyber threat intelligence collection capability for our customers. We are headquartered in the USA and are focused on closed source intelligence collection of financially motivated cyber criminals and hacktivists and have teams across the globe who are on the ground in Eastern Europe, Asia and Latin America. Whilst some companies may offer raw indicators or feeds as threat intelligence, Intel 471 focuses on the individual threat actors and groups that pose a threat to your organization and sector in order to shine a light on the adversary’s business process.

We deliver unmatched and proactive visibility into threat actors and their TTPs, planning, marketplaces, and communication networks. Our product is delivered through:

- An online portal that provides information reports (similar format to IIRs), full text searching, alerting, monitoring actors across forums/marketplaces and social network analysis.
- API allows automated queries by alias/handle, IP address, email address etc.
- Third party threat intelligence platform (TIP) integrations.
- Maltego transforms.

The top use case for our intelligence collection is supporting our customer’s threat intelligence teams with intelligence collection and data in order to support the creation of timely and relevant finished intelligence products for your organization.

For more information, please visit intel471.com or contact sales@intel471.com.


Handbook Band Sponsor

Perch is a smart, stealth mode startup that enables and encourages ISAC member participation.

Phantom Cyber


Phantom, which was recognized as the most innovative company at the 2016 RSA Conference, automates and orchestrates key stages of security operations from prevention to triage and resolution; delivering dramatic increases in productivity and effectiveness. Ranging from simple automation to fully autonomous response, Phantom lets you choose the best balance that fits your organization’s needs while increasing security and accelerating security operations. Focused on closing the security gap by enabling enterprise security operations to be smarter, faster and stronger; Phantom provides the flexibility to connect in-house and third-party systems into one open, integrated and extensible platform. Phantom was founded by enterprise security veterans Oliver Friedrichs and Sourabh Satish who have helped propel companies like Symantec, Sourcefire, Cisco and others to success. For more information visit: www.phantom.us.


Off-site Dinner on Sunday Night (includes invite only access)

Description coming soon!


Suite Meeting Space

Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the "central nervous system" for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.

Transmit Security

Networking Area/Charging Stations

Transmit Security allows organizations to implement frictionless omni-channel authentication without making any modifications to their applications. The company’s FIDO-compatible technology supports any authentication technology, from any vendor, in one modular, micro-services platform that enables application owners to slash time-to-market and cost-to-market for new identity related projects. Transmit Security’s founders created Trusteer (now IBM Security) and Imperva (IMPV on NYSE). The company’s research and development team is made up of former members of Unit 8200, the elite Israeli Intelligence Corps. Transmit Security is self-funded, and based in Boston and Tel-Aviv. For more information visit http://www.transmitsecurity.com/ or follow us on Twitter @TransmitSec. 


Networking Area/Charging Station

Veracode delivers the application security solutions and services today's software-driven world requires. Veracode's unified platform assesses and improves application security from inception through production so that businesses can confidently innovate with the applications they build, buy and deploy as well as the components they integrate into their environments.


Exclusive Sunday Welcome Reception

Verisign Security Services protect revenue and brands by securing online services. Verisign provides a portfolio of cloud-based security services supported by industry- leading security intelligence. Our DDoS Protection, Managed & Recursive DNS and DNS Firewall services are designed to secure and protect online applications and networks. Verisign iDefense provides actionable security intelligence to support decision making within organizations. Verisign, having maintained 100 percent operational accuracy and stability of its own DNS infrastructure for .com and .net for more than 18 years, has unmatched experience in protecting critical Internet infrastructure, and is entrusted by leading organizations to protect their businesses.