Loading... Please wait...



Agenda

Hotel and Travel

Brochure

Call for Presentations

Sponsors

Current Sponsors


Sponsorship Registration

Onsite Representative Registration


Sponsor Prospectus

Contract Terms

Deliverables

Other Opportunities


Return to FSISAC

 

Current Sponsors

Platinum Sponsors
ey-logo6.jpg

Beach Blast Cabana/Lounge - Monday Evening

For EY Advisory, a better working world means solving big, complex industry issues and capitalizing on opportunities to deliver outcomes that grow, optimize and protect our clients' businesses. We've shaped a global ecosystem of consultants, industry professionals and alliance partners with one focus in mind – you. This collaborative approach has enabled a large academic medical center to analyze the cause of a security incident and implement a cybersecurity roadmap to protect critical assets. It enabled a life sciences multinational to create a threat management strategy, operating model and governance structure to establish one global cybersecurity management program, with prioritized defense for critical IP. Anticipating cyber attacks is the only way to be ahead of cyber criminals. With our focus on you, we ask better questions about your operations, priorities and vulnerabilities. We then work with you to co-create more innovative answers that help you activate, adapt and anticipate cyber crime. Together, we help you deliver better outcomes and long-lasting results, from strategy to execution. We believe that when organizations manage cybersecurity better, the world works better. To learn more, please visit ey.com/cyber.

ibm-logo.jpg

IBM has been helping companies innovate for over 100 years and has achieved over 3,700 security-related patents in the last decade while acquiring more than 12 security companies to build its portfolio. As a recognized security leader, IBM offers one of the world’s broadest, most advanced and integrated portfolios of security products and services to help protect against advanced threats, safeguard your most valuable assets, and help you innovate with cloud and mobile while reducing risk. Our security experts can help you assess your security posture, develop security strategies, and deploy and manage the best security solutions to defend your enterprise. www.ibm.com/security

isight-logo-large.jpg

iSIGHT Partners is the leading global provider of cyber threat intelligence. With 200+ experts in 16 countries and expertise in 24 languages, only iSIGHT can deliver the full context and intent of the most damaging threats, enabling security organizations to respond faster, defend proactively, and invest smarter. Find iSIGHT Partners on the web at www.iSIGHTpartners.com or email us at info@isightpartners.com.

phishme-logo-rgb-2c.jpg 

PhishMe is the leading provider of Human Phishing Defense solutions for organizations concerned about their susceptibility to today’s top attack vector—spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense while operationalizing attack intelligence and phishing incident response for the security team. Our open approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization’s security decision-making process. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.

pwc-2014-spring-fsisac.jpg

PwC helps organizations and individuals create the value they're looking for. We're a network of firms in 157 countries with more than 195,000 people who are committed to delivering quality in assurance, tax and advisory services. Find out more and tell us what matters to you by visiting us at www.pwc.com

Gold Sponsors
 acc-sig-blk-cmyk.png

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com.

 agari.png

Agari collects terabytes of email data from email receivers like Gmail and Yahoo! representing 85% of the email inboxes in the U.S., to provide global brands with a cloud-based SaaS solution that eliminates email threats, protects customers and their personal data, and proactively guards brand reputation. Today, Agari has analyzed over a trillion emails, and has blocked over a 2.5 billion malicious messages at a clip of over 200 per second. Founded by the thought leaders behind Cisco's IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award, is headquartered in Silicon Valley and is backed by Alloy Ventures, Battery Ventures, First Round Capital, and Greylock Partners. Learn more at www.agari.com.

fsisac-fall-baydynamics.png 

Bay Dynamics® is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose-built Risk Fabric® platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders, vendors and bad actors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.

bitsight-logo-r-w-tagline.png 

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based Security Ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.

fsisac-fall-booz.jpg

Booz Allen Hamilton has been at the forefront of strategy and technology for more than 100 years. Today, the firm provides management and technology consulting and engineering services to leading Fortune 500 corporations, governments, and not-for-profits across the globe. Booz Allen partners with public and private sector clients to solve their most difficult challenges through a combination of consulting, analytics, mission operations, technology, systems delivery, cybersecurity, engineering, and innovation expertise.

With international headquarters in McLean, Virginia, the firm employs more than 22,500 people globally, and had revenue of $5.27 billion for the 12 months ended March 31, 2015. To learn more, visit www.boozallen.com. (NYSE: BAH)

fsisac-spring-cymmetria.png 

At Cymmetria, we are focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Our cyber deception solution, MazeRunner, gives organizations the ability to detect threats, shape attacker behavior, and mitigate attacks. By turning an organization's network into a labyrinth of high-risk navigational decisions, Cymmetria's MazeRunner allows for unprecedented control over an attacker's movement and activity in a network. Our team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. Founded in 2014, Cymmetria is backed by leading investors such as Y Combinator and Sherpa Capital.

 fsisac-fall-cyphort.png

Cyphort is an innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. Cyphort's unique software solution delivers complete Next Generation APT defense against current and emerging threats, targeted attacks and zero day vulnerabilities; correlating threats from Web and Email, as well as internal vectors for lateral spread and post breach activity detection. The addition of correlation and context for each threat plays a key role in helping prioritize responses and containment actions. The purpose-built integrations to existing enforcement solutions (Firewalls, Proxies etc.) allows customers the ability to extract maximum value from IT assets without compromising the security of an organization. Cyphort is a privately held company headquartered in Santa Clara, California. For more information, please visit www.cyphort.com and follow us @Cyphort.

 new-fidcy-logo-green.jpg

Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber

microsoft-logo-rgb-c-gray.png

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. We build best-in-class platforms and productivity services for a mobile-first, cloud-first world.

