- EMEA Summit
- Annual Summit
EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities. For more information about our organization, please visit ey.com.
FICO (NYSE: FICO) powers decisions that help people and businesses around the world prosper. Founded in 1956 and based in Silicon Valley, the company is a pioneer in the use of predictive analytics and data science to improve operational decisions. FICO holds more than 165 US and foreign patents on technologies that increase profitability, customer satisfaction, and growth for businesses in financial services, telecommunications, health care, retail, and many other industries. FICO’s fraud management solutions protect 2.6 billion financial accounts worldwide — with an average decision time of 10 milliseconds — using patented analytic technologies. We’re applying these technologies to recognize damaging high-risk cyber threats. FICO's cyber solution features proven self-calibrating analytics, consortium data and signature-less technology to protect enterprises from emerging cyber threats. Unlike signature-based technology, or rules-based systems that rely on historical batched data, FICO cyber analytics finds emerging trends much earlier, allowing threats to be stopped faster. We also offer the FICO® Enterprise Security Score, a metric that reveals the likelihood an organization will be breached due to a cyber attack. This score can be used by an enterprise to understand and shore up its defense gaps, and by third parties such as cyber insurance providers, potential partners and customers who need an objective measure of a firm’s cyber risk.
IBM has been helping companies innovate for over 100 years and has achieved over 3,700 security-related patents in the last decade while acquiring more than 12 security companies to build its portfolio. As a recognized security leader, IBM offers one of the world’s broadest, most advanced and integrated portfolios of security products and services to help protect against advanced threats, safeguard your most valuable assets, and help you innovate with cloud and mobile while reducing risk. Our security experts can help you assess your security posture, develop security strategies, and deploy and manage the best security solutions to defend your enterprise. www.ibm.com/security
NC4 revolutionizes safety and security solutions to allow organizations and communities to collect, manage, share and disseminate information to reduce cyber threats, fight crime, mitigate risks, and manage incidents. NC4’s CTX offerings provide Cyber Threat Intelligence (CTI) sharing solutions both through secure collaboration services and through automated, structured, and standardized STIX/TAXII mechanisms. This powerful combination empowers an end-to-end community defense model.
CTX/Soltra Edge is a premier Communications Platform for two-way sharing of cybersecurity information among peers, trust groups, communities and government. It allows for the aggregation of CTI in one common format, which in turn enables analysts to get out of the business of data normalization and refocus on the business of analysis.
CTX/Mission Center is a CTI collaboration platform that works alongside CTX/Soltra Edge. It combines an Intelligence Sharing Suite (ISS) with Social Cyber Collaboration as a mechanism to discuss cyber threat activities with internal and external constituents within a trusted community.
Skyhigh Networks, the world’s leading Cloud Access Security Broker (CASB), enables enterprises to safely adopt SaaS, PaaS and IaaS cloud services, while meeting their security, compliance and governance requirements. With more than 600 enterprise customers globally, Skyhigh provides organizations the visibility and management for all their cloud services, including enforcement of data loss prevention policies; detecting and preventing internal and external threats; encrypting data with customer-controlled keys; and implementing access-control policies. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia Capital, Thomvest Ventures, Tenaya Capital and other strategic investors. For more information, visit skyhighnetworks.com.
Transmit Security allows organizations to implement frictionless omni-channel authentication without making any modifications to their applications. The company’s technology supports any authentication technology, from any vendor, in one modular, micro-services platform that enables application owners to slash time-to-market and cost-to-market for new identity related projects. Transmit Security’s founders created Trusteer (now IBM Security) and Imperva (IMPV on NYSE). The company’s research and development team is made up of former members of Unit 8200, the elite Israeli Intelligence Corps. Transmit Security is self-funded, and based in Boston and Tel-Aviv. For more information visit www.transmitsecurity.com or follow us on Twitter @TransmitSec.
Accenture Security offers holistic strategies and solutions to help clients prevent, intercept and remediate security risks, providing the resilience required to drive, high performance and growth. With a focus on outcomes and the tight integration of security strategies with business goals, Accenture innovates with advanced, intelligent solutions that preempt, detect and respond to threats with agility. Accenture has more than 20 years of experience helping corporations and governments across the globe use security to both defend organizations against malicious threats and empower them to operate new business processes and drive innovation while maintaining acceptable levels of risk. Accenture.com @AccentureSecure
Offsite Dinner on Sunday Night (includes invite only)
Premium Meeting Room Space
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.
Arbor Networks, Inc. helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor delivers market-leading security analytics for dynamic incident response and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business. For more information, please visit www.arbornetworks.com.
At BAE Systems Applied Intelligence, we help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.
We do this using our unique set of solutions, systems, experience and processes - often collecting and analyzing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world, enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “streaming prevention,” to see and stop cyberattacks before they execute. Customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patented CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints.
Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 5,600 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.
Hewlett Packard Enterprise is a leading provider of security solutions to mitigate risk and defend against today's most advanced threats. HPE Security works with customers to understand the increasing complexity of today's IT environment and the sophistication of attackers. We help our customers build security into their applications and data as well as build robust security operations capabilities to help them monitor for and respond to inevitable breaches. Our comprehensive solutions help protect what matters most and enable our customers to grow and innovate. More information available at: www.hpe.com/security
Ionic Security accelerates Internet trust by protecting and controlling data everywhere it travels and anywhere it resides, whether on the corporate network, in a file, in the cloud or on mobile devices. The industry’s first high-assurance data protection and control platform, Ionic Security takes a comprehensive approach to protecting distributed data in today's borderless enterprise without proxies or gateways or changes in user behavior. Ionic Security is changing the data security landscape for some of the most highly regulated companies in the world.
Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. We enable this digital transformation on a foundation and capability for cybersecurity with products and services that have security built in from the start. Our unique approach combines a comprehensive, agile platform together with unparalleled intelligence and strategic partnerships in order to better protect your endpoints, move faster to detect threats, and respond to security breaches across even the largest of organizations.
PhishMe is the leading provider of Human Phishing Defense solutions for organizations concerned about their susceptibility to today’s top attack vector—spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense while operationalizing attack intelligence and phishing incident response for the security team. Our open approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization’s security decision-making process. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Prevalent is the leader in third-party risk management and cyber threat intelligence, helping global organizations manage and monitor the security threats and risks associated with third and fourth-party vendors. With the release of Prevalent Synapse™, organizations now have a purpose-built, unified platform that reduces both risk and cost in a shared assessment model, leveraging standardized content, automation, and threat intelligence.
