
Interested in Sponsoring?
Visit the Sponsor PortalAll Sponsors

Abnormal Security
Abnormal Security provides the leading cloud-native email security platform that leverages behavioral data science to stop modern email attacks. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships and business processes to stop the most sophisticated cyber-attacks.
Back to Top

Akamai
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through solutions that extend the power of their entire architecture. Akamai keeps decisions, apps, and experiences closer to users — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access, and video delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring.
Back to Top

AppOmni
AppOmni is a leading provider of SaaS Security Management software. Its patented technology scans APIs, security controls, and configuration settings to compare the current state of enterprise SaaS deployments against best practices and business intent. AppOmni was founded by top security practitioners and is trusted by many of the world’s largest enterprises across technology, healthcare, banking, and security. For more information, please visit https://appomni.com.
Back to Top

Armis
Armis is the leading agentless, enterprise-class device security platform, designed to protect organizations from cyberthreats created by the onslaught of unmanaged and IoT devices. Fortune 1000 companies trust our unique out-of-band sensing technology to discover and analyze all managed, unmanaged, un-agentable and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides unparalleled device discovery and intelligence, real-time continuous device behavior analysis and threat detection to identify and stop threats or secure suspicious or malicious devices.
Back to Top

Axonius
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with nearly 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine.
Back to Top

Balbix
Balbix is the cybersecurity posture automation company. We use AI to reinvent how the world’s leading organizations reduce the likelihood and impact of a breach. With the advanced analytics and automation of the Balbix Security Cloud, security teams can accurately inventory their cloud and on-premise assets, conduct risk-based vulnerability management, and quantify their cyber risk in monetary terms. As a result, security leaders can measure and improve SLA compliance and other key metrics in real time, demonstrate the ROI of their cybersecurity program, and confidently report on their security posture to the board of directors and other key stakeholders.
Back to Top

BlueVoyant
At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem.
Accuracy. Actionability. Timeliness. Scalability.
Founded in 2017 by former Fortune 500 executives and former government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tel Aviv, San Francisco, Manila, Toronto, London, Latin America and Budapest. Visit www.bluevoyant.com
Back to Top

Boost Security
Boost Security is a transformative cyber security startup on a mission to ensure that we all trust the code that we build and use every day. We are going not only going to boost your confidence in developing secure software by frictionless technology integrated directly into your build processes, but also your confidence in developing software securely by securing the software supply chain from keyboard to production.
Back to Top

Clearwater
Clearwater is the leading provider of cybersecurity, risk management, and HIPAA compliance software, consulting, and managed services for the healthcare industry. Our solutions enable organizations to avoid preventable breaches, protect patients and their data, meet regulatory requirements, and optimize cybersecurity investments. More than 400 healthcare organizations, including 70 of the nation’s largest health systems and a large universe of physician groups and digital health companies, trust Clearwater to meet their cybersecurity and compliance needs. Their belief in our expertise and capabilities has helped Clearwater earn recognition as healthcare’s top-rated Security Advisors and Compliance & Risk Management Solution in Black Book Market Research’s annual industry survey.
Back to Top

ConnectWise
ConnectWise is the world’s leading software company dedicated to the success of IT solution providers through unmatched software, services, community, and marketplace of integrations. ConnectWise’s innovative, integrated, and security-centric platform – Asio™ – provides unmatched flexibility that fuels profitable, long-term growth for partners. ConnectWise enables ITSPs to drive business efficiency with automation, IT documentation, and data management capabilities. And increase revenue using remote monitoring, cybersecurity, and backup and disaster recovery technologies. For more information, visit connectwise.com
Back to Top

CORL Technologies
CORL is a leading provider of vendor risk management solutions for the healthcare industry. CORL gets results by scaling organizational and vendor risk programs through our healthcare vendor risk clearinghouse solution, dashboard reporting that business owners can understand, and proven workflows that drive measurable risk reduction. CORL accelerates the speed of vendor risk assessments and holds vendors accountable for remediating risk exposures. To learn more, visit corltech.com and follow us on LinkedIn.
Back to Top