fsisac-fall-netskope2.png 

Netskope, the leading cloud access security broker (CASB), helps enterprises find, understand, and secure sanctioned and unsanctioned cloud apps. Through contextual awareness and a multi-mode architecture, Netskope sees the cloud differently. This result in the deepest visibility and control, the most advanced threat protection and data loss prevention, and an unmatched breadth of security policies and workflows. The world’s largest companies choose Netskope, the only CASB that ensures compliant use of cloud apps in real-time, whether accessed on the corporate network, remotely or from a mobile device. With Netskope, enterprises move fast, with confidence.

nhisac-optiv-rgb.png

Optiv is the largest comprehensive pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security. Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

paloalto-logo-2016.jpg

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com.

fsisac-fall-pindrop2.png

Bag Insert
Full Page Handbook Ad

Pindrop is the pioneer in voice fraud prevention and authentication. Pindrop provides enterprise solutions to reduce fraud losses and authentication expense for some of the largest call centers in the world. Pindrop’s patented Phoneprinting™ technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Pindrop has been selected by the world’s largest banks, insurers, brokerages and retailers, detecting over 80% of fraud, even for attackers never seen before. Pindrop’s solutions are allowing customers to reduce call time and improve their customers’ experience even while reducing fraud losses. Pindrop was founded in 2011 and is venture backed by Andreessen Horowitz, Citi Ventures, Felicis Ventures, Google Capital, GV and IVP. In total, Pindrop has raised $122 million.

riskiq-fsisac-fall.png

RiskIQ detects online threats that exploit customers and damage enterprise brands. The company discovers and continuously analyzes web and mobile assets from the user perspective to detect malware, fraud and brand infringements. RiskIQ's cloud service is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and is backed by Battery Ventures and Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.

 fsisac-spring-fullcolor-riskrecon.png

RiskRecon traces its beginnings to 2011 when our founder and former CISO, Kelly White, asked himself: "is it possible to measure the security program quality of any company simply by looking at its Internet-facing presence?"

Our breakthrough technology enables you to control third party risk by providing vendor security assessments that are comprehensive, actionable and available on demand.

With RiskRecon, you can quickly evaluate the security program of any vendor – SaaS, outsourcer or on-prem provider. We require no proprietary vendor data, no permissions and no invasive scans. Our patent-pending solution automatically evaluates any organization's security program through multi-step process:

  • Discovers all vendor Internet facing assets (and related third party links)
  • Gathers all relevant technical attributes, and
  • Analyzes with proprietary rules engines and statistical techniques.

By combining these results with legitimate threat intelligence sources and exception-based analyst review, RiskRecon produces assessments based on over 50 security criteria (and growing). These reports provide detailed, descriptive root cause analyses and management dashboard summaries.

Learn more about us at www.riskrecon.com.

fsisac-spring-security-risk-advisors.png

Security Risk Advisors provides expert consulting services with specializations in advanced threats controls implementation and 24x7 operation, red and blue teams, financial services control frameworks, and GRC process improvement. Our approach emphasizes ongoing knowledge transfer and access to our analysts.

symantec-fsisac-spring-2013.gif

Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings - anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: www.symantec.com/social.

tm-logo-cmyk.png

ThreatMetrix®, The Digital Identity Company™, is the market-leading cloud solution for authenticating digital personas and transactions on the Internet. Verifying more than 20 billion annual transactions supporting 30,000 websites and 4,000 customers globally through the ThreatMetrix® Digital Identity Network, ThreatMetrix secures businesses and end users against account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches. Key benefits include an improved customer experience, reduced friction, revenue gain, and lower fraud and operational costs. The ThreatMetrix solution is deployed across a variety of industries, including financial services, e-commerce, payments and lending, media, government and insurance.

For more information, visit www.ThreatMetrix.com or call 1-408-200-5755. Join the cybersecurity conversation by visiting the ThreatMetrix blog, Facebook, LinkedIn and Twitter pages.

trendmicrologo-notagline-printjpg.jpg

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com.

 tripwire-high-res.jpg

Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operations solutions for enterprises, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire's portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics.

Silver Sponsors

Amazon Web Services

Amazon Web Services (AWS) is a cloud services platform offering compute power, database storage, content delivery, and other capabilities to help businesses scale and grow. At AWS, security is job zero and helping to protect the confidentiality, integrity, and availability of our customers' systems and data is of the utmost importance to us. Because our platform and controls were designed and built with the most data-sensitive organizations in mind, Financial Services institutions--from FinTech startups to the largest global investment banks--are using AWS to strengthen their respective security parameters and enforce compliance requirements. To learn more, visit us at http://aws.amazon.com/financial-services

BrandProtect

In a world where the enterprise attack surface has extended far beyond the traditional security perimeter, BrandProtect addresses the critical security need for actionable intelligence about external cyber activity that directly threatens executives, employees, IP, physical locations and more. BrandProtect™ provides security operations teams with something they do not have today: visibility beyond the perimeter™

24/7/365, BrandProtect quickly identifies, accurately validates, thoroughly analyzes, and rapidly escalates or mitigates the cyber threats that could impact our clients' business and increase their exposure to potentially crippling reputational risks. Hundreds of banks, credit unions and financial institutions, including 11 of the top 35 banks in North America, depend on BrandProtect.

BrandProtect delivers an unmatchable cyber security platform comprised of advanced proprietary threat detection technology, accurate assessment and analysis by military-grade threat analysts and mitigation by a world-class rapid response team. Delivered as a customizable suite of services, the BrandProtect platform features comprehensive, multi-channel threat detection technology -- including surface and dark web monitoring -- machine and human based severity scoring and assessment, enterprise-class workflow, complete incident archiving and case management, multi-language capabilities, STIX/TAXII support, and much more.