For more information regarding Prevalent, please visit www.prevalent.net, email [email protected] or call 877-PREVALENT.
Recorded Future delivers threat intelligence powered by machine learning, arming you to significantly lower risk. We enable you to connect the dots to rapidly reveal unknown threats before they impact your business, and empower you to respond to security alerts 10 times faster. Our patented technology automatically collects and analyzes intelligence from technical, open, and dark web sources to deliver radically more context than threat feeds alone, updates in real time so intelligence stays relevant, and packages information ready for human analysis or instant integration with your existing security technology.
RiskIQ is a cybersecurity company that helps organizations discover and protect their external facing known, unknown and third-party web, mobile and social digital assets. The company’s External Threat Management platform combines a worldwide proxy network with synthetic clients that emulate users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and other companies to protect their web assets and users from external security threats and fraud. We are headquartered in San Francisco, backed by growth equity firms Summit Partners and Battery Ventures. For more information, please visit www.riskiq.com.
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management. For more information visit www.securonix.com.
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.
Synack is a security company revolutionizing how enterprises view cybersecurity: through a hacker’s eyes. Synack’s private, managed crowdsourced penetration testing solution provides clients with real-time, adversarial intelligence on clients’ security risk. Our crowd of hundreds of the world's most skilled, vetted ethical hackers work through the Synack Crowd Security Intelligence platform to test clients' digital assets. The platform comprehensively tracks testing activities, providing clients detailed testing coverage maps, asset resiliency assessments, and security risk measurements.
Synack’s confidential client base is comprised of some of the largest F500/G500 enterprise organizations across banking and financial services, retail, healthcare, consumer goods, manufacturing, and technology, as well as the U.S. Government (DoD/Hack the Pentagon, IRS). Synack was founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO.
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com.
Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves application security from inception through production so that businesses can confidently innovate with the applications they build, buy and deploy as well as the components they integrate into their environments.
The Financial Services industry attracts some of the most hostile information security threats and is one of the most regulated industries in the world. Amazon Web Services (AWS) understands these obligations and has worked with the most complex Financial Services organizations to meet security and compliance requirements at every stage of their respective cloud migration lifecycles. Protecting your data is AWS’ number one priority and our global infrastructure is designed and managed according to security best practices, as well as a variety of compliance standards.
AWS also offers numerous security services to manage access and keys, analyze data for irregular activity with machine learning capabilities, mitigate DDoS attacks, encrypt data, and send alerts whenever changes are made to your AWS resources. AWS customers also have access to governance-focused, audit-friendly service features to meet security compliance regulations and audit standards. For more information, visit us at aws.amazon.com/financial-services
BitSight is transforming how companies manage information security risk with objective, verifiable and actionable Security Ratings. Founded in 2011, the company built its Security Ratings Platform to continuously analyze vast amounts of external data on security issues and behaviors in order to help organizations manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk. Seven of the top 10 cyber insurers, 60 Fortune 500 companies, and 3 of the top 5 investment banks rely on BitSight to manage cyber risks.
Denim Group is a leading independent application security firm, serving as a trusted advisor to customers on matters of application risk and security. The company helps organizations assess and mitigate application security risk. Denim Group’s flagship ThreadFix product accelerates the process of application vulnerability remediation, reflecting the company’s rich understanding of what it takes to fix application vulnerabilities faster.
Founded in 1999, Digital Defense, Inc. (DDI) is a trusted provider of managed security risk assessment solutions, protecting billions of dollars in assets for clients around the globe, including legal, energy and retail and more as well as those in highly-regulated industries such as healthcare and financial. DDI’s unique Vulnerability Management as a Service (VMaaS) model delivers consistently-accurate vulnerability scanning and penetration testing, while its security awareness training promotes employees’ security-minded behavior. DDI security solutions are highly-regarded by industry experts, as illustrated by the company’s designation as Best Scan Engine by Frost & Sullivan, top 25 ranking (#21) in Cybersecurity Ventures’ list of the World’s 500 Hottest Cybersecurity Companies, as well as inclusion in CSO Outlook’s Top 10 Network Security Companies and CIO Review’s 20 Most Promising Cyber Security Solutions. Contact DDI at 888-273-1412 or digitaldefense.com; and connect with us on our website, blog, LinkedIn and Twitter
Early Warning is owned by Bank of America, BB&T, Capital One, JPMorgan Chase, PNC, U.S. Bank, and Wells Fargo. Early Warning provides risk management solutions to a diverse network of 2,500 financial institutions, government entities and payment companies, enabling businesses and consumers to transact securely and conveniently. Early Warning’s unique business model facilitates a data exchange system based on collaborative, shared intelligence. For 25 years, the company has worked with organizations of all sizes to advance collaborative risk management and fraud prevention.
Endgame is a leading endpoint security platform that transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, and dramatically reduces the time and cost associated with incident response and compromise assessment. Endgame’s platform uses machine learning and data science to prevent and detect unique attacks at the earliest and every stage of the attack lifecycle. Endgame’s integrated response stops attacks without disrupting normal business operations. For more information, visit www.endgame.com and follow us on Twitter @EndgameInc.
Fireglass is the first real enterprise grade isolation platform.
Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network. Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by worldclass investors including Lightspeed Venture Partners and Norwest Venture Partners.
Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations to make better decisions and mitigate risk. The company's unique Deep & Dark Web data, expertise, and technology enable our customers to glean intelligence that informs risk and protects their ability to operate. Fortune 500 and government customers utilize Flashpoint's intelligence across the enterprise, including bolstering cybersecurity, confronting fraud, detecting insider threats, enhancing physical security, assessing M&A opportunities, and addressing vendor risk and supply chain integrity. For corporations with limited experience availing themselves of Deep & Dark Web intelligence, Flashpoint has tailored offerings that deliver comprehensive reporting and monitoring on their behalf. Flashpoint is backed by Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.
ForeScout Technologies, Inc., transforming security through visibility. ForeScout, offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to a network. Equally important, ForeScout lets customers control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions. Learn more at www.forescout.com.
Booth Crawl Sponsor during Networking Reception
Gurucul is changing the way enterprises protect themselves against cyber fraud, insider threats and external intruders on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit www.gurucul.com.
Full Page Handbook Ad
Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization's weaknesses. Kenna accomplishes this by automating the correlation of customer vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches. For more information, visit kennasecurity.com.
