Loading... Please wait...

Current Sponsors

Platinum Sponsors

Beach Blast Cabana/Lounge - Monday Evening

For EY Advisory, a better working world means solving big, complex industry issues and capitalizing on opportunities to deliver outcomes that grow, optimize and protect our clients' businesses. We've shaped a global ecosystem of consultants, industry professionals and alliance partners with one focus in mind – you. This collaborative approach has enabled a large academic medical center to analyze the cause of a security incident and implement a cybersecurity roadmap to protect critical assets. It enabled a life sciences multinational to create a threat management strategy, operating model and governance structure to establish one global cybersecurity management program, with prioritized defense for critical IP. Anticipating cyber attacks is the only way to be ahead of cyber criminals. With our focus on you, we ask better questions about your operations, priorities and vulnerabilities. We then work with you to co-create more innovative answers that help you activate, adapt and anticipate cyber crime. Together, we help you deliver better outcomes and long-lasting results, from strategy to execution. We believe that when organizations manage cybersecurity better, the world works better. To learn more, please visit ey.com/cyber.


IBM is one of the world's largest information technology companies with over 100 years of leadership in helping institutions innovate. As a recognized security leader, we help protect clients from billions of security events each day. Our technologies assist in solving the most difficult security issues and enable secure access to people, data, applications and infrastructure. In today's world, companies are dealing with a massive volume of both structured and unstructured data and traditional security solutions are no longer sufficient. IBM's approach enables a more holistic, comprehensive perspective and can enhance your security maturity.

For more details on IBM Security Solutions visit: ibm.com/security
Follow @IBMSecurity on Twitter #ibmsecurity, #ibmbanking


iSIGHT Partners is the leading global provider of cyber threat intelligence. With 200+ experts in 16 countries and expertise in 24 languages, only iSIGHT can deliver the full context and intent of the most damaging threats, enabling security organizations to respond faster, defend proactively, and invest smarter. Find iSIGHT Partners on the web at www.iSIGHTpartners.com or email us at info@isightpartners.com.


PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.


PwC helps organizations and individuals create the value they're looking for. We're a network of firms in 157 countries with more than 195,000 people who are committed to delivering quality in assurance, tax and advisory services. Find out more and tell us what matters to you by visiting us at www.pwc.com

Gold Sponsors

Description coming soon!


Agari collects terabytes of email data from email receivers like Gmail and Yahoo! representing 85% of the email inboxes in the U.S., to provide global brands with a cloud-based SaaS solution that eliminates email threats, protects customers and their personal data, and proactively guards brand reputation. Today, Agari has analyzed over a trillion emails, and has blocked over a 2.5 billion malicious messages at a clip of over 200 per second. Founded by the thought leaders behind Cisco's IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award, is headquartered in Silicon Valley and is backed by Alloy Ventures, Battery Ventures, First Round Capital, and Greylock Partners. Learn more at www.agari.com.


Bay Dynamics® is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose-built Risk Fabric® platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders, vendors and bad actors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.


BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based Security Ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.


Booz Allen Hamilton has been at the forefront of strategy and technology for more than 100 years. Today, the firm provides management and technology consulting and engineering services to leading Fortune 500 corporations, governments, and not-for-profits across the globe. Booz Allen partners with public and private sector clients to solve their most difficult challenges through a combination of consulting, analytics, mission operations, technology, systems delivery, cybersecurity, engineering, and innovation expertise.

With international headquarters in McLean, Virginia, the firm employs more than 22,500 people globally, and had revenue of $5.27 billion for the 12 months ended March 31, 2015. To learn more, visit www.boozallen.com. (NYSE: BAH)


Description coming soon!


Cyphort is an innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. Cyphort's unique software solution delivers complete Next Generation APT defense against current and emerging threats, targeted attacks and zero day vulnerabilities; correlating threats from Web and Email, as well as internal vectors for lateral spread and post breach activity detection. The addition of correlation and context for each threat plays a key role in helping prioritize responses and containment actions. The purpose-built integrations to existing enforcement solutions (Firewalls, Proxies etc.) allows customers the ability to extract maximum value from IT assets without compromising the security of an organization. Cyphort is a privately held company headquartered in Santa Clara, California. For more information, please visit www.cyphort.com and follow us @Cyphort.


