Thank You Sponsors!

 

Platinum Sponsors

 

Cisco Logo

CISCO
Cisco delivers intelligent cybersecurity for the real world. This vision is based on a threat-centric approach to security that reduces complexity while providing superior visibility, continuous control, and advanced threat protection across the entire attack continuum. With this new security model organizations can act smarter and more quickly before, during, and after an attack.

KPMG Logo

KPMG
KPMG LLP’s Cyber practice assists organizations in transforming their security, privacy, and continuity controls into business-enabling platforms while maintaining the confidentiality, integrity, and availability of critical business functions. The KPMG Cyber approach strategically aligns with our clients’ business priorities and compliance needs.

Our experienced IT security and forensic partners and professionals possess leading technical experience and are well regarded in their specialties. We have extensive experience building, delivering and supporting cybersecurity programs to Fortune 500 and Global 2000 companies across a multitude of industries. KPMG Cyber’s approach—Prevent, Improve, Detect, Respond—is designed to be simple and effective, and most importantly aligned with your business needs.

Crowdstrike Logo

CrowdStrike
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries. We Stop Breaches. Find out how: www.crowdstrike.com

Gurucul Logo

Gurucul
Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit http://www.gurucul.com/ and follow us on LinkedIn and Twitter.

 

Gold A Sponsors

 

Attivo Networks Logo

Attivo Networks
Attivo Networks® is the leader in deception for cybersecurity defense, providing real-time detection and forensic analysis of in-network threats and solutions for continuous threat management and incident response. The Attivo ThreatMatrix Deception Platform detects stolen credentials, ransomware, man-in-the-middle, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis, actionable alerts, and 3rd party integrations empower accelerated incident response and staff resource efficiency.

Flashpoint Logo

Flashpoint
Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations to make better decisions and mitigate risk. The company’s unique Deep & Dark Web data, expertise, and technology enable our customers to glean intelligence that informs risk and protects their ability to operate. Fortune 500 and government customers utilize Flashpoint’s intelligence across the enterprise, including bolstering cybersecurity, confronting fraud, detecting insider threats, enhancing physical security, assessing M&A opportunities, and addressing vendor risk and supply chain integrity. For corporations with limited experience availing themselves of Deep & Dark Web intelligence, Flashpoint has tailored offerings that deliver comprehensive reporting and monitoring on their behalf. Flashpoint is backed by Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.

 

Gold B Sponsors

 

Cylance Logo

Cylance
Cylance® is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can’t, while using a fraction of the system resources associated with endpoint antivirus and detect and respond solutions that are deployed in enterprises today. For more information and thought provoking blogs, visit: www.cylance.com

Ey Logo

EY
EY Advisory combines a wealth of consulting capabilities — strategy, customer, finance, IT, supply chain, people advisory, program management and risk — with a complete understanding of a client’s most complex issues and opportunities, such as digital disruption, innovation, analytics, cybersecurity, risk and transformation. Visit ey.com to learn more.

Invincea Logo

Invincea
Invincea’s endpoint protection minimizes the trade-off executives are forced to make between security and business performance. Over 25,000 customers rely on Invincea to prevent and detect threats while enabling their workforces to conduct business—in the office or on the road. Invincea protects endpoints by blocking known and unknown malware without signatures, including threats that originate from Weaponized Office docs and spear phishing emails.
With Invincea, your workforce won’t know it’s there, but you will.

Protiviti Logo

Protiviti
Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. Protiviti and our independently owned Member Firms serve clients through a network of more than 70 locations in over 20 countries. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies.

 

Silver Sponsors

 

Acalvio Logo

Acalvio
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation. A Silicon Valley based company, Acalvio is led by an experienced team with a track record of innovation and market leadership and backed by marquee investors.