Level 3 Communications, Inc. (NYSE: LVLT) is a Fortune 500 company that provides local, national and global communications services to enterprise, government and carrier customers. Level 3's comprehensive portfolio of secure, managed solutions includes fiber and infrastructure solutions; IP-based voice and data communications; wide-area Ethernet services; video and content distribution; data center and cloud-based solutions. Level 3 serves customers in more than 500 markets in over 60 countries across a global services platform anchored by owned fiber networks on three continents and connected by extensive undersea facilities. For more information, please visit www.level3.com or get to know us on Twitter, Facebook and LinkedIn.
Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors. The company's patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security products can be deployed in the public or private cloud and are trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Company headquarters are in Menlo Park, California. For more information, please visit www.menlosecurity.com or @menlosecurity.
Netskope is the leader in cloud security. Using patented technology, Netskope’s cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device. This means that security professionals can understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work today. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. Netskope — security evolved.
Offsite Dinner Sunday Night
It’s all about trust. Verify users with their own natural behaviors and offer a great experience.
NuData Security is an award-winning passive biometrics and behavioral analytics company. Their flagship product, NuDetect, helps companies identify users based on their online interactions - behavior that can't be mimicked or replicated by a third party.
NuData believes good users deserve good online experiences and brands deserve protection against abuse. NuDetect analyses hundreds of device, location, passive biometric and behavioral signals to build an ongoing digital identity. This analysis continuously informs clients of fraud risk in real-time and gives them choices about what actions to take even before the transaction.
NuDetect analyzes 80 billion online interactions yearly and is trusted by some of the largest global brands in the world to verify users with their own natural behaviors while offering a great customer experience.
Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of offerings, extensive capabilities and proven expertise. Visit www.optiv.com for more information.
Prevoty is dedicated to securing enterprises and the users they serve by automating defense and intelligence in all applications and services. Prevoty runtime application and data security delivers real-time, actionable security analytics and automated vulnerability mitigation -- including the OWASP Top 10, data exfiltration and fraudulent behavior. Prevoty's solution is installed directly within an application and travels wherever it is deployed, in the cloud or on-premises. By using Prevoty, enterprises have unprecedented visibility and correlation across network, application and database activity. These capabilities enable Global 2000 enterprises to dramatically improve remediation of vulnerabilities, enabling security and development teams to work together more effectively, even with agile release cycles. Prevoty was founded in 2013 and is headquartered in Los Angeles, California. For more information on the company's application security solutions, go to www.prevoty.com or follow @Prevoty on Twitter.
Security Compass is an information security company that provides professional services, training, and enterprise platform solutions to help companies eliminate security vulnerabilities in mission-critical applications, minimize organizational risk, and easily meet regulatory and compliance standards. With Security Compass as a trusted information security partner, organizations can unify application security with business goals to build better, more secure software at the speed of business. Its flagship platform, SD Elements, is uniquely positioned to help agile organizations manage security throughout the entire software development lifecycle -- from initial planning through to application release. The privately held company is headquartered in Toronto and with global offices in California, New Jersey and India.
The Media Trust is the client-side malware scanner for the world’s largest, most heavily-trafficked websites, functioning as the security operations center for their public-facing web and mobile properties. Using a variety of mobile and desktop device/OS/browser, geographic, and user-behavior profile combinations, our proprietary technology continuously scans millions of websites and third-party advertising/content delivery code each day to detect and remove anomalous activity before it becomes overt. This extensive monitoring yields original source, 99.95% accurate, real-time malware data that allows enterprises to block specific malicious web-based activity to secure their networks and mitigate the risk of everyday employee internet use.
TITUS solutions enable organizations to discover, classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud.
TopSpin Security is the leader in integrated deception and detection technologies which allow organizations to quickly and accurately detect breaches, engage attackers and neutralize advanced cyber-attacks. Its technology is based on a network of decoys that lure attackers by mirroring valuable network assets and are fully adaptive to organizations’ changing environments. Its unique traffic analysis engine and integration into organizations’ existing security infrastructure deliver the industry’s only deception solution that provides for strategic placement of traps and decoys; added security and internal correlation; and operational advantages such as automation, point-and-click configuration. Once engaged, the decoys interact with attackers, deceiving them and slowing their advances, while providing accurate, actionable alerts and forensics trails. TopSpin’s DECOYnet is already deployed by leading Global2000 companies. The company’s U.S. operations are headquartered in Mahwah, N.J., with its R&D center in Herzliya, Israel. Learn more at www.topspinsec.com.
Businesses depend on trust, but breaches and outages erode that trust. UpGuard is the world’s first cyber resilience platform, designed to proactively assess and manage the business risks posed by technology.
UpGuard gathers complete information across every digital surface, stores it in a single, searchable repository, and provides continuous validation and insightful visualizations so companies can make informed decisions.
Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text. This rapidly growing data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records. IT and business personnel deploy Varonis software for a variety of use cases, including data security, governance and compliance, user behavior analytics, archiving, search, and file synchronization and sharing.
Wombat Security Technologies is a leading provider of security education solutions that positively change employee behavior. Wombat’s SaaS training solutions help organizations teach their employees how to identify and avoid cyber security attacks. The solutions are integrated into a purpose-built security learning platform that makes it easy for security officers to deliver and manage customized knowledge assessments, the largest offering of simulated attacks, a library of interactive training modules, as well as detailed and executive level reports. Wombat’s unique educational approach is enabling security teams to collect a depth of data and take an evidence-based approach to drive continuous knowledge improvement. The Company’s solutions can reduce employee susceptibility to attack up to 90%. Wombat is helping medium to large enterprises around the world in industries such as finance, technology, banking, insurance, retail, and consumer packaged goods to reduce their risk and strengthen their cyber security defenses.
Booth Crawl Sponsor during Networking Reception
Attivo Networks® is the leader in deception for cybersecurity defense, providing real-time detection and forensic analysis of in-network threats and solutions for continuous threat management and incident response. The Attivo ThreatMatrix Deception Platform detects stolen credentials, ransomware, man-in-the-middle, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis, actionable alerts, and 3rd party integrations empower accelerated incident response and staff resource efficiency.
Led by former military officers and industry experts, GRIMM provides tailored cybersecurity services that solve security issues in software and hardware -- covering traditional enterprise computing, industrial controls, power/energy, automobiles, and embedded systems. Our practice is built on operational experience in cyber mission support for national defense as well as business and service improvement.
