Loading... Please wait...

Fall Current Sponsors

Platinum Sponsors

Booz Allen Hamilton has been at the forefront of strategy and technology for more than 100 years. Today, the firm provides management and technology consulting and engineering services to leading Fortune 500 corporations, governments, and not-for-profits across the globe. Booz Allen partners with public and private sector clients to solve their most difficult challenges through a combination of consulting, analytics, mission operations, technology, systems delivery, cybersecurity, engineering, and innovation expertise.

With international headquarters in McLean, Virginia, the firm employs more than 22,500 people globally, and had revenue of $5.27 billion for the 12 months ended March 31, 2015. To learn more, visit www.boozallen.com. (NYSE: BAH)


IBM is one of the world's largest information technology companies with over 100 years of leadership in helping institutions innovate. As a recognized security leader, we help protect clients from billions of security events each day. Our technologies assist in solving the most difficult security issues and enable secure access to people, data, applications and infrastructure. In today's world, companies are dealing with a massive volume of both structured and unstructured data and traditional security solutions are no longer sufficient. IBM's approach enables a more holistic, comprehensive perspective and can enhance your security maturity.

For more details on IBM Security Solutions visit: ibm.com/security
Follow @IBMSecurity on Twitter: www.twitter.com/ibmsecurity #ibmsecurity, #ibmbanking


iSIGHT Partners is the leading global provider of cyber threat intelligence. With 200+ experts in 16 countries and expertise in 24 languages, only iSIGHT can deliver the full context and intent of the most damaging threats, enabling security organizations to respond faster, defend proactively, and invest smarter. Find iSIGHT Partners on the web at www.iSIGHTpartners.com or email us at info@isightpartners.com.


Norse is the global leader in live attack intelligence. Norse delivers continuously-updated and unique Internet and darknet intel that helps organizations detect and block attacks that other systems miss. The superior Norse DarkMatter™ platform detects new threats and tags nascent hazards long before they're spotted by traditional "threat intelligence" tools. Norse's globally distributed "distant early warning" grid of millions of sensors, honeypots, crawlers and agents deliver unique visibility into the Internet - especially the darknets, where bad actors operate. The Norse DarkMatter™ network processes hundreds of terabytes daily and computes over 1,500 distinct risk factors, live, for millions of IP addresses every day. Norse products tightly integrate with popular SIEM, IPS and next-generation Firewall products to dramatically improve the performance, catch-rate and security return-on-investment of your existing infrastructure.


Skyhigh Networks, the Cloud Visibility and Enablement Company, enables IT organizations to embrace cloud services while ensuring security, compliance and governance. Skyhigh facilitates the entire cloud adoption lifecycle of Discover-Analyze-Secure. Specifically, Skyhigh Discover shines a light on Shadow IT by providing a comprehensive view into the use and risk of all the cloud services within an organization and how their risk compares with peers in the industry. Skyhigh Analyze leverages big data to identify opportunities for IT to enable new cloud services that are in demand, to reduce risk and costs by consolidating and better managing subscriptions, and to highlight anomalous behavior that may indicate a security breach or insider threat. And Skyhigh Secure seamlessly enforces security and compliance policies such as contextual access control, encrypting sensitive data with customer managed keys, and data loss prevention across cloud services.

Skyhigh delivers these capabilities while leveraging your existing IT investments in firewalls, proxies and SIEMs and without requiring any agent or footprint on the device. Proven at over 200 enterprises, Skyhigh Networks is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at skyhighnetworks.com or follow us on Twitter @skyhighnetworks

Gold Sponsors

Adallom delivers visibility, governance and protection for the top SaaS applications used by businesses worldwide, including GoogleApps, Office 365 and Salesforce. Founded in 2012 by Israeli Intelligence alumni, our cloud application security platform extends the boundaries of enterprise security into the cloud. You will be able to gain actionable intelligence into cloud application usage, secure corporate data and detect suspicious activities, without requiring any agent in your datacenter or endpoint. Powered by the Adallom SmartEngineTM advanced heuristics technology, and backed by Adallom Labs, our elite cybersecurity research team, we are the ONLY cloud security provider that has protected businesses from real-world attacks.


Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with machine learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.


Bay Dynamics® is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose-built Risk Fabric® platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders, vendors and bad actors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.


Black Duck Software is a global leader in helping organizations automate the processes for securing and managing their open source software by providing unmatched visibility into, and control of the open source use.

Black Duck collects “fingerprints” from files and folders in repositories and compares them against its extensive Knowledge Base of 1 million+ open source projects managed in more than 4,000 global repositories. The result is a comprehensive Bill of Materials (BOM) of the open source projects and versions in use. No other solution provides this level of open source insight.

The open source BOM is cross-referenced against two lists of known open source security vulnerabilities, the National Vulnerabilities Database (NVD) and the VulnDB, to provide the most comprehensive identification and earliest notification of open source vulnerabilities in the industry.

Find Black Duck on the web at www.blackducksoftware.com


Blue Coat is a leader in enterprise security, providing on-premise, hybrid and cloud-based solutions for protecting web connectivity, combating advanced threats and responding to security breaches. Blue Coat is the global market leader in securing connection to the web and counts nearly 80 percent of the Global Fortune 500 as its customers. Blue Coat was acquired by Bain Capital in March of 2015. For additional information, please visit www.bluecoat.com.


Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware, while simultaneously empowering users and delivering unmatched threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium's technological innovations have earned the company numerous industry awards including being named as a CNBC Disruptor and a Gartner Cool Vendor for 2013. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers, including NYSE and BlackRock. www.bromium.com


Founded in 2008, Endgame is a leading provider of software solutions to the U.S. Intelligence Community and Department of Defense, protecting national security missions from the most sophisticated adversaries in the world's most hostile environments. The adversaries we battle every day have shifted their attacks to commercial and civilian government organizations. Relying on a passive defense does not work.

Today, Endgame combines the industry's deepest understanding of enterprise vulnerabilities and evolving threats with proven science and the software automation necessary for federal and commercial organizations to "turn the map around" and think like an adversary. Endgame enables customers to successfully automate the hunt - pursue, contain and eliminate the most advanced adversaries before they cause damage and loss.


Gurucul is changing the way enterprises protect themselves against fraud, insider threats and external intruders. The company's user behavior analytics and identity access intelligence technology uses machine learning and predictive anomaly detection algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider fraud, IP theft, external attacks and more. Gurucul is based in Los Angeles. To learn more, visit us at www.gurucul.com


IID is a cybersecurity company. Its flagship product, ActiveTrust, adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into actionable intelligence delivered to security professionals and automated infrastructure. Fortune 500 companies and U.S. government agencies leverage IID to detect and mitigate threats, making ActiveTrust one of the world's largest commercial cyberthreat data exchanges. For more, go to internetidentity.com.


Netskope™ is the leading Cloud Access Security Broker (CASB). Only the Netskope Active Platform™ provides discovery, deep visibility, and granular control of sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Serving a broad customer base including leading healthcare, financial services, high technology, and retail enterprises.

Netskope has been named to CIO Magazine's top 10 cloud security startups and featured in such business media as CBS News, Wall Street Journal, and Forbes. Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.


PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.


Full Page Handbook Ad
October "Spotlight Sponsor"
Booth Crawl Sponsor

Pindrop Security provides enterprise solutions to secure phone and voice communications. Pindrop solutions reduce fraud losses and authentication expense for some of the largest call centers in the world. Pindrop’s patented Phoneprinting™ technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Pindrop has been selected by the worlds largest banks, insurers, brokerages and retailers, detecting over 80% of fraud, even for attackers never seen before. Our solutions are allowing our customers to reduce call time and improve their customers' experience even while reducing fraud losses. Pindrop is restoring confidence in the security of phone-based transactions. Learn more about Pindrop at www.pindropsecurity.com.