For more than a decade, BrandProtect has provided CISOs, CIOs, and CFOs assurance that the potentially crippling cyberattacks -- including phishing scams, executive or agent impersonation, domain fraud, mobile app schemes, unauthorized social domains, threatening social media activity, and other criminal and threatening online activities -- are quickly detected, assessed, and escalated and/or mitigated.

Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

Citrix

Citrix powers business mobility in the financial services industry with a fully integrated and secure solution, uniting technologies in virtualization, mobility management, networking, and cloud. Financial Services companies can improve customer experience and employee productivity by providing secure instant access to apps, data and communication on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are trusted by the top 10 largest global banks, as well as the top 10 global companies in investment; property and casualty insurance; and life insurance. Learn more at www.citrix.com/financialservices.

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike's next-generation threat protection platform leverages real-time Stateful Execution inspection (SEI) at the endpoint and Machine Learning, in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform is a combination of big data technologies and endpoint security driven by advanced threat intelligence. CrowdStrike Falcon enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.

CyberArk

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 40 of the Fortune 100 - to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to 1,800 global businesses, including 17 of the world's top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

Cybereason

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber-attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

DB Networks

DB Networks® innovates cybersecurity through intelligent continuous monitoring. Our customers include the world's largest financial institutions, manufacturers, healthcare, and governments. DB Networks provides four primary benefits;

  • Databases discovery - including undocumented ones
  • Detailed insights of interactions between application and databases
  • Monitoring core network policies
  • Behavioral analysis to immediately identify database attacks

DB Networks' unique approach to database security utilizes machine learning to model an applications SQL generation process. It then uses behavioral analysis to immediately identify when the application has been compromised and is generating rogue SQL statements designed to attack a database. With no signature files to deal with or endless false positives to chase down, operational support becomes trivial.

Easy Solutions

Easy Solutions is a security company focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 60 million customers at 220 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.

Endgame

Founded in 2008, Endgame is a leading provider of software solutions to the U.S. Intelligence Community and Department of Defense, protecting national security missions from the most sophisticated adversaries in the world's most hostile environments. The adversaries we battle every day have shifted their attacks to commercial and civilian government organizations. Relying on a passive defense does not work.

Today, Endgame combines the industry's deepest understanding of enterprise vulnerabilities and evolving threats with proven science and the software automation necessary for federal and commercial organizations to "turn the map around" and think like an adversary. Endgame enables customers to successfully automate the hunt - pursue, contain and eliminate the most advanced adversaries before they cause damage and loss.

FourV Systems

GreySpark Cyber calculates IT Risk ‘Vital Signs’ from existing system and security sensor data to provide CISO’s and Security managers with business insight for discussions with executives and board members. Six indices objectively track the health of IT security operations enabling consistent and effective communication with business managers. The inputs are similar to SIEM, GRC and threat intelligence systems; the output is confidence in IT security operations.

Fox-IT

It is Fox-IT's mission to make technical and innovative solutions that ensure a more secure society. We do that through the development of advanced cybersecurity and cyberdefense services and solutions for our clients around the world. We achieve this through a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.

As advancements in Internet technology expand opportunities for misuse by increasingly sophisticated cyber criminals and terrorists, Fox-IT solutions improve surveillance, detection and prosecution of criminals, and harden the security of critical IT networks and systems. We focus on areas where systems are most vulnerable, and in sectors where security is most essential —including government systems up to “state secret level” sensitivity and in vital infrastructure industries like energy and banking.

Intel Security

Description coming soon!

Interset

Interset provides a highly intelligent and accurate insider and targeted outsider threat detection solution that unlocks the power of behavioral analytics, machine learning, and big data to provide the fastest, most flexible and affordable way for IT teams of all sizes to operationalize a data protection program. Utilizing agentless data collectors, lightweight endpoint sensors, advanced behavioral analytics, and an intuitive user interface, Interset provides unparalleled visibility over sensitive data, enabling early attack detection and actionable forensic intelligence with reduced false positives and noise. Interset solutions are deployed to protect critical data across the manufacturing, life sciences, hi-tech, finance, government, aerospace & defense, and securities brokerage industries. For more information visit www.interset.com and follow us on Twitter @intersetca.

KnowBe4

KnowBe4 is the world's most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using mock attacks, engaging interactive training, continuous assessment through simulated phishing, vishing and smishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4's platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance.

LemonFish

LemonFish Technologies is a data science and behavior analytics company building and deploying proactive solutions against data leakage and insider threats. LemonFish deploys advanced discovery and high-end threat analytics on the open, deep, and dark web. By scouring the different layers of the web we are able to determine if sensitive data has been leaked from an organization or is vulnerable to being exposed. Delivering real-time visibility into data exposure Keeping companies on the ahead of governance and compliance therefore increasing efficiency while reducing your exposure to risk.

NuData Security Inc.

NuData Security predicts fraudulent transactions by identifying good users from bad, based on their online behavior. By tracking over 18 billion behaviors anually, NuData harnesses the power of behavioral and statistical analysis, enabling its clients to predict fraud with 99% accuracy. This allows clients to predict fraud before a critical decision, reduce customer insult, and investigate bad actors efficiently.

NuData's product, NuDetect, is trusted by some of the largest e-commerce and banking companies in the world to protect them from threats like automated account creation, manual account takeover and transaction fraud.

