Loading... Please wait...



Agenda

Hotel and Travel

Brochure

Call for Presentations

Sponsors

Cancellations


Attendee Registration

Sponsorship Registration

Onsite Representative Registration


Sponsor Prospectus

Contract Terms

Deliverables

Current Sponsors


Return to FSISAC

 

Fall Current Sponsors

 

 Platinum Sponsors

fsisac-fall-bastille-networks.jpg

Launched in 2014, Bastille Networks is the first security company to detect and mitigate threats affecting the Internet of Things (IoT). As the number of connected devices grows to 50 billion, Bastille is at the vanguard of IoT security with a patented, full scope solution.

booz-allen-100-yr-logo-black-red-2014-spring-fsisac.jpg

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for 100 years. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning consulting, analytics, mission operations, technology, and engineering—which it combines with specialized expertise in clients' mission and domain areas to help solve their toughest problems.

Booz Allen is headquartered in McLean, Virginia, employs approximately 23,000 people, and had revenue of $5.76 billion for the 12 months ended March 31, 2013. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH)

ibm-logo.jpg

IBM is one of the world's largest information technology companies with over 100 years of leadership in helping institutions innovate. As a recognized security leader, we help protect clients from billions of security events each day. Our technologies assist in solving the most difficult security issues and enable secure access to people, data, applications and infrastructure. In today's world, data is flowing like water and traditional security solutions are no longer sufficient. IBM’s approach enables a more holistic, comprehensive perspective and can enhance your security maturity. For more details on IBM Security Solutions; visit ibm.com/security

isight-logo-large.jpg

iSIGHT Partners is the leading global provider of cyber threat intelligence. With 200+ experts in 16 countries and expertise in 24 languages, only iSIGHT can deliver the full context and intent of the most damaging threats, enabling security organizations to respond faster, defend proactively, and invest smarter. Find iSIGHT Partners on the web at www.iSIGHTpartners.com or email us at info@isightpartners.com.

skyhigh-logo-final-jan2014-fsisac-spring-2014.jpg

Skyhigh Networks, the Cloud Visibility and Enablement Company, enables IT organizations to embrace cloud services while ensuring security, compliance and governance. Skyhigh facilitates the entire cloud adoption lifecycle of Discover-Analyze-Secure. Specifically, Skyhigh Discover shines a light on Shadow IT by providing a comprehensive view into the use and risk of all the cloud services within an organization and how their risk compares with peers in the industry. Skyhigh Analyze leverages big data to identify opportunities for IT to enable new cloud services that are in demand, to reduce risk and costs by consolidating and better managing subscriptions, and to highlight anomalous behavior that may indicate a security breach or insider threat. And Skyhigh Secure seamlessly enforces security and compliance policies such as contextual access control, encrypting sensitive data with customer managed keys, and data loss prevention across cloud services.

Skyhigh delivers these capabilities while leveraging your existing IT investments in firewalls, proxies and SIEMs and without requiring any agent or footprint on the device. Proven at over 200 enterprises, Skyhigh Networks is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at skyhighnetworks.com or follow us on Twitter @skyhighnetworks

Gold Sponsors

inspired-logo.jpg

BAE Systems Applied Intelligence creates solutions with our clients to protect and enhance the connected world.

We help leading enterprises and government departments to manage multiple threats from digital criminality – whether your goal is to manage cyber security risk, reduce losses from banking or insurance fraud, protect mobile banking, uncover unauthorised trading, prevent tax or healthcare fraud or ensure regulatory compliance.

Our expertise in advanced data acquisition, network analytics, threat intelligence and operations management gives you the ability to derive intelligence from IT network, communications and transactions data to:

  • access more, and better quality, data from multiple sources
  • identify harmful activity from sophisticated external and insider threats
  • improve your risk view through continuous monitoring
  • improve the efficiency and effectiveness of investigations, analysis and remediation

Our solutions are delivered securely through multiple deployment options, enabling your organisation to successfully deliver its core mission at lower risk.