PwC helps organizations and individuals create the value they're looking for. We're a network of firms in 157 countries with more than 195,000 people who are committed to delivering quality in assurance, tax and advisory services. Find out more and tell us what matters to you by visiting us at www.pwc.com


RedOwl offers a cutting-edge analytical solution to security, compliance, and investigative use cases. RedOwl's flagship product, Reveal, provides immediate value to forward-leaning organizations that understand the massive potential of their untapped internal data sources in improving oversight and reducing risk. For more information, visit www.redowlanalytics.com.


RiskIQ detects online threats that exploit customers and damage enterprise brands. The company discovers and continuously analyzes web and mobile assets from the user perspective to detect malware, fraud and brand infringements. RiskIQ's cloud service is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and is backed by Battery Ventures and Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.


Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com


Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings - anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: www.symantec.com/social.


Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com.


Zscaler ensures that more than 15 million employees across thousands of enterprises and government organizations worldwide are protected against cyber-attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location. Zscaler effectively moves security into the Internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software. To learn more, visit www.zscaler.com

Silver Sponsors

Agari Inc.

Booth Crawl Sponsor
Bag Insert

Agari collects terabytes of email data from email receivers like Gmail and Yahoo! representing 85% of the email inboxes in the U.S., to provide global brands with a cloud-based SaaS solution that eliminates email threats, protects customers and their personal data, and proactively guards brand reputation. Today, Agari has analyzed over a trillion emails, and has blocked over a 2.5 billion malicious messages at a clip of over 200 per second. Founded by the thought leaders behind Cisco's IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award, is headquartered in Silicon Valley and is backed by Alloy Ventures, Battery Ventures, First Round Capital, and Greylock Partners. Learn more at www.agari.com.

Akamai Technologies

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

Bit9 + Carbon Black

More than 1,000 organizations worldwide—from 25 Fortune 100 companies to small enterprises—use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading managed security service providers (MSSP) and incident response (IR) companies have made Bit9 + Carbon Black a core component of their advanced threat prevention, threat detection and incident response services. With Bit9 + Carbon Black, you can arm your endpoints against advanced threats.



In a world where the enterprise attack surface has extended far beyond the traditional security perimeter, BrandProtect addresses the critical security need for actionable intelligence about external cyber activity that directly threatens executives, employees, IP, physical locations and more. BrandProtect™ provides security operations teams with something they do not have today: visibility beyond the perimeter™

24/7/365, BrandProtect quickly identifies, accurately validates, thoroughly analyzes, and rapidly escalates or mitigates the cyber threats that could impact our clients' business and increase their exposure to potentially crippling reputational risks. Hundreds of banks, credit unions and financial institutions, including 11 of the top 35 banks in North America, depend on BrandProtect.

BrandProtect delivers an unmatchable cyber security platform comprised of advanced proprietary threat detection technology, accurate assessment and analysis by military-grade threat analysts and mitigation by a world-class rapid response team. Delivered as a customizable suite of services, the BrandProtect platform features comprehensive, multi-channel threat detection technology -- including surface and dark web monitoring -- machine and human based severity scoring and assessment, enterprise-class workflow, complete incident archiving and case management, multi-language capabilities, STIX/TAXII support, and much more.

For more than a decade, BrandProtect has provided CISOs, CIOs, and CFOs assurance that the potentially crippling cyberattacks -- including phishing scams, executive or agent impersonation, domain fraud, mobile app schemes, unauthorized social domains, threatening social media activity, and other criminal and threatening online activities -- are quickly detected, assessed, and escalated and/or mitigated.

BrightPoint Security

BrightPoint Security delivers actionable threat intelligence by reducing the noise inherent in threat data and enabling secure and controlled information sharing. The automated curation and correlation of threat data from external sources, behind your perimeter defenses, and behind the defenses of trusted organizations enables you to identify relevant threats in minutes instead of months.


Checkmarx (www.checkmarx.com) is a leading developer of software solutions used to identify, fix and block security vulnerabilities in web and mobile applications.

The company's customers include 4 of the world's top 10 software vendors and many Fortune 500 and government organizations, including Samsung, Salesforce.com, Coca Cola and the US Army.