CrowdStrike
CrowdStrike, a global cybersecurity leader, is redefining security for the cloud era with an endpoint and workload protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates 5 trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform. There’s only one thing to remember about CrowdStrike: We stop breaches. Learn more: https://www.crowdstrike.com/.
Back to Top

Cybellum
Cybellum’s product security platform enables medical device manufacturers to keep the products they build secure and compliant, every single moment of their life.
With Cybellum, product security teams can finally manage cyber risk continuously, whichever new threat arises. From living SBOMs, to automated vulnerability management and continuous monitoring, Cybellum enables teams to make sure all their class 3 devices are secure by design, and stay that way. To learn more visit www.cybellum.com.
Back to Top

CyberMDX, a Forescout Company
CyberMDX is an IoT security leader dedicated to protecting the quality care of health delivery worldwide. They provide cloud-based cyber security solutions that support the advancement of The Internet of Medical Things. The CyberMDX solution identifies endpoints and assesses vulnerabilities to detect, respond to, and prevent cyber incidents. Deployed worldwide, CyberMDX is designed to integrate with our customers’ existing environments through its scalable, easy-to-deploy and agentless solution.
Back to Top

Cyware
Cyware helps cybersecurity teams build virtual cyber fusion centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response. Cyware is transforming security operations by delivering the industry’s only Virtual Cyber Fusion Center Platform with next-generation SOAR (security orchestration, automation, and response) and threat intelligence (TIP) solutions for large and small enterprise security teams, ISACs/ISAOs, MSSPs, and government agencies – so that organizations can reduce costs and analyst burnout, and increase speed and efficiency.
Back to Top

Dazz
Dazz is the cloud security remediation platform for smart security and development teams. With Dazz, organizations automate the cloud remediation process, keep engineers on track, and secure their cloud and dev environments. Founded by security visionaries from Microsoft, Armis, Adallom and Claroty, and backed by leading institutions Insight Partners, Greylock, Index Ventures and Cyberstarts, Dazz is being adopted by cloud-forward Fortune 500 and leading technology companies.
Back to Top

Deloitte
Deloitte Cyber. We don’t just perform cyber risk management. We help you enhance the security, visibility, and privacy of your organization’s DNA through program design, implementation, operation, and response services. This, coupled with our deep industry and mission knowledge, strengthens your ability to protect and defend your most valuable assets, facilitate secure digital transformation efforts, and adapt rapidly to emerging threats.
Back to Top

EY
Across the world, health care systems and entities are under unprecedented pressure. Spiraling costs, exacerbated by aging populations and emerging market growth, are bringing newfound focus on value and outcomes. Mobile health and data analytics promise to revamp care delivery but are also bringing in competitors from other sectors. For governments, payers and providers, these trends create a host of challenges: extracting insights from “big data,” partnering in new ways, boosting operating efficiencies and more.
EY’s Global Health Sector brings together a worldwide network of more than 10,000 sector-focused assurance, consulting, strategy, tax and transaction professionals with a range of health care and business backgrounds. Our wide-reaching network allows us to rapidly share leading practices and solutions around the globe and deploy diverse delivery teams to meet your needs.
Back to Top

Fortinet
Fortinet Healthcare provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines security processors, an intuitive operating system, and applied threat intelligence to deliver broad protection and visibility to every network segment, device, and appliance, whether virtual, in the cloud, or on-premises. Security resources automatically synchronize to enforce policies, coordinate automated responses to threats, and easily manage different security solutions and products through a single console. healthcare@Fortinet.com
Back to Top

Fortress
Fortress Information Security provides cyber risk management solutions for mission critical supply chains and critical infrastructure including services for vendor risk management, asset risk management, product security, file integrity, procurement, continuous monitoring, assessments, and remediation to support overall zero trust supply chain cyber security and integrity.
Fortress guides complex enterprises to discover, prioritize, and monitor third-party supply chain cyber risks. We are the only company offering software integrated into a customizable platform to manage OT, IT and third-party technology threats into a single end-to-end solution.
Back to Top