Applied Intelligence is part of BAE Systems, a global defence, aerospace and security company with approximately 90,000 employees.  Learn more at www.baesystems.com/ai.

fsisac-fall-cisco-color.jpg

Cisco delivers intelligent cybersecurity for the real world. This vision is based on a threat-centric approach to security that reduces complexity while providing superior visibility, continuous control, and advanced threat protection across the entire attack continuum. With this new security model organizations can act smarter and more quickly before, during, and after an attack.

ey-logo6.jpg

EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.It's how EY makes a difference.

fireeye-securityreimagined-signature.jpg

FireEye protects the most valuable assets in the world from those who have them in their sights. Our combination of technology, intelligence, and expertise — reinforced with the most aggressive “boots on the ground” — helps eliminate the impact of security breaches. We find and stop attackers at every stage of an incursion. With FireEye, you’ll detect attacks as they happen. You’ll understand the risk these attacks pose to your most valued assets. And you’ll have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 2,500 customers across 65 countries, including over 150 of the Fortune 500.

kaspersky-rgb-fsisac-spring-2014.jpg

Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions and the owner of the most advanced global threat intelligence ecosystem. Kaspersky Lab technologies prevent cyber threats for over 300 million people and 250,000 corporate clients throughout 200 countries and territories. Kaspersky Fraud Prevention combines Kaspersky Lab's global security intelligence and innovative security technologies – to provide rigorous, multi-layered security for online and mobile transactions that prevent fraud by proactively breaking the fraud lifecycle at its earliest stages and eliminate financial information theft. These solutions minimize impact to the end user experience, enable cross-channel visibility, and provide comprehensive, measurable controls against fraud.

fall-fsisac-lacoon.jpg

Lacoon Mobile Security provides a mobile threat management platform that allows enterprises to easily manage and mitigate the risks of BYOD and protect their corporate assets from mobile cyber threats such as malicious applications, targeted network attacks and Advanced Persistent Threats. Lacoon not only provides the most comprehensive solution for iOS and Android but also delivers real-time mobile security and intelligence to an organization’s existing security and mobility infrastructures.  Its patented technology detects device, application and in-network threats that others will miss and quantifies the risks and vulnerabilities that BYOD exposes to the enterprise. With Lacoon, enterprises can balance the needs of mobile security and protection without impacting end user experience and privacy. Lacoon is headquartered in San Francisco, California. Visit us at www.lacoon.com and follows us on Twitter @LacoonSecurity

pan-logo-fsisac-spring-2014-2.jpg

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, commitment to innovation and game-changing security platform, thousands of customers have chosen our technology and approach to security.

Our security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively-built into the platform and share important information across the respective disciplines, we ensure better security than legacy firewalls, UTMs, or point threat detection products.

With our platform, organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks — known and unknown.

phishme-logo-rgb-2c.jpg

PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.

pindrop2014.png

Pindrop Security, headquartered in Atlanta, Ga., is a privately-held company that provides enterprise solutions that help prevent phone-based fraud. Its breakthrough phoneprinting technology can identify phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop's customers include two of the top five banks and one of the leading online brokerages. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner "Cool Vendor" in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security's solutions restore enterprises' confidence in the security of phone-based transactions.

riskiq-fsisac-fall.png

RiskIQ detects online threats that exploit customers and damage enterprise brands. The company discovers and continuously analyzes web and mobile assets from the user perspective to detect malware, fraud and brand infringements. RiskIQ’s cloud service is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and is backed by Battery Ventures and Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.

rsa-division-emc-rgb-25mm-transparent.png

RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.

Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.

sonatype-logo-whitebg.jpg

Sonatype protects the world's enterprise software from security/compliance/licensing risks, while reducing application development/deployment time. Today's software is assembled with open source, 3rd-party components. Customers rely on Sonatype to select the best components from the start so trustworthy applications also meet release deadlines. Policy automation, ongoing monitoring, and proactive alerts ensure applications remain secure.

symantec-fsisac-spring-2013.gif

Symantec is a global leader in providing security; storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

threatmetrix-fsisac-fall-2013.jpg

ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix™ Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

trendmicrologo-notagline-printjpg.jpg

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.

In today's organizations, information has become the most strategic asset; embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need smart protection of information, with technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Trend Micro solutions enable a smart protection strategy for organizations. Smart. Simple. Security that fits.

