HP Enterprise Security
Today’s organizations are facing the most aggressive threat environment in the history of information technology. Emerging computing trends have greatly increased productivity and business agility—but at the same time, have introduced a host of new risks. Actionable security intelligence is critical to protecting your organization from this rising tide of security threats. HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today’s most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today.
AT&T Inc. is a premier communications holding company and one of the most honored companies in the world. AT&T is a leading provider of wireless, Wi-Fi, high speed Internet, voice and cloud-based services. AT&T offers a wide range of security services, availability and recovery services, to support complex networking environments.
Lieberman Software provides privileged identity management solutions to secure the world's largest cross-platform enterprises, having pioneered the first product to address this need in 1999. By automating time-intensive administration tasks, we increase control over the IT infrastructure, reduce security vulnerabilities, improve productivity and ensure regulatory compliance. We have extensive experience helping 1200+ organizations worldwide secure their critical IT assets and prove regulatory compliance. In addition, our Windows security tools manage and report on groups, users, passwords and more.
Webroot® delivers intelligent cybersecurity for endpoints powered by its BrightCloud® Collective Threat Intelligence network. We protect the Internet of everything. Webroot’s cloud-based threat detection, high performance, lightweight agents, and single, web-based point of control have changed the way businesses think about protecting mobile devices, PCs and servers. Discover Smarter Cybersecurity at www.Webroot.com/brightcloud.
eSentire® is the leading innovator in Active Threat Protection, combining behavior-based analytics, immediate mitigation and actionable intelligence 24x7x365. Our security experts continuously monitor customer networks to detect and block cyber-attacks in real-time. Protecting over $1.3 trillion in combined assets, eSentire is the trusted choice of security decision-makers.
IBM Security offers one of the world’s broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research and development, provides the security intelligence to help holistically protect people, infrastructure, data and applications for protection against advanced threats in today’s hyper-connected world. To learn how, please visit ibm.com/security.
Thycotic Software, Ltd. provides password and access management solutions to IT administrators worldwide. Over 85,000 IT professionals use our Identity and Access Management (IAM) tools. Secret Server is a password management system for IT professionals to store, organize, and manage privileged/shared accounts.
One Company, One Solution. By packaging assessment, training and a management system toolset, BSI delivers a business improvement solution that combines it all in a comprehensive service offering and allows us to provide an integrated approach to meet the needs of an organization and embed excellence across the business.
Got PANs or PHI? IRI FieldShield® is fast, friendly data masking software for PII in DBs, files, and dark data subject to PCI, HIPAA and similar laws. IRI RowGen® generates structurally and referentially correct test data from scratch. All IRI data management tools use the same metadata and Eclipse GUI.
LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics.
PhishMe provides organizations the ability to improve their employees’ resilience towards spear phishing, malware, and drive-by attacks with over 4 million individuals trained in 160 countries, PhishMe has been proven to reduce the threat of employees falling victim to advanced cyber attacks by up to 80 percent.
Qualys is a pioneer and leading provider of cloud security and compliance solutions with over 6,700 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand. www.qualys.com
SentinelOne is reinventing endpoint security to protect organizations against advanced threats and nation state malware. The company uses predictive execution inspection to detect and protect all devices against targeted, zero day threats in real time. SentinelOne was formed by an elite team of cyber security and defense experts from Intel, McAfee, Symantec, Checkpoint, IBM, WhiteHat Security and the Israel Defense Forces.
As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we're recognized as the market leader in server security, cloud security, and small business content security. Our solutions protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks.
CISO Executive Summit Sponsor
Paladion is a managed SOC provider with SOCs in North America, Middle East & Asia. In our unique model we integrate client tools like SIEM with our security operations & analytics technology to delivers out of the box threat feeds, work flows, intelligent alerting & response. In the US, Paladion is headquartered in Herndon, VA and we serve customers in 25 states. Please visit www.paladionusa.com.
Advanced Software Products Group, Inc.
Mainframe Data Encryption, Enterprise Password Reset, RACF Administration and more. Since 1986, ASPG has provided cutting edge software solutions, support and services. Data centers worldwide have selected ASPG software as their products of choice to protect data, increase productivity, and solve critical IT issues. Free product evaluation downloads at www.aspg.com.
American Public University
Technology is always advancing. So should your career. American Public University (APU) offers more than 180 degrees and certificates to choose from including Cybersecurity, Cloud Computing, IT project management and more. APU’s affordable tuition, flexible schedules, and monthly course starts, makes reaching your professional goals easier than ever.
ANRC is an industry leading firm focused on Advanced Cyber Security Training, Enterprise Threat Assessments, and Innovative Security Solutions. ANRC draws upon experience obtained at the frontlines of today's cyber conflicts to develop its progressive and comprehensive security solutions for the defense of private enterprises.
Auditwerx specializes in SOC 1 and SOC 2 attestation services. Auditwerx delivers quality, in-depth SOC reports to help service organizations grow their business. As a division of Carr, Riggs & Ingram (CRI), Auditwerx now delivers the resources, skills, and experience of a super-regional firm while maintaining the accessibility and attention of a boutique firm.