Checkmarx offers a suite of application security solutions from code development to live production:

  • Static Application Security Testing (SAST) - Identify and fix security vulnerabilities in the source code, at the early stages of the application development. The solution enables full automation by integration into the Software Development Lifecycle (SDLC).
  • Runtime Application Self Protection (RASP) - Block attacks in real time.
  • Secure Coding Education - Hands on secure coding training based on gamification, using your own code base and real life security vulnerabilities.


CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 40 of the Fortune 100 - to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to 1,800 global businesses, including 17 of the world's top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.


Cyphort is an innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. Cyphort's unique software solution delivers complete Next Generation APT defense against current and emerging threats, targeted attacks and zero day vulnerabilities; correlating threats from Web and Email, as well as internal vectors for lateral spread and post breach activity detection. The addition of correlation and context for each threat plays a key role in helping prioritize responses and containment actions. The purpose-built integrations to existing enforcement solutions (Firewalls, Proxies etc.) allows customers the ability to extract maximum value from IT assets without compromising the security of an organization. Cyphort is a privately held company headquartered in Santa Clara, California. For more information, please visit www.cyphort.com and follow us @Cyphort.

DB Networks

DB Networks® innovates cybersecurity through intelligent continuous monitoring. Our customers include the world's largest financial institutions, manufacturers, healthcare, and governments. DB Networks provides four primary benefits;

  • Databases discovery - including undocumented ones
  • Detailed insights of interactions between application and databases
  • Monitoring core network policies
  • Behavioral analysis to immediately identify database attacks

DB Networks' unique approach to database security utilizes machine learning to model an applications SQL generation process. It then uses behavioral analysis to immediately identify when the application has been compromised and is generating rogue SQL statements designed to attack a database. With no signature files to deal with or endless false positives to chase down, operational support becomes trivial.

Dell SecureWorks

Dell SecureWorks understands cyber security is a critical focus for organizations, and technology alone cannot address the risks posed by cyber threats. Recognized as an industry leader, we combine elite intelligence and trusted security expertise, helping organizations solve complex security challenges, strengthen their security postures and reduce risk in the face of a dynamic threat landscape. Intelligence practices developed by our security experts enable a security methodology, ensuring you see the threat, thwart cyber-attacks and recover faster from security breaches. For more information visit www.secureworks.com.

Easy Solutions

Easy Solutions is a security company focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 60 million customers at 220 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.

Guardian Analytics

Prevent fraudulent ACH and wire payments! Hundreds of financial institutions have standardized on our behavioral analytics solutions, FraudMAP ACH and FraudMAP Wire, to detect fraudulent payments. Please visit us to see our newest product, FraudMAP ACH-RDFI, which detects fraudulent debits and suspicious credits in ACH receiving files.


CSG Invotas™ is an award-winning leader in security orchestration and automation for global security operations. CSG Invotas delivers an automated threat response solution to unify, orchestrate and automate key elements of incident response into a single console and gives enterprises the ability to respond at machine speed, reduce risk exposure and boost productivity. For more information, please visit invotas.csgi.com.


Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against malicious threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors and is a PCMag.com Editor's Choice. It is one of most popular anti-malware solutions in the world, protecting over 80 million users. Malwarebytes Endpoint Security delivers proven malware and exploit security for SMBs and Enterprise businesses. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

Menlo Security

We believe that everyone should be able to enjoy the benefits of the Internet without the fear of risk or compromise. So we founded Menlo Security to eliminate the threat of malware from the Web.

Making the Internet safe requires a new approach. The prevailing methods of preventing attacks, all based on distinguishing "good" content from "bad", are not working and are increasingly being out-maneuvered by attackers. This is an arms race that we cannot win.

We've taken a different approach: Our Isolation Platform provides a new layer in the security stack that contains and eliminates all malware, every time, and delivers a completely native experience to your users. And it doesn't require any software on your user's devices, so it's incredibly easy to deploy and simple to manage across any size enterprise.

Our solution is trusted today by some of the world's largest enterprises, including Fortune 500 companies and financial services institutions. We invite you to learn more and enjoy a safer Web.


NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its Correlated VM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. More information is available at www.netspi.com.


Prelert is the leading provider of behavioral analytics for IT security and operations teams. The company's solution analyzes an organization's log data, finds anomalies, links them together and lets the data tell the story behind advanced cyber threats and IT performance problems. Leveraging machine learning anomaly detection and other behavioral analytics capabilities, it automates the analysis of massive data sets, eliminating manual effort and human error. Hundreds of progressive IT organizations rely on Prelert to detect advanced threat activity, reduce false positive alerts and enable faster root cause analysis.

Prelert lets your data tell the story. Please visit www.prelert.com or follow @Prelert.


Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.

Proofpoint, positioned by Gartner in the Leaders Quadrant in its 2014 Magic Quadrant for Secure Email Gateways, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications—all of which are based on a common security-as-a-service platform. More information is available at www.proofpoint.com.


Rapid7's IT security data and analytics software and services help organizations reduce the risk of a breach, detect and respond to attacks, and build effective IT security programs. With comprehensive real-time data collection, advanced correlation, and unique insight into attacker techniques, Rapid7 strengthens an enterprise's ability to defend against everything from opportunistic drive-by attacks to advanced threats.

Security Compass

Security Compass is an industry-leading information security firm that provides professional services and training to security-conscious companies. We bring extensive, internationally recognized, cross-industry experience to every client engagement. To our clients, we're not simply an information security company - we are trusted partners in the development of secure software.


Work with, not against, your partners to effectively remediate immediate threats and lower collective security risks through alerts, validation and workflow ticketing.


The Synack platform leverages the best combination of humans and technology to create an offensive security service that delivers ongoing and on-demand vulnerability intelligence. Synack's security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment.


Off-site Dinner Sunday Night

Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire's portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at www.tripwire.com/state-of-security or follow us on Twitter @TripwireInc.


Waratek has developed a disruptive approach to application security that protects banking and financial applications and data from logic attacks like SQL Injection, network attacks and unpatched vulnerabilities at runtime, with no code changes or hardware. The Waratek approach is unique because the security resides in the ‘Runtime Environment', an approach that analyst firm Gartner calls Runtime Application Self Protection or RASP. Waratek is therefore able to perform transparent taint detection and validation of each character in a SQL query to identify injection attacks with 100 percent accuracy. Waratek's Threat Forensics provide an in-depth level of information about attacks that originate both internally to and externally from the enterprise network.

Waratek were announced as the winners of the prestigious 2015 RSA Innovation Sandbox Contest at the RSA Conference. In August 2015, Waratek was pronounced a winner of the SIIA NextGen most innovative security solution.

Bronze Sponsors

Centripetal Networks

Centripetal Networks Inc. is a cyber-security solutions provider specializing in Real-Time Active Network Defense. Centripetal has achieved several breakthroughs in the scale and speed of network protection. Centripetal's RuleGate® product is the first and only system able to action threat indicators at scale, at full line-rate speed, and with agility. Threat intelligence can now directly drive an active cyber defense without negatively impacting network performance or user experience. Centripetal's offering includes the RuleGate® a unique ultra-high performance network appliance, QuickThreat® the industry's first real-time threat visualization and analytics platform, and the Advanced Cyber Threat™ (ACT) service. For more information, visit www.CentripetalNetworks.com.


Cigital is one of the world's largest application security firms. We go beyond traditional testing services to help organizations find, fix and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.


Keynote Sponsor
Full Page Handbook Ad

CloudPassage® Halo® is the world's leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

CyberSponse, Inc.

CyberSponse provides an automated enterprise security operations management platform that provides a transparent view of an organization's entire security operations (SecOps) — from allocated human resources and deployed information security technologies to identified threats, breaches and risk management efforts. CyberSponse's technology solution dramatically improves the efficiency and the effectiveness of the SecOps team's efforts, resulting in rapid return on investment by providing a centralized platform for managing, monitoring, reporting, and analyzing an organization's entire IT security infrastructure and processes, as well as requiring less manpower for managing the increasing cyber threats.

