Affiliates

 

Affiliate Board Advisors

Accenture is a global management consulting, technology services and outsourcing company, with more than 293,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$28.6 billion for the fiscal year ended Aug. 31, 2013. Its home page is www.accenture.com.

Email is the most popular communication tool and the entry point for up to 95% of security breaches. The Agari Email Trust Platform protects employees and their customers and trusted business partners from receiving untrusted and malicious emails. It is the only solution that verifies trusted email identities based on insight into 10 Billion emails per day to stop advanced email threats that use identity deception. Agari restores user confidence in their inbox.

About Cyber Solutions: Aon's Cyber Solutions offers holistic cyber risk management, unsurpassed investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.

About Aon: Aon plc (NYSE:AON) is a leading global professional services firm providing a broad range of risk, retirement and health solutions. Our 50,000 colleagues in 120 countries empower results for clients by using proprietary data and analytics to deliver insights that reduce volatility and improve performance.

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. Booz Allen is headquartered in McLean, Virginia, employs more than 25,000 people, and had revenue of $5.59 billion for the 12 months ended March 31, 2011. To learn more, visit www.boozallen.com. (NYSE: BAH)

Deloitte’s Cyber Risk Services help complex organizations more confidently leverage advanced technologies to achieve their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. With deep experience across a broad range of industries, Deloitte’s more than 1600 practitioners provide advisory and implementation services, spanning executive and technical functions, to help transform legacy IT security programs into proactive Secure.Vigilant.Resilient. cyber risk programs that better align security investments with risk priorities, establish improved threat awareness and visibility, and strengthen the ability of organizations to thrive in the face of cyber incidents.

Learn more about Deloitte’s Cyber Risk Services

EY Advisory believes a better working world means helping clients solve big, complex industry issues and capitalize on opportunities to grow, optimize and protect their businesses. A global mindset, diversity and collaborative culture inspires EY consultants to ask better questions, create innovative answers and realize long-lasting results. The better the question. The better the answer. The better the world works. ey.com/fscyber

Flexera Software delivers market-leading Software Vulnerability Management solutions enabling enterprises to proactively identify and remediate software vulnerabilities, effectively reducing the risk of costly security breaches. Our solutions leverage verified vulnerability intelligence to drive prioritization, and technology to integrate assessment and remediation, bridging the gap between IT security and operations and streamlining critical processes. Serving more than 1,000 enterprise customers globally and leveraging proprietary vulnerability research that tracks more than 50,000 applications and systems, our solutions empower organizations to assess risk, prioritize resources and automate processes to continuously minimize the attack surface that could be exploited by cybercriminals and hackers.

IBM helps financial services firms gain insight and agility through information-led transformation. Forward thinking institutions will use these insights to transform their business within four imperatives: attract and retain customers, develop new revenue sources, streamline operations and pro-actively address risk and regulatory requirements. IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services supported by world-renowned IBM X-Force® research, enabling organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations comprising over 12 Security Operations Centers, 15 software security development labs and over 50 Cloud Data Centers in the United States, Europe, India and Asia Pacific. IBM Security monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.

Learn more: ibm.com/banking | ibm.com/security | securityintelligence.com

KPMG provides audit, tax and advisory services and industry insight to help organizations negotiate risks and perform in today's dynamic and challenging environments. KPMG’s advisory risk consulting professionals help organizations transform risk into enduring competitive advantage while navigating their most complex business issues. Our people offer deep knowledge and insightful opinions to help you enhance risk and create value in a dynamic environment in which outcomes must be managed strategically and with agility. KPMG’s client focus, commitment to excellence, global mind-set, and consistent delivery build trusted relationships that are at the core of our business and reputation. Our experienced IT security and forensic partners and professionals possess leading technical experience and are well regarded in their specialties. We have extensive experience building, delivering and supporting cybersecurity programs to Fortune 500 and Global 2000 companies across a multitude of industries. KPMG Cyber’s approach - Prevent, Improve, Detect, Respond -is designed to be simple and effective, and most importantly aligned with your business needs. For additional insights about KPMG’s Cyber Security Services please visit: advisory.kpmg.us/kpmg-cyber.html

Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world. Its mission is to empower every person and every organization on the planet to achieve more. We enable this digital transformation on a foundation and capability for cybersecurity with products and services that have security built-in from the start. Our unique approach combines a comprehensive, agile platform together with unparalleled intelligence and strategic partnerships in order to better protect your endpoints, to move faster to detect threats, and to respond to security incidents across even the largest of organizations.

NC4 delivers safety and security solutions for both business and government organizations. NC4 revolutionizes how organizations and communities collect, manage, share and disseminate information to reduce cyber threats, fight crime, mitigate risks and manage incidents. NC4 also provides cyber threat sharing solutions both through secure collaboration services and recently (via Soltra Edge), through automated, structured, and standardized (STIX/TAXII) mechanisms..

NC4 currently provides services to the FS-ISAC through its secure collaboration portal and as the Soltra Edge cyber threat sharing repository. NC4 has also launched the Cyber Defense Network for Financial Services as an advanced community focusing on defensive actions..

NC4 solutions are used by private sector companies involved in financial services, high-tech, insurance, manufacturing, aerospace and defense, oil and gas, pharmaceuticals and healthcare, as well as other industries. In the public sector, NC4 solutions are used by federal, state and local agencies in homeland security, emergency management and law enforcement disciplines..

To learn more about how NC4 can benefit your organization, visit https://www.nc4.com/ or call 877-624-4999 or 310-606-4444.


As a managed services provider with more than fifteen years of experience finding and stopping threats outside the traditional network perimeter, PhishLabs is the ideal partner to help financial institutions protect their enterprise, brands, and customers from digital risks.

Services provided by PhishLabs include:

•Digital Risk Protection – Find and stop risks across email, domain, social media, mobile, dark, deep, and open web.
•Security Awareness Training – Minimize risky behaviors and drive employees to report threats.
•Phishing Incident Response – Provide expert human analysis and automated response to potential threats reported by end users.

PhishLabs makes it easier than ever for financial institutions to manage risks across email, domain, social media, mobile, dark, deep, and open web vectors. Our expert-driven, managed approach goes beyond do-it-yourself tools to ensure the digital risk protection outcomes institutions want.