For 30 years, Beta Systems has successfully provided solutions in trusting cooperation with customers worldwide for challenging situations involving managing risk and proving compliance. Our solutions range from Identity Access Management to Access Analytics and Governance and Data Security to Anti-Money Laundering and Real-time Fraud Detection.
BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting. We empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and re-mediate asset vulnerabilities targeted by cyber attacks.
Bitdefender is a global IT security company providing organizations of all sizes with solutions for data protection and improved performance. Bitdefender's unique technology is built from the ground-up to support virtualized environments, eliminating the bottlenecks and performance degradation that comes with traditional endpoint security solutions. For more information on Bitdefender, visit http://enterprise.bitdefender.com. Follow us on Twitter @Bitdefender_Ent.
Black Duck Software
Black Duck Software provides the world’s only end-to-end OSS Logistics solution, enabling enterprises of every size to solve the logistical challenges and optimize the opportunities that come with open source adoption and management. Black Duck is headquartered in Boston and has offices in San Mateo, London, Paris, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing.
Blackfin creates a more secure enterprise through simulated training activities involving employees at all levels. We achieve this through security awareness training, role based training, simulated threat assessment training and simulated phishing attacks.
Brandeis University offers the Online Master of Science Information Security to help you develop and manage infrastructures to protect the critical data that keeps businesses running or choose the Online Master of Science in Information Technology Management to help you navigate the complexities involved in using technology.
Checkmarx (www.checkmarx.com) has established itself as a leading developer of Application Security testing solutions, best known for its Static Application Security Testing (SAST) solution. The company's customers include 4 of the world's top 10 software vendors and hundreds of Fortune 500 and SMB organizations from all industries.
Clearwater Compliance, LLC
Clearwater Compliance, LLC, focuses on helping organizations and their service providers establish, operationalize and then mature their information risk management programs. Owned and operated by veteran, C-suite healthcare executives, Clearwater provides comprehensive, by-the-regs HIPAA compliance software and tools, risk management solutions, educational events, and professional services for over 400 organizations.
Conventus is a national information security solutions provider that protects companies from security attacks and data breaches. Founded in 2006, Conventus specializes in optimizing the performance and use of endpoint and server security software. The company also offers incident management as well as PCI, HIPAA, and SOX security compliance consulting.
CorreLog, Inc. is the leading ISV for IT security log management and event log correlation. The CorreLog SIEM Server operates across Windows, UNIX, Linux and IBM mainframe platforms, with an out-of-box PCI DSS-compliant mainframe agent for IBM z/OS. CorreLog identifies and responds to network attacks, suspicious behavior, and policy violations by collecting and correlating user activity and event data to pinpoint security threats.
DG Technology focuses on delivering a comprehensive security strategy, solutions and protection across all platforms - desktop to mainframe. In partnership with Intel Security and other leading information security providers, DG Technology helps organizations map compliance requirements, business objectives and market trends to specific technology solutions through assessments, architecture development, deployment and support.
Emerging Threats is a world-leading provider of commercial and open source threat intelligence. The company's ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, SNORT®, and other network intrusion protection and detection systems. ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.
Fastpath's GRC Studio automates security access and segregation of duties compliance enabling continuous monitoring across multiple, disparate systems from a single platform. By streamlining data gathering and risk identification, users can efficiently focus on analysis/evaluation, gaining a better understanding of security while effectively meeting the needs of their internal and external audit teams.
FishNet Security - the leading provider of information security solutions that combine technology, services, support and training - enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to thousands of clients worldwide.
George Washington University
The George Washington University’s Online Master of Professional Studies in Security and Safety Leadership provides comprehensive knowledge and innovative solutions for homeland security or become a leader in the field of Cyber Security by enrolling in the George Washington’s Online Master of Professional Studies in Strategic Cyber Operations and Information Management.
GigaNetworks delivers a focused group of security products to companies located in the Florida market while delivering value to our business partners and our vendors. We go the extra mile so our clients are comfortable with the products selected and are supported after the initial purchase.
Hitachi ID Systems, Inc.
Hitachi ID Systems delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. To learn more about Hitachi ID Systems, call 1.403.233.0740 or follow @Hitachi_ID on Twitter.
HyperSecu Information Systems/ Feitian Technologies
HyperSecu Information Systems, Inc. is a Canadian-Controlled Private Company (CCPC) based in Richmond BC. We offer strong authentication and secured payment solutions for information security needs. Our offering includes both off-the-shelf and custom-made products and services that will satisfy all your IT security requirements. At Hypersecu, we build security your way.
KnowBe4 delivers ‘new-school’ Kevin Mitnick Security Awareness Training combined with set-it-and-forget-it simulated phishing attacks for an extremely effective user education program. Based on Kevin’s 30+ year unique first-hand hacking experience, you now can train employees to solve the urgent security problems of social engineering, spear phishing and ransomware attacks.
Kroll helps clients make confident risk management decisions about people, assets, operations, and security through investigations, due diligence, compliance, cyber security, and information management services. Headquartered in New York with offices across 29 countries, Kroll’s multidisciplinary team of nearly 2,300 employees serves a global clientele of law firms, financial institutions, corporations, non-profit institutions, government agencies, and individuals.