Fidelis Cybersecurity provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by an elite team of security professionals with decades of hands-on experience, and our award-winning Fidelis XPS™ Advanced Threat Defense Products, which provide visibility and control over the entire threat life cycle. For more information, visit www.fidelissecurity.com.


Description coming soon!


Netskope™ is the leading Cloud Access Security Broker (CASB). Only the Netskope Active Platform™ provides discovery, deep visibility, and granular control of sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Serving a broad customer base including leading healthcare, financial services, high technology, and retail enterprises.

Netskope has been named to CIO Magazine's top 10 cloud security startups and featured in such business media as CBS News, Wall Street Journal, and Forbes. Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.


Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.


Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com.


Bag Insert
Full Page Handbook Ad

Pindrop Security provides enterprise solutions to secure phone and voice communications. Pindrop solutions reduce fraud losses and authentication expense for some of the largest call centers in the world. Pindrop’s patented Phoneprinting™ technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Pindrop has been selected by the worlds largest banks, insurers, brokerages and retailers, detecting over 80% of fraud, even for attackers never seen before. Our solutions are allowing our customers to reduce call time and improve their customers' experience even while reducing fraud losses. Pindrop is restoring confidence in the security of phone-based transactions. Learn more about Pindrop at www.pindropsecurity.com.


RiskIQ detects online threats that exploit customers and damage enterprise brands. The company discovers and continuously analyzes web and mobile assets from the user perspective to detect malware, fraud and brand infringements. RiskIQ's cloud service is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and is backed by Battery Ventures and Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.


Description coming soon!


Security Risk Advisors provides specialized consulting services with specializations in advanced threats control implementation, financial services control frameworks, red and blue teams and Archer-based process improvement. Our approach emphasizes knowledge transfer, clear documentation and an ongoing consultation after our engagement period.


Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings - anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: www.symantec.com/social.


Description coming soon!


Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com.


Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire's portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at www.tripwire.com/state-of-security or follow us on Twitter @TripwireInc.

Silver Sponsors

Amazon Web Services

Description coming soon!


In a world where the enterprise attack surface has extended far beyond the traditional security perimeter, BrandProtect addresses the critical security need for actionable intelligence about external cyber activity that directly threatens executives, employees, IP, physical locations and more. BrandProtect™ provides security operations teams with something they do not have today: visibility beyond the perimeter™

24/7/365, BrandProtect quickly identifies, accurately validates, thoroughly analyzes, and rapidly escalates or mitigates the cyber threats that could impact our clients' business and increase their exposure to potentially crippling reputational risks. Hundreds of banks, credit unions and financial institutions, including 11 of the top 35 banks in North America, depend on BrandProtect.

BrandProtect delivers an unmatchable cyber security platform comprised of advanced proprietary threat detection technology, accurate assessment and analysis by military-grade threat analysts and mitigation by a world-class rapid response team. Delivered as a customizable suite of services, the BrandProtect platform features comprehensive, multi-channel threat detection technology -- including surface and dark web monitoring -- machine and human based severity scoring and assessment, enterprise-class workflow, complete incident archiving and case management, multi-language capabilities, STIX/TAXII support, and much more.

For more than a decade, BrandProtect has provided CISOs, CIOs, and CFOs assurance that the potentially crippling cyberattacks -- including phishing scams, executive or agent impersonation, domain fraud, mobile app schemes, unauthorized social domains, threatening social media activity, and other criminal and threatening online activities -- are quickly detected, assessed, and escalated and/or mitigated.

Carbon Black

Description coming soon!


Description coming soon!


CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike's next-generation threat protection platform leverages real-time Stateful Execution inspection (SEI) at the endpoint and Machine Learning, in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform is a combination of big data technologies and endpoint security driven by advanced threat intelligence. CrowdStrike Falcon enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.


CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 40 of the Fortune 100 - to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to 1,800 global businesses, including 17 of the world's top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.


Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber-attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

DB Networks

DB Networks® innovates cybersecurity through intelligent continuous monitoring. Our customers include the world's largest financial institutions, manufacturers, healthcare, and governments. DB Networks provides four primary benefits;

  • Databases discovery - including undocumented ones
  • Detailed insights of interactions between application and databases
  • Monitoring core network policies
  • Behavioral analysis to immediately identify database attacks

DB Networks' unique approach to database security utilizes machine learning to model an applications SQL generation process. It then uses behavioral analysis to immediately identify when the application has been compromised and is generating rogue SQL statements designed to attack a database. With no signature files to deal with or endless false positives to chase down, operational support becomes trivial.

