Loading... Please wait...

Categories

Sponsor Prospectus

line

Contract Terms

Deliverables/FAQ's

Sponsorship Registration Closed

Onsite Representative Registration Closed

Call For Presentation

Current Sponsors


Return to FSISAC

 

Fall Current Sponsors

 

 Platinum Sponsors
 

inspired-logo.jpg

BAE Systems delivers cyber security and information intelligence solutions to a wide range of commercial organizations and governments around the world. We use our technology expertise to manage and exploit data so that clients can maintain security when dealing with vast quantities of complex information. This helps them to protect national security, detect and stop advanced cyber-attacks, protect their most valuable information, understand their cyber risks and respond effectively to cyber-attack.

Cyber attacks are evolving rapidly. There are more attackers using ever more sophisticated tools, processes and collaboration techniques to breach security systems. The majority of monitoring solutions are not suitable for the current security environment, making scalability a real concern as the data sources and volumes increase continuously. To compound the problem, security analysts are struggling to get a single view of their security estate and are not provided with the level of context required to act on alerts without significant data mining and investigation across tool sets.

CyberReveal is our single application that brings together all relevant information from across your network and significantly increases analyst efficiency. We are part of BAE Systems, a global defence and security company with approximately 90,000 employees worldwide.

www.baesystemsdetica.com/cybersecurity

boozallen.jpg

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. The firm provides services primarily to the US government, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy, organization, engineering, operations, technology, and analytics.

To learn more, visit www.boozallen.com.

 e-y.gif

Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 141,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve their potential. Our 20,000 advisory professionals form one of the broadest global advisory networks of any professional organization, delivering seasoned multidisciplinary teams that work with our clients to deliver a powerful and superior client experience. We use proven, integrated methodologies to help you achieve your strategic priorities and make improvements that are sustainable for the longer term. It's how Ernst & Young makes a difference.

To learn more, visit www.ey.com.

hp-logo-fsisac-spring-2013.gif

HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today’s applications and IT infrastructures from sophisticated cyber threats.

Visit HP Enterprise Security at: www.hpenterprisesecurity.com.

isight-logo-large.jpg

iSIGHT Partners is the leading global cyber intelligence firm delivering managed intelligence services to 140 leading public sector and commercial entities. They have built an unparalleled global cyber intelligence organization that operates through 5 geographic risk management centers covering 56 countries in 22 languages and researches emerging cyber threats, adversary capabilities, and their "playbooks." These playbooks enable customers to proactively understand their threat environment, prioritize investments against those threats that have the highest impact on their organization and manage cyber risk.

palantir.jpg

Palantir Technologies is working to radically change how organizations analyze information. We were founded in 2004 by a handful of PayPal alumni and Stanford computer scientists to work on the data and analysis challenges within counterterrorism. Since then, we've doubled in size every year while retaining our early-stage values: a startup culture, strong work ethic and rigorous hiring standards.

We deliver a comprehensive suite of software applications for integrating, visualizing and analyzing the world's information. Intelligence organizations have spent billions of dollars creating systems that provide a holistic understanding of their own networks and actionable signals of attack. Building upon our deep experience in this space, we have created Palantir Cyber as a commercial product that allows you to understand what is really going on in your network. We support massive-scale cyber log data, unstructured open source data, and everything in between. Within a single environment, organizations can combat Denial-of-Service attacks and Advanced Persistent Threats, investigate data breaches, defend against insider threat, and more.

Our products are built for real analysis with a focus on security, scalability, ease of use and collaboration. They are broadly deployed in the cyber, intelligence, defense, law enforcement, and financial communities, and are spreading rapidly by word of mouth into applications in other industries and realms of impact.

Palantir is headquartered in Palo Alto, CA, with offices around the world.

rsa-emc-logo-highres.jpg

RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption and key management, SIEM, data loss prevention, and fraud protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated.

Learn more: www.netwitness.com.

Gold Sponsors
agari.jpg

Agari collects and analyzes terabytes of email data to provide global brands with a SaaS security solution that eliminates email threats, protects consumer information, and proactively guards brand reputation. To date, Agari has analyzed over 1 trillion email messages, blocked over 1 billion malicious emails, and secures more than 80 percent of US consumer email inboxes. Founded by the thought leaders behind Cisco’s IronPort solutions, Agari is headquartered in San Mateo and is backed by Alloy Ventures, Battery Ventures, First Round Capital, and Greylock Partners.