Learn more about NuData Security at www.nudatasecurity.com

Phantom Cyber

Phantom automates and orchestrates key stages of security operations from prevention to triage and resolution; delivering dramatic increases in productivity and effectiveness. Ranging from simple automation to fully autonomous response, Phantom lets you choose the best balance that fits your organization’s needs while increasing security and accelerating security operations. Focused on closing the security gap by enabling enterprise security operations to be smarter, faster and stronger; Phantom provides the flexibility to connect in-house and third-party systems into one consolidated, integrated and extensible platform. Phantom was founded by enterprise security veterans Oliver Friedrichs and Sourabh Satish who have helped propel companies like Symantec, Sourcefire, Cisco and others to success. For more information visit: www.phantom.us.

Prelert, Inc.

Prelert is the leading provider of behavioral analytics for IT security, IT operations, and business operations teams. The company’s solution analyzes an organization’s log data, finds anomalies, links them together and lets the data tell the story behind advanced security threats, IT performance problems, and business disruptions. Leveraging machine learning anomaly detection and other behavioral analytics capabilities, the solution automates the analysis of massive data sets, eliminating manual effort and human error. Hundreds of progressive IT organizations rely on Prelert to detect advanced threat activity, reduce false positive alerts and enable faster root cause analysis. Prelert lets your data tell the story.

Prevoty

Prevoty is dedicated to securing enterprises and the users they serve by monitoring and protecting the applications that are the heart of modern business. By using a LANGSEC-based approach to accurately analyze attacks from inside production applications, Prevoty’s products provide real-time application security intelligence and RASP (Runtime Application Self-Protection). These capabilities enable Global 2000 enterprises to dramatically improve remediation of vulnerabilities, enabling security and development teams to work together more effectively, even with agile release cycles.

Prevoty was founded in 2013 and is headquartered in Menlo Park, California. For more information on the company's application security solutions, go to prevoty.com or follow @Prevoty on Twitter.

Shape Security

Shape Security stops automated web and mobile application attacks, like credential stuffing, content scraping, and application-layer DDoS, that bypass existing defenses. The Shape Botwall Service, available in the cloud or on-premises, protects more than 350M accounts on behalf of Fortune 500 organizations. Invisible to people but impenetrable to bots, Shape protects the world’s largest banks, airlines, retailers and government agencies. Shape Security is headquartered in Silicon Valley and backed by Kleiner Perkins Caufield & Byers, Norwest Venture Partners, Venrock, Baseline Ventures, Google Ventures, and host of other prominent investors.

Synack

The Synack platform leverages the best combination of humans and technology to create an offensive security service that delivers ongoing and on-demand vulnerability intelligence. Synack's security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment.

TITUS

TITUS solutions enable organizations to classify, protect, analyze and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the cloud. TITUS solutions are trusted by millions of users in over 60 countries around the world. Its customers include Dell, Provident Bank, Dow Corning, Safran Morpho, United States Air Force, NATO, Pratt and Whitney, Canadian Department of National Defence, and Australian Department of Defence.

Waratek

Waratek has developed a disruptive approach to application security that protects banking and financial applications and data from logic attacks like SQL Injection, network attacks and unpatched vulnerabilities at runtime, with no code changes or hardware. The Waratek approach is unique because the security resides in the ‘Runtime Environment', an approach that analyst firm Gartner calls Runtime Application Self Protection or RASP. Waratek is therefore able to perform transparent taint detection and validation of each character in a SQL query to identify injection attacks with 100 percent accuracy. Waratek's Threat Forensics provide an in-depth level of information about attacks that originate both internally to and externally from the enterprise network.

Bronze Sponsors

Akamai

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

Arxan Technologies

Arxan provides the world's strongest application protection solutions.

Our unique patented guarding technology

  • Defends applications against attacks
  • Detects when an attack is being attempted, and
  • Responds to detected attacks with alerts and repairs.

Arxan offers solutions for software running on mobile devices, desktops, servers, and embedded platforms – including those connected as part of the Internet of Things (IOT) – and is currently protecting applications running on more than 500 million devices across a range of industries.

Attivo Networks

Attivo Networks® is an innovator in cyber security defense. As the leader in deception-based threat detection technology, Attivo provides dynamic deceptions for the real-time detection of any type of attack (insider or external) that has bypassed other prevention solutions. Detailed attack forensics drive actionable alerts for prompt remediation. For more information visit www.attivonetworks.com

Bastille

Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with machine learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.

Bromium

Bromium has pioneered the next generation of endpoint protection that eliminates breaches. Just as virtualization transformed IT, Bromium is transforming security with its unique micro-virtualization technology. Bromium provides the world’s most advanced endpoint security, even against the most sophisticated zero-day malware. Unlike traditional security technologies, such as antivirus or virtual containers, which rely on ineffective detection techniques, Bromium’s solution automatically isolates each user-task in a lightweight, CPU-enforced micro-VM. This enables users to click on anything without risk of compromise, protecting the enterprise. Bromium’s technological innovations have earned the company numerous industry awards. Visit us at www.bromium.com.

Centripetal Networks

Centripetal Networks Inc. is a cyber-security solutions provider specializing in Real-Time Active Network Defense. Centripetal has achieved several breakthroughs in the scale and speed of network protection. Centripetal's RuleGate® product is the first and only system able to action threat indicators at scale, at full line-rate speed, and with agility. Threat intelligence can now directly drive an active cyber defense without negatively impacting network performance or user experience. Centripetal's offering includes the RuleGate® a unique ultra-high performance network appliance, QuickThreat® the industry's first real-time threat visualization and analytics platform, and the Advanced Cyber Threat™ (ACT) service. For more information, visit www.CentripetalNetworks.com.

Cigital

Monday After Hours Hospitality Suite

Cigital is one of the world's largest application security firms. We go beyond traditional testing services to help organizations find, fix and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.

