Affiliates

Affiliate Board Advisors

Accenture is a global management consulting, technology services and outsourcing company, with more than 293,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$28.6 billion for the fiscal year ended Aug. 31, 2013. Its home page is www.accenture.com.

Email is the most popular communication tool and the entry point for up to 95% of security breaches. The Agari Email Trust Platform protects employees and their customers and trusted business partners from receiving untrusted and malicious emails. It is the only solution that verifies trusted email identities based on insight into 10 Billion emails per day to stop advanced email threats that use identity deception. Agari restores user confidence in their inbox.

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. Booz Allen is headquartered in McLean, Virginia, employs more than 25,000 people, and had revenue of $5.59 billion for the 12 months ended March 31, 2011. To learn more, visit www.boozallen.com. (NYSE: BAH)

Deloitte’s Cyber Risk Services help complex organizations more confidently leverage advanced technologies to achieve their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. With deep experience across a broad range of industries, Deloitte’s more than 1600 practitioners provide advisory and implementation services, spanning executive and technical functions, to help transform legacy IT security programs into proactive Secure.Vigilant.Resilient. cyber risk programs that better align security investments with risk priorities, establish improved threat awareness and visibility, and strengthen the ability of organizations to thrive in the face of cyber incidents.

Learn more about Deloitte’s Cyber Risk Services

EY Advisory believes a better working world means helping clients solve big, complex industry issues and capitalize on opportunities to grow, optimize and protect their businesses. A global mindset, diversity and collaborative culture inspires EY consultants to ask better questions, create innovative answers and realize long-lasting results. The better the question. The better the answer. The better the world works. ey.com/fscyber

Flexera Software delivers market-leading Software Vulnerability Management solutions enabling enterprises to proactively identify and remediate software vulnerabilities, effectively reducing the risk of costly security breaches. Our solutions leverage verified vulnerability intelligence to drive prioritization, and technology to integrate assessment and remediation, bridging the gap between IT security and operations and streamlining critical processes. Serving more than 1,000 enterprise customers globally and leveraging proprietary vulnerability research that tracks more than 50,000 applications and systems, our solutions empower organizations to assess risk, prioritize resources and automate processes to continuously minimize the attack surface that could be exploited by cybercriminals and hackers.

IBM helps financial services firms gain insight and agility through information-led transformation. Forward thinking institutions will use these insights to transform their business within four imperatives: attract and retain customers, develop new revenue sources, streamline operations and pro-actively address risk and regulatory requirements. IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services supported by world-renowned IBM X-Force® research, enabling organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations comprising over 12 Security Operations Centers, 15 software security development labs and over 50 Cloud Data Centers in the United States, Europe, India and Asia Pacific. IBM Security monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.

Learn more: ibm.com/banking | ibm.com/security | securityintelligence.com

KPMG provides audit, tax and advisory services and industry insight to help organizations negotiate risks and perform in today's dynamic and challenging environments. KPMG’s advisory risk consulting professionals help organizations transform risk into enduring competitive advantage while navigating their most complex business issues. Our people offer deep knowledge and insightful opinions to help you enhance risk and create value in a dynamic environment in which outcomes must be managed strategically and with agility. KPMG’s client focus, commitment to excellence, global mind-set, and consistent delivery build trusted relationships that are at the core of our business and reputation. Our experienced IT security and forensic partners and professionals possess leading technical experience and are well regarded in their specialties. We have extensive experience building, delivering and supporting cybersecurity programs to Fortune 500 and Global 2000 companies across a multitude of industries. KPMG Cyber’s approach - Prevent, Improve, Detect, Respond -is designed to be simple and effective, and most importantly aligned with your business needs. For additional insights about KPMG’s Cyber Security Services please visit: advisory.kpmg.us/kpmg-cyber.html

Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world. Its mission is to empower every person and every organization on the planet to achieve more. We enable this digital transformation on a foundation and capability for cybersecurity with products and services that have security built-in from the start. Our unique approach combines a comprehensive, agile platform together with unparalleled intelligence and strategic partnerships in order to better protect your endpoints, to move faster to detect threats, and to respond to security incidents across even the largest of organizations.

MSA is a specialized security company that began in 1987 and has since grown into a recognized industry leader in high consequence threat protection and specialized training for corporate and government clients. MSA's team of security professionals - comprised of veteran members of the law enforcement, military, and business communities - provides unparalleled perimeter security, training and explosive detection services domestically and internationally. MSA combines hands-on experts with information and technology to provide our clients with the best resources for reducing their vulnerabilities to threats and protecting their personnel and property.

MSA has a robust operational protection capability that includes facility and perimeter security, executive protection, special event planning, WMD detection, and the largest privately owned single handler explosive detection canine company in North America. MSA's comprehensive consulting services consist of counterterrorism threat and intelligence analysis, risk and vulnerability assessment, maritime training and protection services, and physical security design. We also offer complete security systems design and integration, continuity of operations planning, and security program audits. Learn more: msasecurity.net

NC4 delivers safety and security solutions for both business and government organizations. NC4 revolutionizes how organizations and communities collect, manage, share and disseminate information to reduce cyber threats, fight crime, mitigate risks and manage incidents. NC4 also provides cyber threat sharing solutions both through secure collaboration services and recently (via Soltra Edge), through automated, structured, and standardized (STIX/TAXII) mechanisms..

NC4 currently provides services to the FS-ISAC through its secure collaboration portal and as the Soltra Edge cyber threat sharing repository. NC4 has also launched the Cyber Defense Network for Financial Services as an advanced community focusing on defensive actions..

NC4 solutions are used by private sector companies involved in financial services, high-tech, insurance, manufacturing, aerospace and defense, oil and gas, pharmaceuticals and healthcare, as well as other industries. In the public sector, NC4 solutions are used by federal, state and local agencies in homeland security, emergency management and law enforcement disciplines..