Trend Micro provides layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For additional information, visit www.trendmicro.com

tripwire-logo-2014.jpg

Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.

websense-fsisac-2013.jpg

Websense is a global leader in protecting organizations from the latest cyber attacks and data theft. Websense TRITON comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. More than 11,000 enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. www.websense.com

Silver Sponsors

Agari

Agari builds new, internet scale, data driven security solutions that eliminate email as a channel for cyberattacks and enable businesses and consumers to interact safely. The Agari cloud-based SaaS solution aggregates data from 2.5 billion mailboxes hosted by email receivers including Gmail and Yahoo! to help global brands including JPMorgan Chase, Facebook, Aetna, and UPS eliminate email threats, protect customers and their personal data, and proactively guard brand reputation. Today, Agari analyzes over 6 billion messages per day, identifies over 2 million malicious URLs per month, and blocks over 200 million malicious emails per month. Founded by the thought leaders behind Cisco's IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security, is headquartered in Silicon Valley. Learn more at www.agari.com.

AirWatch by VMware

AirWatch by VMware is the leader in enterprise mobility management, with more than 12,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content, and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for Bring Your Own Device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com. VMware is headquartered in Silicon Valley and can be found online at www.vmware.com.

Battelle Memorial Institute

Every day, the people of Battelle apply science and technology to solving what matters most. At major technology centers and national laboratories around the world, Battelle conducts research and development, designs and manufactures products, and delivers critical services to government and commercial clients. Headquartered in Columbus, OH since its founding in 1929, Battelle serves the national security, health and life sciences, and energy and environmental industries. Battelle has now taken decades of national security experience and is applying it directly to the global financial industry, focusing on developing the next generation of actionable threat intelligence. For more information, visit www.battelle.org.

BioCatch

BioCatch is a leading provider of Cognitive Biometrics and Authentication solutions for mobile and Web applications. Available as a cloud-based solution, BioCatch proactively collects and analyzes more than 400 bio-behavioral, cognitive and physiological parameters to generate a unique user profile. Banks and eCommerce websites and mobile apps use BioCatch to significantly reduce friction associated with risky transactions and protect users against cyber threats, such as Account Takeovers, Man-in-the-Browser (MitB) Malware and Remote Access (RAT) attacks. Additionally, BioCatch provides an enterprise tool that improves the employee authentication experience while protecting access to critical IT assets. The Company was founded in 2011 by experts in neural science research, machine learning and cyber security and is currently deployed in leading banks, eCommerce sites and enterprises across North America, Latin America and Europe. For more information, please visit www.biocatch.com.

CipherCloud

CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks.  CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, cloud data loss prevention, cloud malware detection and activity monitoring. CipherCloud's ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.

CipherCloud has experienced exceptional growth and success with over 2 million business users, more than 250 million customer records, in over 10 industries, and with marquee customers around the globe.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as Salesforce, Chatter, Box, Google Gmail, Microsoft Office 365, and Amazon Web Services. Additionally, CipherCloud for Any App and CipherCloud for Databases enable organizations to extend data protection to hundreds of third-party cloud and private cloud applications and databases.

CipherCloud, named as SC Magazine's 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

CSG Invotas

CSG Invotas, an enterprise security business unit of CSG International Inc. (NASDAQ: CSGS), is focused on automated threat response capabilities built on proven carrier-grade activation technology. For more than 30 years, CSG has amassed a track record in building automated systems that solve business challenges, improve operations, preserve continuity and enhance profitability. CSG Invotas builds on this heritage with innovative security strategies that inspire CIOs and CISOs to think differently about secure enterprise management.

To learn more, contact CSG Invotas at: www.csginvotas.com or 1-844-468-0827

CXOWARE, Inc.

CXOWARE is a risk analytics software company providing IT & cybersecurity risk analysis solutions. CXOWARE's applications provide Chief Information Security Officers (CISO's) and Risk Officers with a decision-analysis solution that dramatically improves their ability to measure the monetary loss associated with cybersecurity risk. Decision-makers can efficiently tailor risk mitigation budgets to the highest loss exposure areas, thus saving money and reducing liabilities to the business. . Decision-makers are also provided the necessary reports to make judicious and defensible decisions regarding risk appetite statements, capital reserves, and cyber insurance. CXOWARE's RiskCalibrator software is the only FAIR (Factor Analysis of Information Risk) authorized software and is based on The Open Group Risk Analysis Standard, Factor Analysis of Information Risk (FAIR).