Confer

Confer offers a fundamentally different approach to endpoint security through the Converged Endpoint, an adaptive defense that integrates prevention, detection and incident response for endpoints, servers and cloud workloads. The patented technology disrupts more than 99% of attacks while collecting a rich history of endpoint behavior to support post-incident response and remediation. Confer automates this approach to secure millions of devices, regardless of where they are, allowing security teams to focus on more important activities.

Cylance, Inc.

Off-site Dinner - Sunday Night

Cylance is a next generation, endpoint protection, product company, specializing in advanced threat security that detects and stops zero-day malware and APT attacks. Using advanced math and machine learning, coupled with the understanding of a hacker’s mindset, Cylance provides a proactive, preventive approach to security.

Deloitte

Deloitte's Cyber Risk Services help complex organizations more confidently pursue their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. With deep experience across a broad range of industries, Deloitte's Cyber Risk Services practitioners provide advisory and implementation services, spanning executive and technical functions, to help transform legacy IT security programs into proactive, Secure.Vigilant.Resilient.™ cyber risk programs that better align security investments with risk priorities, establish improved threat awareness and visibility, and strengthen the ability of organizations to thrive in the face of cyber incidents.

DomainTools

DomainTools is the leader in domain name and DNS-based cyber threat intelligence. With over 15 years of 'cyber fingerprint' data across the Internet, we empower the ten largest global financial institutions to address real-world incident response and threat mitigation challenges such as threat identification, attacker profiling, and monitoring in order to prevent future attacks. Fortune 1000 companies and the largest security solution providers also use DomainTools as a critical ingredient in their threat investigation and mitigation work. Learn more at www.domaintools.com.

eSentire, Inc.

eSentire® is a proven industry leader, keeping mid-size organizations safe from constantly evolving cyber attacks that traditional security defenses simply can't detect. eSentire combines people, process and technology to deliver an unmatched, premium level service that detects, remediates and communicates sophisticated cyber threats in real-time, 24/7. Protecting more than $3 trillion in Assets under Management (AuM), eSentire is the award-winning choice for security decision-makers in mid-size enterprise. eSentire has received multiple accolades for exceptional service, which includes HFM (Hedge Fund Manager) Service Provider awards (2013, 2014, 2015). In 2015 eSentire was named to Deloitte's Technology Fast 50 TM and Fast 500TM and included in the list of “Cool Vendors” in the Cool Vendors in Cloud Security Services, 2015 report by Gartner, Inc. For more information visit www.esentire.com and follow @esentire.

Exabeam

Description coming soon!

Invincea

Beach Blast Cabana/Lounge - Monday Evening

Invincea is the market-leading solution for advanced malware threat detection, breach prevention and forensic threat intelligence. The Invincea platform provides organizations of all sizes—enterprises to small-medium businesses—with coverage against the largest attack surface for cyber-breach attacks aimed at end-users in the form of spear-phishing, drive-by download exploits, poisoned search results and user-initiated infections. The company is venture capital-backed and based in Fairfax, VA. For more information, visit www.invincea.com.

LookingGlass

LookingGlass Cyber Solutions is the leader in threat intelligence and dynamic threat defense. LookingGlass solutions are uniquely architected to discover, understand, manage and mitigate threats both inside and outside an organization's infrastructure. LookingGlass empowers customers to confidently enable effective security decisions and efficient security operations throughout the threat lifecycle. For more information, please visit www.LGScout.com

Malwarebytes

Malwarebytes provides anti-malware and anti-exploit software designed to protect users against zero-day threats that consistently escape detection by traditional endpoint security solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors, is a PCMag.com Editor's Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That's why large Enterprise businesses worldwide, including Disney, Dole, and Samsung, trust Malwarebytes to protect their mission-critical data. For more information visit www.malwarebytes.org

Menlo Security

Key Card Sponsor
Booth Crawl Sponsor

Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors. The company's patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security products can be deployed in the public or private cloud and are trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Company headquarters are in Menlo Park, California. For more information, please visit www.menlosecurity.com or @menlosecurity.

NetSPI

Networking Area/Charging Station

NetSPI combines managed services, application assessment, network assessment, and program development services to deliver full-spectrum threat and vulnerability management solutions that transform IT security. Built on 15 years of deep-dive pentesting and security expertise, our CorrelatedVM™ platform, proven processes, and end-to-end managed services programs help financial services, technology, healthcare, and retail leaders identify, prioritize, and remediate vulnerabilities to help prevent threats across the enterprise—before they disrupt business. We put the right people, processes, and technology in the right place at the right time to increase visibility across your portfolio, eradicate blind spots, and protect your most critical assets. www.netspi.com

Niara, Inc.

Niara’s security analytics platform automates the detection of attacks that have bypassed perimeter defenses and dramatically reduces the time and skill needed to investigate and respond to security events. The solution applies machine learning algorithms and forensics to data from the network and security infrastructure to detect compromised users, entities, and malicious insiders, speed threat hunting efforts, and reduce the time for incident investigation and response by focusing security teams on the threats that matter.

NSS Labs

NSS Labs, the security insight company, is trusted by the world's largest and most demanding enterprises to help make their organizations more secure. Focused exclusively on IT security, NSS provides CEOs, CIOs, CISOs, and information security professionals with data-driven insight to help them make informed security decisions.

NSS' heritage is its best-in-class security product testing laboratory, which offers in-depth test reports as well as research and analyst services. This expertise is the premise for its Cyber Advanced Warning System™ – the industry's revolutionary cloud-based security and risk management platform designed to identify and expose active threats that matter.