arbor-fsisac-2013-converted-.jpg Arbor Networks is the leading provider of network security and management solutions for enterprise and service provider networks. Arbor Networks protects enterprises from distributed denial of service attacks and advanced malware using Arbor's global network intelligence. Arbor's proven solutions help grow and protect customer networks, businesses and brands
arxan-logo-2013.jpg Arxan Technologies Inc. is a leading provider of software security solutions that protect the App Economy. Arxan's application protection secures mobile, desktop, server and embedded applications against tampering and reverse engineering attacks as an integral part of end to end application security. Our security defends against unauthorized use, insertion of exploits, piracy, and theft of intellectual property for enterprise, financial, ISV, gaming and digital media applications to proactively defend the integrity of code and business models. We defend, detect, alert and react to application attacks through a threat-based, customizable approach. Proven, durable and resilient, Arxan's offerings support a full range of application protection needs, from commercial software to military grade assurance. Arxan Technologies is headquartered in the U.S. with global offices in EMEA and APAC. For more information, please visit www.arxan.com.
authentify-2012-fs-isac.gif Authentify offers a suite of user-centric multi-factor authentication services, (SaaS) including voice biometrics and digital certificates without the effort associated with deploying these technologies. A unique architecture protects an Enterprise from data breaches and supports the entire ecosystem of user’s computing or mobile devices ensuring no end user is left behind.
 br-bromium-glossy-fsisac-fall-2012.jpg

Bromium is re-inventing enterprise security with vSentry®, which automatically creates hardware-isolated micro-VMs to isolate each user task. When malware strikes, the threat is contained in a micro-VM and is not able to steal or damage any enterprise resource. vSentry is transparent to the end user, has no impact on user experience or performance, and empowers the user to click without fear. Bromium LAVA works with vSentry to automatically record an entire attack within the isolated micro-VM. It is then forwarded to the central LAVA console, providing security teams with automatic, in-depth analysis of advanced malware. Learn more at www.bromium.com.

 f5-fullcolor-lg.jpg F5 Networks (NASDAQ: FFIV) makes the connected world run better. F5 helps organizations meet the demands and embrace the opportunities that come with the relentless growth of voice, data, and video traffic, mobile workers, and applications—in the data center, the network, and the cloud. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5’s intelligent services framework to deliver and protect their applications and services while ensuring people stay connected. Learn more at www.f5.com. You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technology.
 ibm-logo.jpg IBM helps financial services clients maximize their efficiences and gain sophisticated insight and agility through information-led transformation. Forward thinking institutions will use these insights to transform their business within four imperatives: attract and retain customers, develop new revenue sources, streamline operations and pro-actively address risk and regulatory reguirements. Our clients benefit from decades of deep IBM industry experience integrating hardware, software and services to holistically bridge their business and IT strategies.

Learn more: ibm.com/banking

mandiant-fsisac-2012-web.gif

Mandiant is the information security industry’s leading provider of advanced threat detection and incident response solutions and services. Mandiant provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and leading U.S. law firms.

 mcafee-2012-fsisac.jpg

McAfee is the world’s largest dedicated security technology company. Delivering proactive and proven solutions and services that help secure systems and networks around the world, McAfee protects consumers and businesses of all sizes from the latest malware and emerging online threats. Our solutions are designed to work together, integrating antimalware, antispyware, and antivirus software with security management features that deliver unsurpassed real-time visibility and analytics, reduce risk, ensure compliance, improve Internet security, and help businesses achieve operational efficiencies.

Backed by an award-winning research team, McAfee security technologies use a unique, predictive capability that is powered by McAfee Global Threat Intelligence — enabling home users and businesses to stay one step ahead of online threats.

 pwc-fsisac-fall-2012.jpg

PwC’s cybersecurity consulting team helps organizations understand dynamic cyber challenges, adapt and respond to risks inherent to their business ecosystem, and prioritize and protect the most valuable assets fundamental to their business strategy. For more information on PwC’s cybersecurity point of view, visit: www.pwc.com/cybersecurity.

About PwC US - PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 158 countries with more than 180,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/US. Learn more about PwC by following us online: @PwC_LLP, YouTube, LinkedIn, Facebook and Google +.

 riskiq-logo-2colors.gif

RiskIQ® is an internet-scale crawling and archiving platform for the open Web and App Stores. RiskIQ is a SAAS that was purpose built to give security professionals access to current and historical internet content for: research, investigations, intelligence collection, and distribution analysis. With a full API suite that is TAXII/STIX compliant, RiskIQ can be used in Web or App Store security efforts to: perform off-line/ non-attributable investigations, detect/ alert on waterholes, crawl/ archive current URLs and Apps for future use, enhance IOC blacklists, and much, much more.