CyberArk

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 35 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications.  CyberArk is a vital security partner to more than 1,500 global businesses, including 17 of the world’s top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

Cylance

Cylance is a global cybersecurity products and service company, specializing in advanced threat security that detects and stops zero-day malware and APT attacks. Using advanced math and machine learning, coupled with the understanding of a hacker’s mindset, Cylance provide a proactive, preventive approach to security.

Fox-IT

Fox-IT's is dedicated to making innovative solutions that ensure a more secure society. We develop advanced cybersecurity and cyberdefense solutions for our clients around the world. We have a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity. Fox-IT delivers solutions before, during and after attacks: InTELL provides global visibility into on-line threats. The ability to understand threats is the most effective way for companies to build their defenses. DetACT delivers real-time behavioral analytics to detect attacks and anomalies to on-line channels. DetACT offers intelligence powered detection, scaling infosec and anti-fraud processes. with analytics, channel insight and fraud stopping engines. FoxCERT is our global CERT, investigating breaches and normalizing difficult situations all over the world. www.fox-it.com

Guardian Analytics

Protect payments, personal information, and online and mobile banking. Come see how our behavioral analytics solutions help hundreds of financial institutions mitigate fraud risk so they can expand revenue-generating services while improving operational efficiency, competitiveness, and client loyalty and trust.

Imperva

Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

Invincea, Inc.

Invincea is the market leader in user protection solutions, delivering advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach— attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.

The company's solutions include a desktop security software suite and cloud hosted management and threat intelligence service. The solutions offer a unique ability to protect networks against all types of threats directed at end users, including zero-days, by seamlessly moving applications that render untrusted content into controlled, secure virtual containers that automatically detect and terminate threats in real time. Invincea's platform seamlessly moves the browser, PDF reader and Microsoft Office suite from the native operating system into secure virtualized environments without altering the user experience.

Ionic Security

Ionic Security, bringing trust to distributed computing.

Ionic Security is the unified data protection platform that takes a comprehensive approach to security data in today's borderless enterprise by providing access control, intellectual property monitoring, data encryption, policy management and analytics, without proxies or gateways or changes in user behavior.

KPMG LLP

KPMG LLP's IT Advisory professionals help clients assess, manage, and remediate IT-related risks. We help organizations develop the right approach— turning risk into opportunity—to drive sustainable business value. We accomplish this by helping organizations demonstrate effective IT compliance through governance and controls, data integrity, security and privacy, and supplier management.

Our professionals use experience and insight to cut through complexity and deliver informed perspectives and clear methodologies that our clients value. Client focus, commitment to excellence, global mind-set, and consistent delivery build trusted relationships - core to our business and reputation.

Netskope

Netskope™ is the leader in cloud app analytics and policy enforcement. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps. The Netskope Active Platform™ performs deep analytics and lets decision-makers create policies in a few clicks that prevent the loss of sensitive data and optimize cloud app usage in real-time and at scale, whether IT manages the app or not. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.

Serving a broad customer base including leading healthcare, financial services, high technology, and retail enterprises, Netskope has been named to CIO Magazine's top 10 cloud security startups and featured in such business media as CBS News, Wall Street Journal, and Forbes. Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter@Netskope.

Northrop Gruman Corporation

Northrop Grumman has more than thirty years' experience in cybersecurity and information assurance, and brings unparalleled expertise in managing and protecting networks and delivering complex information assurance and security solutions to high-risk customers including government and critical infrastructure industries.

Northrop Grumman is developing the next-generation of advanced cyber solutions that touch on policy, governance requirements, software applications, network development, training and operational support, and is responsive to emerging cybersecurity needs. Through aggressive technology investments in key research areas such as identity management, situational awareness, cloud security and supply chain, Northrop Grumman has a deep understanding of the breadth and complexity of cyber.

PhishLabs

PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial of service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust.

To learn more about PhishLabs, visit http://www.phishlabs.com or email info[at]phishlabs[dot]com.

Follow PhishLabs:   Twitter   |   LinkedIn   |   Google +

Proofpoint

Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.

