H-ISAC teams with innovative cybersecurity solution providers to become integral architects for the future of Healthcare. Healthcare members desire vendor partners willing to invest in them and support their peers as they grow and share solutions for the ever changing landscape ahead. Vendors that will be enabling them to increase resiliency and aid in direction amongst the ever darkening and turbulent seas of cybersecurity.
Navigator Sponsorship Program
H-ISAC offers the benefits of its customized Navigator program to interested vendors or solutions providers to the Security sector within the Healthcare/Public Health (HPH) sub-sector. Participation in the Navigator Program is designed to enhance the understanding of sector progress in information sharing and the tools used to enhance security.
In today’s Cyber Security universe, solution providers can play an important role in navigating and educating active members of the HPH security vertical. These firms provide products and services designed to make the HPH sector stronger and safer, and an essential part of H-ISAC’s ability to achieve its goals.
If you are interested in becoming a Navigator, or learning more and what is included with the Navigator Program, please click the buttons below.
**Click to download the Navigator Agreement, sign and email the PDF to the contact point listed on the agreement.
Current H-ISAC Navigators
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with nearly 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine. For more visit Axonius.com.
Booz Allen Hamilton
For more than 100 years, business, government, and military leaders have turned to Booz Allen Hamilton to solve their most complex problems. As a consulting firm with experts in analytics, digital, engineering and cyber, we help organizations transform. We are a key partner on some of the most innovative programs for governments worldwide and trusted by the most sensitive agencies. We work shoulder to shoulder with clients, using a mission-first approach to choose the right strategy and technology to help them realize their vision.
With global headquarters in McLean, Virginia, our firm employs about 27,200 people globally, and had revenue of $6.70 billion for the 12 months ended March 31, 2019. To learn more, visit www.boozallen.com. (NYSE: BAH)
Today, the biggest risks to patient care come from disruptions or downtime to clinical applications and medical devices caused by cyberattacks such as data breaches and ransomware.
In September of 2017, we founded Censinet with a vision to take these risks out of healthcare. Our mission is to become the trusted network for third-party vendor risk management in U.S. healthcare by 2022.
With input and guidance from a broad cross-section of healthcare providers and leaders, we set out to understand how big the issue really was for providers and vendors. We realized quickly that the old processes, workflows and technical approaches that were being used were part of the problem.
So we’ve taken on the status quo and disrupted how third-party risk is managed. We created the healthcare industry’s first collaborative cloud platform for third-party vendor risk management, built exclusively for healthcare providers by providers and healthcare experts.
Our platform is based on our core beliefs:
– Risk is not a technical problem, it’s a business problem.
– Risk never sleeps. It hides patiently in infusion pumps, quietly lurks on hospital networks and in the cloud, and says good morning at the end of every shift.
– The enemy of risk is transparency.
These beliefs define who we are and drive why we are. They’re foundational to our values and DNA. They also drive us to create a better way for third-party risk management – one that is transparent, immediate, and always on.
Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected. An integral part of our DNA is creating long-lasting customer partnerships, working together to identify our customers’ needs and provide solutions that fuel their success.
We have preserved this keen focus on solving business challenges since our founding in 1984. Len Bosack and wife Sandy Lerner, both working for Stanford University, wanted to email each other from their respective offices, but technological shortcomings did not allow such communication. A technology had to be invented to deal with disparate local area protocols, and as a result of solving their challenge, the multiprotocol router was born.
“Deloitte” is the brand under which tens of thousands of dedicated professionals in independent firms throughout the world collaborate to provide audit & assurance, consulting, risk and financial advisory, risk management, tax, and related services to select clients. These firms are members of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”). Each DTTL member firm provides services in particular geographic areas and is subject to the laws and professional regulations of the particular country or countries in which it operates.
Each DTTL member firm is structured in accordance with national laws, regulations, customary practice, and other factors, and may secure the provision of professional services in its territory through subsidiaries, affiliates, and other related entities. Not every DTTL member firm provides all services, and certain services may not be available to attest clients under the rules and regulations of public accounting.
DTTL and each DTTL member firm are legally separate and independent entities, which cannot obligate each other. DTTL and each DTTL member firm are liable only for their own acts and omissions, and not those of each other. DTTL (also referred to as “Deloitte Global”) does not provide services to clients.
Flashpoint delivers Business Risk Intelligence (BRI) that empowers organizations worldwide to combat threats and adversaries.