Offering Analyst advisory services, a comprehensive library of research, and continuous product monitoring – all backed by unmatched security product testing expertise – NSS Labs is the only research, testing & advisory agency 100% focused on cyber-security insight.

For more information visit: www.nsslabs.com

OpenDNS

OpenDNS, acquired by Cisco in August, 2015, is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

Phishlabs

PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including four of the five largest U.S. financial institutions. PhishLabs combines proprietary technology, intelligence, and human expertise to rapidly detect, analyze, and stop targeted cyberattacks.

Proofpoint

Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. www.proofpoint.com

Resilient

Resilient empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s leading Incident Response Platform (IRP) arms response teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter.

Resilient’s security, privacy, and action modules provide organizations with agile, collaborative, and comprehensive action plans – enabling teams to modify responses to suit organizational needs, adapt in real time as incidents evolve, and focus on critical incidents before they become full-blown crises.

Headquartered in Massachusetts, USA, Resilient’s customers are some of the world’s most trusted organizations.

Learn more at resilientsystems.com.

Return Path

Return Path analyses the world’s largest collection of email data to show businesses how to stay connected to their audiences, strengthen their customer engagement, and protect their brands from fraud. Our data solutions help analysts understand consumer behaviour and market trends. We help mailbox providers and security providers around the world deliver great user experiences and build trust in email by ensuring that wanted messages reach the inbox while spam and abuse don’t. For more information on Return Path’s Email Fraud Protection solution, visit www.returnpath.com/StopEmailFraud.

Reversing Labs

ReversingLabs delivers solutions that drastically accelerate and broaden organizations' ability to detect cyber threats, respond to incidents and analyze file integrity. Our “Deep Content Inspection” solutions enable detection and analysis of advanced file-based cyber threats in-flight, at-rest, in-the-cloud and on-the-bench. Cyber criminals have developed sophisticated strategies for evading conventional signature, behavior and sandbox based defenses. Our solutions pioneer an array of unique static analysis techniques for exposing and understanding these cyber adversaries to reduce detection and mitigation time.

Security Compass

Security Compass focus on helping you delivers secure software through deliberate practice while maintaining the speed of your business. Our goal is to help you build secure software by seamlessly unifying your application security needs through eLearning, Security Requirements and Verification.

Securonix

Securonix radically transforms data security with actionable intelligence. Our purpose-built security analytics platform mines, enriches, analyzes, scores and visualizes data into actionable intelligence on the highest risk threats to organizations. Using signature-less anomaly detection techniques, Securonix detects the most advanced data security, insider threat and fraud attacks automatically and accurately.

Skybox Security

Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

The Media Trust

The Media Trust is the client-side malware scanner for the world's largest, most heavily-trafficked websites, functioning as the security operations center for their public-facing web and mobile properties. Using a variety of mobile and desktop device/OS/browser, geographic, and user-behavior profile combinations, our proprietary technology continuously scans millions of websites and third-party advertising/content delivery code each day to detect and remove anomalous activity before it becomes overt. This extensive monitoring yields original source, 99.95% accurate, real-time malware data that allows enterprises to block specific malicious web-based activity to secure their networks and mitigate the risk of everyday employee internet use.

ThreatConnect

ThreatConnect, Inc. is the leading provider of threat intelligence products and services including ThreatConnect®, the most widely adopted Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Designed to engage security teams at all levels of maturity, ThreatConnect is used globally by government agencies and organizations just getting their threat intelligence programs started, as well as more than 40% of the Fortune 100 with advanced needs. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com.

Venafi

Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—keys and certificates—so they can't be misused by bad guys in attacks. Venafi constantly assesses which keys and certificates are trusted, protects those that should be trusted, and fixes or blocks those that are not.

Veracode

Off-site Dinner - Sunday Night

Veracode's cloud-based service and programmatic approach deliver a simpler and more scalable solution for reducing global application-layer risk. Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-criminals can find and exploit them, Veracode helps enterprises deliver innovation to market faster – without sacrificing security.

Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode secures hundreds of the world's largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and 25+ of the world's top 100 brands.

Vormetric

Vormetric (@Vormetric) is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. Vormetric helps over 1500 customers, including 17 of the Fortune 30, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data —anywhere it resides — with a high performance, market-leading solution set.

Zscaler

Zscaler ensures that more than 15 million employees across thousands of enterprises and government organizations worldwide are protected against cyber-attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location. Zscaler effectively moves security into the Internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software. To learn more, visit www.zscaler.com

Additional Sponsors

Alvarez and Marsal

Beach Blast Cabana/Lounge - Monday Evening

Description coming soon!

Anomali

Beach Blast Cabana/Lounge - Monday Evening

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Arbor Networks

Off-site Dinner - Sunday Night

Arbor Networks, Inc. helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor delivers market-leading security analytics for dynamic incident response and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business.

Bitglass

Bag Insert

In a world of cloud applications and mobile devices, IT must secure corporate data that resides on third-party servers and travels over third-party networks to employee-owned mobile devices. Existing security technologies are simply not suited to solving this task, since they were developed to secure the corporate network perimeter. Bitglass delivers innovative technologies that transcend the network perimeter to deliver total data protection for the enterprise - in the cloud, at access, on mobile devices and on the corporate network.

Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. Bitglass is based in Silicon Valley and backed by venture capital from NEA, Norwest and Singtel.

Brown University

Half Page Handbook Ad

Description coming soon!

Bugcrowd

Executive Women's Networking Event

An innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of more than 25,000 security researchers to surface critical software vulnerabilities. Bugcrowd provides a range of vulnerability disclosure and bug bounty programs that allow organizations to commission a customized security testing program that fits their needs.

Check Point Software Technologies

Full Page Handbook Ad

Description coming soon!