Proofpoint, positioned by Gartner in the Leaders Quadrant in its 2014 Magic Quadrant for Secure Email Gateways, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications—all of which are based on a common security-as-a-service platform. More information is available at www.proofpoint.com.

Rapid7

Rapid7

Securonix

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management.

Shape Security

Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world's first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Venrock, Norwest, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley Networks, Palo Alto Networks, VMware, and Google.

ThreatTrack Security

ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber defenses deployed by enterprises and government agencies around the world. With more than 300 employees worldwide and backed by Insight Venture Partners and Bessemer Venture Partners, the company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the latest malicious threats, including its ThreatSecure advanced threat detection and remediation platform, ThreatAnalyzer malware behavioral analysis sandbox, ThreatIQ real-time threat intelligence service, and VIPRE business antivirus endpoint protection. Learn more at www.ThreatTrackSecurity.com

Triumfant

Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Volatile Threat, Advanced Persistent Threatzero-day attacks, targeted attacks and rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image.  No signatures or prior knowledge of any kind are required to stop the adversary. Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready.  To learn more about the company go to: http://www.triumfant.com/default.asp or follow Triumfant on Twitter and YouTube.

Vorstack

Vorstack is a venture-backed company founded and staffed by security and legal experts. We offer solutions that provide automation and control over threat and fraud intelligence sharing, resulting in a significant reduction in human resources and earlier identification of relevant threats. The Vorstack solution for financial services is a distributed analytics and correlation platform for multi-party coordinated cyber defense. We provide the control and auditability necessary to satisfy strict domestic and international privacy, anonymity and compliance requirements. Our solution natively operates across emerging threat-sharing standards like STIX/TAXII to enable organizations to leverage public-private partnerships and ISACS to promote intelligence sharing. Vorstack's solution provides a configurable channel for human intelligence collaboration complementing real-time data intelligence analysis.

Bronze Sponsors

Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance, and reduce IT costs. For more information please visit www.accellion.com or call (650) 485-4300.

CyberSponse, Inc.

CyberSponse provides an automated enterprise security operations management platform that provides a transparent view of an organization’s entire security operations (SecOps) — from allocated human resources and deployed information security technologies to identified threats, breaches and risk management efforts.  CyberSponse’s technology solution dramatically improves the efficiency and the effectiveness of the SecOps team’s efforts, resulting in rapid return on investment by providing a centralized platform for managing, monitoring, reporting, and analyzing an organization’s entire IT security infrastructure and processes, as well as requiring less manpower for managing the increasing cyber threats.

Founded in 2011, CyberSponse provides solutions for CSIRTs and allows them to communicate securely and seamlessly across the organization, while automating workflows and tasks.  Organizations across a wide range of markets including financial services, healthcare, retail, government, higher education, utilities, and hospitality turn to CyberSponse to shorten the time it takes to resolve cyber threats and comply with industry regulations and best practices — including PCI, HIPAA, and GLBA.  Offices are located in Scottsdale, Arizona. For more information, please visit www.CyberSponse.com.

DB Networks

DB Networks® is innovating behavioral analysis technology for continuous intrusion detection. Developed for organizations that need to protect their information from evolving threats including Zero-Day attacks and advanced persistent threats. DB Networks IDS-6300 core IDS offers continuous database discovery, database mapping, and truly effective detection of database attacks. Intrusions happen rapidly – in a matter of minutes – and easily bypass traditional perimeter security measures. DB Networks' IDS-6300 is a new generation of security system that isn't based on traditional black list/white list signature files. Rather through adaptive behavioral analysis it automatically learns each application's proper behavior. Any suspicious activity immediately raises an alarm. The IDS-6300 is able to detect advanced database attacks so that your predefined procedures can be initiated to block or quarantine the attack. In addition you'll have the information to quickly locate what needs to be patched in your application to permanently close the vulnerability. Don't let your first indication of an intrusion be a call from a customer or the Secret Service. DB Networks is a privately held company headquartered in San Diego, California.

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyberattacks. The company's CounterACT platform dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based mitigation of security issues. ForeScout's open ControlFabric technology allows a broad range of IT security products and management systems to share information and automate remediation actions. Because ForeScout's solutions are easy to deploy, unobtrusive, flexible and scalable, they've been chosen by over 1,500 enterprises and government agencies. Headquartered in Campbell, California, ForeScout offers its solutions through its network of authorized partners worldwide.