Invincea’s endpoint protection minimizes the trade-off executives are forced to make between security and business performance. Over 25,000 customers rely on Invincea to prevent and detect threats while enabling their workforce to conduct business—in the office or on the road. Invincea protects endpoints by blocking known and unknown malware without signatures, including threats that originate from Weaponized Office docs and spear phishing emails.
With Invincea, your workforce won’t know it’s there, but you will.
Pindrop is the pioneer in voice fraud prevention and authentication. Pindrop provides enterprise solutions to reduce fraud losses and authentication expense for some of the largest call centers in the world. Pindrop’s patented PhoneprintingTM technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Pindrop has been selected by the world’s largest banks, insurers, brokerages and retailers, detecting over 80% of fraud, even for attackers never seen before. Pindrop’s solutions are allowing customers to reduce call time and improve their customers’ experience even while reducing fraud losses. Pindrop was founded in 2011 and is venture backed by Andreessen Horowitz, Citi Ventures, Felicis Ventures, CapitalG, GV and IVP.
Skycure offers the most complete, accurate and effective mobile threat defense (MTD) solution, delivering unparalleled depth of threat intelligence to predict, detect and protect against the broadest range of existing and unknown threats. Skycure's predictive technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and vulnerability exploits while preserving user privacy and experience. Skycure’s mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise.
Sqrrl is the threat hunting company that enables organizations to target, hunt, and disrupt advanced cyber threats. Sqrrl’s industry-leading Threat Hunting Platform unites link analysis, User and Entity Behavior Analytics (UEBA), and multi-petabyte scalability capabilities into an integrated solution. Sqrrl’s unique approach enables security analysts to discover threats faster and reduces the time and resources required to investigate them.
Agari, a leading cybersecurity company, is trusted by leading Fortune 1000 companies, including 6 of the top 10 banks, to protect their enterprise, partners and customers from advanced email phishing attacks.
The Agari Email Trust Platform™ is the industry’s only solution that ‘understands’ the true sender of emails, leveraging the company’s proprietary, global email telemetry network and patent-pending, predictive Agari Trust Analytics to identify and stop phishing attacks.
The platform powers Agari Enterprise Protect, which help organizations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands.
Agari is a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security. Learn more at www.agari.com and follow us on Twitter @AgariInc.
Your FinServ customers expect their online experience to be always available and always secure—and for their personal and business assets to be safe. As more data and business processes move online, organizations are challenged to protect websites and infrastructure without sacrificing performance for security. Akamai takes your FinServ products and services closer to your users by extending the security perimeter to the cloud to help protect against increasingly sophisticated web and data center attacks.
Arxan is the trusted of application self-protection and management products for Internet of Things (IoT), Mobile, Desktop, and other applications. We help protect our customers against financial loss, brand damage, fraud, IP theft, stolen credentials, fraudulent transactions, unauthorized access, non-compliance with regulatory and industry standards, and more. Our unique patented guarding technology 1) Defends applications against attacks, 2) Detects at run-time when an attack is being attempted, and 3) Deters attacks to stop hackers, send alerts, or repair making customers’ applications truly resilient. We are currently protecting applications running on more than 500 million devices across a range of industries, including: financial services, automotive (connected automobiles), healthcare (connected medical devices), digital media, gaming, high tech/independent software vendors (ISVs), and others. The company’s headquarters and engineering operations are based in the United States with global offices in EMEA and APAC.
At Aspect Security, we are application security experts. We provide insight into the assurance of your most complex and mission-critical applications.
Know your application risk: We develop an application risk scoring model tailored to your organization, enabling you to make efficient and effective security decisions.
Improve and scale your application security program: We evaluate the maturity of your program and provide an improvement plan tailored to your organization's goals and processes. As you grow, we help you build automation strategies that improve efficiency and scalability.
Assess your applications: Our engineers use a variety of tools and techniques to fully assess the security of your applications, including architecture and business threat modeling, manual code review and penetration testing.
Develop secure software: Empower your developers to develop secure software with our Application Security Learning Programs, available in a variety of delivery formats
Trust Aspect Security with your application portfolio. Contact us today at [email protected]
Bitglass is a global next-generation Cloud Access Security Broker and agentless mobile security company based in Silicon Valley. The company's solutions enable real-time end-to-end data protection, from the cloud to the device. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. www.bitglass.com
Organizations worldwide use Black Duck’s industry-leading products to automate the process of securing and managing open source software, eliminating the pain related to security vulnerabilities, compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in San Jose, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul, Vancouver and Beijing. For more information, visit www.blackducksoftware.com.
For decades, we’ve been embedded in some of government’s most classified cyber missions, and been trusted to advance them. We know the policies, architectures, and intelligence that best define cyber security, because our people helped pioneer them. That is why companies trust Booz Allen for high-performance cyber security – from the operations center to the boardroom. Our people—engineers, analysts, developers, and strategists—bring a unique mix of consulting and advanced technology expertise to work for commercial clients. We’ll help you tackle your cyber challenges in a manner that is suited to your business. www.BoozAllen.com/commercial
BrandProtect™ provides a complete suite of world class Internet threat detection and mitigation services to monitor the entire social Internet spectrum and mitigate business risk arising from fraudulent or unauthorized online activity. BrandProtect deploys a unique combination of advanced proprietary technology, plus a seasoned team of deeply experienced threat analysts to quickly identify and take action on relevant brand abuse and trademark infringement incidents, phishing attacks, web traffic diversions, website integrity issues, defamatory discussions and other fraudulent or unauthorized online activity. Acting as a trusted partner, BrandProtect, helps security, risk management, and marketing organizations at leading financial services institutions manage operational, reputational, legal and compliance risk in today’s marketplace.
Coalfire is the trusted leader in cybersecurity risk management and compliance services. We offer advisory, technical assessments and testing services to organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Our approach addresses your specific cyber risk challenges while developing a long-term strategy and partnership to prevent security breaches and data theft.
CyberSponse Incorporated, a global leader in cyber security automation & orchestration, helps accelerate an organization’s processes, security operations teams and incident responders. The CyberSponse platform enables organizations to seamlessly integrate, automate and playbook their security tool stack, enabling better, faster and more effective security operations. With a global presence, offering an enterprise platform, CyberSponse enables organizations to secure their security operations teams and environments. For more information, visit www.cybersponse.com
Cylance® is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can’t, while using a fraction of the system resources associated with endpoint antivirus and detect and respond solutions that are deployed in enterprises today. For more information and thought provoking blogs, visit: www.cylance.com
Offsite Dinner Sunday Night
Founded in 2014, Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Cymmetria's cyber deception solution, MazeRunner, is at the forefront of deception-based cybersecurity technology.
