Platinum Sponsors
|
|
 |
Crowdstrike www.crowdstrike.com
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries. We Stop Breaches. Find out how: www.crowdstrike.com |
 |
EY www.ey.com
EY Advisory combines a wealth of consulting capabilities — strategy, customer, finance, IT, supply chain, people advisory, program management and risk — with a complete understanding of a client’s most complex issues and opportunities, such as digital disruption, innovation, analytics, cybersecurity, risk and transformation. Visit www.ey.com to learn more. |
 |
RiskRecon riskrecon.net
|
 |
SecureWorks www.secureworks.com
|
 |
Securonix www.securonix.com
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management. For more information visit www.securonix.com. |
|
Gold Sponsors
|
|
 |
Cylance
www.cylance.com
Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT™ stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Visit www.cylance.com/ or call 877-973-3336 for more information. |
 |
Deloitte www2.deloitte.com
|
 |
Gurucul gurucul.com
Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit www.gurucul.com/ and follow us on LinkedIn and Twitter. |
 |
Ionic Security www.ionic.com
Ionic Security is a distributed data service which enables lifetime control over your data while providing real-time visibility and analytics of data-type, location, and use. When data access is requested, policies are checked in real time, every time, to ensure that sensitive information is only shared when allowed. This enables continuous control of your data both inside and outside your perimeter through Ionic's hybrid cloud on-premise service. |
 |
Optiv www.optiv.com
Optiv is the largest holistic pure-play cyber security solutions provider in North America. The company’s diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security. Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv is a Blackstone (NYSE: BX) portfolio company that has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers. For more information, please visit www.optiv.com. |
 |
Security Risk Advisors securityriskadvisors.com
Security Risk Advisors provides expert consulting services with specializations in advanced threats controls implementation and 24x7 operation, red and blue teams, financial services control frameworks, and GRC process improvement. Our approach emphasizes ongoing knowledge transfer and access to our analysts. |
 |
Symantec
www.symantec.com
|
|
Grand Rounds Sponsors
|
|
 |
Cymmetria
www.cymmetria.com
|
 |
SecuriyScorecard securityscorecard.com
SecurityScorecard is the most accurate cybersecurity rating across the entire business ecosystem. The cloud-based platform helps enterprises gain operational command of the security posture for themselves and across all their partners and vendors. It offers a measurement and analysis of critical risk factors not available from any other service provider and in a completely self-service and automated tool. It's based on the ThreatMarket™ data engine which collects over 30 million daily security risk signals from the entire Internet. SecurityScorecard was founded in 2013 by two former Chief Information Security Officers, Dr. Aleksandr Yampolskiy and Sam Kassoumeh. It is made up of veteran security researchers, cryptographers, data scientists, and software engineers. The company is privately held with headquarters in New York City. Security Scorecard investors include Sequoia Capital, Evolution Equity Partners, Boldstart Ventures, and others. |
 |
Soltra soltra.com
About Soltra® Soltra, which developed Soltra Edge, is a joint venture between the Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The Depository Trust & Clearing Corporation (DTCC), the premier post-trade market infrastructure for the global financial services industry. Soltra Edge is an on premise software solution that enables critical entities to import structured and unstructured threat information, standardize and organize that threat information using STIX formats, and instantly route that uniform threat intelligence via the TAXII standard to devices and analysts in order to take immediate action to prevent cyber incidents. The software takes only a few minutes to download, install and configure and a basic license is available at no cost. Learn more at www.soltra.com and download a free copy of Soltra Edge at forums.soltra.com. |
 |
Veracode www.veracode.com
Veracode delivers the application security solutions and services today’s user- and software-centric world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can fully realize the benefits of the applications they build, buy and deploy as well as the components they integrate into their environments. |
|
Silver Sponsors
|
|
 |
Anomali www.anomali.com
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred. |
 |
Appthority www.appthority.com
Appthority is the pioneer and global leader in enterprise mobile app risk management. Our automated, scalable solution scans and analyzes mobile apps on corporate or personal devices. Our service leverages the largest database of analyzed public and private apps (3.5 million and growing), features dynamic and behavioral app analysis and offers advanced policy management tools for scalable, automated control of mobile app risks. Appthority delivers visibility and trust to the rapidly expanding app ecosystem within enterprises. Headquartered in San Francisco, Appthority is backed by U.S. Venture Partners and Venrock, Blue Coat Systems, and Knollwood Investment Advisory. Visit www.appthority.com for more information. |
 |
Arxan www.arxan.com
Arxan provides the world’s strongest application protection solutions.
Our unique patented guarding technology
- Defends applications against attacks
- Detects when an attack is being attempted, and
- Responds to detected attacks with alerts and repairs.
Arxan offers solutions for software running on mobile devices, desktops, servers, and embedded platforms – including those connected as part of the Internet of Things (IOT) – and is currently protecting applications running on more than 500 million devices across a range of industries.
|
 |
Cigital www.cigital.com
Cigital is one of the world’s largest application security firms. We go beyond traditional testing services to help organizations identify, remediate, and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services, and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications. Our proactive methods helps clients reduce costs, speed time to market, improve agility to respond to changing business pressures and threats, and focus resources where they are needed most.
For more information, visit us at https://www.cigital.com/. |
 |
Prevalent www.prevalent.net
Prevalent is a vendor risk management and cyber threat intelligence analytics innovator with a reputation for developing cutting-edge technologies and highly-automated services that are proven to help organizations reduce, manage and monitor the security threats and risks associated with third and fourth-party vendors.