HP

Today’s organizations are facing the most aggressive threat environment in the history of information technology. Emerging computing trends have greatly increased productivity and business agility—but at the same time, have introduced a host of new risks. Actionable security intelligence is critical to protecting your organization from this rising tide of security threats.

HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today’s most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today.

More information about HP Enterprise Security Products is available at hp.com/go/esp

Lookingglass

Lookingglass Cyber Solutions is the world leader in threat intelligence management combining global network situational awareness with automated Internet intelligence to support threat, security and risk operations. Lookingglass enables security professionals to navigate, investigate, analyze and research relevant, context-enriched threat information through a single platform. The Lookingglass Scout platform provides aggregated access to Lookingglass' industry-leading, extensive and diverse threat sources alerting organizations to impending risk. The Scout platform drives effectiveness and efficiency by replacing the manual process of management threat intelligence for enterprise and mid-sized organizations. For more information, visit www.LGScout.com

Lookout

Lookout is the mobile security company that keeps people and companies safe from both broad based and targeted mobile threats. Lookout combines a real-time view of the world's mobile data with powerful machine intelligence to continuously identify, analyze, predict and eliminate every mobile threat. Building on this unique capability, Lookout stops attacks before they can do damage and provides individuals and companies alike with the assurance they need to work freely in a connected world. To date, a worldwide community of over 50 million individuals and the world's major mobile operators, including AT&T, EE, Deutsche Telekom, Sprint and T-Mobile, have chosen Lookout as their preferred mobile security solution. Headquartered in San Francisco, Lookout has offices in London and Tokyo.

Norse

Norse is the global leader in live attack intelligence. Norse delivers continuously-updated and unique Internet and darknet intel that helps organizations detect and block attacks that other systems miss. The superior Norse DarkMatter™ platform detects new threats and tags nascent hazards long before they're spotted by traditional "threat intelligence" tools. Norse's globally distributed "distant early warning" grid of millions of sensors, honeypots, crawlers and agents deliver unique visibility into the Internet - especially the darknets, where bad actors operate. The Norse DarkMatter™ network processes hundreds of terabytes daily and computes over 1,500 distinct risk factors, live, for millions of IP addresses every day. Norse products tightly integrate with popular SIEM, IPS and next-generation Firewall products to dramatically improve the performance, catch-rate and security return-on-investment of your existing infrastructure.

NSS Labs, Inc.

NSS Labs, Inc. is the world's leading information security research and advisory company. Known for testing the world's security products, NSS now offers the NSS Cyber Resiliency Center™ (CRC), a suite of services to help enterprises manage their cyber risk. This first-of-its-kind SaaS offering enables CIOs and CISOs to continually evaluate their security posture, and identify which threats target their applications and bypass their security controls. Included in the CRC are:

•NSS Advanced Warning System™, the first cyber resiliency platform to provide enterprises with real-time alerts based on attacks that both target the specific applications within an organization and bypass specific security products deployed within their networks. Backed by threat and security performance data from NSS' extensive, ongoing testing of the world's leading security products, this service enables enterprises to better focus resources against threats that pose the most imminent danger.

•NSS InSight™ enables enterprises to run "what if?" scenarios that model their deployed security layers, show which threats are able to exploit their attack surface, and then virtually "swap out" different security products to assess which technologies best suit their varying risk tolerance and cost constraints. This capability dramatically improves security decision-making by providing empirical data CIOs, CISOs - and even CFOs - can use to better align resources and justify security spending and priorities.

•NSS Research & Testing offers the security industry's most comprehensive library of independent test results for leading security products as well as in-depth vendor, product and market research.

For more information, go to nsslabs.com.

PwC

PwC serves multinational financial institutions across banking and capital markets, insurance, asset management, hedge funds, private equity, payments, and financial technology. As a result, PwC has the extensive experience needed to advise on the portfolio of business issues that affect the industry, and we apply that knowledge to our clients' individual circumstances. We help address business issues from client impact to product design, and from go-to-market strategy to human capital, across all dimensions of the organization.