Guidehouse
Guidehouse is a leading global provider of consulting services to the public sector and commercial markets, with broad capabilities in management, technology, and risk. The company’s Health segment integrates consulting and outsourcing expertise to help hospitals and health systems, government agencies, life sciences and retail companies, payers, and other organizations solve their most complex issues and deliver innovative services to their communities. With 12 KLAS #1 rankings, Guidehouse was also ranked 2021’s third largest healthcare management consulting firm by Modern Healthcare. Visit the Guidehouse Center for Health Insights for healthcare payment, operational, and consumer disruption insights and solutions.
Back to Top

Hunters
The Hunters SOC platform empowers security teams to automatically identify and respond to incidents that matter across their entire attack surface, at a predictable cost. Through built-in detection engineering, data correlation, and automatic investigation, we help teams overcome volume, complexity, and false positives. Hunters mitigates real threats faster and more reliably than SIEMs, ultimately reducing customers’ overall security risk.
Back to Top

Intel 471
Intel 471 empowers enterprises, government agencies, and other organizations to win the cybersecurity war using near-real-time insights into the latest malicious actors, relationships, threat patterns, and imminent attacks relevant to their businesses.
The company’s TITAN platform collects, interprets, structures, and validates human-led, automation-enhanced results. Clients across the globe leverage this threat intelligence with our proprietary framework to map the criminal underground, zero in on key activity, and align their resources and reporting to business requirements. Intel 471 serves as a trusted advisor to security teams, offering ongoing trend analysis and supporting your use of the platform. Learn more at https://intel471.com/.
Back to Top

Irdeto
Irdeto is the world leader in digital platform security, protecting platforms and applications for video entertainment, video games, connected transport and IoT connected industries. Irdeto’s solutions and services enable customers to protect their revenue, create new offerings and fight cybercrime. With 50 years of expertise in security, Irdeto’s software security technology and cyberservices protect over 5 billion devices and applications for some of the world’s best-known brands. With a unique heritage in security innovation, Irdeto is the well-established and reliable partner to build a secure future where people can embrace connectivity without fear. Please visit Irdeto at www.irdeto.com.
Back to Top

IRONSCALES
IRONSCALES’ best-in-class email security platform is powered by AI, enhanced by thousands of customer security teams, and is built to detect and remove threats in the inbox. We offer a service that is fast to deploy, easy to operate and is unparalleled in the ability to stop all types of email threats, including advanced attacks like BEC, ATO and more.
Back to Top

KPMG
KPMG LLP is the U.S. firm of the KPMG global organization of independent professional services firms providing audit, tax and advisory services. The KPMGglobal organization operates in 146 countries and territories and has close to 227,000 people working in member firms around the world. Each KPMG firm is a legally distinct and separate entity and describes itself as such. KPMG International Limited is a private English company limited by guarantee. KPMG International Limited and its related entities do not provide services to clients.
KPMG is widely recognized for being a great place to work and build a career. Our people share a sense of purpose in the work we do, and a strong commitment to community service, inclusion and diversity, and eradicating childhood illiteracy.
Back to Top

Kudelski Security
Kudelski Security is a world leader in cybersecurity solutions and services. We help organizations navigate an increasingly complex cyber environment to reduce business risk and become resilient against threats. We enable clients to identify and adopt the right security strategies, accelerate secure digital transformation, and innovate securely in everything they do.
Back to Top

MedCrypt
MedCrypt gives healthcare technology companies cybersecurity features in a few lines of code. Our product helps medical device vendors take a proactive approach to cybersecurity, satisfying new and forthcoming FDA cybersecurity requirements. Through embedding the MedCrypt library in a software application, critical cryptography features, proactive intrusion detection, regulatory compliance and market advantage are achieved.
Back to Top

Medigate
Connected devices bring complicated risks, and it has never been harder to secure the healthcare enterprise. Medigate created a simple platform to orchestrate and augment HDO security, allowing them to “Connect with Confidence.” Healthcare is all we focus on, which fuels our deep understanding of IoHT. From the foundation of industry leading visibility and insights, advanced features allow for the mitigation of cyber risk, increased compliance, and significant operational improvements. Medigate has been named “Best in KLAS” for Healthcare IoT Security 2 years in row.
Back to Top