PwC’s cybersecurity consulting team helps organizations understand dynamic cyber challenges, adapt and respond to risks inherent to their business ecosystem, and prioritize and protect the most valuable assets fundamental to their business strategy. For more information on PwC’s cybersecurity point of view, visit: www.pwc.com/cybersecurity.

About PwC’s Advisory Practice - PwC’s Advisory professionals help organizations improve business performance, respond quickly and effectively to crisis, and extract value from transactions. We understand our clients’ industries and unique business challenges, and look across the entire organization — focusing on strategy, structure, people, process and technology — to help clients build their next competitive advantage. See www.pwc.com/us/consulting for more information or follow us @PwCAdvisory.

About PwC US - PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 158 countries with more than 180,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/US. Learn more about PwC by following us online: @PwC_LLP, YouTube, LinkedIn, Facebook and Google +.

RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and, reduce business risk, fraud and cybercrime. RSA protects millions of users around the world and helps more than 90% of Fortune 500 companies thrive in an uncertain, high risk world. For more information, go to RSA.com or follow us on @RSAsecurity

PPISC Affiliates
Affiliates

Agio is a leading IT and Security Managed Services Provider, offering technology hosting, monitoring, management, disaster prevention and recovery, security, and other high-end technology services. With 130+ employees, Agio is headquartered in New York City with operational headquarters in Norman, OK. Learn more at agio.com.


At Akamai, our mission is to make digital experiences fast, intelligent and secure. Our intelligent edge platform surrounds everything, from the enterprise to the cloud. It keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai as their competitive edge. We help them win in the market through agile solutions that extend the power of their multi-cloud world. Our portfolio of edge security, web and mobile performance, enterprise access and video-delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring. At Akamai, we see a world of unimagined potential, all enabled through the unique power of the Akamai Edge. It’s this power that creates the agility our customers need to accelerate and secure their multi-cloud world — and own their digital future.

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred. Visit us at www.anomali.com

Attivo Networks™ is the leader in dynamic deception technology with a strong customer base in financial, healthcare, and other industries that have a need to protect customer and company data from exfiltration. Attivo provides the real-time detection and visibility of inside-the-network and data center intrusions. The Attivo BOTsink® platform uses high-interaction deception to lure BOTs/APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures or database lookup to detect cyber attacks. Whether it is a reconnaissance or stolen credential attack, Attivo provides the forensics required to stop current and prevent future attacks. www.attivonetworks.com

BAE Systems Applied Intelligence helps nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.

We do this using our set of solutions; systems, experience and processes - often collecting and analyzing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world, enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems.

We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA. For further information, visit www.baesystems.com/businessdefense.

Baffle™, the application data protection company, prevents data breaches by securing the end-to-end data access model for applications and databases. Using this method, the technology protects against some of the most recent high-profile attacks and vulnerabilities including Spectre and Meltdown. With its patent-pending technology, Baffle is the only company that can enable encryption of data at-rest, in use, in memory and in the search index without impacting the application and uses AES encryption. Baffle is also the first company to enable secure data processing on a commercial application and database to guarantee data protection.


BehavioSec enables enterprises to transparently and continuously authenticate people across mobile and web apps by integrating its behavioral biometrics platform. BehavioSec pioneered behavioral biometrics, a unique method of authentication dramatically reducing fraud and theft committed by people and malware abusing accounts and credentials. As digital transformation explodes along with fraud risks, global enterprises rely on BehavioSec to lower fraud risks and costs in verifying online identities at scale, without having an adverse effect on digital experience and frustrating their users. BehavioSec currently verifies billions of transactions and millions of users at scale for some of the largest global 2000 companies.


BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments.

BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network.

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third-party risk, benchmark performance, and assess and negotiate cyber insurance premiums.

Blueliv is a leading cyberthreat intelligence provider, headquartered from Barcelona, Spain. We scour the open, deep and dark web to deliver fresh, automated and actionable threat intelligence to organizations, helping protect their networks from the outside in. Blueliv’s scalable cloud-based technology turns global threat data into sophisticated, relevant intelligence. We enable organizations to save time and resource by accelerating incident response performance, providing user-friendly evidence accessible to all levels within cybersecurity operations teams. Our pay-as-you-need solution delivers an accelerated, predictive view of the threat landscape in real-time. We do not believe in a one-size-fits-all approach, and work together to configure a modular solution bespoke to your needs using separate intelligence modules, all backed up by our world-class in-house analyst team. Blueliv has been named a Gartner Cool Vendor and Go-Ignite winner, and been an FS-ISAC affiliate member for several years.


Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats. The company’s real-time deep learning platform is proven to detect known and unknown network threats with speed, efficacy, and coverage that set a new standard for cyber defense. Blue Hexagon is headquartered in Sunnyvale, CA, and backed by Benchmark and Altimeter Capital. For more information, visit www.bluehexagon.ai or follow @bluehexagonai. 


Bromium is the leader in application isolation. We pioneered virtualization-based security to protect your brand, data and people. Using patented hardware-enforced containerization, application isolation automatically isolates threats, providing the last line of defense in the new security stack. Inside an isolated application container, malware can fully execute because the threat has nowhere to go and nothing to steal. Unlike detection-based techniques, Bromium instantly shares threat intelligence to eliminate the impact and adapts to new attacks using behavioral analysis. Fortune 500 companies across every industry and government agencies worldwide trust Bromium application isolation.


Bugcrowd is the #1 crowdsourced security company. More Fortune 500 organizations trust Bugcrowd to manage their bug bounty, vulnerability disclosure, and next gen pen test programs. Bugcrowd’s award-winning platform combines actionable, contextual intelligence with the skill and experience of the world’s most elite hackers to help leading organizations solve security challenges, protect customers, and make the digitally connected world a safer place. Based in San Francisco, Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures, Salesforce Ventures and Triangle Peak Partners. Learn more at www.bugcrowd.com.

Cequence Security delivers multiple innovative application security solutions, deployed within a single, open software platform. Our award-winning Application Security Platform discovers, detects and defends web, mobile, and API application services that today’s hyper-connected organizations rely on to support their business processes and customers. Cequence Security was founded in 2015 and is a privately-held, venture-backed company based in Sunnyvale, CA. Leadership principles are from Palo Alto Networks and Symantec. Learn more at www.cequence.ai.


Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware and business email compromise. Today, this is all made real for thousands of global organizations. Learn more


Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production. More information can be found at www.contrastsecurity.com or by following Contrast on Twitter at @ContrastSec.


Corelight delivers powerful network security monitoring (NSM) solutions that help organizations defend themselves by transforming raw network traffic into rich logs, extracted files, and security insights. Corelight Sensors are built on Zeek (formerly called “Bro”), the open-source NSM framework that generates actionable, real-time data for thousands of security teams worldwide. Zeek has become the network data ‘gold standard’ for incident response, threat hunting, and forensics in large enterprises and government agencies. Corelight makes a family of virtual, cloud, and physical network sensors that take the pain out of deploying and managing open-source Zeek and make it faster and more powerful. Corelight is based in San Francisco, California and its global customers include Fortune 500 companies, large government agencies, and major research universities. To learn more please visit www.corelight.com

CrowdStrike is the leader in cloud-delivered endpoint protection. The CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. CrowdStrike Falcon seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed. CrowdStrike Falcon protects customers against all cyberattack types, using sophisticated signatureless artificial intelligence/machine learning and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates more than 70 billion security events from across the globe to immediately prevent and detect threats.


Cyxtera Technologies combines a worldwide footprint of 50+ best-in-class data centers with a portfolio of modern, cloud- and hybrid-ready security and analytics offerings – providing more than 3,500 enterprises, government agencies and service providers an integrated, secure and resilient infrastructure platform for critical applications and systems.

DefenseStorm is a security data platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective. Built from the ground up in the cloud, DefenseStorm unifies detection, investigation, reporting, and compliance into a single place to manage cybersecurity data. Formed by bankers and technology experts, DefenseStorm aggregates event data across all cybersecurity tools and links policies to real-time alerts, so that financial institutions can prove to regulators they are both secure and compliant with evolving FFIEC cybersecurity requirements. For more information please visit www.DefenseStorm.com.

Serving financial institutions since 1999, Digital Defense’s innovative and leading-edge technology helps organizations safeguard sensitive data and eases the burdens associated with information security. Frontline.Cloud, the original Security SaaS platform, delivers unparalleled accuracy and efficiencies through multiple systems including Frontline Vulnerability Manager (Frontline VM™), Frontline Web Application Scanning (Frontline WAS™), Frontline Active Threat Sweep™ (Frontline ATS™) and Frontline Pen Test™, while SecurED®, the company’s security awareness training, promotes employees’ security-minded behavior.

Contact Digital Defense at 888-273-1412 or visit us at www.digitaldefense.com.


Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLightTM helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com.

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Many large financial services institutions, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.


EclecticIQ enables intelligence-powered cybersecurity for government organizations and commercial enterprises. We develop analyst-centric products and services that align our clients’ cybersecurity focus with their threat reality. The result is intelligence-led security, improved detection and prevention, and cost-efficient security investments.

Our solutions are built specifically for analysts across all intelligence-led security practices such as threat investigation, and threat hunting, as well as incident response efforts. And we tightly integrated our solutions with our customers’ IT security controls and systems.

EclecticIQ operates globally with offices in Europe, United Kingdom, and North-America, and via certified value-add partners.


Eclypsium defends the firmware and hardware layer of your most critical laptops, servers, and network infrastructure. Our technology proactively finds weaknesses in these devices, helps mitigate the risk, and proactively defends against threats like firmware implants and backdoors. This lets security teams manage an attack surface that is largely unseen by traditional security and actively defend against the most sophisticated threats. With Eclypsium you can know that your devices are safe throughout the hardware lifecycle including at the time of purchase, while deployed, and when they return from travel. 


ExtraHop is the leader in analytics for performance monitoring and security. Our platform makes data-driven IT and security a reality, applying advanced analytics and machine learning to all digital interactions to deliver timely and accurate insight. Business, security and IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Microsoft, Adobe, and DIRECTV.


Farsight Security is the world’s largest provider of historic and real-time DNS intelligence. We enable security teams to qualify, enrich and correlate all sources of threat data and ultimately save time when it is most critical - during an attack or investigation. Our DNS intelligence solutions are easily integrated into TIPs, SIEMs and SOAR platforms to provide enterprise, government and security industry personnel with unmatched global visibility, context and response. Farsight Security is headquartered in San Mateo, California, USA. Learn more about how we can empower your threat platform and security team with Farsight Security DNS intelligence solutions at www.farsightsecurity.com.

FICO is a leading analytics software company, helping businesses in 80+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. FICO provides analytics software and tools across multiple industries to manage risk, fight fraud, build profitable customer relationships, optimize operations and meet strict government regulations.

Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations with a decision advantage over potential threats and adversaries. The company’s sophisticated technology and human-powered analysis enable enterprises and public sector organizations globally to bolster cybersecurity, confront fraud, detect insider threats, enhance physical security, assess M&A opportunities, and address vendor risk and supply chain integrity. Flashpoint is backed by Georgian Partners, Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information, visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people's intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.


Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environment and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, 100-percent real-time discovery and classification, as well as continuous posture assessment. As of December 31, 2018, 3,300 customers in over 80 countries rely on Forescout’s infrastructure-agnostic solution to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity. Learn how at www.forescout.com

Global cybersecurity leader Fox-IT's 200+ employees create solutions for a more secure society. Dedicated to clients, and our integrity, Fox-IT delivers solutions before, during and after attacks. InTELL provides global visibility into on-line threats. Our world-wide customers value the unique context and attribution. Our rich STXI/TAXII feeds power their defenses. DetACT delivers real-time web and mobile event analytics, detecting attacks and anomalies to on-line channels. It is the only solution to detect and stop past and present channel attacks like Dyre & Dridex in real-time. Powered by intelligence, it provides 100% visibility, allowing companies to be in full control.