symantec-fsisac-spring-2013.gif

Symantec is a global leader in providing security, storage and systems management solutions to help our customers – from consumers and small businesses to the largest global organizations – secure and manage their information, technology infrastructures and related processes against more risks at more points, more completely and efficiently than any other company. As the world’s fourth largest independent software company and backed by the Global Intelligence Network, our unique focus is to eliminate information, technology and process risks independent of device, platform, interaction or location. Our software and services protect completely, in ways that can be managed easily and with controls that can be enforced automatically – enabling confidence wherever information is used or stored.

www.symantec.com

 trusteer-logo-small.jpg

Boston-based Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breaches. Hundreds of organizations and millions of end users rely on Trusteer to protect their computers and mobile devices from online threats that are invisible to legacy security solutions. Trusteer’s Cybercrime Prevention Architecture combines multi-layer security software with real-time threat intelligence to achieve sustainable protection against malware and phishing attacks and meet regulatory compliance requirements.

 veracode-logo-hi-res-fsisac-fall-2013.jpg

Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. Learn More: www.veracode.com.

Silver Sponsors

AirWatch

AirWatch is the leader in enterprise-grade mobility management and security solutions. More than 6,000 customers across the world trust AirWatch to manage their most valuable assets: their mobile devices. Our highly scalable solution provides an integrated, real-time view of an entire fleet of corporate and employee-owned Apple iOS, Android, Windows, BlackBerry and Symbian devices.

As the largest MDM provider with more than 1,200 employees, 350 focused on R&D, AirWatch offers the most comprehensive mobility management solution. With a proven track record of deployments larger than 100,000 devices, organizations can confidently manage every single device used across the enterprise.

Check Point Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies.
CipherCloud

CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by eliminating concerns about data privacy, residency, security, and regulatory compliance. CipherCloud’s open platform provides comprehensive security controls including military-grade encryption, tokenization, data loss prevention, malware detection, and activity monitoring.

CipherCloud's ground-breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality. The CipherCloud product portfolio supports popular cloud applications such as Salesforce, Force.com applications, Chatter, Box, Gmail, Microsoft Office 365, and Amazon Web Services. Additionally, CipherCloud Connect AnyApp and CipherCloud Database Gateway enable organizations to extend data protection to hundreds of third-party cloud and private cloud applications and databases.

CipherCloud is backed by premier venture capital firms including Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

Coverity

Coverity is the trusted standard for companies that need to protect their brands and bottom lines from software failures. Over 1,100 customers use Coverity's development testing suite of products to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches, or catastrophic failure.

CyberArk CyberArk is the only security company laser focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. www.cyberark.com
 FireEye, Inc. FireEye® has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,000 customers across more than 40 countries, including over one-third of the Fortune 100.
 Guardian Analytics

200 financial institutions use behavior-based FraudMAP® to detect suspicious activity and prevent fraudulent transactions in their online, mobile, and ACH channels. Our industry-leading anomaly detection solutions monitor all online and mobile banking sessions and analyze ACH origination files, automatically protecting all account holders from the widest array of fraud threats.

By comparing current activity with established patterns of legitimate behavior, we can detect and stop suspicious wire, ACH, bill pay, and other fraudulent transfers. Our flexible deployment options speed deployment, lower maintenance costs, and decrease reliance on IT.

See how you can conform to requirements in the FFIEC Guidance for anomaly detection and expand online banking, mobile banking, and ACH services with confidence, resulting in increased customer trust and loyalty.

For more information, please visit www.guardiananalytics.com.

iovation

iovation protects online businesses and their end users against fraud and abuse through an industry-leading combination of advanced device identification, shared device reputation and real-time risk evaluation. More than 2,000 fraud managers around the globe leverage iovation’s database of Internet devices and the relationships between them to determine the level of risk associated with any type of online transaction. Retail, financial services, insurance, social network, gaming and other companies make real-time queries to iovation’s knowledge base of more than 1.5 billion devices from every country in the world. Clients also leverage iovation's Fraud Force Community, an exclusive virtual crime-fighting network of the world's foremost security experts, to share intelligence about cybercrime and prevention techniques. Every day, iovation stops more than 150,000 fraud attempts. For more information, visit www.iovation.com.

 PhishLabs

PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial of service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust.

To learn more about PhishLabs, visit www.phishlabs.com or email info@phishlabs.com.