Fueled by a combination of sophisticated technology, advanced data collections, and human-powered analysis, Flashpoint tailors its offerings to customer requirements.
The result is meaningful intelligence that enables large enterprises and the public sector to bolster cybersecurity, confront fraud, combat insider threats, enhance physical security, and address vendor risk and supply chain integrity.
HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer. Our platform is the industry standard for hacker-powered security. We partner with the global hacker community to surface the most relevant security issues of our customers before they can be exploited by criminals. HackerOne is headquartered in San Francisco with offices in London, New York City, Singapore, and the Netherlands. Investors include Benchmark, New Enterprise Associates, Dragoneer Investments, and EQT Ventures.
HYPR is the leading provider of True Passwordless Security™
Backed by Comcast, Mastercard, and Samsung, HYPR is the first authentication platform designed to eliminate passwords and shared secrets across the enterprise. With HYPR, businesses are finally able to deploy Desktop MFA and Strong Customer Authentication to millions of users worldwide.
Eliminate The Target.
Irdeto is the world leader in digital platform security, protecting platforms and applications for video entertainment, video games, connected transport and IoT connected industries. Irdeto’s solutions and services enable customers to protect their revenue, create new offerings and fight cybercrime. With 50 years of expertise in security, Irdeto’s software security technology and cyberservices protect over 5 billion devices and applications for some of the world’s best-known brands. With a unique heritage in security innovation, Irdeto is the well-established and reliable partner to build a secure future where people can embrace connectivity without fear. Please visit Irdeto at www.irdeto.com.
Since IronNet was founded in 2014, our mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that people, companies, and nations can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threats targets in their networks and share that information with peers so that all members can collectively defend against that threat.
Netskope was founded on four key tenets — these remain true today:
– Cloud services are how people work and collaborate.
They no longer seek IT’s permission to use those services.
– These services can be accessed from anywhere.
Whether that’s on or off your network, via mobile devices, or through sync clients.
– These services are written using APIs.
Security tools that don’t understand APIs are no longer as relevant.
– IT can no longer block cloud services.
Instead, they need a way to say “yes.”
Our mission is to evolve security for the way people work
We ensure each day is safer and more secure than the one before. – Every day we work to anticipate, intercept, and deflect a world of threats—your cybersecurity partner of choice, protecting our digital way of life.
We innovate relentlessly – Automation and machine learning are creating new possibilities in threat prediction and prevention, and we are harnessing our vast amounts of data to provide the most comprehensive security platform available.
Trusted today, prepared for tomorrow. – We are enabling businesses to transition to the cloud without fear, while our pioneering next-generation firewall helps tens of thousands of organizations protect billions of people worldwide.
It’s never been easier to connect and communicate with the world. Enterprises do everything online, across all kinds of digital platforms outside of the network. Social media, web, email, mobile apps, SMS, etc… With all of that exposure, it’s also never been easier for bad actors to attack your employees, customers, and brands. And when they do, you find you don’t have the power to stop it.
PhishLabs helps you solve this problem. We provide external threat intelligence, incident response, and security awareness training solutions that mitigate digital risks and give you control you need to protect your enterprise, customers, and brands.
The highest-fidelity intelligence is what’s already captured within the four walls of your organization. TruSTAR breaks down silos across tools and teams to surface the most relevant data, helping you speed investigation and response times.
At TruSTAR, we’re obsessed with getting the most value from your threat intelligence data. We believe that when analysts can integrate threat intelligence data into every stage of their workflow, they can make better decisions faster.
Founded in 2014 by a mix of seasoned entrepreneurs, former security and intelligence specialists, and killer product developers, TruSTAR is focused on building the best threat intelligence platform for enterprise cybersecurity.
Our founders have been in the security and infrastructure field since the late 1990s and friends since the mid-2000s. They wondered why email still had no mechanism to address its “original sin,” which is the inability to authenticate the sender of an email. Without email authentication, domain owners have no control over how their organization name and domain address are used. And mail recipients are left on the defensive, never knowing for sure if the sender of a message is being impersonated and if they can trust an email.
Protect your brand and customers against phishing, domain spoofing, and fake email. Fully automated DMARC enforcement. Guaranteed. Test your domain.
VMware software powers the world’s complex digital infrastructure. The company’s cloud,
networking and security, and digital workspace offerings provide a dynamic and efficient digital
foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered
in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough
innovations to its global impact. For more information, please visit