Easy Solutions

Easy Solutions is a security company focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 60 million customers at 220 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.


Founded in 2008, Endgame is a leading provider of software solutions to the U.S. Intelligence Community and Department of Defense, protecting national security missions from the most sophisticated adversaries in the world's most hostile environments. The adversaries we battle every day have shifted their attacks to commercial and civilian government organizations. Relying on a passive defense does not work.

Today, Endgame combines the industry's deepest understanding of enterprise vulnerabilities and evolving threats with proven science and the software automation necessary for federal and commercial organizations to "turn the map around" and think like an adversary. Endgame enables customers to successfully automate the hunt - pursue, contain and eliminate the most advanced adversaries before they cause damage and loss.

FourV Systems

Description coming soon!


It is Fox-IT's mission to make technical and innovative solutions that ensure a more secure society. We do that through the development of advanced cybersecurity and cyberdefense services and solutions for our clients around the world. We achieve this through a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.

As advancements in Internet technology expand opportunities for misuse by increasingly sophisticated cyber criminals and terrorists, Fox-IT solutions improve surveillance, detection and prosecution of criminals, and harden the security of critical IT networks and systems. We focus on areas where systems are most vulnerable, and in sectors where security is most essential —including government systems up to “state secret level” sensitivity and in vital infrastructure industries like energy and banking.

Intel Security

Description coming soon!


Interset provides a highly intelligent and accurate insider and targeted outsider threat detection solution that unlocks the power of behavioral analytics, machine learning, and big data to provide the fastest, most flexible and affordable way for IT teams of all sizes to operationalize a data protection program. Utilizing agentless data collectors, lightweight endpoint sensors, advanced behavioral analytics, and an intuitive user interface, Interset provides unparalleled visibility over sensitive data, enabling early attack detection and actionable forensic intelligence with reduced false positives and noise. Interset solutions are deployed to protect critical data across the manufacturing, life sciences, hi-tech, finance, government, aerospace & defense, and securities brokerage industries. For more information visit www.interset.com and follow us on Twitter @intersetca.


Description coming soon!


Description coming soon!

NuData Security Inc.

NuData Security predicts fraudulent transactions by identifying good users from bad, based on their online behavior. By tracking over 18 billion behaviors anually, NuData harnesses the power of behavioral and statistical analysis, enabling its clients to predict fraud with 99% accuracy. This allows clients to predict fraud before a critical decision, reduce customer insult, and investigate bad actors efficiently.

NuData's product, NuDetect, is trusted by some of the largest e-commerce and banking companies in the world to protect them from threats like automated account creation, manual account takeover and transaction fraud.

Learn more about NuData Security at www.nudatasecurity.com

Phantom Cyber

Description coming soon!

Prelert, Inc.

Prelert is the leading provider of behavioral analytics for IT security and operations teams. The company's solution analyzes an organization's log data, finds anomalies, links them together and lets the data tell the story behind advanced cyber threats and IT performance problems. Leveraging machine learning anomaly detection and other behavioral analytics capabilities, it automates the analysis of massive data sets, eliminating manual effort and human error. Hundreds of progressive IT organizations rely on Prelert to detect advanced threat activity, reduce false positive alerts and enable faster root cause analysis.

Prelert lets your data tell the story. Please visit www.prelert.com or follow @Prelert.


Description coming soon!

Shape Security

Description coming soon!


The Synack platform leverages the best combination of humans and technology to create an offensive security service that delivers ongoing and on-demand vulnerability intelligence. Synack's security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment.


Description coming soon!


Waratek has developed a disruptive approach to application security that protects banking and financial applications and data from logic attacks like SQL Injection, network attacks and unpatched vulnerabilities at runtime, with no code changes or hardware. The Waratek approach is unique because the security resides in the ‘Runtime Environment', an approach that analyst firm Gartner calls Runtime Application Self Protection or RASP. Waratek is therefore able to perform transparent taint detection and validation of each character in a SQL query to identify injection attacks with 100 percent accuracy. Waratek's Threat Forensics provide an in-depth level of information about attacks that originate both internally to and externally from the enterprise network.