Follow PhishLabs: Twitter @phishlabs | LinkedIn www.linkedin.com/company/phishlabs

Radware Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility.  Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.  For more information, please visit www.radware.com.
Return Path Return Path is the worldwide leader in email intelligence. We analyze more data about email than anyone else in the world and use that data to power products that ensure the security of your brand within the email channel and the inboxes of your valuable customers. Our anti-phishing solutions provide financial services organizations with a proactive means of mitigating fraud risk and potential financial loss by providing full visibility in all outbound mail activity, blocking fraudulent email from reaching customers, and forensic data for efficient takedown of malicious sites. http://www.returnpath.com/security
Skyhigh Networks The Skyhigh Networks Cloud Services Manager, delivered as a zero footprint, cloud-based, multi-tenant service, enables companies to embrace cloud services with appropriate levels of security and governance, while lowering overall risk and cost. With customers including Cisco, Equinix, and Torrance Memorial Medical Center, Skyhigh was a finalist for the RSA Conference 2013 Most Innovative Company award, recently named a “Cool Vendor” by Gartner and mentioned in Network World’s latest list of "10 Hot Security Startups to Watch."
ThreatMetrix

ThreatMetrix™ secures Web transactions against account takeover, payment fraud, identity spoofing, malware, and data breaches. The ThreatMetrix™ Global Trust Intelligence Network, which analyzes 500 million monthly transactions, provides context-based authentication and Web fraud prevention to help companies accelerate revenue, reduce costs and eliminate friction.

FFIEC Compliance The 2011 Federal Financial Institutions Examination Council (FFIEC) supplement identifies two key techniques that financial service institutions should implement for effective fraud prevention: complex device identification, and the ability to detect emerging threats in form of malware and provide a secure browsing environment.
ThreatMetrix provides a combined solution that fully addresses both of these requirements. The TrustDefender™ Cybercrime Protection Platform addresses the FFIEC requirements to protect the integrity of online customer accounts and financial transactions.
Additionally, ThreatMetrix protects financial institutions from:

Transaction Fraud

  • Reduces potential for fraudulent wire transfers
  • Prevents web-based and machine-resident attacks from executing fraudulent transactions
  • Protects online banking customers from session-based transaction attacks

Account Takeover ThreatMetrix detects compromised accounts across multiple dimensions, including:
  • Automated logins from bots and compromised devices
  • Shared user accounts, including concurrent access and access from multiple locations
  • Malicious software, including web-based and machine resident malware
  • Access from suspicious locations or unrecognized computer settings

Fraudulent New Account Registration
  • Prevents use of stolen credentials to create new identities and accounts
  • Flags suspicious accounts that may be used to apply for credit or loans
  • Protects customers from false accounts that may be attempting to transfer funds out of real accounts

For more information on ThreatMetrix, visit www.threatmetrix.com or call 1-408-200-5755.
Tripwire, Inc Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.
 Triumfant, Inc Triumfant is a patented endpoint tool that detects advanced malware missed by other tools. It detects and removes the infection within minutes of the attack without the need to reimage the computer.

It accomplishes this by using anomaly change detection on large data sets without signatures or any prior knowledge.

WhiteHat Security Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security provides end-to-end solutions for Web security. The company's cloud technology platform and leading security engineers turn verified security intelligence into actionable insights for customers. Through a combination of core products and strategic partnerships, WhiteHat Security provides complete Web security at a scale unmatched in the industry. WhiteHat Sentinel, the company's flagship product line, currently manages more than 4,000 websites -- including sites in the most regulated industries as well as top ecommerce, finance and healthcare companies.

Bronze Sponsors

Agiliance

Agiliance® is the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance RiskVision™ enables Global 2000 companies and government agencies to automate their risk analysis to make better investment decisions. The company’s integrated risk management software provides a unified view of organizations’ risk posture, combining policy, risk, compliance, and threat / vulnerability management applications in a single platform. Agiliance RiskVision scales with businesses, effectively managing data, assets, people, and processes to achieve 100 percent risk and compliance coverage. Its real time risk analysis leads to optimized business performance and better investment decisions. Financial services organizations are leveraging Agiliance RiskVision to improve the efficiency of audits amidst escalating regulations, automate threat / vulnerability remediation actions, minimize negligence in incident response, and provide effective risk trending for the C-suite and board of directors.

For more information, please visit www.agiliance.com.

Cigital

Cigital is the global leader in helping organizations design, build and maintain secure software. Our unique expertise, technologies, and training services are the culmination of more than twenty years of cutting-edge research and successful software security consulting engagements with leading public and private organizations. We provide a comprehensive range of software security services including consulting, instructor-led and computer-based training, managed services aimed at addressing the potential security risks associated with third-party or outsourcer-developed software, and our solution technologies.