MazeRunner gives organizations a platform for creating effective deception stories, which create realistic environments for hunting cyber attackers. Deception stories are comprised of breadcrumbs and decoys; they lead attackers to believe that they have successfully gained access to a target machine. Having gained a false sense of security, attackers reveal their attack tools and methods, which defenders are then able to document and analyze. Finally, MazeRunner communicates with an organization's existing defense infrastructure, exporting information that allows for the creation of attack signatures.
Fully customizable and easily deployed, MazeRunner does not burden organizational networks or IT security teams. It is a dynamic solution that helps organizations defend their valuable assets from ever-changing cyber threats.
Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. The company is backed by leading investors such as Y Combinator and Sherpa Capital, and has already gained traction throughout the InfoSec community and global media.
DFLabs is a recognized global leader in cyber incident response automation and orchestration. The company is led by a management team recognized for its experience in and contributions to the information security field including co-edited many industry standards such as ISO 27043 and ISO 30121. IncMan – Cyber Incidents Under Control – is the flagship product, adopted by Fortune 500 and Global 2000 organizations worldwide. DFLabs has operations in North America, Europe, Middle East, and Asia with US headquarters in Boston, MA and World headquarters in Milano, Italy. http://www.dflabs.com
Distil Networks, the global leader in bot detection and mitigation, is the only easy and accurate way to protect web applications from bad bots, API abuse, and fraud. With Distil, you automatically block 99.9% of malicious traffic without impacting legitimate users.
Distil Web Security defends websites against web scraping, brute force attacks, competitive data mining, account takeovers, online fraud, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.
Distil API Security protects all types of APIs including those serving web browsers, mobile applications, and Internet of Things (IoT) connected devices. Distil API Security defends APIs against developer errors, integration bugs, automated scraping, and web and mobile hijacking.
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more about how to connect the dots on malicious activity at http://www.domaintools.com or follow us on Twitter:@domaintools
Easy Solutions® is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 100 million customers at 385 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.
EclecticIQ is an applied cyber intelligence technology provider, enabling enterprise security programs and governments to bootstrap a threat intelligence practice. Empowering analysts to take back control of their threat reality and mitigate exposure accordingly.
EclecticIQ’s mission is to restore balance in the fight against cyber adversaries. Its flagship product EclecticIQ Platform enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of cyber threat intelligence detection, prevention and response capabilities.
EclecticIQ is a privately held company headquartered in Amsterdam, the Netherlands, and holds an office in London. Awarded the 2015 EU IPACSO Cyber Security Award, partner of the NATO NCI Agency Security Incubator, and member of FS-ISAC and OASIS CTI TC.
For more information or schedule a personal demo, please visit: www.EclecticIQ.com.
It is Fox-IT's mission to make technical and innovative solutions that ensure a more secure society. We do that through the development of advanced cybersecurity and cyberdefense services and solutions for our clients around the world. We achieve this through a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.
As advancements in Internet technology expand opportunities for misuse by increasingly sophisticated cyber criminals and terrorists, Fox-IT solutions improve surveillance, detection and prosecution of criminals, and harden the security of critical IT networks and systems. We focus on areas where systems are most vulnerable, and in sectors where security is most essential —including government systems up to “state secret level” sensitivity and in vital infrastructure industries like energy and banking.
KPMG provides audit, tax and advisory services and industry insight to help organizations negotiate risks and perform in today's dynamic and challenging environments. KPMG’s advisory risk consulting professionals help organizations transform risk into enduring competitive advantage while navigating their most complex business issues. Our people offer deep knowledge and insightful opinions to help you enhance risk and create value in a dynamic environment in which outcomes must be managed strategically and with agility. KPMG’s client focus, commitment to excellence, global mind-set, and consistent delivery build trusted relationships that are at the core of our business and reputation. Our experienced IT security and forensic partners and professionals possess leading technical experience and are well regarded in their specialties. We have extensive experience building, delivering and supporting cybersecurity programs to Fortune 500 and Global 2000 companies across a multitude of industries. KPMG Cyber’s approach - Prevent, Improve, Detect, Respond -is designed to be simple and effective, and most importantly aligned with your business needs. For additional insights about KPMG’s Cyber Security Services please visit: advisory.kpmg.us/kpmg-cyber.html
Half Page Handbook Ad
LookingGlass Cyber Solutions delivers comprehensive threat intelligence-driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation.
By addressing risks across structured Indicators of Compromise (IoCs), unstructured and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners.
Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle. For more information, please visit www.lookingglasscyber.com.
Lookout is a cybersecurity company that makes it possible for individuals and enterprises to be both mobile and secure. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseen -- predicting and stopping mobile attacks before they do harm.
NetSPI combines managed services, application assessment, network assessment, and program development services to deliver full-spectrum threat and vulnerability management solutions that transform IT security. Built on 15 years of deep-dive pentesting and security expertise, our CorrelatedVM™ platform, proven processes, and end-to-end managed services programs help financial services, technology, healthcare, and retail leaders identify, prioritize, and remediate vulnerabilities to help prevent threats across the enterprise—before they disrupt business. We put the right people, processes, and technology in the right place at the right time to increase visibility across your portfolio, eradicate blind spots, and protect your most critical assets. www.netspi.com
Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. As one of the few companies capable of knowing with certainty who is on the other end of every interaction, we’re trusted by the world’s great brands to make critical decisions some 20 billion times a day. Because we can authoritatively tell a client exactly who is calling or connecting with them, we make critical real-time responses possible. More information is available at www.neustar.biz
NSS Labs, the security insight company, is trusted by the world’s largest and most demanding enterprises to help make their organizations more secure. Focused exclusively on IT security, NSS provides CEOs, CIOs, CISOs, and information security professionals with data-driven insight to help them make informed security decisions.
NSS’ heritage is its best-in-class security product testing laboratory, which offers in-depth test reports as well as research and analyst services. This expertise is the premise for its Cyber Advanced Warning System™ – the industry’s revolutionary cloud-based security and risk management platform designed to identify and expose active threats that matter.
Offering Analyst advisory services, a comprehensive library of research, and continuous product monitoring – all backed by unmatched security product testing expertise – NSS Labs is the only research, testing & advisory agency 100% focused on cyber-security insight.