To learn more about how NC4 can benefit your organization, visit www.NC4.com or call 877-624-4999 or 310-606-4444.


As a managed services provider with more than fifteen years of experience finding and stopping threats outside the traditional network perimeter, PhishLabs is the ideal partner to help financial institutions protect their enterprise, brands, and customers from digital risks.

Services provided by PhishLabs include:

•Digital Risk Protection – Find and stop risks across email, domain, social media, mobile, dark, deep, and open web.
•Security Awareness Training – Minimize risky behaviors and drive employees to report threats.
•Phishing Incident Response – Provide expert human analysis and automated response to potential threats reported by end users.

PhishLabs makes it easier than ever for financial institutions to manage risks across email, domain, social media, mobile, dark, deep, and open web vectors. Our expert-driven, managed approach goes beyond do-it-yourself tools to ensure the digital risk protection outcomes institutions want.

PwC’s cybersecurity consulting team helps organizations understand dynamic cyber challenges, adapt and respond to risks inherent to their business ecosystem, and prioritize and protect the most valuable assets fundamental to their business strategy. For more information on PwC’s cybersecurity point of view, visit: www.pwc.com/cybersecurity.

About PwC’s Advisory Practice - PwC’s Advisory professionals help organizations improve business performance, respond quickly and effectively to crisis, and extract value from transactions. We understand our clients’ industries and unique business challenges, and look across the entire organization — focusing on strategy, structure, people, process and technology — to help clients build their next competitive advantage. See www.pwc.com/us/consulting for more information or follow us @PwCAdvisory.

About PwC US - PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 158 countries with more than 180,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/US. Learn more about PwC by following us online: @PwC_LLP, YouTube, LinkedIn, Facebook and Google +.

RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and, reduce business risk, fraud and cybercrime. RSA protects millions of users around the world and helps more than 90% of Fortune 500 companies thrive in an uncertain, high risk world. For more information, go to RSA.com or follow us on @RSAsecurity

Stroz Friedberg is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected and regulated business world. We are trusted advisers—a collection of the brightest minds in the fields of cybersecurity—who are leading experts in digital forensics, incident response, and security science; investigation; eDiscovery; and due diligence. We work proactively to minimize risk, and respond in real time to contain issues and crisis situations when the inevitable occurs. Our multi-disciplinary teams tackle the most complex, time-sensitive, and far-reaching issues and guide businesses through the maze of complexities found at the intersection of law, technology, investigations, compliance and security science. The skills, backgrounds, and integrity of our people, combined with our industry-leading proprietary incident response and digital forensics tools, are a powerful force when getting it right matters most. At Stroz Friedberg, we are united by a common goal — to maximize the health of an organization, ensuring its longevity, protection and resilience.

PPISC Affiliates
Affiliates

Founded in 2012 by cyber defense veterans, Adallom, a 2014 Gartner Cool Vendor, is a cloud access security broker which delivers visibility, governance and protection for cloud applications. Its innovative platform is simple to deploy, seamless to users, and is available as a SaaS-based or on-prem solution. Powered by SmartEngine(tm) advanced heuristics and backed by an elite cybersecurity research team, Adallom makes it easy to protect data in the cloud. For more information, visit www.adallom.com or follow @adallom.

Agio is a leading IT and Security Managed Services Provider, offering technology hosting, monitoring, management, disaster prevention and recovery, security, and other high-end technology services. With 130+ employees, Agio is headquartered in New York City with operational headquarters in Norman, OK. Learn more at agio.com.


​At Akamai, our mission is to make digital experiences fast, intelligent and secure. Our intelligent edge platform surrounds everything, from the enterprise to the cloud. It keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai as their competitive edge. We help them win in the market through agile solutions that extend the power of their multi-cloud world. Our portfolio of edge security, web and mobile performance, enterprise access and video-delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring. At Akamai, we see a world of unimagined potential, all enabled through the unique power of the Akamai Edge. It’s this power that creates the agility our customers need to accelerate and secure their multi-cloud world — and own their digital future.

AlienVault® has simplified the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault® Unified Security Management™, with the power of AlienVault’s Open Threat Exchange®, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource constrained IT teams.

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred. Visit us at www.anomali.com

Arxan, the global trusted leader of application protection solutions, delivers the confidence to build, deploy, and manage an organization’s most innovative and valuable applications. Currently protecting more than 1 billion application instances across industries including financial services, mobile payments, healthcare, automotive, gaming, and entertainment, the company provides the industry’s most comprehensive application protection solution. Unlike legacy security providers that rely on perimeter-based barriers to keep bad actors out, Arxan protects applications at the source and binary code level to expand the area of trust and provides a broad range of enterprise services and patented security capabilities such as code hardening, obfuscation, encryption, and whitebox cryptography. Founded in 2001, the company is headquartered in North America with global offices in EMEA and APAC.

Attivo Networks™ is the leader in dynamic deception technology with a strong customer base in financial, healthcare, and other industries that have a need to protect customer and company data from exfiltration. Attivo provides the real-time detection and visibility of inside-the-network and data center intrusions. The Attivo BOTsink® platform uses high-interaction deception to lure BOTs/APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures or database lookup to detect cyber attacks. Whether it is a reconnaissance or stolen credential attack, Attivo provides the forensics required to stop current and prevent future attacks. www.attivonetworks.com

The Awake Security Investigation Platform enables rapid, iterative and conclusive alert investigations and hunting by placing the context security teams need at their fingertips. This patent-pending platform builds on more than two years of R&D with over 200 security teams. Using proprietary behavioral analytics and machine learning, Awake extracts often ignored signals from full packet capture and other data sources to create a Security Knowledge Graph™. By automatically pre-correlating, profiling and tracking assets including devices, users and domains it surfaces notable behaviors previously difficult or impossible for the security team to consume. Gathering this context manually, if even possible, can take hours combing through dozens of data sources. As a result, Awake closes the investigation gap, delivering customers a 10X improvement in time to truth when responding to threats.