Enable your business – allow every link to be clicked, browse the web with confidence. Garrison has developed patented isolation technology to provide hardware-enforced secure remote browsing for enterprise customers. This innovative approach ensures a great user experience even when deployed across the largest of enterprises, whilst achieving unparalleled security. Garrison’s unique Silicon Assured Video Isolation (Garrison SAVI®) provides a game-changing platform for secure remote browsing: security strong enough for governments and high-risk payment processing teams, but at a price point and level of usability that’s suitable for deployment at scale across mainstream enterprises. Learn more at www.garrison.com.

Genpact (NYSE: G) stands for "generating business impact." We design, transform, and run intelligent business operations including those that are complex and specific to a set of chosen industries. The result is advanced operating models that foster growth and manage cost, risk, and compliance across a range of functions. We have hundreds of long-term clients including more than one-fourth of the Fortune Global 500 and currently employ over 66,000 employees in 25 countries, with key management and corporate offices in New York City. Behind our passion for process and operational excellence is the Lean and Six Sigma heritage of a former General Electric division that has served GE businesses for more than 16 years.

How financial services organizations build software. Teams across the financial services industry use GitHub to build secure software that doesn’t compromise on collaboration or customer experience. With security built into their process, teams can move fast, embrace user-driven development, and make customers happy—all while maintaining the highest regulatory standard. https://github.com.


GuidePoint Security LLC provides innovative and valuable cybersecurity solutions and expertise that enable organizations to successfully achieve their missions. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Learn more at: www.guidepointsecurity.com.

HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security alternative. The U.S. Department of Defense, General Motors, Google, Nintendo, Lufthansa, Starbucks, Intel, and over 1,200 other organizations have partnered with HackerOne to resolve over 100,000 vulnerabilities and award over $50.5M in bug bounties.


HYAS dives deep into the world of cyber attackers, providing attribution intelligence tools that help security professionals detect and defend their data. In our quest to make the Internet a better place, we strive to go beyond simply helping companies understand their attackers.

For true defence, an organization needs intelligence. It must understand not just what is happening on its network, but what the data means. To do this, it must know its attackers. Where do they come from? What tools, tactics and procedures do they use? At HYAS we have dedicated ourselves to helping them solve it.


HYPR is the leading provider of True Password-less Security.

With millions of users deployed across the Global 2000, HYPR is the first Decentralized Authentication Platform designed to eliminate credential reuse, fraud and phishing for consumers and employees across the enterprise.

When passwords are stored inside the enterprise, they create a single point of failure. Centralized passwords are the primary target for hackers and have remained the #1 cause of mass breaches, credential reuse, fraud and phishing attacks.

HYPR removes centralized passwords from the enterprise by securely storing user credentials on their mobile devices. By enabling true password-less security, HYPR eliminates credential breaches, enhances user experience, and empowers enterprises to Trust Anyone.

iboss has created the first and only web gateway as a service specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, the iboss Distributed Gateway Platform leverages an elastic, cloud-based node architecture that provides advanced security for today’s decentralized organizations with more financial predictability. Backed by more than 110 patents and patents pending, and protecting over 4,000 organizations worldwide, iboss is one of the fastest growing cybersecurity companies in the world. To learn more, visit iboss.com.

Illumio, the leader in micro-segmentation, prevents the spread of cyber threats inside data centers and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, Workday, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. Illumio’s Adaptive Security Platform™ uniquely protects critical information with real-time application dependency mapping and micro-segmentation that works in any data center, public cloud, or across hybrid deployments on bare-metal, virtualization, and containers. For more information about Illumio, visit www.illumio.com/what-we-do and follow us @Illumio.


Illusive Networks stops cyberattacks by destroying attackers’ ability to make safe decisions as they attempt to move toward their targets. Using Illusive, organizations eliminate high-risk pathways to critical systems, detect attackers early in the attack process, and capture real-time forensics that focus and accelerate incident response and improve resilience. Through simple, agentless technology, Illusive provides nimble, easy-to-use solutions that enable organizations to continuously improve their cyber risk posture and function with greater confidence and agility. For more information, visit us at www.illusivenetworks.com or contact info@illusivenetworks.com.


Infoblox is leading the way to next-level DDI with its Secure Cloud-Managed Network Services. Infoblox brings next-level security, reliability, and automation to cloud and hybrid systems, setting customers on a path to a single pane of glass for network management. Infoblox is a recognized leader with 50 percent market share comprised of 8,000 customers, including 350 of the Fortune 500. Learn more at http://www.infoblox.com.

Intel 471 provides unique, high-value actor-centric cyber threat intelligence collection in support of our customers’ information security operations. Whilst some companies may offer indicators/feeds as threat intelligence, Intel 471 focuses on the individual threat actors and groups that pose a threat to your organization and sector.

Intel 471 employs specialists on the ground globally who are experts in their region and is incorporated in the United States.

Intel 471 provides two products accessible via a web portal and API:
Cyber Crime – Covers cyber threat activity from financially motivated cyber criminals.
Hacktivism – Covers cyber threat activity from politically motivated cyber criminals.

 

 


IntSights is redefining cyber security with the industry’s first and only enterprise threat management platform that transforms tailored threat intelligence into automated security operations. Our groundbreaking data-mining algorithms and unique cyber reconnaissance capabilities continuously monitor an enterprise's external digital profile across the surface, deep and dark web, categorize and analyze tens of thousands of threats, and automate the risk remediation lifecycle -- streamlining workflows, maximizing resources and securing business operations. This has made IntSights’ one of the fastest growing cybersecurity companies in the world. IntSights’ has offices in Amsterdam, Boston, New York, Dallas and Tel Aviv. To learn more, visit: https://www.insights.com/us/.


Founded in 2014 by GEN (Ret.) Keith Alexander the former Director of the National Security Agency (NSA) and Founding Commander of US Cyber Command, IronNet is a global cybersecurity leader that is revolutionizing how enterprises, industries, and governments secure their networks. IronNet takes the skills of its top-notch cybersecurity operators with their real-world, public and private sector, offensive and defensive cyber experience, and integrates their deep tradecraft knowledge into its solutions to help enterprises of all sizes collectively defend against advanced threats that target their industries.

Learn more about IronNet Cybersecurity at https://www.ironnet.com or follow us on Twitter at @IronNetCyber.