For more information visit: www.nsslabs.com
Opening Luncheon Dessert Booth Crawl
Full Page Handbook Ad
Perch Security is the first cyber Community Defense Platform. Perch makes threat intelligence accessible and affordable for the “everyone else” – non-giant organizations who don’t have dedicated threat analysts on staff. Now small and mid-size businesses can mount a cyber defense with curated community intelligence and participate within the sharing community; all without a SIEM, a TIP, or increasing staff. Perch is headquartered in Tampa, Florida. To find out more or to join our flock, visit www.perchsecurity.com
Phantom is the first community-powered security automation and orchestration platform. It integrates your existing security technologies, providing a layer of connective tissue between them. The Phantom platform helps you work smarter by automating repetitive tasks, effectively force multiplying your team’s efforts and allowing them to focus their attention on mission-critical decisions. It also helps you respond faster and reduce dwell times with automated detection, investigation, and response. Using Phantom helps you strengthen your defenses by integrating your entire security infrastructure together so that each part is actively participating in your defense strategy. For more information visit: phantom.us
PhishLabs™ is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including 4 of the 5 largest U.S. financial institutions. PhishLabs combines proprietary technology, intelligence, and human expertise to rapidly detect, analyze, and stop targeted cyberattacks before they impact organizations. Additionally, the company provides robust threat intelligence that strengthens existing cyber defenses and optimizes threat prevention. Leading organizations partner with PhishLabs to more effectively disrupt targeted cyberattacks, prevent data breaches, and reduce online fraud. To learn more about PhishLabs, visit www.phishlabs.com or email info[at]phishlabs[dot]com.
Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that couples User and Entity Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com
Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. proofpoint.com
Meeting Room Space with Adjoining Hotel Room
With offices in 157 countries and more than 208,000 people, PwC is among the leading professional services networks in the world. We help organisations and individuals create the value they’re looking for, by delivering quality in assurance, tax and advisory services.
Booth Crawl Sponsor during Networking Reception
RiskRecon, your trusted source for third-party risk information, provides a SaaS platform that delivers frequent, comprehensive and actionable security performance measurements and management tools to more effectively manage the risk reality of increasingly interconnected organizations.
Using proprietary data gathering techniques, RiskRecon creates a comprehensive risk management view of an extended enterprise’s public IT footprint. Clients rely on RiskRecon to bring greater transparency, accountability and productivity to their third-party risk management processes. And, they trust that RiskRecon’s continuous monitoring solution employs only ethical techniques – no proprietary vendor data, no permissions and no invasive scans. Learn more at www.riskrecon.com.
Your enterprise needs to move faster, but lack of process and legacy tools hold you back. Unstructured. Undocumented. Unimproved for years. With the ServiceNow System of Action™ you can replace these unstructured work patterns of the past with intelligent workflows of the future. ServiceNow Security Operations is underpinned by the System of Action, allowing your financial services institution to bring incident data from multiple security tools into a structured enterprise security response engine that uses workflows, automation, and a deep connection with IT to prioritize and resolve threats based on the impact they pose to your institution. This helps assure the resilience and continuity of your infrastructure, ultimately ensuring the ongoing functioning of services for the global economy. Work at lightspeed™. Learn more about ServiceNow in Security at www.servicenow.com/sec-ops
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
Splunk Inc. (NASDAQ: SPLK) is the market leader in analyzing machine data to deliver Operational Intelligence for security, IT and the business. Splunk® software provides the enterprise machine data fabric that drives digital transformation. More than 13,000 customers in over 110 countries use Splunk solutions in the cloud and on-premises. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk® Light and premium solutions. Join millions of passionate users by trying Splunk software for free: www.splunk.com/free-trials.
Through its Software Integrity Platform, Synopsys provides advanced solutions for improving the quality and security of software. This comprehensive platform of automated analysis and testing technologies integrates seamlessly into the software development process and enables organizations to detect and remediate quality defects, security vulnerabilities, and compliance issues early in the software development life cycle, as well as gain security assurance and visibility throughout their software supply chain.
Thales e-Security is the leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. We ensure that the data belonging to companies and government entities is both secure and trusted in any environment, without sacrificing business agility. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property, and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged-user control and high-assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales e-Security is part of Thales Group. www.thalesesecurity.com
ThreatConnect unites cybersecurity people, processes and technologies behind a cohesive intelligence-driven defense. Built for security teams at all maturity levels, the ThreatConnect platform enables organizations to benefit from their collective knowledge and talents; develop security processes; and leverage their existing technologies to identify, protect and respond to threats in a measurable way. More than 1,200 companies and agencies worldwide use ThreatConnect to maximize the value of their security technology investments, combat the fragmentation of their security organizations, and enhance their infrastructure with relevant threat intelligence. To register for a free ThreatConnect account or learn more, visit: www.threatconnect.com.
TrapX Security is the leader in deception technology. Our solution rapidly detects, analyzes and defeats new zero-day, targeted attacks, and malicious insiders. Our product, DeceptionGrid provides automated, highly accurate insight into malicious activities unseen by other types of cyber defense. We enable a proactive security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes Forbes Global 2000 commercial enterprises and government agencies around the world in sectors that include defense, healthcare, finance, energy, consumer products and other key industries.
Opening Luncheon Dessert Booth Crawl
Booth Crawl Sponsor during Networking Reception
Venafi is the cyber security market leader in protecting cryptographic keys and digital certificates which every business and government depends on to deliver safe encryption, authentication and authorization. Organizations use Venafi key and certificate security to secure machine-to-machine connections and communications—protecting commerce, critical systems and data, and mobile and user access.
Venafi constantly assesses keys and certificates, protecting those that are trusted and fixing or blocking those that are not. By protecting the foundation of machine identity security—keys and certificates—Venafi prevents them from being misused by cyber criminals. The Venafi Trust Protection Platform delivers an ever-evolving, intelligent response that protects your network, business, and brand.
Venafi customers are among the world's most demanding, security-conscious Global 2000 organizations, including four of the top five U.S., U.K. and South African banks, five of the top five U.S. health insurers, five of the top five U.S. airlines, and four of the top five U.S. retailers. Venafi is backed by top-tier venture capital funds, including Foundation Capital, Intel Capital, Origin Partners, Pelion Venture Partners, QuestMark Partners, and Sliver Lake Partners. For more information, visit www.venafi.com.
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false postitives, and derive actionable intelligence for remediation. The Silicon Valley based company is led by an expierenced team with a track record of innovation and market leadership and backed by marquee investors.