Founded in 2011, CyberSponse provides solutions for CSIRTs and allows them to communicate securely and seamlessly across the organization, while automating workflows and tasks. Organizations across a wide range of markets including financial services, healthcare, retail, government, higher education, utilities, and hospitality turn to CyberSponse to shorten the time it takes to resolve cyber threats and comply with industry regulations and best practices — including PCI, HIPAA, and GLBA. Offices are located in Scottsdale, Arizona. For more information, please visit www.CyberSponse.com.


Room Drop Sponsor

It is Fox-IT's mission to make technical and innovative solutions that ensure a more secure society. We do that through the development of advanced cybersecurity and cyberdefense services and solutions for our clients around the world. We achieve this through a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.

As advancements in Internet technology expand opportunities for misuse by increasingly sophisticated cyber criminals and terrorists, Fox-IT solutions improve surveillance, detection and prosecution of criminals, and harden the security of critical IT networks and systems. We focus on areas where systems are most vulnerable, and in sectors where security is most essential —including government systems up to “state secret level” sensitivity and in vital infrastructure industries like energy and banking.


LookingGlass Cyber Solutions is the leader in threat intelligence and dynamic threat defense. LookingGlass solutions are uniquely architected to discover, understand, manage and mitigate threats both inside and outside an organization's infrastructure. LookingGlass empowers customers to confidently enable effective security decisions and efficient security operations throughout the threat lifecycle. For more information, please visit www.LGScout.com

NSS Labs

NSS Labs, Inc. is the world's leading information security company. Focused exclusively on IT security, NSS is known as the world's security product testing laboratory, offering in-depth security product test reports, research, and analyst services. Upon this foundation, NSS has built the Cyber Advanced Warning SystemTM - a revolutionary cloud-based security and risk management platform that lets clients see where they are at risk.

Through these unique offerings, NSS delivers unparalleled cyber risk management guidance. CEOs, CIOs, CISOs, and information security professionals from many of the largest and most demanding enterprises around the world rely on NSS to help them succeed in getting the most out of their security investments.

For more information, go to www.nsslabs.com


PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial of service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust.

To learn more about PhishLabs, visit www.phishlabs.com or email info[at]phishlabs[dot]com.
Follow PhishLabs: Twitter | LinkedIn | Google +


Booth Crawl Sponsor
Full Page Handbook Ad

Praesidio is a cloud-based cybersecurity company that was formed by bankers and security experts to solve the critical, real-world problems of breach detection, remediation, and governance insight that Financial Institutions (FI) are grappling with today. Praesidio bridges the gap between Governance and IT by linking your cybersecurity policies with the millions of system events where threats hide. It aggregates data across all cybersecurity tools to provide real-time management reporting that proves to your security team, board, auditors and regulators that your FI is actively managing and enforcing its policies. Praesidio's integrated policies and best practices help FIs know definitively that they are safe.

Return Path

Return Path analyses the world’s largest collection of email data to show businesses how to stay connected to their audiences, strengthen their customer engagement, and protect their brands from fraud. Our data solutions help analysts understand consumer behaviour and market trends. We help mailbox providers and security providers around the world deliver great user experiences and build trust in email by ensuring that wanted messages reach the inbox while spam and abuse don’t. For more information on Return Path’s Email Fraud Protection solution, visit www.returnpath.com/StopEmailFraud.

Shape Security

The Shape Botwall Service has deflected over $100M in fraud losses in 2015 alone for major financial institutions, retailers, airlines, and manufacturers. Shape uniquely defends Global 2000 enterprises (websites and API services) against sophisticated automated attacks.

ThreatConnect, Inc.

ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com. ThreatConnect is proud to be an FS-ISAC Affiliate Member and Bronze Sponsor. Stop by our booth to learn more!

Additional Sponsors



AppDome provides an essential shield that secures enterprise and consumer-facing apps from advanced cyber threats, mobile fraud, and data theft.