Bronze Sponsors


Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

Arxan Technologies

Arxan provides the world's strongest application protection solutions.

Our unique patented guarding technology

  • Defends applications against attacks
  • Detects when an attack is being attempted, and
  • Responds to detected attacks with alerts and repairs.

Arxan offers solutions for software running on mobile devices, desktops, servers, and embedded platforms – including those connected as part of the Internet of Things (IOT) – and is currently protecting applications running on more than 500 million devices across a range of industries.

Attivo Networks

Description coming soon!


Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with machine learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.

Bluebox Security

Description coming soon!


Description coming soon!

Centripetal Networks

Centripetal Networks Inc. is a cyber-security solutions provider specializing in Real-Time Active Network Defense. Centripetal has achieved several breakthroughs in the scale and speed of network protection. Centripetal's RuleGate® product is the first and only system able to action threat indicators at scale, at full line-rate speed, and with agility. Threat intelligence can now directly drive an active cyber defense without negatively impacting network performance or user experience. Centripetal's offering includes the RuleGate® a unique ultra-high performance network appliance, QuickThreat® the industry's first real-time threat visualization and analytics platform, and the Advanced Cyber Threat™ (ACT) service. For more information, visit www.CentripetalNetworks.com.


Monday After Hours Hospitality Suite

Cigital is one of the world's largest application security firms. We go beyond traditional testing services to help organizations find, fix and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.

Confer Technologies

Description coming soon!


CyberSponse provides an automated enterprise security operations management platform that provides a transparent view of an organization's entire security operations (SecOps) — from allocated human resources and deployed information security technologies to identified threats, breaches and risk management efforts. CyberSponse's technology solution dramatically improves the efficiency and the effectiveness of the SecOps team's efforts, resulting in rapid return on investment by providing a centralized platform for managing, monitoring, reporting, and analyzing an organization's entire IT security infrastructure and processes, as well as requiring less manpower for managing the increasing cyber threats.

Founded in 2011, CyberSponse provides solutions for CSIRTs and allows them to communicate securely and seamlessly across the organization, while automating workflows and tasks. Organizations across a wide range of markets including financial services, healthcare, retail, government, higher education, utilities, and hospitality turn to CyberSponse to shorten the time it takes to resolve cyber threats and comply with industry regulations and best practices — including PCI, HIPAA, and GLBA. Offices are located in Scottsdale, Arizona. For more information, please visit www.CyberSponse.com.

Cylance, Inc.

Off-site Dinner - Sunday Night

Cylance is a next generation, endpoint protection, product company, specializing in advanced threat security that detects and stops zero-day malware and APT attacks. Using advanced math and machine learning, coupled with the understanding of a hacker’s mindset, Cylance provides a proactive, preventive approach to security.


Description coming soon!


DomainTools is the leader in Cyber Threat Intelligence and cybercrime forensics for investigations ‘outside the firewall.’ With over 12 years of domain name, DNS and related ‘cyber fingerprint’ data across the entire Internet, DomainTools helps companies assess security threat risks, profile attackers, map cyber activity in order to stop attacks. Fortune 1000 companies, global government agencies, and many security and online fraud investigation vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more about how to connect the dots on criminal activity at www.domaintools.com or follow us on Twitter: @domaintools.

eSentire, Inc.

Description coming soon!


Description coming soon!


Beach Blast Cabana/Lounge - Monday Evening

Invincea is the market-leading solution for advanced malware threat detection, breach prevention and forensic threat intelligence. The Invincea platform provides organizations of all sizes—enterprises to small-medium businesses—with coverage against the largest attack surface for cyber-breach attacks aimed at end-users in the form of spear-phishing, drive-by download exploits, poisoned search results and user-initiated infections. The company is venture capital-backed and based in Fairfax, VA. For more information, visit www.invincea.com.


LookingGlass Cyber Solutions is the leader in threat intelligence and dynamic threat defense. LookingGlass solutions are uniquely architected to discover, understand, manage and mitigate threats both inside and outside an organization's infrastructure. LookingGlass empowers customers to confidently enable effective security decisions and efficient security operations throughout the threat lifecycle. For more information, please visit www.LGScout.com


Malwarebytes provides anti-malware and anti-exploit software designed to protect users against zero-day threats that consistently escape detection by traditional endpoint security solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors, is a PCMag.com Editor's Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That's why large Enterprise businesses worldwide, including Disney, Dole, and Samsung, trust Malwarebytes to protect their mission-critical data. For more information visit www.malwarebytes.org


Networking Area/Charging Station

Description coming soon!