The Kenna Security Platform is a scalable, cloud-based solution that delivers the most informed and accurate risk prioritization available, enabling security and IT operations teams to take a risk-based approach to vulnerability management by prioritizing and proactively managing the vulnerabilities that matter most. Leveraging Cyber Risk Context Technology™, the platform combines 15+ exploit intelligence sources, 3+ billion managed vulnerabilities, global attack telemetry, and remediation intelligence to accurately track and measure real-world exploit activity across the enterprise’s global attack surface. Using predictive modeling technology, the platform can also accurately forecast the future risk of vulnerabilities the instant they’re discovered, allowing organizations to proactively manage risk.


Kinetica is the insight engine for the Extreme Data Economy. The Kinetica engine combines artificial intelligence and machine learning, data visualization and location-based analytics, and the accelerated computing power of a GPU database across healthcare, energy, telecommunications, retail, and financial services. Kinetica has a rich partner ecosystem, including NVIDIA, Dell, HP, and IBM, and is privately held, backed by leading global venture capital firms Canvas Ventures, Citi Ventures, GreatPoint Ventures, and Meritech Capital Partners. For more information and trial downloads, visit kinetica.com or follow us on LinkedIn and Twitter.

KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using mock attacks, engaging interactive training, continuous assessment through simulated phishing, vishing and smishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance. Learn more at www.KnowBe4.com


Leidos Cyber is a global provider of cybersecurity services focused on developing, implementing, maintaining, and securing critical infrastructures for both government and commercial clients in Oil and Gas, Utilities, Financial Services, Healthcare, and Chemical industries. Leidos cybersecurity practitioners are recognized for their expertise by both our FORTUNE 500® clients and leading market research organizations. Leidos Cyber practitioners span the globe, overseeing hundreds of active programs providing services and solutions to protect the networks of our commercial clients’ infrastructures.

Lookingglass Cyber Solutions delivers unified threat protection against sophisticated cyber attacks to global enterprises and government agencies by operationalizing threat intelligence across its end-to-end portfolio. Scalable threat intelligence platforms and network-based threat response products consume our machine-readable data feeds to provide comprehensive threat-driven security. Augmenting the solutions portfolio is a worldwide team of security analysts who continuously enrich our data feeds and provide customers unprecedented understanding and response capability into cyber, physical and 3rd party risks. Prioritized, relevant and timely insights enable customers to take action on threat intelligence across the different stages of the attack life cycle. Learn more at lookingglasscyber.com/.

The ManTech Commercial Services (MCS) and the ManTech Advanced Cyber Range Environment (ACRE) highly skilled experts are equipped to provide collaborative solutions to critical cyberproblems. The MCS innovative approach increases efficiency and lowers costs while incorporating your businesses current process and tools within ManTech’s architecture methodology. The ACRE is a unique physical and virtualized facility that brings best-in-class cyberdefense expertise to a new generation of professionals. Collaborative solutions include compliance and log retention, security information and event management and security operations center supplement or replacement, risk reduction, insider threat, information assurance, cyber-range customization and hands-on cybertraining. mantech.com/cyber


Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors. The company’s patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security products can be deployed in the public or private cloud and are trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Company headquarters are in Menlo Park, California. For more information, please visit http://www.menlosecurity.com or @menlosecurity.

MSA is a specialized security company that began in 1987 and has since grown into a recognized industry leader in high consequence threat protection and specialized training for corporate and government clients.

MSA has a robust operational protection capability that includes facility and perimeter security, executive protection, special event planning, WMD detection, and the largest privately owned single handler explosive detection canine company in North America. MSA's comprehensive consulting services consist of counterterrorism threat and intelligence analysis, risk and vulnerability assessment, maritime training and protection services, and physical security design. We also offer complete security systems design and integration, continuity of operations planning, and security program audits. Learn more: msasecurity.net


At NETSCOUT we transform and accelerate the way our customers deliver, deploy, and secure services and applications across physical, virtual, and cloud environments. This is achieved using our proprietary Smart Data technology, which distills real time, precise, and relevant intelligence from all connected services and their interactions. NETSCOUT Smart Data fuels the visibility and analytics to protect and assure the user experience in our connected world.


Netskope is the leader in cloud security — we help the largest organizations in the world take full advantage of the cloud and web without sacrificing security. Our patented Cloud XD technology goes deeper than any other security provider to quickly target and control activities across thousands of cloud services and millions of websites. Delivered from a unified cloud-native platform, our customers benefit from 360-degree data and threat protection that works regardless of location or device type. At Netskope, we call this smart cloud security.


NetSPI delivers application and network security solutions to enterprise organizations, globally. Our security testing experts and proprietary technology platform empower organizations to scale and operationalize their security testing programs. Contact us today to learn how we can help you catapult the sophistication of your programs and improve your organizations security posture.

NowSecure is the mobile app security software and services company trusted by the world’s most demanding organizations and most advanced security teams. Only the NowSecure Platform delivers automated 360-degree coverage of mobile app security testing 8X faster and 3X deeper than any alternative. The NowSecure Services team of accomplished mobile security experts delivers comprehensive app security testing program development, penetration testing, and training services for enterprise mobility security. NowSecure identifies the broadest array of security, privacy, and compliance gaps in custom, third-party, and business-critical mobile apps through its unrivaled threat research team, superior testing and analysis, and multiple deployment models.

NSS Labs, the security insight company, is trusted by the world's largest and most demanding enterprises to help make their organizations more secure. Focused exclusively on IT security, NSS provides CEOs, CIOs, CISOs, and information security professionals with data-driven insight to help them make informed security decisions. NSS' heritage is its best-in-class security product testing laboratory, which offers in-depth test reports as well as research and analyst services. This expertise is the premise for its Cyber Advanced Warning System™ - the industry's revolutionary cloud-based security and risk management platform designed to identify and expose active threats that matter. For more information visit: www.nsslabs.com

Your biggest asset is also your biggest risk. Whether it is trusted third parties, privileged users, or business users, people – and the lack of visibility many security teams have into their actions - pose the biggest security challenge to organizations. Insiders present a massive risk because they have been given access to critical applications, systems and data to do their jobs. With more than 1,700 global customers across all major verticals, ObserveIT is the only insider threat management solution that empowers security teams to detect insider threats, streamline the investigation process, and prevent data exfiltration.


Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,600 organizations, including Experian, FICO, Nasdaq, TP ICAP and Motorists Insurance Group, trust Okta to securely connect their people and technology.

At Palo Alto Networks, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. As the next-generation security company, we are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud. View our website for more information.

Perch Security is the first cyber Community Defense Platform. Perch makes threat intelligence accessible and affordable for the “everyone else” – non-giant organizations who don’t have dedicated threat analysts on staff. Now small and mid-size businesses can mount a cyber defense with curated community intelligence and participate within the sharing community; all without a SIEM, a TIP, or increasing staff. Perch is headquartered in Tampa, Florida. To find out more or to join our flock, visit www.perchsecurity.com

Pindrop Security provides enterprise solutions that help prevent phone-based fraud and provide phone authentication. Pindrop’s breakthrough phoneprinting technology can identify phone devices uniquely based on only the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop’s customers include two of the top five banks and two of the leading online brokerages. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions. View their website for more information.

Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that couples User and Entity Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com


As a leader in the Gartner MQ and Forrester Wave, Prevalent makes third party business relationships more secure and compliant. It is the industry’s only comprehensive platform that integrates a powerful combination of automated risk-tiered assessments, continuous monitoring, and evidence sharing for collaboration between enterprises and vendors. No other cloud-based product on the market combines all three components, providing the best solution for a highly-functioning, efficient third party risk program. Prevalent’s actionable intelligence accelerates time to value, improves scale, and increases efficiency across any organization. 

Proofpoint - As advanced threats increase in frequency and sophistication, it’s never been more important to secure your financial organization's email, by far the number one threat vector. Proofpoint, positioned by Gartner in the Leaders Quadrant in their 2015 Magic Quadrant for Secure Email Gateways, uniquely combines a world class email gateway solution with the industry’s leading Targeted Attack Protection technology, catching and stopping cyber threats from malicious links and attachments hours or even days before traditional defenses.

Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders confidently face the future. Protiviti and our independently owned Member Firms provide consulting solutions in finance, technology, operations, data, analytics, governance, risk and internal audit to our clients through our network of more than 70 offices in over 20 countries.

We have served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index.

Recorded Future delivers threat intelligence powered by patented machine learning to significantly lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to security alerts 10 times faster. To supercharge the efforts of analysts and SOC teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources. Recorded Future delivers measurably more context than threat feeds alone, updates in real time so intelligence stays relevant, and packages information ready for human analysis or instant integration with existing security technology. 86% of the Fortune 100 use Recorded Future.


ReversingLabs empowers organizations to find, understand and neutralize malware that has eluded other security measures and now resides undetected inside their networks. Our solutions combine unique Static Analysis technology with authoritative, comprehensive threat intelligence about files in-the-wild to provide on-premises, secure capabilities for advanced malware identification, hunting, and analysis. These solutions give control back to our customers to zero-in on the unknown threats embedded in their networks, understand the breadth and intent of these attacks, and initiate rapid mitigation measures. ReversingLabs solutions deliver the visibility, speed, and scalability that large enterprises and government need to rid their networks of undetected malware.

RiskIQ provides organizations the visibility and intelligence they need to secure their Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of managed, unmanaged and rogue web and mobile assets. This “Digital Footprint” is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com.


SafeBreach is the leader in Breach and Attack Simulation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture to proactively predict attacks, validate security controls and improve SOC analyst response. SafeBreach automatically executes thousands of breach methods from an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. Headquartered in Sunnyvale, California, the company is funded by Sequoia Capital, Deutsche Telekom Capital Partners, Draper Nexus, Hewlett Packard Pathfinder, PayPal, and investor Shlomo Kramer. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.

SailPoint, the undisputed leader in identity governance, brings the Power of Identity™ to enterprise customers around the world. SailPoint’s open identity platform gives enterprises the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis – securely and confidently. The company pioneered the identity governance market, and provides an integrated set of cloud-based services, including compliance controls, provisioning, password management, single sign-on and data access governance, all built on the belief that identity is a business enabler. SailPoint's customers are among the world’s largest companies in virtually every industry.

Salesforce is the global leader in customer relationship management (CRM), helping companies connect with their customers in a whole new way. Founded in 1999, Salesforce enables companies of every size and industry to take advantage of powerful Fourth Industrial Revolution technologies—cloud, mobile, social, internet of things, and artificial intelligence—to get closer to their customers. The Salesforce Customer Success Platform includes industry-leading services spanning sales, service, marketing, commerce, communities, collaboration and industries, all on a single trusted cloud platform.


The Santa Fe Group works (SFG) collaboratively with organizations worldwide to identify valuable trends and vulnerabilities, and to advise, educate, and empower organizations in the areas of cybersecurity, third party risk, emerging technologies and program management. SFG is the managing agent of the membership-based Shared Assessments Program, which helps many of the world’s leading organizations manage and protect against third party IT security risks.

As the only organization that has uniquely positioned and developed standardized resources to bring efficiencies to the market for more than a decade, the Shared Assessments Program is the trusted leader in third party risk assurance.


Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills and tools to write secure code from the beginning.

We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and Asia Pacific. 


Security Compass is a leader in helping customers proactively manage cybersecurity risk without slowing down their business. Offering Advisory Services, Training, and SD Elements, an award-winning policy to procedure platform for security and compliance. Security Compass enables organizations to rapidly and efficiently deliver technology that's secure by design. Security Compass serves some of the world's largest businesses including seven of the 15 largest financial institutions and four of the 10 largest technology companies in North America.
The privately held company is headquartered in Toronto, Canada with global offices in the United States and India. To learn more, visit www.securitycompass.com


Securonix is redefining the next generation of cyber-threat detection using the power of machine learning and big data. Our purpose-built security analytics platform uses machine learning to track and create baselines of user, account, and system behavior, and detects the most advanced insider threats, cyber threats, and fraud activities in real time. Built on Hadoop, the Securonix solution provides an open platform with unlimited scalability. Securonix provides incident orchestration capabilities with playbooks that enable automated incident response. Globally, customers use Securonix to address their insider threat, cyber threat, cloud security, fraud, and application security monitoring requirements. Visit www.securonix.com

ServiceNow was started in 2004 with the belief that getting simple stuff done at work can be easy, and getting complex multi step tasks completed can be painless. From the beginning, ServiceNow envisioned a world where anyone could create powerful workflows to get enterprise work done. Today, ServiceNow’s cloud-based platform simplifies the way we work through a structured security response engine. ServiceNow Security Operations automates, predicts, digitizes, and optimizes security and vulnerability response to resolve threats quickly based on business impact. Reduce manual processes and increase efficiency across security and IT teams. ServiceNow is how work gets done.