MedSec
MedSec is the exclusively to the unique challenge of medical device and healthcare cybersecurity. MedSec partners with medical device manufacturers and healthcare delivery organizations to help address cybersecurity in medical devices throughout all stage of the device lifecycle. With medical device manufacturers MedSec leverages its cybersecurity expertise, coupled with its intimate knowledge of the healthcare regulatory and operating environments to offer support in design, architecture, verification, penetration testing, risk assessments, regulatory filings, and execution of security best practices in the development of new medical devices as well legacy systems. With Healthcare Delivery Organizations MedSec leverages its intimate knowledge of medical devices to offer software solutions for cybersecurity and asset management of connected medical devices in hospitals. MedSec is an active participant in helping move the cybersecurity healthcare community forward, and participates in a number of standards and best practice committees involved in furthering cybersecurity for medical products.
Back to Top

Mimecast
Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together.
Back to Top

Netlib Security
NetLib Security, Inc., with more than 20 years in the security space, is a provider of simple-to-deploy encryption solutions for stored data. Our unique encryption solutions are an easy and cost effective way to proactively and transparently protect your data. Encryptionizer is our powerful flagship platform that encrypts stored data right out of the box, with virtually no impact on performance, requires no changes to program code, and directly assists with compliance requirements.
Back to Top

Noname Security
The Noname API Security Platform is the only solution to proactively secure your environment from API security vulnerabilities, misconfigurations, design flaws, and provides API attack protection with automated detection and response. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and “Shift Left” API Security Testing. Noname Security is privately held, remote-first with headquarters in Silicon Valley, with offices in Tel Aviv and Amsterdam.
Back to Top

Obsidian Security
Obsidian Security is the first truly comprehensive security and compliance solution built for SaaS. Obsidian analyzes state and activity data across business-critical applications to help manage privileges, optimize configurations, and identify compromised accounts and insider threats. By pairing a deep understanding of each application with proprietary machine learning models, Obsidian delivers value in minutes without agents to deploy or custom rules to write. Obsidian goes beyond alerts, providing actionable recommendations for security teams and detailing the exact impact of each change in customer environments. The company is led by industry veterans from cybersecurity and enterprise software and is backed by Greylock Partners, GV, Norwest Venture Partners, and Wing.
Back to Top
Polarity
Knowledge and data is spread across disparate systems. Polarity fuses them together in one unified view. With Polarity, get immediate knowledge delivery for informed decision making, uplevel your current team, and using Polarity’s telemetry feature, enable global visibility across workflows, allowing your team to get the most out of the data they have.
Back to Top

Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Back to Top

ReliaQuest
ReliaQuest fortifies the world’s most trusted brands against cyber threats with its platform for proactive security model management. Acting as a force multiplier on an organization’s existing cybersecurity investments, only ReliaQuest’s GreyMatter integrates disparate technologies to provide a unified, actionable view that fills the gaps in enterprise security programs.
Back to Top

Reveal Risk
Reveal Risk is a boutique Cybersecurity and Risk Management consultancy focused on delivering the BEST (Business Enabling, Strategic, and Thorough) solutions to global organizations, with a focus on life sciences. The company was founded by deeply experienced pharmaceutical industry leaders and has a team of corporate leaders, industry practitioners, and military veterans that deliver a broad portfolio of services including strategy, process design, architecture, awareness, and third-party risk management.
Back to Top

RiskIQ, a Microsoft Company
RiskIQ is the leader in attack surface management, providing the most comprehensive internet intelligence that enables organizations to discover unknowns and investigate threats across its digital presence. With a spike in attacks against healthcare organizations, visibility into unknown, unprotected, misconfigured, and unmonitored digital assets is imperative. RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and protect the business, brand, and customers.
Back to Top

RiskRecon, a Mastercard Company
RiskRecon, a Mastercard Company, enables you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon’s cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities. Learn more about RiskRecon and request a demo at www.riskrecon.com.
Back to Top