Axiad Logo

Axiad IDS
The U.S. healthcare industry is a top target for data breaches, to the tune of $6.2 billion a year. According to the Ponemon Institute, nearly 90 percent of healthcare organizations represented in a recent study had a data breach in the past two years, and nearly half had more than five data breaches in the same time period. Beyond the financial risk, there are also significant threats to patient privacy and trust. For this reason, healthcare providers face an increasing number of government mandates to protect against breaches, some of which bring costly fines for non-compliance.

Axiad IDS, the leading provider of trusted identities for enterprise, government and financial organizations, is helping healthcare organizations manage the complexity of these mandates. In particular, section 3.5 of NIST SP800-171 which demands a multi-factor solution for identification and authentication. Axiad IDS’ fully hosted cloud offering, enables quick compliance with even the most rigorous mandates. And it does so with reliable and predictable cost containment. Axiad ID Cloud eliminates the potential for human error by automating the set-up, while getting organizations compliant and operational in days versus months. To learn more, visit Axiad IDS at Booth #16.

Cigital Logo

Cigital
Cigital is one of the world’s largest application security firms. We go beyond traditional testing services to help organizations identify, remediate, and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services, and products tailored to fit your specific needs. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.
For more information, visit us at https://www.cigital.com/.

Coalfire Logo

Coalfire
Coalfire is the trusted leader in cybersecurity risk management and compliance services. We offer advisory, technical assessments and testing services to organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Our approach addresses your specific cyber risk challenges while developing a long-term strategy and partnership to prevent security breaches and data theft.

LightCyber Logo

LightCyber
LightCyber is a leading provider of Behavioral Attack Detection solutions that provide accurate and efficient security visibility into attacks that have slipped through the cracks of traditional security controls. With LightCyber, health care organizations can detect network attackers early to curtail or minimize a data breach, prevent the network spread of ransomware or protect network-connected medical equipment. The LightCyber Magna™ platform is the first security product to integrate user, network and endpoint context to provide security visibility into a range of attack activity. Founded in 2012 and led by world-class cyber security experts, the company’s products have been successfully deployed by top-tier customers around the world in health care and other industries.

Resilient Logo

Resilient
Resilient, an IBM Company, empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s industry-leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, smarter, and more efficiently.

Part of IBM Security, the Resilient IRP also integrates security technologies into a single hub and provides easy workflow customization and process automation. With Resilient, security teams can have best-in-class response capabilities.

Resilient has more than 100 global customers, including 30 of the Fortune 500 and partners in more than 20 countries. Learn more at www.resilientsystems.com.

RiskRecon Logo

RiskRecon
“RiskRecon, your trusted source for third-party risk information, provides a SaaS platform that delivers frequent, comprehensive and actionable security performance measurements and management tools to more effectively manage the risk reality of increasingly interconnected organizations.

Using proprietary data gathering techniques, RiskRecon creates a comprehensive risk management view of an extended enterprise’s public IT footprint. Clients rely on RiskRecon to bring greater transparency, accountability and productivity to their third-party risk management processes. And, they trust that RiskRecon’s continuous monitoring solution employs only ethical techniques – no proprietary vendor data, no permissions and no invasive scans. Learn more at www.riskrecon.com.”

SWRX Logo

SecureWorks
SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.”

To learn more, visit www.secureworks.com and https://www.secureworks.com/about/partners

Synack Logo

Synack
The Synack platform leverages the best combination of humans and technology to create an offensive security service that delivers ongoing and on-demand vulnerability intelligence. Synack’s security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment. For more information, visit www.synack.com.

Tripwire Logo

Tripwire
Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operations solutions for enterprises, service providers and government organizations. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.

 

Grand Rounds Sponsors

 

Booz Allen Hamilton Logo

Booz Allen Hamilton
Booz Allen is the leading provider of advanced cyber security services to many government agencies, including those involved in regulating and providing health technology and services. This experience gives us unique capabilities and insight into the cyber security challenges facing the US National Health community.

