The HEALTH-ISAC NAVIGATOR PROGRAM provides business networking opportunities which is achieved through supporting educational related activities. Solution driven organizations that advocate for H-ISAC increasing resiliency across the health ecosystem, in the face of ongoing cybersecurity and other security threats, are prime candidates for participation in this program.
Navigator Sponsorship Program
Joining the Navigator program signifies that you are a solution provider, committed to sharing high level thought leadership content to H-ISAC’s global membership. By becoming a “Navigator,” your organization will be offered UNIQUE business networking opportunities with all of H-ISAC’s Global members.
If you are interested in becoming a Navigator, or learning more and what is included with the Navigator Program, please click the buttons below.
**Click to download the Navigator Agreement, sign and email the PDF to the contact point listed on the agreement.
Current H-ISAC Navigators
AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first platform that enables security teams to test and measure the effectiveness of their security controls and staff. The AttackIQ Security Optimization Platform supports the MITRE ATT&CK framework, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying defenses work as expected. AttackIQ is trusted by leading companies around the world to improve security program effectiveness and productivity. For more information visit www.attackiq.com. For more information visit www.attackiq.com.
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with nearly 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine. For more visit Axonius.com.
Booz Allen Hamilton
For more than 100 years, business, government, and military leaders have turned to Booz Allen Hamilton to solve their most complex problems. As a consulting firm with experts in analytics, digital, engineering and cyber, we help organizations transform. We are a key partner on some of the most innovative programs for governments worldwide and trusted by the most sensitive agencies. We work shoulder to shoulder with clients, using a mission-first approach to choose the right strategy and technology to help them realize their vision.
With global headquarters in McLean, Virginia, our firm employs about 27,200 people globally, and had revenue of $6.70 billion for the 12 months ended March 31, 2019. To learn more, visit www.boozallen.com. (NYSE: BAH)
Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected. An integral part of our DNA is creating long-lasting customer partnerships, working together to identify our customers’ needs and provide solutions that fuel their success.
We have preserved this keen focus on solving business challenges since our founding in 1984. Len Bosack and wife Sandy Lerner, both working for Stanford University, wanted to email each other from their respective offices, but technological shortcomings did not allow such communication. A technology had to be invented to deal with disparate local area protocols, and as a result of solving their challenge, the multiprotocol router was born.
Flashpoint delivers Business Risk Intelligence (BRI) that empowers organizations worldwide to combat threats and adversaries.
Fueled by a combination of sophisticated technology, advanced data collections, and human-powered analysis, Flashpoint tailors its offerings to customer requirements.
The result is meaningful intelligence that enables large enterprises and the public sector to bolster cybersecurity, confront fraud, combat insider threats, enhance physical security, and address vendor risk and supply chain integrity.
Forescout is the leader in Enterprise of Things security, offering a holistic platform that continuously identifies, segments and enforces compliance of every connected thing across any heterogeneous network. The Forescout platform is the most widely deployed, scalable, enterprise-class solution for agentless device visibility and control. It deploys quickly on your existing infrastructure –without requiring agents, upgrades or 802.1X authentication. Fortune 1000 companies and government organizations trust Forescout to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity.
Don’t just see it. Secure it. Visit forescout.com to learn how Forescout provides active defense for the Enterprise of Things.
HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer. Our platform is the industry standard for hacker-powered security. We partner with the global hacker community to surface the most relevant security issues of our customers before they can be exploited by criminals. HackerOne is headquartered in San Francisco with offices in London, New York City, Singapore, and the Netherlands. Investors include Benchmark, New Enterprise Associates, Dragoneer Investments, and EQT Ventures.
HYPR is the leading provider of True Passwordless Security™
Backed by Comcast, Mastercard, and Samsung, HYPR is the first authentication platform designed to eliminate passwords and shared secrets across the enterprise. With HYPR, businesses are finally able to deploy Desktop MFA and Strong Customer Authentication to millions of users worldwide.
Eliminate The Target.
IntSights is revolutionizing cybersecurity operations with the industry’s only all-in-one external threat protection platform designed to neutralize cyberattacks outside the wire. Our unique cyber reconnaissance capabilities enable continuous monitoring of an enterprise’s external digital profile across the clear, deep, and dark web to identify emerging threats and orchestrate proactive response. Tailored threat intelligence that seamlessly integrates with security infrastructure for dynamic defense has made IntSights one of the fastest-growing cybersecurity companies in the world. IntSights has offices in Amsterdam, Boston, Dallas, New York, Singapore, Tel Aviv, and Tokyo. To learn more, visit: intsights.com or connect with us on LinkedIn, Twitter, and Facebook.
Irdeto is the world leader in digital platform security, protecting platforms and applications for video entertainment, video games, connected transport and IoT connected industries. Irdeto’s solutions and services enable customers to protect their revenue, create new offerings and fight cybercrime. With 50 years of expertise in security, Irdeto’s software security technology and cyberservices protect over 5 billion devices and applications for some of the world’s best-known brands. With a unique heritage in security innovation, Irdeto is the well-established and reliable partner to build a secure future where people can embrace connectivity without fear. Please visit Irdeto at www.irdeto.com.
Since IronNet was founded in 2014, our mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that people, companies, and nations can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threats targets in their networks and share that information with peers so that all members can collectively defend against that threat.