The world's largest enterprises rely on Shape Security as their primary line of defense against fraud and attacks on their web and mobile applications. Shape customers include three of the Top 5 US banks, five of the Top 10 global airlines, two of the Top 5 US insurers, and two of the Top 5 global hotels. The company has raised $100M+ from Kleiner Perkins, Google Ventures, Eric Schmidt, and other leading investors to build an advanced web, mobile, artificial intelligence, and machine learning platform for global scale application defense. The Shape platform, covered by 50 issued patents and 100+ additional patent applications, was designed to stop the most dangerous application attacks enabled by cybercriminal fraud tools, including credential stuffing (account takeover), product scraping, unauthorized aggregation, and other threats. Shape was named by CNBC as one of the 50 most disruptive companies in the world. Today, the Shape Network defends 1.4 billion user accounts from account takeover and protects $1B of in-store mobile payments worldwide. Shape is headed by industry leaders from Google, Cisco, IBM, Raytheon, Palo Alto Networks, and the Department of Defense. Visit us at https://www.shapesecurity.com/

Silobreaker is a technology company that helps business, security and intelligence professionals make sense of the overwhelming amount of unstructured data on the web. By providing powerful tools and visualizations that cut through the noise and analyze data from millions of sources, Silobreaker makes it easy for its users to monitor and research companies, industries, threats, compromises, actors, instabilities, geopolitical developments or any other topic, incident or event. Customers save time by working more efficiently through large data-sets and improve their expertise, knowledge and decision-making by examining and interpreting contextually relevant data more easily. www.silobreaker.com 

Silverfort delivers strong authentication across complex corporate networks and cloud environments, without requiring any software agents, proxies or local configurations. Silverfort seamlessly enables adaptive multi-factor authentication (MFA) for all sensitive users, devices and resources, including systems that don’t support it today, such as legacy and homegrown systems, IT infrastructure (e.g. hypervisors, DCs and network equipment), critical financial servers (e.g. SWIFT servers and Cardholder Data Environment), file shares, databases, IoT devices and more.
Silverfort enables financial organizations to detect and mitigate threats in real-time (account takeover, lateral movement, ransomware and more), and achieve compliance with PCI DSS, SWIFT CSP, NY-DFS, GDPR and more. Visit us at www.Silverfort.com 

​​
Sixgill’s cyber threat intelligence solution focuses on your intelligence needs, helping you mitigate risk to your organization, more effectively and more efficiently. Using an agile and automatic collection methodology, Sixgill provides you with broad coverage of exclusive-access deep and dark web sources as well as relevant surface web sources. Utilizing artificial intelligence and machine learning, Sixgill automates the production cycle of cyber intelligence from monitoring, to extraction to production, uniquely focusing on relevant threats operating in these sources. A market leader in deep and dark web cyber threat intelligence, Sixgill provides threat intelligence solutions to enterprises around the world including Fortune 500 companies, financial institutions, and law enforcement agencies, addressing a wide range of cybersecurity challenges. 

Every day, developers rely on millions of third party and open source building blocks — known as components — to build the software hat runs our world. Sonatype ensures that only the best components are used throughout the development lifecycle so that organizations don't have to make the  tradeoff between going fast and being secure. Policy automation, ongoing monitoring and proactive alerts makes it easy to have full visibility and control of components throughout the software supply chain so that applications start secure and remain that way over time. Learn more at www.sonatype.com or in this FS-ISAC Third Party Software Working Group whitepaper (Control Type 3).

Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Symphony is the cloud-based messaging and collaboration platform that connects markets, organizations and individuals, securely. Powered by an open and growing app ecosystem, and protected with customer-owned encryption keys, Symphony’s communication platform increases workflow productivity while facilitating global regulatory compliance. Already the platform of choice for the financial services industry, Symphony eliminates inefficient workflows to boost productivity in information-driven businesses. Founded in October 2014 and headquartered in Palo Alto, CA, the company has offices in New York, Hong Kong, Singapore, Stockholm and London.

Synopsys offers the most comprehensive solution for integrating security and quality into your SDLC and supply chain. Whether you’re well-versed in software security or just starting out, we provide the tools you need to ensure the integrity of the applications that power your business. Our holistic approach to software security combines best-in-breed products, industry-leading experts, and a broad portfolio of managed and professional services that work together to improve the accuracy of findings, speed up the delivery of results, and provide solutions for addressing unique application security challenges. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure software. For more information go to www.synopsys.com/software.

TITUS solutions enable organizations to discover, classify, protect, analyze and confidently share information. Organizations can use TITUS products to meet regulatory compliance requirements by identifying and securing unstructured data – on the desktop, on mobile devices, and in the cloud. Millions of users in over 120 countries around the world trust TITUS to keep their data compliant and secure. Its customers include Safran Morpho, United States Air Force, NATO, Pratt and Whitney, and Canadian Department of National Defence. Additional information is available at TITUS.com.

ThreatConnect® arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry's only intelligence-driven, extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis and automation needs of security teams at any maturity level. More than 1,600 companies and agencies worldwide deploy the ThreatConnect platform to fully integrate their security technologies, teams, and processes with relevant threat intelligence resulting in reduced detection to response time and enhanced asset protection. To register for a free ThreatConnect account or learn more, visit: www.threatconnect.com.

ThreatQuotient Inc. (TQI) was founded in March 2013 and is dedicated to revolutionizing cyber defense capabilities by building analyst-driven applications, helping organizations manage threat intelligence and therefore defending against sophisticated cyber attacks. Our foundation is built from our operational experience to deliver a relevant vendor agnostic on-premise deployment – allowing analysts to spend more time on high-value processes rather than transferring intelligence across multiple cloud solutions and internal platforms. ThreatQ will advance threat information management through end-to-end automation that transforms disparate data into ACTIONABLE intelligence. Because of its power and ability to provide defenders with critical contextual information, ThreatQ is becoming a team’s cornerstone tool.