Cylance

Cylance is a leading security technology company that prevents advanced cyber threats using a scientific approach to security. Today¹s advanced threats target everyone with a computer or mobile device, no matter how small, including Enterprise customers and especially Critical Infrastructure like Industrial Control Systems and Embedded devices that control much of our physical world. Cylance offerings deliver on prevention through a non-signature, non-heuristic and non-behavioral based approach that detects and blocks unknown attacks by applying advanced mathematical analysis and machine learning on massive amounts of data ¬ applying ³Big Math² to security. Cylance is the only solution provider with this unique approach, allowing a lightweight, extremely fast algorithmic analysis of good and bad data. Through high-end consulting services Cylance helps organizations recover after an attack while also detecting and preventing attack before it impacts business. Cylance Presponse services include advanced compromise assessment capabilities, unpublished intelligence and secure software development services. With our products and services, Cylance empowers and protects you to prevent the next big hack - silently.

Cyveillance

For more than 15 years, Cyveillance has led the industry as an innovative developer of intelligence-led security solutions. Through our proprietary technology platform and support from expert analysts, we identify risks early for effective prevention and mitigation. Cyveillance serves Fortune 500 companies in the financial services, pharmaceutical, energy and technology industries as well as consumer packaged goods, retail, travel and hospitality, healthcare, legal, media entertainment and insurance industries. We offer a wide range of threat intelligence services, including detection, analysis and response, to help protect organizations from threats to their people, physical infrastructure, networks, brand reputation, and intellectual property.

DB Networks

DB Networks is innovating behavioral analysis based database security equipment. Our next generation ADF-4200 was developed for organizations who need to protect their data from advanced database attacks. DB Networks ADF-4200 is an effective countermeasure against advanced SQL Injection and database Denial of Service attacks. Unlike traditional database security solutions, which require extensive user customization and time-consuming white list/black list maintenance, the ADF-4200 automatically learns and creates a model of proper SQL transaction behavior for each application. Any rogue SQL transaction will deviate from the behavioral model and will thus immediately raise an alarm. DB Networks is a privately held company headquartered in San Diego, California.

Easy Solutions Easy Solutions is the only company focused on the detection and prevention of electronic fraud across all devices, channels and clouds. Our activities range from anti-phishing and secure browsing to multi-factor authentication and transaction anomaly detection. We protect 32M customers of over 120 leading financial companies, retailers and other entities in the US and abroad.
Endace Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions that enable unrivaled end-to-end application visibility, optimization and acceleration for global networks that support enterprise, cloud, government and telecommunications. Emulex’s I/O connectivity offerings, including its ultra high-performance Ethernet and Fibre Channel-based connectivity products, have been designed into server and storage solutions from leading OEMs. Emulex’s monitoring and management solutions, including its portfolio of network visibility and recording products, provide organizations with complete network performance management at speeds up to 100Gb Ethernet. Emulex is headquartered in Costa Mesa, Calif., with offices and research facilities worldwide. Visit www.Emulex.com.
ForeScout Technologies

ForeScout is the leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations.

ForeScout’s automated solutions for network access control, mobile security, threat prevention and endpoint compliance empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because ForeScout’s CounterACT portfolio is easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by over 1000 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Within hours, ForeScout customers can see and control everything on their network—all devices, all operating systems, all applications, all users.

Fox - IT

InTELL is the real-time collaboration intelligence portal by Fox-IT. In the face of malware, phishing and DDOS attacks, companies need to know what threatens their online channels. InTELL provides world class intelligence protecting companies and brands. Analysts find and track new threats, providing actionable information. The InTELL portal contains the financial industries most complete global attack reference, providing valuable information to any industry. Customers use the virtual analyst feature to track investigations in real time. Collaboration gives insight into peer threats and mitigation options. You can’t fight what you can’t see – with InTELL you are ahead of the game.

Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. It is Fox-IT’s mission to make technical and innovative solutions that ensure a more secure society. We do that through the development of advanced cybersecurity and cyberdefense services and solutions for our clients around the world. We achieve this through a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.

As advancements in Internet technology expand opportunities for misuse by increasingly sophisticated cyber criminals and terrorists, Fox-IT solutions improve surveillance, detection and prosecution of criminals, and harden the security of critical IT networks and systems. We focus on areas where systems are most vulnerable, and in sectors where security is most essential —including government systems up to “state secret level” sensitivity and in vital infrastructure industries like energy and banking.