BAE Systems Applied Intelligence helps nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.

We do this using our set of solutions; systems, experience and processes - often collecting and analyzing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world, enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems.

We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA. For further information, visit www.baesystems.com/businessdefense.

Baffle™, the application data protection company, prevents data breaches by securing the end-to-end data access model for applications and databases. Using this method, the technology protects against some of the most recent high-profile attacks and vulnerabilities including Spectre and Meltdown. With its patent-pending technology, Baffle is the only company that can enable encryption of data at-rest, in use, in memory and in the search index without impacting the application and uses AES encryption. Baffle is also the first company to enable secure data processing on a commercial application and database to guarantee data protection.


BehavioSec enables enterprises to transparently and continuously authenticate people across mobile and web apps by integrating its behavioral biometrics platform. BehavioSec pioneered behavioral biometrics, a unique method of authentication dramatically reducing fraud and theft committed by people and malware abusing accounts and credentials. As digital transformation explodes along with fraud risks, global enterprises rely on BehavioSec to lower fraud risks and costs in verifying online identities at scale, without having an adverse effect on digital experience and frustrating their users. BehavioSec currently verifies billions of transactions and millions of users at scale for some of the largest global 2000 companies.

BeyondTrust® is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks.

We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your organization goes.

BeyondTrust's security solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

The Bitglass Cloud Access Security Broker (CASB) solution provides enterprises with end-to-end data protection from the cloud to the device. It deploys in minutes and works with any cloud app on any device.

Bitglass enables enterprises to secure cloud apps like Office 365 and Salesforce, and internal apps like Exchange and Sharepoint. Corporate data security policies can be enforced across multiple cloud services. Mobile devices can be protected without the hassles of MDM.

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third-party risk, benchmark performance, and assess and negotiate cyber insurance premiums.

Created for and used by the US intelligence community, BluVector answers the challenge of too much disparate data in too many places requiring sequential handoffs between humans. Using state-of-the-art machine learning and AI technology – in combination with existing investments - BluVector massively accelerates and automates the process of correlating, prioritizing and reporting on even the newest and most sophisticated threats, in minutes rather than months, so that security staff can anticipate and stop the threat before damage is done. Join the Hunt – www.bluvectorcyber.com.

Blueliv is a leading cyberthreat intelligence provider, headquartered from Barcelona, Spain. We scour the open, deep and dark web to deliver fresh, automated and actionable threat intelligence to organizations, helping protect their networks from the outside in. Blueliv’s scalable cloud-based technology turns global threat data into sophisticated, relevant intelligence. We enable organizations to save time and resource by accelerating incident response performance, providing user-friendly evidence accessible to all levels within cybersecurity operations teams. Our pay-as-you-need solution delivers an accelerated, predictive view of the threat landscape in real-time. We do not believe in a one-size-fits-all approach, and work together to configure a modular solution bespoke to your needs using separate intelligence modules, all backed up by our world-class in-house analyst team. Blueliv has been named a Gartner Cool Vendor and Go-Ignite winner, and been an FS-ISAC affiliate member for several years.

CA Veracode, part of CA Technologies, enables the secure development and deployment of the software powering the application economy.

With its combination of automation, process and speed, CA Veracode seamlessly integrates into the software lifecycle, so enterprises realize the advantages of DevOps while ensuring secure code is synonymous with high-quality code. Learn more at www.veracode.com.


Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware and business email compromise. Today, this is all made real for thousands of global organizations. Learn more

Hundreds of services used by employees are not protected by the security platforms enterprises use. In the quest for agility, great user experience, and productivity, users connect to services through any infrastructure on private devices, entirely bypassing security.

Integrating these services into the current security infrastructure is often complex, slow, expensive, isn’t scalable and sometimes, unnecessary.

Coronet provides an alternative to heavy integration: An all-in- one cloud based security platform that enables the enterprise to introduce services in minutes, with zero impact on user experience, at a fraction of the cost.

By enabling employees to securely use any internal or SaaS service on any device using any infrastructure - without integration efforts, Coronet empowers the user’s productivity while enabling the enterprise’s ability to maintain needed security.

CrowdStrike is the leader in cloud-delivered endpoint protection. The CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. CrowdStrike Falcon seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed. CrowdStrike Falcon protects customers against all cyberattack types, using sophisticated signatureless artificial intelligence/machine learning and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates more than 70 billion security events from across the globe to immediately prevent and detect threats.

Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide.

Cylance’s award-winning product, CylancePROTECT™, stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. CylancePROTECT is a radically different technological approach to cybersecurity that employs artificial intelligence to analyze the DNA of files before they execute.

Complementing CylancePROTECT are professional services that provide pre-attack penetration and vulnerability testing, compromise assessments and post-attack incident response. Cylance specializes in securing critical infrastructure and key resources for education, energy, financial services, government, healthcare, heavy industry, oil and gas, retail, technology, and other industries.

Standing apart from a cybersecurity industry reliant upon an outdated detection and response model, Cylance secures through prediction and pre-response at the enterprise endpoint, preventing malware and advanced persistent threat breaches before they cause harm.

Founded in 2014, Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. The company is backed by leading investors such as Y Combinator and Sherpa Capital, and has already gained traction throughout the InfoSec community and global media.

DefenseStorm is a security data platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective. Built from the ground up in the cloud, DefenseStorm unifies detection, investigation, reporting, and compliance into a single place to manage cybersecurity data. Formed by bankers and technology experts, DefenseStorm aggregates event data across all cybersecurity tools and links policies to real-time alerts, so that financial institutions can prove to regulators they are both secure and compliant with evolving FFIEC cybersecurity requirements. For more information please visit www.DefenseStorm.com.