Return Path

Return Path is the global leader in email intelligence. We analyze more data about email than anyone else in the world and use that data to power products that ensure that only emails people want and expect reach the inbox. Many of the world’s top brands trust Return Path with their email fraud protection efforts, including leading financial services, ecommerce, travel, hospitality and logistics companies, and government agencies. Return Path leverages technologies like DMARC as well as comprehensive relationships with all major ISPs to detect, mitigate, and block malicious spoofing, phishing, and malware attacks. Return Path is committed to the privacy and security of the email ecosystem and eliminating the impact of email fraud.  Please visit our solutions at http://www.returnpath.com/security.

 Additional Sponsors

Cigital

Cigital is one of the world's leading software security services and products companies. We help clients launch and mature software security initiatives, as well as design, build, and test secure software through a combination of expert consultants, security testing as-a-service offerings, and effective training built on over twenty years of cutting-edge research and successful client engagements. From Architecture Risk Analysis and Mobile App Security Assessments to Source Code Review and Penetration Testing, Cigital is uniquely qualified to help clients find and fix the security flaws and defects that make software vulnerable to being attacked and exploited.

Click Security

Off-site Dinner (Monday)

Description

Comilion

Half Page Handbook Ad

Description

CyberSponse, Inc.

Padfolios
Full Page Handbook Ad
Premiere Signage Banner

CyberSponse provides an automated enterprise security operations management platform that provides a transparent view of an organization’s entire security operations (SecOps) — from allocated human resources and deployed information security technologies to identified threats, breaches and risk management efforts.  CyberSponse’s technology solution dramatically improves the efficiency and the effectiveness of the SecOps team’s efforts, resulting in rapid return on investment by providing a centralized platform for managing, monitoring, reporting, and analyzing an organization’s entire IT security infrastructure and processes, as well as requiring less manpower for managing the increasing cyber threats.

Founded in 2011, CyberSponse provides solutions for CSIRTs and allows them to communicate securely and seamlessly across the organization, while automating workflows and tasks.  Organizations across a wide range of markets including financial services, healthcare, retail, government, higher education, utilities, and hospitality turn to CyberSponse to shorten the time it takes to resolve cyber threats and comply with industry regulations and best practices — including PCI, HIPAA, and GLBA.  Offices are located in Scottsdale, Arizona. For more information, please visit www.CyberSponse.com.

Cyveillance

For more than 16 years, Cyveillance has been recognized as an innovative developer of intelligence-led security solutions. Leading financial services companies and Fortune 500 insurance companies were among the first to embrace cyber intelligence from Cyveillance. Through our proprietary technology platform and support from expert analysts, we identify risks early for effective prevention and mitigation. With continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions.

Key solutions for the financial and insurance industry include Anti-Phishing, Information Protection, Corporate Security, Brand Protection, Data Feeds, Response Services, and Rogue Mobile Application Monitoring. Cyveillance helps financial institutions reduce fraud-related losses by proactively identifying transactions utilizing stolen personal credentials; maintain customer trust by eliminating phishing websites and monitoring for data breaches, rogue mobile apps and insider leaks; protect executives, events, and facilities; and assure compliance with corporate policies.

Cyveillance serves the Global 2000 and OEM Data Partners - protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 100 million global consumers through its partnerships with security and service providers that include Blue Coat, AOL and Microsoft. Cyveillance is a wholly-owned subsidiary of QinetiQ, a FTSE250 company which uses its domain knowledge to provide technical support and know-how to customers in the global aerospace, defense and security markets. For more information on QinetiQ, please visit www.qinetiq.com.

For more information: Visit www.cyveillance.com or read our blog at blog.cyveillance.com, follow @Cyveillance on Twitter, or find us on LinkedIn www.linkedin.com/company/cyveillance.

eSentire

Bag Insert
Full Page Handbook Ad
After Hours Hospitality Suite
(Wednesday)
After Hours Hospitality Suite
(Tuesday)
Lanyard Sponsor
Conference Totebags

eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. eSentire’s flagship offering, Network Interceptor, challenges legacy security approaches, combining behavior-based analytics, immediate mitigation and actionable intelligence on a 24x7x365 basis. The company’s dedicated team of security experts continuously monitors customer networks to detect and block cyber attacks in real-time. Protecting more than $2.0 trillion in combined assets, eSentire is the trusted choice for security decision-makers in financial services, healthcare, mining, energy, engineering and construction, legal services, and technology companies. In late 2013, eSentire was named to the Deloitte Technology Fast 50 Companies to Watch and cited as a Canadian Innovation Exchange CIX Top 20 most innovative Canadian company. For more information visit www.esentire.com and follow @esentire.