Closing Luncheon Food Truck
Bandura is a cybersecurity company that enables organizations to control their exposure to the internet. Our users are able to leverage Bandura technology in conjunction with their existing security infrastructure to simplify the deployment and enforcement of their vast threat intelligence repositories, eliminating large amounts of threatening infrastructure from being able to interact with their environment. The Bandura PoliWall can deploy 100 MILLION malicious IP’s or CIDR blocks in line and likewise automate activities such as ACL's to eliminate traffic from threatening countries with a click.
Welcome Refreshment Sponsor
BeyondTrust® is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks.
We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management. BeyondTrust solutions are trusted by over 4,000 customers worldwide. Learn more at www.beyondtrust.com.
Meeting Room Space with Adjoining Hotel Room
As the leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of over 35,000 security researchers to identify critical software vulnerabilities. Powered by Bugcrowd’s platform, companies of all sizes can run both private and public bounty programs to efficiently test their applications and reward valid vulnerabilities.
Offsite Dinner Wednesday Night
Cobalt’s hacker-powered application security solution transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of trusted ethical hackers, Cobalt’s SaaS crowdsourced pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget. Visit www.cobalt.io to learn how Cobalt is securing apps at the speed of business.
Spotlight Sponsor (April)
Contrast Security is the only company that enables applications to automatically detect and fix vulnerabilities, identify attacks, and defend themselves. Contrast employs security instrumentation to strengthen applications before they deploy, protect them in production and provide visibility throughout the application lifecycle.
Coronet R2 is a cloud based Connectivity Management Platform for Wi-Fi and Cellular networks that runs on any device and
Since the enterprise lost control over how users connect to and access its resources on premises or in the cloud, Coronet provides the ability to eliminate the inherent risks, and regain control. Coronet is the recipient of Frost & Sullivan’s 2016 Global Technology Innovation award.
Networking Area/Charging Station
Description coming soon.
Full Page Handbook Ad
Cryptomathic is one of the world's leading providers of secure server solutions to businesses across a wide range of industry sectors, including banking, government, technology manufacturing, cloud and mobile. With over 30 years of experience, we provide systems for authentication, e-signatures, ID & ePassport, EMV issuing and acquiring, as well as advanced key management and managed cryptography, through best-of-breed security solutions and services.
We pride ourselves on strong technical expertise and unique market knowledge, with 2/3 of our employees working in R&D, including an international team of security experts and a number of world renowned cryptographers. At the leading edge of security provision within its key markets, Cryptomathic closely supports its global customer base with many multinationals as longstanding clients.
Closing Luncheon Food Truck
Cyberbit is one of Israel’s largest cybersecurity companies, providing an advanced product portfolio that protects enterprises and public sector organizations across Asia, Europe and the US:
EDR – advanced endpoint security based on machine learning, for detecting unknown threats and ransomware that bypass traditional AV, and hunting proactively
Cyberbit Range - the most widely deployed cybersecurity training and simulation platform
SOC 3D – attain an efficient, business-driven SOC
with automation, orchestration and big data security analytics
SCADAShield – the only full-stack security solution
industrial control networks
Cyberbit is a subsidiary of Elbit Systems Ltd. A world leading defense systems provider (NASDAQ and TASE: ESLT).
Closing Luncheon Food Truck
Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices. Deep learning’s capabilities of identifying malware from any data source results in comprehensive protection on any device, any platform, and operating system. Website: www.deepinstinct.com
Offsite Dinner Wednesday Night
According to Gartner's report published in April 2016, Deloitte was ranked #1 globally in Security Consulting Services for the 4th consecutive year. Deloitte’s Cyber Risk Services help complex organisations pursue their strategic growth, innovation and performance objectives more confidently, through proactive management of associated cyber risks. With extensive experience across many industries (FS being a major area of focus), Deloitte professionals provide highly differentiated end-to-end cyber solutions. The combination of advisory, implementation, 24/7 operations and training spans executive and technical functions and helps transform legacy IT security programmes into secure, vigilant and resilient cyber risk programmes. Deloitte serves clients across the globe via a wide cross-border network of Cyber Intelligence Centres and regional Cyber Operations Delivery Centres.
Technology Forum Speaking Sponsor
Edgile was founded in 2001 to deliver strategic cybersecurity and risk management services to the Fortune 500. What distinguishes Edgile in this arena is its business-aligned security approach coupled with the deep knowledge of its professionals and the active engagement of its leadership.
Edgile offers proven services to help solve complex security challenges across many industries including healthcare, financial services, energy, retail, et al. Among its diverse customer base, Edgile works with 45+ companies in the Fortune 500, including more than 12 in the Fortune 100. Edgile is known for the high-caliber of its team, thoughtful and well-structured strategic advice, and stellar execution through leading-edge practices in:
Governance, risk and compliance (GRC)
Identity and access management (IAM)
Cloud services and virtual enterprise
With roots established in the Big Four, the leadership at Edgile is among the top professionals in the industry. Edgile has earned its reputation as a trusted advisor to the CSO by aligning security with the strategy, goals and demands of the business. This approach helps to redefine security in terms of strategic capabilities and transform the perception of security into a strategic imperative for the enterprise.
Edgile is headquartered in Austin, Texas, with offices across the U.S.
Technology Forum Speaking Sponsor
FourV Systems is an SRC Company leveraging more than 60 years of defense and intelligence know-how and building upon a foundation of technology leaders who are experts in cybersecurity and big data. Founded in 2015, FourV Systems provides information technology and services for the evaluation and assessment of business performance through data analytics. Consisting of over twenty-five full-time and part-time staff and engineers, FourV Systems is headquartered in Baltimore, MD. Inquiries may be directed to [email protected] or by calling 443.449.7578.
Closing Luncheon Food Truck
Gemalto is a global leader in digital security, bringing trust to an increasingly connected world. We deliver a vast range of solutions to businesses, governments and other organizations, protecting identities and data so they’re kept safe wherever they are: in personal devices, connected objects, the network, the cloud and in between.
Exclusive Sunday Welcome Reception
GuidePoint Security provides innovative and valuable cybersecurity solutions and expertise that enable organizations to successfully achieve their missions. By embracing new technologies, GuidePoint helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Learn more at: http://www.guidepointsecurity.com.
InAuth is the leading digital device intelligence company for a mobile-first world. InAuth delivers the most advanced device identification, risk detection, and analysis capabilities possible to help organizations limit risk, remove friction, and reduce fraud within their digital channels. With safer digital transactions, banks, payment networks, merchants, healthcare providers, governments, and other organizations are better positioned to capture new revenue opportunities and compete more effectively in an “always-on” world. For more information, visit www.InAuth.com.