DFLabs is a Technology and Services company specialized in Cyber Security Incident and Data Breach Response. Our mission is: eliminating the complexity of Cyber Security Incident and Data Breach, reducing reaction time and risk exposure. In other words: Cyber Incidents Under Control.

With this goal in mind, we ve created IncMan NG, the cutting edge technology platform for managing and responding to cyber incidents and share intelligence. IncMan has been created for SOC and CSIRT orchestration, and It is currently being used by many Fortune 100/1000, and Financial Services Institutions worldwide.

More info here.

Since 1999, Digital Defense, Inc., (DDI) has assisted financial organizations to protect sensitive data through managed security risk assessment solutions. DDI has received numerous industry recognitions including a top 25 ranking in Cybersecurity Ventures’ listing of the World’s 500 Hottest Cybersecurity Companies, and inclusion in CSO Outlook’s Top 10 Network Security Companies and CIO Review’s 20 Most Promising Cyber Security Solutions. Vulnerability scanning, penetration testing, and security awareness training are DDI’s most popular offerings, each of which proactively improves the security of an organization. DDI’s unique Vulnerability Management as a Service (VMaaS) delivery model helps organizations bolster information security.

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Many large financial services institutions, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.

Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection.


EclecticIQ enables intelligence-powered cybersecurity for government organizations and commercial enterprises. We develop analyst-centric products and services that align our clients’ cybersecurity focus with their threat reality. The result is intelligence-led security, improved detection and prevention, and cost-efficient security investments.

Our solutions are built specifically for analysts across all intelligence-led security practices such as threat investigation, and threat hunting, as well as incident response efforts. And we tightly integrated our solutions with our customers’ IT security controls and systems.

EclecticIQ operates globally with offices in Europe, United Kingdom, and North-America, and via certified value-add partners.


ExtraHop is the leader in analytics for performance monitoring and security. Our platform makes data-driven IT and security a reality, applying advanced analytics and machine learning to all digital interactions to deliver timely and accurate insight. Business, security and IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Microsoft, Adobe, and DIRECTV.

Fastly helps the world’s most popular digital businesses keep pace with their customer expectations by delivering fast, secure, and scalable online experiences. Businesses trust the Fastly edge cloud platform to accelerate the pace of technical innovation, mitigate evolving threats, and scale on demand. Founded in 2011, Fastly serves 14 trillion requests each month, more than 10 percent of all internet requests. Learn more at Fastly.com and follow us on Twitter @fastly.

FICO is a leading analytics software company, helping businesses in 80+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. FICO provides analytics software and tools across multiple industries to manage risk, fight fraud, build profitable customer relationships, optimize operations and meet strict government regulations.

Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations with a decision advantage over potential threats and adversaries. The company’s sophisticated technology and human-powered analysis enable enterprises and public sector organizations globally to bolster cybersecurity, confront fraud, detect insider threats, enhance physical security, assess M&A opportunities, and address vendor risk and supply chain integrity. Flashpoint is backed by Georgian Partners, Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information, visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people's intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.


ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional endpoints, IoT devices and operational technologies the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of March 31, 2018, more than 2,800 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions. See devices. Control them. Orchestrate system-wide threat response. Learn how at www.forescout.com.

Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Fortinet hardware and virtual solutions are recommended by NSS Labs and with over 2.5M threat sensors worldwide, are reinforced by FortiGuard Labs, a team of over 200 cyber-security researchers focused solely on industry threat research, analytics, and intelligence for preventing and detecting the latest attacks while delivering incident response. Fortinet provides broad, high-performance protection against dynamic security threats whether inside the perimeter or out and custom ASIC technology radically increases throughput 5 - 10X more than other solutions, enabling the world's first 1 terabit per second throughput firewall.

Global cybersecurity leader Fox-IT's 200+ employees create solutions for a more secure society. Dedicated to clients, and our integrity, Fox-IT delivers solutions before, during and after attacks. InTELL provides global visibility into on-line threats. Our world-wide customers value the unique context and attribution. Our rich STXI/TAXII feeds power their defenses. DetACT delivers real-time web and mobile event analytics, detecting attacks and anomalies to on-line channels. It is the only solution to detect and stop past and present channel attacks like Dyre & Dridex in real-time. Powered by intelligence, it provides 100% visibility, allowing companies to be in full control.

Genpact (NYSE: G) stands for "generating business impact." We design, transform, and run intelligent business operations including those that are complex and specific to a set of chosen industries. The result is advanced operating models that foster growth and manage cost, risk, and compliance across a range of functions. We have hundreds of long-term clients including more than one-fourth of the Fortune Global 500 and currently employ over 66,000 employees in 25 countries, with key management and corporate offices in New York City. Behind our passion for process and operational excellence is the Lean and Six Sigma heritage of a former General Electric division that has served GE businesses for more than 16 years.

How financial services organizations build software. Teams across the financial services industry use GitHub to build secure software that doesn’t compromise on collaboration or customer experience. With security built into their process, teams can move fast, embrace user-driven development, and make customers happy—all while maintaining the highest regulatory standard. https://github.com.

HackerOne is the no.1 vulnerability disclosure and bug bounty platform, connecting organizations with the world’s largest community of trusted hackers. More than 800 organizations, including The U.S. Department of Defense, General Motors, Intel, Uber, Twitter, GitHub, Nintendo, LendingClub, Lufthansa, Panasonic Avionics, Qualcomm, Square, Starbucks, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before criminals can exploit them. HackerOne customers have resolved more than 50,000 vulnerabilities and awarded more than $20M in bug bounties. HackerOne is headquartered in San Francisco with offices in London, Seattle, Los Angeles and the Netherlands.