Who We Are
•Founded in 1999, Fox-IT is headquartered in Delft, The Netherlands and works with trusted partners in more than 20 countries.
•Our Mission: Making technical and innovative contributions for a more secure society.
•200 security experts with deep industry experience dedicated to maintaining the security and integrity of governments, enterprises, critical infrastructure, banking systems – in short, society as a whole.

inAuth InAuth Inc. offers an “app integrated solution” for Mobile and Desktop Security focused on fraud prevention and detection by proactively monitoring and risk scoring mobile devices and their users. The InAuth Trusted Customer Device Platform is an elegant solution that it is invisible to the end-user, flexibly integrated into mobile applications via SDKs, customizable and adaptive. Our team has worked closely with many of the world's largest organizations to provide innovative solutions with the highest integrity, reliability and privacy protections. We are ready to work within every level of your organization to solve problems together, help protect financial institutions and safe-guard the mobile and desktop transaction market.
Internet Identity (IID) IID (Internet Identity) offers products and services that combat and mitigate cyber attacks in order to protect the growth plans, assets, and customers of enterprises and government entities. Armed with collective intelligence about the latest Internet risks, IID secures the networks of five of the top six banks in the U.S., the largest government agencies worldwide, and many of today’s leading financial services firms, e-commerce companies, social networks and ISPs. IID’s 24-7 analysts, and partnerships with law enforcement, service providers and security experts around the world ensure the protection of its customers. The company is headquartered in Tacoma, Washington. More information can be found at www.internetidentity.com.
KPMG

KPMG LLP's IT Advisory professionals help clients assess, manage, and remediate IT-related risks. We help organizations develop the right approach— turning risk into opportunity—to drive sustainable business value. We accomplish this by helping organizations demonstrate effective IT compliance through governance and controls, data integrity, security and privacy, and supplier management.

Our high-performing professionals use experience and insight to cut through complexity and deliver informed perspectives and clear methodologies that our clients value. Client focus, commitment to excellence, global mind-set, and consistent delivery build trusted relationships - core to our business and reputation.

In essence, our competitive advantage is high-performing people cutting through complexity.

Lookingglass

Lookingglass is a pioneer delivering over-the-horizon visibility through a revolutionary Cyber Threat Intelligence Management (CTIM) platform. The Lookingglass product suite provides revolutionary solutions that deliver deep visibility into the Internet threat landscape. With its ScoutVisionTM and CloudScoutTM solutions, Lookingglass offers alert and warning capabilities that empower customers to continuously monitor for over-the-horizon threats from outside a client’s network and control, such as the presence of botnets, hosts associated with cyber criminal networks, unexpected route changes and the loss of network resiliency. Lookingglass’ outside-in approach accounts for a client’s entire enterprise cyber ecosystem including the extended enterprise, and other networks beyond their control. This oversight ensures business partners or service providers are not the proximate cause of security breaches or data loss. For more information, visit www.LGScout.com.

NetSPI

NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its Correlated VM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. More information is available at www.netspi.com.

Norse Corporation Norse Corporation is a leading innovator of IT security and fraud prevention solutions - and the only provider of live, actionable, cyber threat intelligence. Norse's patent-pending IPViking technology continuously monitors the Internet for malicious high risk network traffic and cyber threats. Using proprietary big data analytics, IPViking turns this data into live actionable threat intelligence, enabling enterprises to prevent financial fraud, enhance network security and protect against breaches through websites, applications, e-commerce systems, and network connected devices.
NSS Labs, Inc.

NSS Labs, Inc. is the world's leading information security research and advisory company. NSS is both an analyst firm specializing in security technologies and a testing laboratory widely recognized as the “go to” company for research and unbiased reporting. We deliver a unique mix of test-based research and expert analysis to provide our clients with the right information they need to make IT decisions. CIOs, CISOs, and information security professionals from many of the largest and most demanding enterprises rely on NSS. The company is located in Austin, Texas. For more information, visit www.nsslabs.com.

PhishMe

PhishMe provides organizations the ability to improve their employees’ resilience towards spear phishing, malware, and drive-by attacks. The detailed metrics PhishMe provides make it easy to measure the organization’s progress in successfully managing employees’ security behavior. With over 4 million individuals trained in 140 countries, PhishMe has been proven to reduce the threat of employees falling victim to advanced cyber attacks by up to 80 percent.

PhishMe’s methodology entails periodically immersing employees in simulated phishing scenarios, and presenting bite-sized, engaging training, instantly to those found susceptible. The solution provides clear and accurate reporting on user behavior, allowing customers to measure improvement over time. PhishMe works with Federal Agencies and Fortune 1000 companies across many industries to include financial services, healthcare, higher education and defense. For additional information, please visit: PhishMe.com.