Premium Meeting Room Space
Intel 471 provides an actor-centric intelligence collection capability for our customers. Our intelligence collection focuses on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber attacks.
To learn more about Intel 471, visit www.intel471.com
Interset provides a highly intelligent and accurate insider and targeted outsider threat detection solution that unlocks the power of behavioral analytics, machine learning, and big data to provide the fastest, most flexible and affordable way for IT teams of all sizes to operationalize a data protection program. Utilizing agentless data collectors, lightweight endpoint sensors, advanced behavioral analytics, and an intuitive user interface, Interset provides unparalleled visibility over sensitive data, enabling early attack detection and actionable forensic intelligence with reduced false positives and noise. Interset solutions are deployed to protect critical data across the manufacturing, life sciences, hi-tech, finance, government, aerospace & defense, and securities brokerage industries. For more information visit www.interset.com and follow us on Twitter @intersetca.
Technology Forum Speaking Sponsor
KnowBe4, the provider of the world’s most popular integrated security awareness training and simulated phishing platform, is used by more than 8,500 organizations worldwide. KnowBe4 helps organizations address the human element of security by raising awareness of ransomware, CEO Fraud and other social engineering tactics through a new school approach to security awareness training. This method integrates baseline testing using real-world mock attacks, engaging interactive training, continuous assessment through simulated phishing, and vishing attacks along with enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy government and insurance to mobilized their end users as a last line of defense. Learn more at www.KnowBe4.com
Technology Forum Speaking Sponsor
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.
LogRhythm is consistently recognized as a market leader. The company has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for five consecutive years, named a ‘Champion’ in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report, received SC Labs ‘Recommended’ 5-Star rating for SIEM and UTM for 2016 and earned Frost & Sullivan’s 2015 Global Security Information and Event Management (SIEM) Enabling Technology Leadership Award.
LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region.
Exclusive Soarin' After Hours
Security teams are facing?growing scrutiny.? Stakeholders?such as executives, regulators, customers and business partners are asking for different information, more regularly. The finite time of security staff is being eaten up trying to make sense of data, often in spreadsheets, and generating robust reports.?
Both security and business?leaders are frustrated about how difficult it is to get meaningful, timely and accurate insights from their operating environment to inform risk?decisions?and justify priorities. Panaseer Limited is a London headquartered cyber security software company that solves this.
The Panaseer Security Data lake is an extensible platform for big data?analytics that can ingest any security?relevant data at any speed and volume. It is architected to enable any analysis technique, and adapt to changes in your size, scale, complexity and IT operating model.
‘Out of the box' data analytics?modules enable continuous risk measurement, simplifying and automating how you identify, prioritize, communicate and mitigate risk.
A data science interface enables your analysts to interrogate data on the fly and create their own analytics for repeated tasks. The platform’s front end interface provides interactive visualizations that communicate technical and operational data about security in a way that is tailored for different decision makers and their level of accountability.
Networking Break (Tuesday AM)
Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders confidently face the future. Our consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit. We are committed to attracting and developing a diverse workforce of professionals that share the common value of collaboration. As an organization, we believe that by teaming together, with each other, and our clients, we can see beyond the surface of changes and problems organizations face in this fast changing world to discover opportunities others might miss and face the future with greater confidence.
Our more than 4,500 people serve clients through the network of Protiviti and independently owned Member Firms in more than 70 offices in over 20 countries. We have served over 60% of FORTUNE 1000® companies and 35% of FORTUNE Global 500® companies. Our people and organization have consistently been recognized by FORTUNE and Consulting Magazine as a best company to work for.
Networking Area/Charging Station
ReliaQuest, a pioneer in IT security solutions, ensures organizations remain secure and compliant as the IT security world rapidly changes. ReliaQuest's focus on training, development and innovation enables the company and its customers to scale and evolve as quickly as possible without resource constraints. By empowering IT security professionals through 24/7/365 incident response, engineering and threat management services, ReliaQuest simplifies the complex and serves as a force multiplier for its customers.
Executive Women's Networking Event
RiskVision develops comprehensive risk intelligence solutions for the enterprise. The highly decorated RiskVision platform is the industry’s first risk intelligence solution designed for today’s real-time, big data, threat-centric world. RiskVision’s architecture and design delivers the industry’s best usability, scale, and automation and time-to-deployment advantages – at a fraction of the cost of traditional solutions. CIOs and CROs of the world’s leading organizations and government agencies rely on RiskVision including AXA Group, Cisco, Deutsche Bank, E*TRADE, Exelon, First Data, Fiserv, HCL, Novartis, Roche, Safeway, Sheetz, Southern Co., Time Warner, United Health Group, U.S. Departments of Defense, Health & Human Services, Justice, and Veterans Affairs, and dozens of other clients worldwide. For more information, please visit www.riskvisioninc.com.
SecureWorks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats. Learn more at www.secureworks.com
Shape Security defends the Global 2000, including three of the top 5 US banks, from sophisticated attacks on web and mobile applications. Shape is the leading expert in defending enterprises against credential stuffing, application DDoS, and unauthorized aggregation. The Shape platform, covered by 34 US patents, stops attacks that utilize botnets, artificial intelligence, and automated tools. Shape has prevented over $1B in fraud for its customers and protects 20% of the world’s in-store mobile payments.
Offsite Dinner on Sunday Night
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the "central nervous system" for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
Learn more at www.tanium.com
Premium Meeting Room Space
ThreatQuotient delivers an open and extensible threat intelligence platform (TIP) to provide defenders the context, customization and collaboration needed for increased security effectiveness and efficient threat operations and management. With ThreatQ, customers can get more out of existing security resources, both people and infrastructure.
Meeting Room with Adjoining Hotel Room
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com.
Green Water Station
Unisys is a global information technology company that specializes in providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.
Unisys offerings include security solutions, advanced data analytics, cloud and infrastructure services, application services and application and server software.
ZeroFOX, the innovator of social media & digital security, protects modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using targeted data collection and artificial intelligence-based analysis, ZeroFOX protects modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. Recognized as a Leader in Digital Risk Monitoring by Forrester, the patented ZeroFOX SaaS platform processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, HipChat, Instagram, Reddit, Pastebin, Tumblr, YouTube, VK, mobile app stores, the deep & dark web, domains and more.