HYAS dives deep into the world of cyber attackers, providing attribution intelligence tools that help security professionals detect and defend their data. In our quest to make the Internet a better place, we strive to go beyond simply helping companies understand their attackers.

For true defence, an organization needs intelligence. It must understand not just what is happening on its network, but what the data means. To do this, it must know its attackers. Where do they come from? What tools, tactics and procedures do they use? At HYAS we have dedicated ourselves to helping them solve it.


HYPR is the leading provider of decentralized authentication with millions of password-less users secured across the Fortune 500. Named a “Cool Vendor” by Gartner, HYPR is trusted by major enterprises such as Mastercard and Samsung to eliminate fraud, enhance user experience, and minimize the risk of a breach.

Companies often store user credentials in a centralized database targeted by hackers. Centralized passwords create a single point of failure and have remained the #1 cause of mass breaches and credential reuse – until now.

The HYPR solution ensures that your users’ credentials always remain safe on personal devices. Eliminating centralized passwords enables HYPR to remove the target and provide a secure password-less experience for your customers and employees.

By decentralizing user authentication, HYPR minimizes the risk of a breach, eliminates credential reuse, and enables enterprises to Trust Anyone.

iboss has created the first and only web gateway as a service specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, the iboss Distributed Gateway Platform leverages an elastic, cloud-based node architecture that provides advanced security for today’s decentralized organizations with more financial predictability. Backed by more than 110 patents and patents pending, and protecting over 4,000 organizations worldwide, iboss is one of the fastest growing cybersecurity companies in the world. To learn more, visit iboss.com.

Illumio, the leader in micro-segmentation, prevents the spread of cyber threats inside data centers and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, Workday, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. Illumio’s Adaptive Security Platform™ uniquely protects critical information with real-time application dependency mapping and micro-segmentation that works in any data center, public cloud, or across hybrid deployments on bare-metal, virtualization, and containers. For more information about Illumio, visit www.illumio.com/what-we-do and follow us @Illumio.

Infoblox delivers Actionable Network Intelligence to enterprises, government agencies, and service providers around the world—Including 7 of the top 10 telecommunications providers, 8 of the top 10 retailers, 8 of the top 10 major banks, and 9 of the top 10 automakers. As the industry leader in DNS, DHCP, and IP address management (DDI), Infoblox provides control and security from the network core. We’re empowering thousands of organizations to pursue the big initiatives that drive business success today—next-generation data centers, security, compliance, and digital transformation—and to achieve increased efficiency and visibility, reduced risk, and better customer experience.

Intel 471 provides unique, high-value actor-centric cyber threat intelligence collection in support of our customers’ information security operations. Whilst some companies may offer indicators/feeds as threat intelligence, Intel 471 focuses on the individual threat actors and groups that pose a threat to your organization and sector.

Intel 471 employs specialists on the ground globally who are experts in their region and is incorporated in the United States.

Intel 471 provides two products accessible via a web portal and API:
Cyber Crime – Covers cyber threat activity from financially motivated cyber criminals.
Hacktivism – Covers cyber threat activity from politically motivated cyber criminals.

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.


IntSights is redefining cyber security with the industry’s first and only enterprise threat management platform that transforms tailored threat intelligence into automated security operations. Our groundbreaking data-mining algorithms and unique cyber reconnaissance capabilities continuously monitor an enterprise's external digital profile across the surface, deep and dark web, categorize and analyze tens of thousands of threats, and automate the risk remediation lifecycle -- streamlining workflows, maximizing resources and securing business operations. This has made IntSights’ one of the fastest growing cybersecurity companies in the world. IntSights’ has offices in Amsterdam, Boston, New York, Dallas and Tel Aviv. To learn more, visit: https://www.intsights.com.


The Kenna Security Platform is a scalable, cloud-based solution that delivers the most informed and accurate risk prioritization available, enabling security and IT operations teams to take a risk-based approach to vulnerability management by prioritizing and proactively managing the vulnerabilities that matter most. Leveraging Cyber Risk Context Technology™, the platform combines 15+ exploit intelligence sources, 3+ billion managed vulnerabilities, global attack telemetry, and remediation intelligence to accurately track and measure real-world exploit activity across the enterprise’s global attack surface. Using predictive modeling technology, the platform can also accurately forecast the future risk of vulnerabilities the instant they’re discovered, allowing organizations to proactively manage risk.

KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using mock attacks, engaging interactive training, continuous assessment through simulated phishing, vishing and smishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance. Learn more at www.KnowBe4.com

Lookingglass Cyber Solutions delivers unified threat protection against sophisticated cyber attacks to global enterprises and government agencies by operationalizing threat intelligence across its end-to-end portfolio. Scalable threat intelligence platforms and network-based threat response products consume our machine-readable data feeds to provide comprehensive threat-driven security. Augmenting the solutions portfolio is a worldwide team of security analysts who continuously enrich our data feeds and provide customers unprecedented understanding and response capability into cyber, physical and 3rd party risks. Prioritized, relevant and timely insights enable customers to take action on threat intelligence across the different stages of the attack life cycle. Learn more at lookingglasscyber.com/.

The ManTech Commercial Services (MCS) and the ManTech Advanced Cyber Range Environment (ACRE) highly skilled experts are equipped to provide collaborative solutions to critical cyberproblems. The MCS innovative approach increases efficiency and lowers costs while incorporating your businesses current process and tools within ManTech’s architecture methodology. The ACRE is a unique physical and virtualized facility that brings best-in-class cyberdefense expertise to a new generation of professionals. Collaborative solutions include compliance and log retention, security information and event management and security operations center supplement or replacement, risk reduction, insider threat, information assurance, cyber-range customization and hands-on cybertraining. mantech.com/cyber


At NETSCOUT we transform and accelerate the way our customers deliver, deploy, and secure services and applications across physical, virtual, and cloud environments. This is achieved using our proprietary Smart Data technology, which distills real time, precise, and relevant intelligence from all connected services and their interactions. NETSCOUT Smart Data fuels the visibility and analytics to protect and assure the user experience in our connected world.