Checkmarx

Beach Blast Cabana/Lounge - Monday Evening

Checkmarx provides a comprehensive Application Security platform used for finding & fixing application layer vulnerabilities during software development as well as blocking attacks in real time. Best known for its Static Application Security Testing (CxSAST) solution, the product enables developers and auditors to easily scan un-compiled code in all major coding languages and to identify security vulnerabilities. With tight integration into the various SDLC components, CxSAST enables full automation of the analysis process and provides auditors and developers with immediate access to findings and remediation advice. By automatically detecting software vulnerabilities at the earliest stages of development, precious development and security resources are spared while application risk is minimized. For more information, visit www.checkmarx.com.

CloudPassage

Full Page Handbook Ad
Networking Break - Tuesday AM

CloudPassage® Halo® is the world's leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts--at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

Contrast Security

Networking Area/Charging Stations

Contrast Security delivers the world’s fastest application security software that eliminates the single greatest security risk to enterprises today. Industry research shows that application security flaws are the leading source of data breaches. Contrast can be deployed, automatically discover applications and identify vulnerabilities within seven minutes. Relying on sensors instead of expensive security experts, Contrast runs continuously and is ten times more accurate than the competition. Unlike tedious, painful and slow legacy approaches, Contrast analyzes a complete portfolio of running applications simultaneously in real time at any scale. As a result, organizations can act faster against threats and immediately reduce risk. More information on Contrast Security can be found at www1.contrastsecurity.com.

Dell SecureWorks

Sunday Cabana Rental

Dell SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – Dell SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.

To learn more, visit www.secureworks.com

EclecticIQ

Handbook Band Sponsor
Bag Insert

EclecticIQ is an applied cyber intelligence technology provider, enabling enterprise security programs and governments to bootstrap a threat intelligence practice. Empowering analysts to take back control of their threat reality and mitigate exposure accordingly.

EclecticIQ's mission is to restore balance in the fight against cyber adversaries. Its flagship product EclecticIQ Platform enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of cyber threat intelligence detection, prevention and response capabilities.

EclecticIQ is a privately held company headquartered in Amsterdam, the Netherlands, and holds an office in London. Awarded the 2015 EU IPACSO Cyber Security Award, partner of the NATO NCI Agency Security Incubator, and member of FS-ISAC and OASIS CTI TC.

For more information or schedule a personal demo, please visit: www.EclecticIQ.com.

Flashpoint

Sunday Cabana Rental

Flashpoint provides the data, tools and expertise necessary to obtain actionable intelligence from the Deep & Dark Web. The company offers a state-of-the-art platform with data curated by world-class subject matter experts. Flashpoint’s products illuminate threatening actors, relationships, behaviors, and networks hidden within these opaque areas of the Internet. Security and intelligence teams across the Fortune 500 and government use the company’s tools to gain critical awareness of threats and malicious activity yet to surface from the Deep & Dark Web.

ForeScout Technologies

All Day Break Sponsor

ForeScout Technologies Inc. offers Global 2000 enterprises and government organizations the unique ability to see networked devices, including non-traditional devices, control them, and orchestrate information sharing and operation among disparate security tools. As of October 2015, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Gemalto

Exclusive Sunday Outdoor Welcome Reception
Monthly Email Sponsor - April

Description coming soon!

Great Bay Software

Bag Insert

Great Bay Software provides organizations complete real-time visibility and access control over all devices on the most complex of global networks. Great Bay Software’s Warehouse of Context™ serves as the industry’s richest repository of real-time information on all managed and unmanaged endpoints. Security and IT operations teams use Great Bay’s easy-to-deploy, agentless solution to continuously discover, monitor and enforce access policies on every endpoint, which is critical given that two-thirds of an organization’s devices, which include printers, fax machines and the Internet of Things, are typically unmanaged. Great Bay’s unprecedented speed, scale and simplicity give organizations the power to more effectively protect against modern-day threats, simplify regulatory compliance and streamline operations. For more information about Great Bay Software visit www.greatbaysoftware.com.

Guardian Analytics

Exclusive Closing Jeopardy Reception

Description coming soon!

GuardiCore

Wednesday Lunch Sponsor

GuardiCore provides a real-time breach detection and response solution to help companies more quickly and efficiently detect, analyze and thwart advanced threats inside the data center.
Our security platform provides granular visibility and policy definition across data center and cloud applications, combined with high-interaction deception technology to allow our customers to know immediately when their data center has been breached and respond in a fraction of the time of traditional security technologies.

GuidePoint Security, LLC

Suite Meeting Space

Description coming soon!

Gurucul

Bag Insert
Full Page Handbook Ad
Beach Blast Cabana/Lounge - Monday Evening
Sunday Cabana Rentals

Gurucul is changing the way enterprises protect themselves against cyber fraud, insider threats and external intruders on-premises and in the cloud. The company's user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit www.gurucul.com

Infoblox

Beach Blast Cabana/Lounge - Monday Evening

Infoblox delivers network control solutions that connect end users, devices, and networks, enabling approximately 8,100 enterprises and service providers to transform, secure, and scale complex networks. They take network control out of human hands, reduce costs, and increase security.

Our solutions automate DNS, DHCP, and IP address management to reduce costs and maximize uptime. The patented Infoblox Grid™ ensures availability and provides an authoritative database for real-time and historical reporting. And our purpose-built DNS security solutions defend against a wider range of threats than any other product available.

Headquartered in Santa Clara, California, Infoblox has operations in over 25 countries.

Instart Logic, Inc.

Bag Insert

Instart Logic makes application delivery fast, secure & easy. Our end-to-end platform combines machine learning for performance and security, with a CDN for delivery, and is designed for DevOps and mobile-first applications.