Gartner's 2015 Cool Vendor for Mobile Security, AppDome sets the standard for dynamic mobile app protection.

Within 7 minutes, AppDome's dynamic app wrapping technology secures iOS and Android apps from a range of attack vectors such as compromised devices vulnerabilities, malware, IP infringement and more.

The solution is based on the application binary level, which completely eliminates the need for source code modifications and SDK integration during the development life cycle.

AppDome's dynamic app protection is used by the world's leading financial, healthcare and e-commerce enterprises to ensure productivity, compliance, and security for consumers and employees.

To learn more about AppDome visit, www.appdome.com.

Arbor Networks, Inc.

Off-site Dinner Sunday Night

Arbor Networks, Inc. helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor delivers market-leading security analytics for dynamic incident response and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business.


Keynote Sponsor
Full Page Handbook Ad

CloudPassage® Halo® is the world's leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts--at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.


Wednesday Lunch Sponsor

Cyveillance is the leading provider of cyber threat intelligence, enabling organizations to protect their information, infrastructure, and employees from physical and online threats found outside the network perimeter. Cyveillance delivers an intelligence-led approach to security through continuous, comprehensive monitoring of millions of online data sources, along with sophisticated technical and human analysis.

People, process, and technology are critical to providing organizations with this vital information so they can prepare accordingly. Cyveillance offers a team of trained security analysts and experts; scalable, enterprise-level processes to sort through volumes of data; and advanced, proprietary technology - combined with human review - to provide relevant, immediate intelligence.


Green Water Station

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack's timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

Cylance, Inc.

Off-site Dinner Sunday Night

Cylance is a next generation, endpoint protection, product company, specializing in advanced threat security that detects and stops zero-day malware and APT attacks. Using advanced math and machine learning, coupled with the understanding of a hacker's mindset, Cylance provides a proactive, preventive approach to security.


Wednesday Lunch Sponsor

Cyveillance is the leading provider of cyber threat intelligence, enabling organizations to protect their information, infrastructure, and employees from physical and online threats found outside the network perimeter. Cyveillance delivers an intelligence-led approach to security through continuous, comprehensive monitoring of millions of online data sources, along with sophisticated technical and human analysis.

People, process, and technology are critical to providing organizations with this vital information so they can prepare accordingly. Cyveillance offers a team of trained security analysts and experts; scalable, enterprise-level processes to sort through volumes of data; and advanced, proprietary technology - combined with human review - to provide relevant, immediate intelligence.


Exclusive Sunday Outdoor Welcome Reception
Midway Event Flight Simulators

RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. RSA delivers agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services. For more information, please visit www.RSA.com.


Full Page Handbook Ad

Sonatype protects the world's enterprise software from security/compliance/licensing risks, while reducing application development/deployment time. Today's software is assembled with open source, 3rd-party components. Customers rely on Sonatype to select the best components from the start so trustworthy applications also meet release deadlines. Policy automation, ongoing monitoring, and proactive alerts ensure applications remain secure.



For over a century, we have built our firm based on a simple and enduring premise: We see the world through the eyes of our clients. We immerse ourselves in our clients' businesses to fully understand the context of their legal issues. Our clients know that our every decision - from hiring, to shaping our service areas, to expanding our global reach - is informed by our desire to better serve their needs.

Comprehensive Solutions to Today's Complex Issues: Today, Venable is an American Lawyer 100 law firm. With more than 600 attorneys in nine offices across the country, we are strategically positioned to advance our clients' business objectives in the U.S. and abroad. Our clients rely on Venable's proven capabilities in all areas of corporate and business law, complex litigation, intellectual property, and regulatory and government affairs.

Our attorneys have an excellent understanding of their practice areas and bring a wealth of firsthand experience to the challenges and opportunities our clients face. In this era of ever-increasing scrutiny by the government, our clients benefit from Venable's Washington know-how. Our attorneys, many of whom are former Members of Congress, regulators and senior government staffers, have the experience to provide solutions when government creates regulatory roadblocks.


Exclusive Wednesday Closing "Jeoparty" Reception

Description coming soon!