Netskope is the leader in cloud security — we help the largest organizations in the world take full advantage of the cloud and web without sacrificing security. Our patented Cloud XD technology goes deeper than any other security provider to quickly target and control activities across thousands of cloud services and millions of websites. Delivered from a unified cloud-native platform, our customers benefit from 360-degree data and threat protection that works regardless of location or device type. At Netskope, we call this smart cloud security.


NetSPI delivers application and network security solutions to enterprise organizations, globally. Our security testing experts and proprietary technology platform empower organizations to scale and operationalize their security testing programs. Contact us today to learn how we can help you catapult the sophistication of your programs and improve your organizations security posture.

NowSecure is the mobile app security software and services company trusted by the world’s most demanding organizations and most advanced security teams. Only the NowSecure Platform delivers automated 360-degree coverage of mobile app security testing 8X faster and 3X deeper than any alternative. The NowSecure Services team of accomplished mobile security experts delivers comprehensive app security testing program development, penetration testing, and training services for enterprise mobility security. NowSecure identifies the broadest array of security, privacy, and compliance gaps in custom, third-party, and business-critical mobile apps through its unrivaled threat research team, superior testing and analysis, and multiple deployment models.

NSS Labs, the security insight company, is trusted by the world's largest and most demanding enterprises to help make their organizations more secure. Focused exclusively on IT security, NSS provides CEOs, CIOs, CISOs, and information security professionals with data-driven insight to help them make informed security decisions. NSS' heritage is its best-in-class security product testing laboratory, which offers in-depth test reports as well as research and analyst services. This expertise is the premise for its Cyber Advanced Warning System™ - the industry's revolutionary cloud-based security and risk management platform designed to identify and expose active threats that matter. For more information visit: www.nsslabs.com

At Palo Alto Networks, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. As the next-generation security company, we are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud. View our website for more information.

Your biggest asset is also your biggest risk. Whether it is trusted third parties, privileged users, or business users, people – and the lack of visibility many security teams have into their actions - pose the biggest security challenge to organizations. Insiders present a massive risk because they have been given access to critical applications, systems and data to do their jobs. With more than 1,700 global customers across all major verticals, ObserveIT is the only insider threat management solution that empowers security teams to detect insider threats, streamline the investigation process, and prevent data exfiltration.

Phantom is the first community-powered security automation and orchestration platform. It integrates your existing security technologies, providing a layer of connective tissue between them. The Phantom platform helps you work smarter by automating repetitive tasks, effectively force multiplying your team’s efforts and allowing them to focus their attention on mission-critical decisions. It also helps you respond faster and reduce dwell times with automated detection, investigation, and response. Using Phantom helps you strengthen your defenses by integrating your entire security infrastructure together so that each part is actively participating in your defense strategy. For more information visit: phantom.us.

Pindrop Security provides enterprise solutions that help prevent phone-based fraud and provide phone authentication. Pindrop’s breakthrough phoneprinting technology can identify phone devices uniquely based on only the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop’s customers include two of the top five banks and two of the leading online brokerages. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions. View their website for more information.

Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that couples User and Entity Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com

Recently named a Leader in the Gartner Magic Quadrant for IT Vendor Risk Management, Prevalent, is helping global organizations manage and monitor the security threats and risks associated with third and fourth-party vendors. Prevalent introduced the only unified platform for Third-Party Risk Management and the first vendor evidence sharing portal that enables collaboration between both enterprises and vendors. Prevalent is the chosen platform powering the NH-ISAC CYBERFIT(tm) Shared Risk Assessments program and was named the Fastest Growing Cybersecurity Company by the 2017 Cybersecurity Excellence Awards. For more information regarding Prevalent, visit www.prevalent.net.

Proofpoint - As advanced threats increase in frequency and sophistication, it’s never been more important to secure your financial organization's email, by far the number one threat vector. Proofpoint, positioned by Gartner in the Leaders Quadrant in their 2015 Magic Quadrant for Secure Email Gateways, uniquely combines a world class email gateway solution with the industry’s leading Targeted Attack Protection technology, catching and stopping cyber threats from malicious links and attachments hours or even days before traditional defenses.

Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders confidently face the future. Protiviti and our independently owned Member Firms provide consulting solutions in finance, technology, operations, data, analytics, governance, risk and internal audit to our clients through our network of more than 70 offices in over 20 countries.

We have served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index.

Recorded Future delivers threat intelligence powered by patented machine learning to significantly lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to security alerts 10 times faster. To supercharge the efforts of analysts and SOC teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources. Recorded Future delivers measurably more context than threat feeds alone, updates in real time so intelligence stays relevant, and packages information ready for human analysis or instant integration with existing security technology. 86% of the Fortune 100 use Recorded Future.

RiskIQ provides organizations the visibility and intelligence they need to secure their Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of managed, unmanaged and rogue web and mobile assets. This “Digital Footprint” is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com.

SailPoint, the undisputed leader in identity governance, brings the Power of Identity™ to enterprise customers around the world. SailPoint’s open identity platform gives enterprises the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis – securely and confidently. The company pioneered the identity governance market, and provides an integrated set of cloud-based services, including compliance controls, provisioning, password management, single sign-on and data access governance, all built on the belief that identity is a business enabler. SailPoint's customers are among the world’s largest companies in virtually every industry.