HP

HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today's most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today.

More information about HP Enterprise Security Products is available at www.hpenterprisesecurity.com.

IID

IID is a cybersecurity company that provides the platform to easily exchange cyber threat intelligence between enterprises and governments. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. IID was founded in 1996. The company is headquartered in Tacoma, Washington.

Invincea, Inc.

Full Page Handbook Ad
Key Cards

Invincea is the market leader in user protection solutions, delivering advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach— attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.

The company's solutions include a desktop security software suite and cloud hosted management and threat intelligence service. The solutions offer a unique ability to protect networks against all types of threats directed at end users, including zero-days, by seamlessly moving applications that render untrusted content into controlled, secure virtual containers that automatically detect and terminate threats in real time. Invincea's platform seamlessly moves the browser, PDF reader and Microsoft Office suite from the native operating system into secure virtualized environments without altering the user experience.

Lookout

Off-site Dinner Monday Night

Lookout is the mobile security company that keeps people and companies safe from both broad based and targeted mobile threats. Lookout combines a real-time view of the world's mobile data with powerful machine intelligence to continuously identify, analyze, predict and eliminate every mobile threat. Building on this unique capability, Lookout stops attacks before they can do damage and provides individuals and companies alike with the assurance they need to work freely in a connected world. To date, a worldwide community of over 50 million individuals and the world's major mobile operators, including AT&T, EE, Deutsche Telekom, Sprint and T-Mobile, have chosen Lookout as their preferred mobile security solution. Headquartered in San Francisco, Lookout has offices in London and Tokyo.

NetSPI

Description

Ntrepid Corporation

Ntrepid’s product suite has been enabling enterprises to securely conduct online business activities for 20 years. From corporate identity management to secure browsing, our products facilitate online research and big data collection, and they eliminate the threats that come with having a workforce connected to the Internet. Ntrepid has been building safe environments for Internet operations against the most sophisticated opponents and in the most hostile network environments around the world. We are proud to support some of the most demanding customers, including the Intelligence Community, our Armed Forces and Law Enforcement. This year, we took the technologies from our top of the line specialized tools and created a product that will secure the Web for every business: Passages by Ntrepid.

Passages secures the browser to eliminate malware from infecting the corporate network, mitigating against 90% of all attacks directed at the enterprise. It runs on a user’s computer and isolates web browsing within a lightweight virtual machine, removing the threats associated with connected computers. We understand that preventing data loss is a priority for financial services firms, and we've built in the most comprehensive logging tools of any virtual browser. In addition, Passages incorporates data and audit management tools, providing management with valuable historical information and trend analysis ensuring compliance and reporting functions can be met.

To learn more visit www.GetPassages.com.

RiskIQ

RiskIQ protects corporate brands and their customers on the internet. The company combines a worldwide proxy network with synthetic clients that emulate real users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and brands in the US to protect their web assets and visitors/users from security threats and fraud. RiskIQ is headquartered in San Francisco and is backed by growth equity firm Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.

ThreatGrid

Full Page Handbook Ad

ThreatGRID is the first and only unified malware analysis and threat intelligence solution that enables organizations to detect, block and recover from these sophisticated attacks faster, become proactive and better use existing security tools and enabling new ones. ThreatGRID also provides highly accurate premium content feeds enabling organizations to generate context-rich threat intelligence that is both actionable and specific. Via its powerful API, ThreatGRID supports full automation and deep integration with existing security products.

vArmour

Off-site Dinner Monday Night

vArmour provides security for the data defined perimeter in a new world of mobile applications, virtualization, and cloud computing.¬ We help enterprises protect their greatest asset: their data, from advanced cyber threats and security breaches, dynamically and securely by giving them instant visibility and control of their East/West Traffic flows. vArmour is based in Mountain View, California, and is led by executives from NetScreen, Juniper Networks, Silver Tail Systems, Citrix, Riverbed and IBM. Find out more at www.varmour.com

ZeroFOX

Description

 

 

 




?