Renesys Corp. Renesys makes doing business in the Cloud more reliable and secure by providing the world’s most comprehensive view of the Internet and how it operates. The company’s patented technology continuously monitors and analyzes global Internet performance and provides tools to help you mitigate vulnerabilities and manage the impact of impairments wherever they occur. Operating one of the world’s largest real-time global sensor grids with active measurement systems, Renesys is widely recognized as the Internet Intelligence Authority. Organizations around the world rely on Renesys for cyber security assurance, situational and operational awareness, and real-time business and competitive intelligence. Founded in 2000, the company is privately held, with headquarters in Manchester, New Hampshire. For more information visit: www.renesys.com and follow us on Twitter @renesys
Shape Security Based in Mountain View, California, Shape Security is a startup developing a new category of web security products. The company has raised $26 million in Series A and B funding from Kleiner Perkins Caufield & Byers, Venrock, Google Ventures, Allegis Capital, Google Executive Chairman Eric Schmidt’s TomorrowVentures, former Symantec CEO Enrique Salem, and top executives from LinkedIn, Twitter, Square, and Dropbox. Shape has a world-class team hailing from Google, the Pentagon, Cisco, VMware, major defense contractors, and other leading corporations. The company's patent-pending technology will provide customers with a fundamentally better approach to protecting websites against modern web attacks.
WatchDox

WatchDox is the most secure way to enable organizations to access, share and control critical documents wherever they go – even on devices beyond IT’s control. Available SaaS or on-premise, the WatchDox document-centric security platform allows organizations to collaborate with partners, adopt BYOD initiatives, and control or wipe documents remotely, all while providing an intuitive user experience across every device.

WatchDox also tracks document use for compliance and visibility. The platform integrates with SharePoint and other enterprise applications via comprehensive APIs. More than 500 organizations – including top-10 global financials, governments and Fortune 500s – depend on WatchDox to protect their business-critical information.

Win Magic

WinMagic Inc. provides the world’s most secure, manageable and easy-to–use data security solutions. WinMagic’s SecureDoc is a comprehensive encryption and security management solution that can manage data security across the enterprise. By encrypting entire disks, specific files or folders locally or on the network as well as mobile devices and removable media, SecureDoc secures data wherever it is stored, providing enterprise grade data security policy and key management across all operating systems such as Windows, Mac OS, Android and Linux.

SecureDoc is trusted by thousands of enterprises and government organizations worldwide. Our solutions help organizations to minimize business risks, meet privacy/regulatory compliance requirements, and protect valuable information assets against unauthorized access. With a full complement of professional and customer services, WinMagic supports over three million SecureDoc users in more than 80 countries.

 Additional Sponsors
 

Agari

Monday Night Dinner

Agari collects and analyzes terabytes of email data to provide global brands with a SaaS security solution that eliminates email threats, protects consumer information, and proactively guards brand reputation. To date, Agari has analyzed over 1 trillion email messages, blocked over 1 billion malicious emails, and secures more than 80 percent of US consumer email inboxes. Founded by the thought leaders behind Cisco’s IronPort solutions, Agari is headquartered in San Mateo and is backed by Alloy Ventures, Battery Ventures, First Round Capital, and Greylock Partners.

Agiliance

Full Page Ad

Agiliance® is the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance RiskVision™ enables Global 2000 companies and government agencies to automate their risk analysis to make better investment decisions. The company’s integrated risk management software provides a unified view of organizations’ risk posture, combining policy, risk, compliance, and threat / vulnerability management applications in a single platform. Agiliance RiskVision scales with businesses, effectively managing data, assets, people, and processes to achieve 100 percent risk and compliance coverage. Its real time risk analysis leads to optimized business performance and better investment decisions. Financial services organizations are leveraging Agiliance RiskVision to improve the efficiency of audits amidst escalating regulations, automate threat / vulnerability remediation actions, minimize negligence in incident response, and provide effective risk trending for the C-suite and board of directors.

For more information, please visit www.agiliance.com.

Akamai Technologies

Mobile Conference App

Akamai(r) is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform(tm) providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

Brand Protect

Lanyards

BrandProtect provides Internet monitoring, management and mitigation to financial organizations that allows them to manage and mitigate the risk over how they are represented online. Core service application areas are IDTheft , Internet Brand Protection, Social Media Monitoring for either risk or policy compliance and Mobile Application Monitoring.

BrandProtect provides detailed and actionable reports 24/7/365 on the most relevant and highest priority threats through a combination of advanced technology, round-the-clock monitoring, proven best practices and exhaustive human analysis.

Bromium

Key Cards

Bromium, Inc. is a pioneer in trustworthy computing. Its products make computer systems more secure by design. The company's founders developed the XenR hypervisor, and the Bromium team is comprised of experts who are dedicated to advancing the state of the art in systems architecture.

Bromium's products are built on the Bromium MicrovisorT - a second-generation virtualization technology that applies the isolation and security principles of virtualization to tasks running within the operating system of any computing device. The Microvisor identifies vulnerable tasks and instantly hardware-isolates each within a micro-VM; a lightweight, hardware-backed isolation container that polices access to system resources.