The Santa Fe Group works (SFG) collaboratively with organizations worldwide to identify valuable trends and vulnerabilities, and to advise, educate, and empower organizations in the areas of cybersecurity, third party risk, emerging technologies and program management. SFG is the managing agent of the membership-based Shared Assessments Program, which helps many of the world’s leading organizations manage and protect against third party IT security risks.

As the only organization that has uniquely positioned and developed standardized resources to bring efficiencies to the market for more than a decade, the Shared Assessments Program is the trusted leader in third party risk assurance.


Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills and tools to write secure code from the beginning.

We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and Asia Pacific. 

SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.”

To learn more, visit www.secureworks.com


Security Compass is a leader in helping customers proactively manage cybersecurity risk without slowing down their business. Offering Advisory Services, Training, and SD Elements, an award-winning policy to procedure platform for security and compliance. Security Compass enables organizations to rapidly and efficiently deliver technology that's secure by design. Security Compass serves some of the world's largest businesses including seven of the 15 largest financial institutions and four of the 10 largest technology companies in North America.
The privately held company is headquartered in Toronto, Canada with global offices in the United States and India. To learn more, visit www.securitycompass.com

Since 2002, Security Innovation has been helping financial services organizations reduce enterprise risk where they are most vulnerable - at the application layer. We have trained development teams on code security, mitigated risk in critical applications, and improved processes by which applications are built for customers like HSBC, Charles Schwab, Guardian, Capitol One, Metlife and others. The company's flagship CMD+CTRL training platform offers the industry's largest secure development library and a cyber range for staff to hone security skills in real-world banking and e-commerce applications. In a heavily regulated industry where standards such as PCI DSS & OWASP demand the safeguarding of sensitive data, we understand compliance, and the need to go above and beyond standard regulations to prevent malicious attacks. We can help you develop secure applications and avoid the risk of a data breach.For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.

ServiceNow was started in 2004 with the belief that getting simple stuff done at work can be easy, and getting complex multi step tasks completed can be painless. From the beginning, ServiceNow envisioned a world where anyone could create powerful workflows to get enterprise work done. Today, ServiceNow’s cloud-based platform simplifies the way we work through a structured security response engine. ServiceNow Security Operations automates, predicts, digitizes, and optimizes security and vulnerability response to resolve threats quickly based on business impact. Reduce manual processes and increase efficiency across security and IT teams. ServiceNow is how work gets done.

The world's largest enterprises rely on Shape Security as their primary line of defense against fraud and attacks on their web and mobile applications. Shape customers include three of the Top 5 US banks, five of the Top 10 global airlines, two of the Top 5 US insurers, and two of the Top 5 global hotels. The company has raised $100M+ from Kleiner Perkins, Google Ventures, Eric Schmidt, and other leading investors to build an advanced web, mobile, artificial intelligence, and machine learning platform for global scale application defense. The Shape platform, covered by 50 issued patents and 100+ additional patent applications, was designed to stop the most dangerous application attacks enabled by cybercriminal fraud tools, including credential stuffing (account takeover), product scraping, unauthorized aggregation, and other threats. Shape was named by CNBC as one of the 50 most disruptive companies in the world. Today, the Shape Network defends 1.4 billion user accounts from account takeover and protects $1B of in-store mobile payments worldwide. Shape is headed by industry leaders from Google, Cisco, IBM, Raytheon, Palo Alto Networks, and the Department of Defense. Visit us at https://www.shapesecurity.com/

Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Comcast, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring.

Every day, developers rely on millions of third party and open source building blocks — known as components — to build the software hat runs our world. Sonatype ensures that only the best components are used throughout the development lifecycle so that organizations don't have to make the  tradeoff between going fast and being secure. Policy automation, ongoing monitoring and proactive alerts makes it easy to have full visibility and control of components throughout the software supply chain so that applications start secure and remain that way over time. Learn more at www.sonatype.com or in this FS-ISAC Third Party Software Working Group whitepaper (Control Type 3).


Stealth Security provides innovative security software for organizations targeted by an ever-increasing number of sophisticated and advanced bot attacks. The Stealth solution, easily deployed in the cloud or on-premises, uses patented machine learning and behavioral analysis technology first to automatically discover all web, mobile, and API application targets across the customer’s network, then detect in near real-time advanced bot attacks targeting those assets. Stealth also employs automated mitigation and deception controls to block attacks or misdirect fraudsters. Stealth technology deploys across multiple verticals, including financial services, retail, media, gaming, and more. Learn more at www.stealthsec.com.

Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Symphony is the cloud-based messaging and collaboration platform that connects markets, organizations and individuals, securely. Powered by an open and growing app ecosystem, and protected with customer-owned encryption keys, Symphony’s communication platform increases workflow productivity while facilitating global regulatory compliance. Already the platform of choice for the financial services industry, Symphony eliminates inefficient workflows to boost productivity in information-driven businesses. Founded in October 2014 and headquartered in Palo Alto, CA, the company has offices in New York, Hong Kong, Singapore, Stockholm and London.

Synopsys offers the most comprehensive solution for integrating security and quality into your SDLC and supply chain. Whether you’re well-versed in software security or just starting out, we provide the tools you need to ensure the integrity of the applications that power your business. Our holistic approach to software security combines best-in-breed products, industry-leading experts, and a broad portfolio of managed and professional services that work together to improve the accuracy of findings, speed up the delivery of results, and provide solutions for addressing unique application security challenges. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure software. For more information go to www.synopsys.com/software.

Our vision is to put security at the heart of everything you do, from securing your digital environment to enabling your people to become your strongest line of defence. As your global security partner, we provide your business with tailored solutions to build resilience, safeguard operations and empower growth. By combining technical expertise with human ingenuity, we have a heightened understanding of you and your adversary. Our diverse background and inquisitive mindset allow us to tackle each and every challenge in a thorough and agile way. We are Tempest, Intelligence Led, Security Focused. www.tempestsi.com

TITUS solutions enable organizations to discover, classify, protect, analyze and confidently share information. Organizations can use TITUS products to meet regulatory compliance requirements by identifying and securing unstructured data – on the desktop, on mobile devices, and in the cloud. Millions of users in over 120 countries around the world trust TITUS to keep their data compliant and secure. Its customers include Safran Morpho, United States Air Force, NATO, Pratt and Whitney, and Canadian Department of National Defence. Additional information is available at TITUS.com.