Streamline, automate and encrypt file transfers using Linoma Software's GoAnywhere Managed File Transfer Suite. GoAnywhere allows your organization to securely exchange data using standard protocols to transfer and encrypt files using OpenPGP, AES, FTPS, SFTP, SCP, HTTPS, and GPG. Learn more and view brief overview videos at www.GoAnywhere.com.
National Cybersecurity Institute at Excelsior College
The National Cybersecurity Institute at Excelsior College is an academic and research center based in Washington, DC dedicated to assisting government, industry, military, and academic sectors meet the challenges in cybersecurity policy, technology, and education. The Institute's unique team of cybersecurity experts draws from different industries and organizations who are working together to educate and advise the public and private sectors on today's cybersecurity issues and needs.
National Security Agency
We live in a net-centric world where new information technologies arrive at lightning speed, allowing us to share information across town or around the world faster than ever before. The National Security Agency's Information Assurance Mission is dedicated to providing information assurance solutions that will keep our information systems secure.
ObserveIT, a pioneer in User Activity Monitoring, provides a new user-centric approach to IT security to address user-based attacks. ObserveIT provides video recordings of user activity, analytics and alerting to respond rapidly to security incidents and operationalize forensics. Over 1,200 companies use ObserveIT. Visit http://www.observeit.com for more information.
Palo Alto Networks
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our next-generation security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.
Quadrant Information Security
Founded in 2003, Quadrant Information Security is a consulting firm committed to supporting organizations in all vertical markets by protecting their sensitive data. Quadrant prides itself on helping its customers maintain a secure environment by Specializing in Managed Security Services, Enterprise Security Consulting and IT Professional Services. We purposely focus on Information Security program development and related technologies, but have deep expertise in auditing standards and process improvement.
Security Awareness, Inc.
Security Awareness Incorporated provides leading edge training for information security, HIPAA, GLBA and PCI compliance. Training tools include e-Learning, classroom-based training, posters, pamphlets, e-booklets, animated banners and more. Government clients can purchase through GSA IT-70 (GS-35F-0547R) Call SAI today to help design an effective security awareness program for your organization.
Solutionary is a leading managed security services provider (MSSP), focuses on delivering managed security services, security consulting services and global threat intelligence. Solutionary services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Clients are able to optimize security programs, make informed decisions, achieve compliance, and reduce costs.
SpectorSoft is the leader in computer User Activity Monitoring and analysis software. SpectorSoft has helped more than 36,000 businesses, government organizations, schools, and law enforcement agencies improve how they address security and achieve compliance across communication and computing OSs and devices. SpectorSoft solutions review security risk, audit compliance mandates, protect assets and reputation, ensure adherence to Acceptable Use Policies, and optimize productivity and efficiency. For more information, visit www.spectorsoft.com.
SSH Communications Security
SSH Communications Security has become the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks. Our platform based approach to Secure Shell deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments
Sword & Shield
Sword & Shield Enterprise Security, Inc. is the premier holistic information security service provider. With solutions designed to meet the needs of a dynamic security and compliance landscape, we deliver evaluation, remediation, and ongoing monitoring and management to ensure your organization maintains the most comprehensive security posture possible.
Founded by the leading privacy and data security law expert Professor Daniel Solove, TeachPrivacy provides computer-based privacy and data security training. We have extensive material on phishing, PCI, privacy awareness, GLBA, FERPA, HIPAA, and many more topics. Our training incorporates videos, quizzes and interactive elements which make it highly engaging.
Tenable Network Security
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense.
Terranova offers flexible and customizable solutions for information security awareness and other governance needs of large companies and international organizations. Our online courses, combined with our communication tools, help change users’ behaviours regarding information security, to prevent data breaches that could have a negative impact on the finances and reputation of a company.
The Media Trust
Established in 2005, The Media Trust is the global leader in monitoring and protecting the online and mobile ecosystem. With a physical presence in 65 countries, The Media Trust provides website security via comprehensive detection and alerting services to protect against malware, site performance issues and data leakage, which lead to lost revenue and privacy violations.
TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT GRC management solutions that give decision makers a holistic view of their security posture, enables effective data protection and automates compliance. Dramatically reducing the complexities of ever-changing threats and technology, TraceSecurity empowers organizations to best pursue their strategic objectives.
Founded by David Kennedy, TrustedSec is a leader in Information Security Consulting Services. Our passion is security and our offerings are designed to move security programs from where they are to where they want to be. Penetration testing, Red Teaming, Program Maturity Reviews and more… We have the right people for the job.
The University Alliance (UA) provides access to the nation’s top universities — offering you the skills and credentials you need to take your career to the next level. Through UA, these accredited universities bring the classroom to you with 100% online instructor-led, video-based certificate and degree programs.
Watchful Software provides advanced persistent security solutions that keep sensitive information safe from security breaches resulting from either accidental or malicious disclosure. Watchful has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems and information, protecting against potentially massive economic and competitive damage from cyberterrorists and information thieves.
Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, up to 90%.