Co3 Systems

Half Page Ad

The Co3 Systems incident response management platform makes handling incidents efficient, compliant, and repeatable. It replaces home-grown approaches - like spreadsheets and trouble ticketing systems - with an expert system that does it all automatically.

Co3 helps organizations define, manage, and optimize their cybersecurity and data breach incident response program. Partly a case management system, partly a team collaboration tool, and partly a workflow engine, Co3 is built on top of a knowledgebase of cyber security response best practices as well as breach response regulations (state, federal and international). It automatically generates contextual incident response plans for any cybersecurity incident.

Our solution ensures consistency and efficiency in your incident response processes, allowing you to dramatically reduce time to resolution with fewer resources. It provides critical metrics needed to drive process improvements and direct resource investment. At the same time, it provides real-time situational awareness up the management chain.

Customers find they close incidents in a fraction of the time, stop attacks in their tracks, and free up resources to do other things.

Ernst & Young

Executive Women's Networking Event

Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 141,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve their potential. Our 20,000 advisory professionals form one of the broadest global advisory networks of any professional organization, delivering seasoned multidisciplinary teams that work with our clients to deliver a powerful and superior client experience. We use proven, integrated methodologies to help you achieve your strategic priorities and make improvements that are sustainable for the longer term. It's how Ernst & Young makes a difference.

To learn more, visit www.ey.com.

NSS Labs, Inc

Off-site Dinner Monday Night
Full Page Ad
Golf Tournament 

NSS Labs, Inc. is the world's leading information security research and advisory company. NSS is both an analyst firm specializing in security technologies and a testing laboratory widely recognized as the “go to” company for research and unbiased reporting. We deliver a unique mix of test-based research and expert analysis to provide our clients with the right information they need to make IT decisions. CIOs, CISOs, and information security professionals from many of the largest and most demanding enterprises rely on NSS. The company is located in Austin, Texas. For more information, visit www.nsslabs.com.

Renesys

Breakout Room Charging Station

Renesys makes doing business in the Cloud more reliable and secure by providing the world’s most comprehensive view of the Internet and how it operates. The company’s patented technology continuously monitors and analyzes global Internet performance and provides tools to help you mitigate vulnerabilities and manage the impact of impairments wherever they occur. Operating one of the world’s largest real-time global sensor grids with active measurement systems, Renesys is widely recognized as the Internet Intelligence Authority. Organizations around the world rely on Renesys for cyber security assurance, situational and operational awareness, and real-time business and competitive intelligence. Founded in 2000, the company is privately held, with headquarters in Manchester, New Hampshire. For more information visit: www.renesys.com and follow us on Twitter @renesys

Return Path

After Hours Hospitality Suite - Wednesday

Founded in 1999, Return Path helps over 2,000 of the best known senders get more email delivered to the inbox. Our solutions provide data, insight and resources to diagnose and prevent email deliverability, subscriber engagement, brand and rendering failures. In addition, Return Path offers the most widely used third-party whitelist, the Return Path Certification Program covering more than 2 billion inboxes with images on and links enabled at both Yahoo! and Hotmail. To learn more about Return Path and how we can help you to get in, stay in and keep pretenders out, please visit us online www.returnpath.net.

Security Mentor

Half Page Ad

Security Mentor® provides innovative, online security awareness training designed for how people learn and work. Security Mentor’s Brief, Frequent, and Focused™ training model fits busy schedules and keeps security top of mind. Our rich media, Flash-based lessons are as memorable as they are engaging and effective, and our realistic interactive content promotes learning by doing. Your security staff will love using Security Mentor’s easy tracking, reporting and management capabilities. See for yourself why Security Mentor's trainees say "It was not only informative, but fun! A rare combination!."  Ask for a demo today at www.securitymentor.com, or view our 2-minute intro video at http://www.securitymentor.com/security-awareness-training/video.

Veracode

Off-site Dinner Monday Night

Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. Learn More:www.veracode.com.

WatchDox

After Hours Hospitality Suite - Tuesday

WatchDox is the most secure way to enable organizations to access, share and control critical documents wherever they go – even on devices beyond IT’s control. Available SaaS or on-premise, the WatchDox document-centric security platform allows organizations to collaborate with partners, adopt BYOD initiatives, and control or wipe documents remotely, all while providing an intuitive user experience across every device.

WatchDox also tracks document use for compliance and visibility. The platform integrates with SharePoint and other enterprise applications via comprehensive APIs. More than 500 organizations – including top-10 global financials, governments and Fortune 500s – depend on WatchDox to protect their business-critical information.

 

 

 




?