ThreatConnect® arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry's only intelligence-driven, extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis and automation needs of security teams at any maturity level. More than 1,600 companies and agencies worldwide deploy the ThreatConnect platform to fully integrate their security technologies, teams, and processes with relevant threat intelligence resulting in reduced detection to response time and enhanced asset protection. To register for a free ThreatConnect account or learn more, visit: www.threatconnect.com.

ThreatQuotient Inc. (TQI) was founded in March 2013 and is dedicated to revolutionizing cyber defense capabilities by building analyst-driven applications, helping organizations manage threat intelligence and therefore defending against sophisticated cyber attacks. Our foundation is built from our operational experience to deliver a relevant vendor agnostic on-premise deployment – allowing analysts to spend more time on high-value processes rather than transferring intelligence across multiple cloud solutions and internal platforms. ThreatQ will advance threat information management through end-to-end automation that transforms disparate data into ACTIONABLE intelligence. Because of its power and ability to provide defenders with critical contextual information, ThreatQ is becoming a team’s cornerstone tool.

Transmit Security allows organizations to implement frictionless omni-channel authentication without making any modifications to their applications. The company’s technology supports any authentication technology, from any vendor, in one modular, micro-services platform that enables application owners to slash time-to-market and cost-to-market for new identity related projects. Transmit Security’s founders created Trusteer (now IBM Security) and Imperva (IMPV on NYSE). The company’s research and development team is made up of former members of Unit 8200, the elite Israeli Intelligence Corps. Transmit Security is self-funded, and based in Boston and Tel-Aviv. For more information visit http://www.transmitsecurity.com/ or follow us on Twitter @TransmitSec.

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. With over 5,000 employees in over 50 countries, and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud. Visit www.trendmicro.com.

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire's portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing. We break down security operations silos, helping you achieve real-time enterprise threat awareness to expedite investigation and know what’s coming next.

Many products are too focused on aggregating feeds, and not focused enough on how we can operationalize data. Any meaningful insight is distorted by information overload.

At TruSTAR, we make your data more meaningful by creating custom workflow systems for users and groups so that you can share information and make decisions faster.

Unbound applies revolutionary breakthroughs in mathematics to allow secrets to be used without ever being exposed, thus ensuring digital assets are safe—anytime, anywhere. Unbound is reinventing the future of security and privacy, enabling business to deliver with unprecedented speed and scale a new world of digital products and services which were previously beyond reach. www.unboundtech.com


ValiMail has developed the world's first cloud service that fully automates email authentication, giving our customers brand and fraud protection across 4.8 billion mailboxes worldwide. ValiMail enables organizations to stop phishing attacks, control shadow email, and improve the reputation of their email domain. ValiMail's patented, standards-compliant technology provides the only zero-administration solution to enable trusted email for enterprises. Customers include Uber, Fannie Mae, Yelp, Twilio, Time Warner, Square, OpenTable, and City National Bank. Founded in 2015, ValiMail is based in San Francisco and is backed by Shasta Ventures, Flybridge Capital Partners, and Bloomberg Beta. For more information visit www.valimail.com.

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise's financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.

Venafi is the market leading cybersecurity company in Next-Generation Trust Protection (NGTP). As a Gartner-recognized Cool Vendor, Venafi delivered the first Trust Protection Platform™ to secure cryptographic keys and digital certificates that every business and government depend on for secure communications, commerce, computing, and mobility. Today organizations that blindly trust keys and certificates are at increased risk of costly attacks, data breaches, audit failures and unplanned outages.

As part of any enterprise infrastructure protection strategy, Venafi TrustAuthority™ and Venafi TrustForce™ help organizations regain control over trust in the cloud, on mobile devices, applications, virtual machines and network devices by protecting Any Key. Any Certificate. Anywhere™. Venafi Threat Center provides primary research and threat intelligence for trust-based attacks.

Virtru is a data security company that protects corporate information from unauthorized access. Our patented technology eliminates the tradeoff between data protection and ease of use by seamlessly integrating directly into platforms like Microsoft Outlook and Office 365, Google G Suite, and other SaaS applications. More than 7,000 customers trust the Virtru Data Protection Platform to easily protect and control sensitive information wherever it's created, stored, or shared.



VirusTotal is one of the world’s largest malware intelligence services. Our goal is to make the internet a safer place through collaboration between members of the antivirus industry, researchers and end users. Millions of people use VirusTotal every day to perform basic research on malware by checking aggregated verdicts from the AV products that participate in the service. The VirusTotal platform also offers advanced and powerful malware intelligence services designed to help analysts perform better understand threats both in the wild and in their networks.

Wapack Labs is a cyber intelligence and threat analysis company that provides early warning and threat detection services for customers worldwide. Unlike feed aggregators, they add meaning to the deluge of data CISOs and enterprise defenders struggle to deal with, provide context, and produce intelligence reports that help you make sound business and security decisions. Wapack Labs has developed a suite of products, services and training that can provide information security professionals the edge they need to prepare for ever increasing cyber threats.


​​

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers.

Yubico is a leading contributor to both the FIDO2 and FIDO Universal 2nd Factor open authentication standards, and the company’s technology is deployed and loved by 9 of the top 10 internet brands and by millions of users in 160 countries. For more information: www.yubico.com.

To read the Affiliate Terms and Conditions (pdf), Click Here.