Transmit Security allows organizations to implement frictionless omni-channel authentication without making any modifications to their applications. The company’s technology supports any authentication technology, from any vendor, in one modular, micro-services platform that enables application owners to slash time-to-market and cost-to-market for new identity related projects. Transmit Security’s founders created Trusteer (now IBM Security) and Imperva (IMPV on NYSE). The company’s research and development team is made up of former members of Unit 8200, the elite Israeli Intelligence Corps. Transmit Security is self-funded, and based in Boston and Tel-Aviv. For more information visit http://www.transmitsecurity.com/ or follow us on Twitter @TransmitSec.

   

TruSTAR is a cyber intelligence management platform that helps enterprises easily manage and operationalize their intelligence starting from within. The platform uses Enclave based architecture to fuse and correlate data reducing time to mitigate and strengthening security operation effectiveness. TruSTAR surfaces the most valuable security data often locked inside silos in and across companies. The company is the technology infrastructure that manages intelligence for many of the U.S.’s largest ISACs and ISAOs, and has enterprise customers that span across Finance, Retail, Healthcare, Aerospace, and IT. Learn more at www.trustar.co and follow us on Twitter at @TruSTARtech.


Tufin® is the leader in Network Security Policy Orchestration, providing enterprises with the ability to streamline the management of security policies across complex, heterogeneous environments. Serving over 2,000 customers and more than half of the top 50 companies in the Forbes Global 2000, Tufin’s network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin assures business continuity with a robust security posture, rapid service delivery and regulatory compliance across physical, private, public and hybrid cloud environments. Find out more at www.tufin.com.

Unisys is a global technology company that builds high-performance, security-centric solutions for the most demanding businesses and governments. Some of our offerings include security software, workplace services, industry applications and innovative software operating environments. We build better outcomes for our clients across the Government, Financial Services and Commercial markets.

The pressures institutions face is constantly evolving and you’re juggling increased expectations, capitalization requirements, regulations, and cyber threats.
With Unisys, you’ll simplify and automate operations, so you can drive sustainable growth and differentiation while delivering an enhanced customer experience.


ValiMail has developed the world's first cloud service that fully automates email authentication, giving our customers brand and fraud protection across 4.8 billion mailboxes worldwide. ValiMail enables organizations to stop phishing attacks, control shadow email, and improve the reputation of their email domain. ValiMail's patented, standards-compliant technology provides the only zero-administration solution to enable trusted email for enterprises. Customers include Uber, Fannie Mae, Yelp, Twilio, Time Warner, Square, OpenTable, and City National Bank. Founded in 2015, ValiMail is based in San Francisco and is backed by Shasta Ventures, Flybridge Capital Partners, and Bloomberg Beta. For more information visit www.valimail.com.

Venafi is the market leading cybersecurity company in Next-Generation Trust Protection (NGTP). As a Gartner-recognized Cool Vendor, Venafi delivered the first Trust Protection Platform™ to secure cryptographic keys and digital certificates that every business and government depend on for secure communications, commerce, computing, and mobility. Today organizations that blindly trust keys and certificates are at increased risk of costly attacks, data breaches, audit failures and unplanned outages.

As part of any enterprise infrastructure protection strategy, Venafi TrustAuthority™ and Venafi TrustForce™ help organizations regain control over trust in the cloud, on mobile devices, applications, virtual machines and network devices by protecting Any Key. Any Certificate. Anywhere™. Venafi Threat Center provides primary research and threat intelligence for trust-based attacks.


Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world.
With its combination of automation, integrations, process, and speed, Veracode helps companies make security a seamless part of the development process. This allows them to both find and fix security defects so that they can use software to achieve their missions. 


Verodin is a business platform that provides organizations with the evidence needed to measure, manage, and improve their cybersecurity effectiveness. The Verodin Security Instrumentation Platform (SIP) provides proof that cybersecurity technologies and processes are effective across endpoint, email, cloud, and network controls, enabling organizations to continuously validate the protection of their business-critical assets. Verodin has a diverse, global customer base and is backed by world-class investors including Bessemer Venture Partners, Blackstone, Capital One Growth Ventures, Cisco Investments, Citi Ventures, ClearSky, Crosslink Capital, Rally Ventures, and TenEleven Ventures.

Virtru is a data security company that protects corporate information from unauthorized access. Our patented technology eliminates the tradeoff between data protection and ease of use by seamlessly integrating directly into platforms like Microsoft Outlook and Office 365, Google G Suite, and other SaaS applications. More than 7,000 customers trust the Virtru Data Protection Platform to easily protect and control sensitive information wherever it's created, stored, or shared.



VirusTotal is one of the world’s largest malware intelligence services. Our goal is to make the internet a safer place through collaboration between members of the antivirus industry, researchers and end users. Millions of people use VirusTotal every day to perform basic research on malware by checking aggregated verdicts from the AV products that participate in the service. The VirusTotal platform also offers advanced and powerful malware intelligence services designed to help analysts perform better understand threats both in the wild and in their networks.


VMRay is a market-leading automated malware analysis and detection platform. It brings together a revolutionary, dynamic analysis engine with rapid reputation and static analysis, providing total visibility into malware behavior and noise-free output for fast, accurate incident response. Completely invisible to malware, VMRay detects even the most evasive threats.


​​

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers.

Yubico is a leading contributor to both the FIDO2 and FIDO Universal 2nd Factor open authentication standards, and the company’s technology is deployed and loved by 9 of the top 10 internet brands and by millions of users in 160 countries. For more information: www.yubico.com.


ZeroFOX, the market leader in social media & digital protection, safeguards modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using diverse data sources and artificial intelligence-based analysis, the ZeroFOX Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFOX SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains and more. 

 


Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, the Zscaler multi-tenant, distributed security cloud protects thousands of customers from cyberattacks and data loss, so they can embrace cloud agility, speed, and cost containment—securely.

To read the Affiliate Terms and Conditions (pdf), Click Here.