Niara, Inc.

Niara’s security analytics platform automates the detection of attacks that have bypassed perimeter defenses and dramatically reduces the time and skill needed to investigate and respond to security events. The solution applies machine learning algorithms and forensics to data from the network and security infrastructure to detect compromised users, entities, and malicious insiders, speed threat hunting efforts, and reduce the time for incident investigation and response by focusing security teams on the threats that matter.

NSS Labs

NSS Labs, Inc. is the world's leading information security company. Focused exclusively on IT security, NSS is known as the world's security product testing laboratory, offering in-depth security product test reports, research, and analyst services. Upon this foundation, NSS has built the Cyber Advanced Warning SystemTM - a revolutionary cloud-based security and risk management platform that lets clients see where they are at risk.

Through these unique offerings, NSS delivers unparalleled cyber risk management guidance. CEOs, CIOs, CISOs, and information security professionals from many of the largest and most demanding enterprises around the world rely on NSS to help them succeed in getting the most out of their security investments.

For more information, go to www.nsslabs.com


Description coming soon!


PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial of service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust.

To learn more about PhishLabs, visit www.phishlabs.com or email info[at]phishlabs[dot]com.
Follow PhishLabs: Twitter | LinkedIn | Google +


Description coming soon!

Resilient Labs

Resilient Systems empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s leading Incident Response Platform (IRP) arms response teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter.

Resilient’s security, privacy, and action modules provide organizations with agile, collaborative, and comprehensive action plans – enabling teams to modify responses to suit organizational needs, adapt in real time as incidents evolve, and focus on critical incidents before they become full-blown crises.

Headquartered in Massachusetts, USA, Resilient’s customers are some of the world’s most trusted organizations.

Learn more at resilientsystems.com.

Return Path

Return Path analyses the world’s largest collection of email data to show businesses how to stay connected to their audiences, strengthen their customer engagement, and protect their brands from fraud. Our data solutions help analysts understand consumer behaviour and market trends. We help mailbox providers and security providers around the world deliver great user experiences and build trust in email by ensuring that wanted messages reach the inbox while spam and abuse don’t. For more information on Return Path’s Email Fraud Protection solution, visit www.returnpath.com/StopEmailFraud.

Reversing Labs

Description coming soon!

Security Compass

Description coming soon!

Skybox Security

Description coming soon!


Bag Insert

Description coming soon!

The Media Trust

Description coming soon!

ThreatConnect, Inc.

ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com. ThreatConnect is proud to be an FS-ISAC Affiliate Member and Bronze Sponsor. Stop by our booth to learn more!


Description coming soon!


Off-site Dinner - Sunday Night

Veracode's cloud-based service and programmatic approach deliver a simpler and more scalable solution for reducing global application-layer risk. Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-criminals can find and exploit them, Veracode helps enterprises deliver innovation to market faster – without sacrificing security.

Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode secures hundreds of the world's largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and 25+ of the world's top 100 brands.


Vormetric (@Vormetric) is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. Vormetric helps over 1500 customers, including 17 of the Fortune 30, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data —anywhere it resides — with a high performance, market-leading solution set.

Additional Sponsors



Description coming soon!

Alvarez and Marsal

Beach Blast Cabana/Lounge - Monday Evening

Description coming soon!

Arbor Networks

Off-site Dinner - Sunday Night

Arbor Networks, Inc. helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor delivers market-leading security analytics for dynamic incident response and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business.


Beach Blast Cabana/Lounge - Monday Evening

Checkmarx (www.checkmarx.com) is a leading developer of software solutions used to identify, fix and block security vulnerabilities in web and mobile applications. The company's customers include 4 of the world's top 10 software vendors and many Fortune 500 and government organizations, including Samsung, Salesforce.com, Coca Cola and the US Army.