Safe Security
Headquartered in Palo Alto, California, Safe Security is a leader in the “Cyber security and Digital Business Risk Quantification” (CRQ) space. It helps organizations measure and mitigate enterprise-wide cyber risk in real-time using its ML Enabled API-First SAFE Platform by aggregating automated signals across people, process, and technology, both for first & third party to dynamically predict the breach likelihood (SAFE Score) & dollar risk of an organization.
The SAFE scoring model is built as joint research at MIT that incorporates cyber security sensors data, external threat intelligence, and business context and places it together in a Bayesian Network of a Supervised Machine Learning scoring engine to give out scores and dollar value risk that the organization faces. The scores are calculated both at a macro and micro level and can also be measured for particular Lines of Business / Crown Jewels / Departments.
The SAFE Scores will enable the organization to have a “common language” across teams, from the board all the way down to an analyst to be aligned with a consistent risk metric along with justifying investments in cyber security and purchase of cyber insurance for the organization.
Back to Top

SafeBreach
Combining the Mindset of a CISO and the Toolset of a Hacker, SafeBreach is the pioneer in breach and attack simulation (BAS) and is the most widely used continuous security validation platform. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker’s Playbook™, the industry’s most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data.
Back to Top

Salt Security
Salt Security, the leader in API protection, enables organizations to catalog their APIs, see where those APIs are exposing sensitive data, detect and block API attackers, and provide developer insights that improve your API security posture. Using big data along with ML and AI, the Salt platform keeps API-connected data and services safe, even as those systems change.
Back to Top

SecurityScorecard
SecurityScorecard, a global leader in cybersecurity ratings, offers organizations valuable insights into the vulnerabilities that exist in their own environments and their third-party ecosystems. With sophisticated data collection techniques, attribution of millions of proprietary and open-source data feeds, and advanced machine-learning algorithms, SecurityScorecard measures, analyzes, and reports risk.
Back to Top

Security Risk Advisors
Security Risk Advisors delivers consulting and CSOC/XDR services to Fortune and Global 1000 companies, innovating technology startups and mission-oriented non-profits. Our approach emphasizes knowledge transfer, collaboration and strengthening security processes. We are not a reseller, so we are independent to recommend best-fit controls based on our experience implementing and operating them.
Back to Top

ShiftLeft
With ShiftLeft CORE, developer-friendly workflows are the first principle. In order to maximize developer efficiency, the CORE workflow inserts into pull requests with fast feedback so developers can find and fix vulnerabilities within the code they are already working on. This phased delivery of vulnerabilities at the time they are easiest to fix is what unlocks the efficiency of “shifting left.”
Back to Top

SimSpace
SimSpace delivers the most comprehensive cybersecurity risk management platform, instilling confidence in an organization’s cybersecurity talent and technologies. With SimSpace, security teams, operational processes, and environments are continuously tested, readily available, and optimally tuned to defend against advanced adversaries. SimSpace: Secure with Confidence. For more information, visit: www.simspace.com.
Back to Top

Strider
Strider is revolutionizing the way companies, research institutions, and government agencies protect their innovation and compete in a new era of global strategic competition. Our trailblazing technology and intelligence solutions enable clients to proactively identify, manage, and respond to nation-state directed IP theft and supply chain vulnerabilities.
Back to Top

Tenable
Tenable® is the Cyber Exposure company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.
Back to Top

Tessian
Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like March Capital, Sequoia, Accel, and Balderton and has offices in San Francisco, Boston and London.
Back to Top

Transmit Security
Transmit Security is reinventing Customer Identity and Access Management. Our flagship service BindIDTM is the only passwordless customer authentication solution to completely remove passwords, eliminating today’s biggest security risk, customer friction and revenue loss. We help companies create elegantly simple and inherently secure identity experiences across all channels and devices.
Back to Top

TrueFort
TrueFort brings zero trust protection to critical business applications. Leveraging unique real-time, adaptive trust, and cloud-to-ground capabilities, TrueFort’s Fortress platform detects and contains security threats before they become business risks. For more information, visit truefort.com and follow us on Twitter and LinkedIn.
Back to Top

Varonis
Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
Back to Top