For more information regarding Prevalent, please visit www.prevalent.net, email info@prevalent.net or call 877-PREVALENT. |
 |
Saviynt saviynt.com
Saviynt is an innovative leader in providing application, data and infrastructure access governance and intelligence platform for Cloud and Enterprise. Saviynt uniquely delivers IGA 2.0 by integrating advanced usage & risk analytics with fine-grained privilege management. Saviynt’s completely managed IDaaS platform ensures a worry free adoption of IGA services to secure critical enterprise assets. |
 |
Skyhigh www.skyhighnetworks.com
Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Cisco, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia, and Salesforce.com. For more information visit http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks |
 |
ThreatConnect www.threatconnect.com
|
 |
Topspin Security www.topspinsec.com
TopSpin Security provides a real-time offensive deception platform that allows companies to accurately detect attacks in progress and eliminate the threats without wasting time on false positives. Our technology is based on a unique combination of active decoys and in-depth egress analysis. TopSpin's network of decoys lures attackers by mirroring valuable network assets. Once engaged, the decoy interacts with the attacker, deceiving it and slowing its advance, while providing accurate, actionable alerts and a full forensics trail. TopSpin’s DECOYnet is currently deployed by leading Global2000 companies. Learn more at www.topspinsec.com. |
|
Additional Sponsors
|
|
 |
Agari www.agari.com
|
 |
Anomali www.anomali.com
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred. |
 |
Coalfire www.coalfire.com
Coalfire’s healthcare and life sciences practice helps covered entities and business associates optimize their cyber risk advisory, assessment/compliance, and testing programs. We work with their security teams, the C-suite and boards to ensure they achieve a security maturity posture that allows them to be proactive in their stance against cyber threats. We understand that healthcare organizations have multiple types of data to protect as well as several regulations to comply with, including HIPAA, PCI, ISO, SOC, FISMA, and FedRAMP. As such, we provide consolidated audit programs with success metrics of up to 40% savings in time, cost and security team productivity. |
 |
Crowdstrike www.crowdstrike.com
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries. We Stop Breaches. Find out how: www.crowdstrike.com |
 |
Digicert
www.digicert.com
|
 |
FlashPoint Intel www.flashpoint-intel.com/
|
 |
Gurucul gurucul.com
Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit www.gurucul.com/ and follow us on LinkedIn and Twitter. |
 |
NH-ISAC www.nhisac.org/
|
 |
Phantom www.phantom.us
|
 |
Prevalent www.prevalent.net
Prevalent is a vendor risk management and cyber threat intelligence analytics innovator with a reputation for developing cutting-edge technologies and highly-automated services that are proven to help organizations reduce, manage and monitor the security threats and risks associated with third and fourth-party vendors.
For more information regarding Prevalent, please visit www.prevalent.net, email info@prevalent.net or call 877-PREVALENT. |
 |
SecureWorks www.secureworks.com
|
 |
Securonix www.securonix.com
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management. For more information visit www.securonix.com. |
 |
Shape Security
www.shapesecurity.com
|
 |
Soltra soltra.com
About Soltra® Soltra, which developed Soltra Edge, is a joint venture between the Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The Depository Trust & Clearing Corporation (DTCC), the premier post-trade market infrastructure for the global financial services industry. Soltra Edge is an on premise software solution that enables critical entities to import structured and unstructured threat information, standardize and organize that threat information using STIX formats, and instantly route that uniform threat intelligence via the TAXII standard to devices and analysts in order to take immediate action to prevent cyber incidents. The software takes only a few minutes to download, install and configure and a basic license is available at no cost. Learn more at www.soltra.com and download a free copy of Soltra Edge at forums.soltra.com. |
 |
Tanium
www.tanium.com
Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations. Follow us on Twitter at @Tanium and use #CONVERGE16 for conference information.
|
 |
ThreatQuotient www.threatq.com
ThreatQ is a cyber threat intelligence platform that focuses on centralizing, structuring, and strengthening a security team’s Intel-driven defensive posture against attacks! ThreatQ was designed by a team of security and intelligence analysts who collectively took their expertise and a blank canvas to design a masterful cyber intelligence tool to flll the gaps within the current industry. The cornerstone of ThreatQ is taking cyber threat indicators and adversaries’ TTPs and making them “ACTIONABLE” through seamless automation. |
 |
Topspin Security www.topspinsec.com
TopSpin Security provides a real-time offensive deception platform that allows companies to accurately detect attacks in progress and eliminate the threats without wasting time on false positives. Our technology is based on a unique combination of active decoys and in-depth egress analysis. TopSpin's network of decoys lures attackers by mirroring valuable network assets. Once engaged, the decoy interacts with the attacker, deceiving it and slowing its advance, while providing accurate, actionable alerts and a full forensics trail. TopSpin’s DECOYnet is currently deployed by leading Global2000 companies. Learn more at www.topspinsec.com. |
 |
Transmit Security www.transmitsecurity.com
|
 |
Trusona
www.trusona.com
By fusing True and Persona, Trusona’s users are completely guaranteed. Trusona ensures the identity of the user for risky online or call-center transactions – thus, chosen to protect the world’s most sensitive assets.
Trusona is designed for privileged accounts, high-dollar wires, DTC stock transfers, critical infrastructure, government and homeland security, VIP and high net-worth individuals, news outlets social media, CEO/CFO wire fraud, healthcare records, etc.
Trusona’s authentication platform is comprised of:
- In-person identity-proofing
- In-person distribution of TruToken
- Patented anti-replay technology
- Insured up to $1M per wire
Created by cyber security expert Ori Eisen, Trusona is backed by the largest venture capital firm, Kleiner Perkins Caufield & Byers.
Trusona – when you truly need to know.
|
 |
Twistlock
www.twistlock.com
|
|