Kenna

Beach Blast Cabana/Lounge - Monday Evening

Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization's weaknesses. Kenna accomplishes this by automating the correlation of customer vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches. For more information, visit kennasecurity.com.

KnowCyber

Mobile App

KnowCyber helps companies and other organizations build cybersecurity through learning. We reduce organizational risk by preparing and motivating employees to think and act differently, providing them with the know-how to become the organization’s greatest cybersecurity resource. Our training solutions combine the latest technologies and best practices in learning and development with the latest and best thinking in cybersecurity. Crisp, concise instructional modules address top threats and vulnerabilities, engaging learners through compelling narratives, rich multimedia, and meaningful interactivity and assessment. Programs are designed for seamless delivery to any device from mobile to desktop, via the client’s LMS or our own. They can be co-branded or white-labeled, with learning content customized per industry, organization, or learner roles and responsibilities. Learn more at www.knowcyber.com.

KPMG LLP

BCD Scholarship
Full Page Handbook Ad

Description coming soon!

MarkMonitor

Padfolios

MarkMonitor®, the world leader in enterprise brand protection and a Thomson Reuters Intellectual Property & Science business, provides advanced technology and expertise that protects the revenues and reputations of the world's leading brands. In the digital world, brands face new risks due to the Web's anonymity, global reach and shifting consumption patterns for digital content, goods and services. Customers choose MarkMonitor for its unique combination of industry-leading expertise, advanced technology and extensive industry relationships to preserve their marketing investments, revenues and customer trust. To learn more about MarkMonitor, our solutions and services, please visit markmonitor.com or call us at 1-800-745-9229.

RiskVision, Inc.

Lanyards

RiskVision develops comprehensive risk intelligence solutions for the enterprise. The highly decorated RiskVision platform is the industry’s first risk intelligence solution designed for today’s real-time, big data, threat-centric world. RiskVision’s architecture and design delivers the industry’s best usability, scale, and automation and time-to-deployment advantages – at a fraction of the cost of traditional solutions. CIOs and CROs of the world’s leading organizations and government agencies rely on RiskVision including AXA Group, Cisco, Deutsche Bank, E*TRADE, Exelon, First Data, Fiserv, HCL, Novartis, Roche, Safeway, Sheetz, Southern Co., Time Warner, United Health Group, U.S. Departments of Defense, Health & Human Services, Justice, and Veterans Affairs, and dozens of other clients worldwide. For more information, please visit www.riskvisioninc.com.

SecurityScorecard

Escalator Runner

Description coming soon!

Skyhigh Networks

Room Drop
Off-site Dinner (invite only) - Sunday Night
R&R Zone

Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Cisco, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia, and Salesforce.com. For more information visit www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks

ThreatQuotient

Half Page Handbook Ad

ThreatQuotient's flagship product, ThreatQ, is a proven threat intelligence platform consisting of three modules: indicator of compromise (IOC) management, attack tracker, adversary profiles, and signature repository. ThreatQ will advance threat information management through end-to-end automation that transforms disparate data into ACTIONABLE intelligence. Because of its power and ability to provide defenders with critical contextual information, ThreatQ is becoming a team's cornerstone analytical tool.

Transmit Security

Green Water Station

Putting the customer first should be at the forefront of deploying any authentication solution. You want to allow them to do more in a much safer and convenient manner. As fraud continues to rise, it is important to find ways to overcome the increasing security challenges and still be innovative while offering your customers the best experience possible. Biometric techniques, new devices and new device sensors provide exciting possibilities. However, they can be expensive to deploy and manage. Combining these new technologies with the Transmit Solution’s context aware, flexible and open approach allows you to significantly improve security while offering a superior customer experience for authentication. Transmit has one of the best policy engines that make your authentication completely programmable without touching the application.The solution is a full omni channel (e.g. mobile, web, call center, branch) solution that provides for a common way to authenticate customers across channels. It also profiles customer behavior across channels to detect behavioral anomalies and invoke policy based secondary authentication. The end result is higher security, happier customers and increased usage of the applications for a better bottom line.

TrapX Security

Bag Insert
Full Page Handbook Ad

TrapX Security is a leader in the delivery of advanced cyber security defense. Our solutions rapidly detect, analyze and defend against new zero-day and APT attacks in real time. DeceptionGrid provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a proactive security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes Forbes Global 2000 commercial and government customers around the world in sectors that include defense, health care, finance, energy, consumer products and other key industries. Learn more at www.trapx.com.

Yubico, Inc.

Totebags

Yubico sets new world standards for simple, secure login, preventing unauthorized access to computers, servers, and internet accounts.

Supporting multiple authentication and encryption protocols on all devices and platforms, YubiKeys protect access to user accounts for the world’s largest enterprises with a simple touch, and with no driver or client software needed. Yubico is a leading contributor to the FIDO Universal 2nd Factor open authentication standard, and Yubico’s technology is used, and loved, in more than 150 countries.

Founded in 2007, Yubico is privately held with offices in Palo Alto (California), Seattle (Washington), Stockholm (Sweden), and London (UK).

ZeroFOX

Wifi

ZeroFOX is the leader in social media cyber security and has developed security technology that enables organizations to monitor and prevent social media cyber attacks, conduct proactive attack reconnaissance and safeguard their social assets. ZeroFOX Enterprise represents an evolution in security technology, custom engineered to identify both behavioral and technical threat indicators across cyber security’s newest and most dangerous threat vector: social media. Through a combination of cutting edge technology and expert security professionals, ZeroFOX provides solutions for the full spectrum of social media risk.

 

 

 




?