MedSec is the exclusively to the unique challenge of medical device and healthcare cybersecurity. MedSec partners with medical device manufacturers and healthcare delivery organizations to help address cybersecurity in medical devices throughout all stage of the device lifecycle. With medical device manufacturers MedSec leverages its cybersecurity expertise, coupled with its intimate knowledge of the healthcare regulatory and operating environments to offer support in design, architecture, verification, penetration testing, risk assessments, regulatory filings, and execution of security best practices in the development of new medical devices as well legacy systems. With Healthcare Delivery Organizations MedSec leverages its intimate knowledge of medical devices to offer software solutions for cybersecurity and asset management of connected medical devices in hospitals. MedSec is an active participant in helping move the cybersecurity healthcare community forward, and participates in a number of standards and best practice committees involved in furthering cybersecurity for medical products.
We ensure each day is safer and more secure than the one before. – Every day we work to anticipate, intercept, and deflect a world of threats—your cybersecurity partner of choice, protecting our digital way of life.
We innovate relentlessly – Automation and machine learning are creating new possibilities in threat prediction and prevention, and we are harnessing our vast amounts of data to provide the most comprehensive security platform available.
Trusted today, prepared for tomorrow. – We are enabling businesses to transition to the cloud without fear, while our pioneering next-generation firewall helps tens of thousands of organizations protect billions of people worldwide.
Perch Security is on a mission to empower organizations of all sizes with advanced cybersecurity previously available only to large institutions. Founded by veteran security practitioners, Perch detects cyber threat activity in network and logs with next-generation SIEM and a 24/7 Security Operations Center (SOC), letting users side-step daunting challenges around expensive hardware and in-house analysts. Cloud integrations, reporting, and community threat intelligence make Perch’s award-winning platform ideal for H-ISAC members. Perch is the only vendor with a dedicated, embedded analyst in the H-ISAC Threat Operations Center. Transparency, education and community-building are central to the company’s culture. Perch is headquartered in Tampa Florida, opening offices in Houston and Denver since its founding in 2016, and currently manages over one million endpoints.
It’s never been easier to connect and communicate with the world. Enterprises do everything online, across all kinds of digital platforms outside of the network. Social media, web, email, mobile apps, SMS, etc… With all of that exposure, it’s also never been easier for bad actors to attack your employees, customers, and brands. And when they do, you find you don’t have the power to stop it.
PhishLabs helps you solve this problem. We provide external threat intelligence, incident response, and security awareness training solutions that mitigate digital risks and give you control you need to protect your enterprise, customers, and brands.
Your business is more complex than ever. You need tools to tame that complexity. Unfortunately, many products produce more noise than signal. At QOMPLX, we are experts in building high-speed, highly-scaled event processing solutions. Our technology integrates all of your critical data sources to allow you to make better, more data-driven decisions. QOMPLX’s advanced algorithms, simulations, and machine learning tools help the world’s most demanding firms solve the toughest challenges in cyber security, insurance underwriting and finance. Find out what QOMPLX can do for you.
RiskIQ is the leader in attack surface management, providing the most comprehensive internet intelligence that enables organizations to discover unknowns and investigate threats across its digital presence. With a spike in attacks against healthcare organizations, visibility into unknown, unprotected, misconfigured, and unmonitored digital assets is imperative. RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and protect the business, brand, and customers.
RiskRecon, a Mastercard company, delivers the world’s easiest path to understanding and acting on third-party cyber risk. RiskRecon provides security and risk teams with AI-powered, continuous monitoring capabilities so companies of any size can know their cybersecurity posture through automated risk assessments that are custom-tuned to match an organization’s risk appetite.
With a 98.5% accuracy rate, RiskRecon offers the only solution in the cybersecurity risk ratings market that delivers risk-prioritized action plans specifically so teams can achieve dramatically better risk outcomes as they scale third-party risk management programs.
Built by practitioners for practitioners, RiskRecon offers solutions for organizations of any size, in any industry, worldwide, to prevent the multi-party data loss events from impacting customers and their growing ecosystem of third and fourth parties.
SafeBreach is the leader in Breach and Attack Simulation. The company’s groundbreaking platform provides a “hacker’s view” of an enterprise’s security posture to proactively predict attacks, validate security controls and improve SOC analyst response. SafeBreach automatically executes thousands of breach methods from an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. Headquartered in Sunnyvale, California, the company is funded by Sequoia Capital, Deutsche Telekom Capital Partners, Draper Nexus, Hewlett Packard Pathfinder, PayPal, and investor Shlomo Kramer. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.
The highest-fidelity intelligence is what’s already captured within the four walls of your organization. TruSTAR breaks down silos across tools and teams to surface the most relevant data, helping you speed investigation and response times.
At TruSTAR, we’re obsessed with getting the most value from your threat intelligence data. We believe that when analysts can integrate threat intelligence data into every stage of their workflow, they can make better decisions faster.
Founded in 2014 by a mix of seasoned entrepreneurs, former security and intelligence specialists, and killer product developers, TruSTAR is focused on building the best threat intelligence platform for enterprise cybersecurity.
Our founders have been in the security and infrastructure field since the late 1990s and friends since the mid-2000s. They wondered why email still had no mechanism to address its “original sin,” which is the inability to authenticate the sender of an email. Without email authentication, domain owners have no control over how their organization name and domain address are used. And mail recipients are left on the defensive, never knowing for sure if the sender of a message is being impersonated and if they can trust an email.
Protect your brand and customers against phishing, domain spoofing, and fake email. Fully automated DMARC enforcement. Guaranteed. Test your domain.
VMware software powers the world’s complex digital infrastructure. The company’s cloud,
networking and security, and digital workspace offerings provide a dynamic and efficient digital
foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered
in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough
innovations to its global impact. For more information, please visit