Cymmetria Logo

Cymmetria
Founded in 2014, Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Cymmetria’s cyber deception solution, MazeRunner, is at the forefront of deception-based cybersecurity technology.
MazeRunner gives organizations a platform for creating effective deception stories, which create realistic environments for hunting cyber attackers. Deception stories are comprised of breadcrumbs and decoys; they lead attackers to believe that they have successfully gained access to a target machine. Having gained a false sense of security, attackers reveal their attack tools and methods, which defenders are then able to document and analyze. Finally, MazeRunner communicates with an organization’s existing defense infrastructure, exporting information that allows for the creation of attack signatures.
Fully customizable and easily deployed, MazeRunner does not burden organizational networks or IT security teams. It is a dynamic solution that helps organizations defend their valuable assets from ever-changing cyber threats.
Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. The company is backed by leading investors such as Y Combinator and Sherpa Capital, and has already gained traction throughout the InfoSec community and global media.

Illusive Logo

Illusive Networks
illusive networks is the first purpose-built Distributed Deception Platform. Its award winning, patent pending Deceptions Everywhere technology neutralizes targeted and Advanced Persistent Threats by creating a deceptive layer across the entire network – agentlessly deployed on every endpoint, server, and network component – with an endless source of false information. illusive networks disrupts and detects breaches with source-based and real time forensics and without interrupting business. For more information, please visit us at www.illusivenetworks.com

Palo Alto Logo

Palo Alto Networks
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. Find out more at www.paloaltonetworks.com.

Security Scorecard
SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary SaaS platform helps enterprises gain operational command of the security posture for themselves and across all of their partners, and vendors. It provides continuous, non-intrusive monitoring for any organization including third and fourth parties. The platform offers a breadth and depth of critical data points not available from any other service provider including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering and Passwords Exposed.

Skycure Logo

Skycure
Skycure offers the most complete, accurate and effective mobile threat defense (MTD) solution, delivering unparalleled depth of threat intelligence to predict, detect and protect against the broadest range of existing and unknown threats. Skycure’s predictive technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and vulnerability exploits while preserving user privacy and experience. Skycure’s mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise.

ThinAir Logo

ThinAir
ThinAir’s mission is to provide companies security through simplicity. Using the platform, organizations instantly gain complete visibility, context and control over all their data no matter where it goes, without any user friction. ThinAir delivers security through simplicity against insider threats, automatic data exfiltration, and human error, and can be deployed in seconds by organizations of any size or architecture. Learn more at www.thinair.com.

Veriphyr Logo

Veriphyr
Veriphyr User Behavior Analytics – Understanding the Haystack Reveals the Needles
Efficiently detect insider breaches by transcending the Sisyphean task of modeling each new attack. Veriphyr automatically identifies insider attacks by understanding your organization’s “”haystack”” – the legitimate work activity of your employees, contractors and providers within your applications, databases, and file servers.
Learn how understanding the operational context of user work behavior in healthcare’s complex, dynamic environment provides the key to proactively detecting the “needles” – the malicious behavior of insiders and hackers using compromised credentials.
Discover how Veriphyr analytics enhances your existing security investments with a continuous automated structural analysis of your organization’s operations using data you already collect on the activity of your employees, contractors, and providers.

 

Additional Sponsors

 

Agari
“Agari, a leading cybersecurity company, is trusted by leading Fortune 1000 companies, including 6 of the top 10 banks, to protect their enterprise, partners and customers from advanced email phishing attacks.

The Agari Email Trust Platform™ is the industry’s only solution that ‘understands’ the true sender of emails, leveraging the company’s proprietary, global email telemetry network and patent-pending, predictive Agari Trust Analytics to identify and stop phishing attacks.

The platform powers Agari Enterprise Protect, which help organizations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands.

Agari is a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security. Learn more at http://www.agari.com and follow us on Twitter @AgariInc.”
Shared Services

Global Cyber Alliance

Mimecast

H-ISAC

Perch Security

SecureWorks
SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.

To learn more, visit www.secureworks.com and https://www.secureworks.com/about/partners

Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Translate »