Checkmarx offers a suite of application security solutions from code development to live production:

  • Static Application Security Testing (SAST) - Identify and fix security vulnerabilities in the source code, at the early stages of the application development. The solution enables full automation by integration into the Software Development Lifecycle (SDLC).
  • Runtime Application Self Protection (RASP) - Block attacks in real time.
  • Secure Coding Education - Hands on secure coding training based on gamification, using your own code base and real life security vulnerabilities.


Full Page Handbook Ad
Networking Break - Tuesday AM

CloudPassage® Halo® is the world's leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts--at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

Contrast Security

Networking Area/Charging Stations

Contrast Security delivers the world’s fastest application security software that eliminates the single greatest security risk to enterprises today. Industry research shows that application security flaws are the leading source of data breaches. Contrast can be deployed, automatically discover applications and identify vulnerabilities within seven minutes. Relying on sensors instead of expensive security experts, Contrast runs continuously and is ten times more accurate than the competition. Unlike tedious, painful and slow legacy approaches, Contrast analyzes a complete portfolio of running applications simultaneously in real time at any scale. As a result, organizations can act faster against threats and immediately reduce risk. More information on Contrast Security can be found at www1.contrastsecurity.com.

Dell Secureworks

Sunday Cabana Rental

Dell SecureWorks understands cyber security is a critical focus for organizations, and technology alone cannot address the risks posed by cyber threats. Recognized as an industry leader, we combine elite intelligence and trusted security expertise, helping organizations solve complex security challenges, strengthen their security postures and reduce risk in the face of a dynamic threat landscape. Intelligence practices developed by our security experts enable a security methodology, ensuring you see the threat, thwart cyber-attacks and recover faster from security breaches. For more information visit www.secureworks.com.

ForeScout Technologies

All Day Break Sponsor

ForeScout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. ForeScout's CounterACT™ appliance dynamically identifies and evaluates network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security problems. As of January 1, 2015, more than 1,800 enterprises and government agencies have chosen ForeScout.


Exclusive Sunday Outdoor Welcome Reception
Monthly Email Sponsor - April

Description coming soon!

Guardian Analytics

Exclusive Closing Jeopardy Reception

Description coming soon!


Wednesday Lunch Sponsor

Description coming soon!


Bag Insert
Full Page Handbook Ad
Beach Blast Cabana/Lounge - Monday Evening
Sunday Cabana Rentals

Gurucul is changing the way enterprises protect themselves against fraud, insider threats and external intruders. The company’s user behavior analytics and identity access intelligence technology uses machine learning and predictive anomaly detection algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider fraud, IP theft, external attacks and more. Gurucul is based in Los Angeles. To learn more, visit us at www.gurucul.com


Beach Blast Cabana/Lounge - Monday Evening

Description coming soon!

Recorded Future

Exclusive Women's Networking Event

We arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.

Skyhigh Networks

Room Drop
Off-site Dinner (invite only) - Sunday Night
R&R Zone

Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Comcast, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring.


Beach Blast Cabana/Lounge - Monday Evening

Description coming soon!

Transmit Security

Green Water Station

Putting the customer first should be at the forefront of deploying any authentication solution. You want to allow them to do more in a much safer and convenient manner. As fraud continues to rise, it is important to find ways to overcome the increasing security challenges and still be innovative while offering your customers the best experience possible. Biometric techniques, new devices and new device sensors provide exciting possibilities. However, they can be expensive to deploy and manage. Combining these new technologies with the Transmit Solution’s context aware, flexible and open approach allows you to significantly improve security while offering a superior customer experience for authentication. Transmit has one of the best policy engines that make your authentication completely programmable without touching the application.The solution is a full omni channel (e.g. mobile, web, call center, branch) solution that provides for a common way to authenticate customers across channels. It also profiles customer behavior across channels to detect behavioral anomalies and invoke policy based secondary authentication. The end result is higher security, happier customers and increased usage of the applications for a better bottom line.

Yubico, Inc.


Description coming soon!



ZeroFOX is the leader in social media cyber security and has developed security technology that enables organizations to monitor and prevent social media cyber attacks, conduct proactive attack reconnaissance and safeguard their social assets. ZeroFOX Enterprise represents an evolution in security technology, custom engineered to identify both behavioral and technical threat indicators across cyber security’s newest and most dangerous threat vector: social media. Through a combination of cutting edge technology and expert security professionals, ZeroFOX provides solutions for the full spectrum of social media risk.