Affiliate Board Advisors

Accenture is a global management consulting, technology services and outsourcing company, with more than 293,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$28.6 billion for the fiscal year ended Aug. 31, 2013. Its home page is

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. Booz Allen is headquartered in McLean, Virginia, employs more than 25,000 people, and had revenue of $5.59 billion for the 12 months ended March 31, 2011. To learn more, visit (NYSE: BAH)

For enterprises concerned about their exposure to increasing online risk, BrandProtect™ provides a complete suite of world class cyber threat detection analysis and intelligence services to monitor the entire social Internet spectrum and mitigate business risk arising from illegal, infringing, or threatening online activity.

BrandProtect deploys an unmatchable combination of advanced proprietary threat detection technology, along with a professional team of deeply experienced threat analysts to quickly identify, analyze, and mitigate cyber threats against intellectual property, physical locations, executives and employees, as well as reputational and compliance risks. These risks can occur as a result of online brand abuse, trademark infringement incidents, phishing attacks, web traffic diversions, website integrity issues, defamatory discussions and other fraudulent or unauthorized online activity.

Deloitte’s Cyber Risk Services help complex organizations more confidently leverage advanced technologies to achieve their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. With deep experience across a broad range of industries, Deloitte’s more than 1600 practitioners provide advisory and implementation services, spanning executive and technical functions, to help transform legacy IT security programs into proactive Secure.Vigilant.Resilient. cyber risk programs that better align security investments with risk priorities, establish improved threat awareness and visibility, and strengthen the ability of organizations to thrive in the face of cyber incidents.​

Learn more about Deloitte’s Cyber Risk Services

Technology executives are focused on managing IT across the organization and keeping the business running cost effectively. Soon, an organization's future success will depend on IT delivering tangible value to the business. It will mean transcending day-to-day operational needs to help bring real change. EY's experienced professionals can help you rethink how you architect, deploy and manage technology. We can work with you to help accelerate business performance through technology transformation, enterprise intelligence, enabling technology and technology risk and security.

Guardian Analytics uses behavioral analytics to prevent banking fraud. Financial institutions rely on our patented FraudMAP solutions to protect their account holders from the diverse and ever-expanding mix of fraud attacks and schemes. By focusing on account holder behavior, FraudMAP can detect account takeover, reconnaissance, and fraudulent payments that result from cross-channel attacks. FraudMAP, available as a Software-as-a-Service (SaaS) solution with versions for wire and ACH payments plus online and mobile channels, uses sophisticated behavioral analytics to accurately distinguish suspicious activity from established normal behavioral patterns, and offers easy-to-use investigation and case management tools. Hundreds of institutions of all sizes are using FraudMAP to improve competitiveness and growth, reduce fraud risk and losses, increase operational efficiency, and enhance compliance. Learn more:

IBM helps financial services clients gain insight and agility through information-led transformation. Forward thinking institutions will use these insights to transform their business within four imperatives: attract and retain customers, develop new revenue sources, streamline operations and pro-actively address risk and regulatory requirements. IBM Security, supported by world-renowned Trusteer® and X-Force® research and development, provides the security intelligence to help organizations holistically protect their people, infrastructure, data and applications. This enables organizations to more effectively manage risk and implement integrated security solutions for cloud, analytics, mobile and other enterprise business architectures. IBM operates one of the world’s largest security research and development and delivery organizations comprising over 10 Security Operations Centers, 15 software security development labs with over 40 Softlayer Cloud Data Centers in the United States, Europe, India and Asia Pacific. IBM monitors over 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents. A smarter business needs smarter systems. Let's build a Smarter Planet.

Learn more:  |  |

MSA is a specialized security company that began in 1987 and has since grown into a recognized industry leader in high consequence threat protection and specialized training for corporate and government clients. MSA's team of security professionals - comprised of veteran members of the law enforcement, military, and business communities - provides unparalleled perimeter security, training and explosive detection services domestically and internationally. MSA combines hands-on experts with information and technology to provide our clients with the best resources for reducing their vulnerabilities to threats and protecting their personnel and property.

MSA has a robust operational protection capability that includes facility and perimeter security, executive protection, special event planning, WMD detection, and the largest privately owned single handler explosive detection canine company in North America. MSA's comprehensive consulting services consist of counterterrorism threat and intelligence analysis, risk and vulnerability assessment, maritime training and protection services, and physical security design. We also offer complete security systems design and integration, continuity of operations planning, and security program audits. Learn more:

PwC’s cybersecurity consulting team helps organizations understand dynamic cyber challenges, adapt and respond to risks inherent to their business ecosystem, and prioritize and protect the most valuable assets fundamental to their business strategy. For more information on PwC’s cybersecurity point of view, visit:

About PwC’s Advisory Practice - PwC’s Advisory professionals help organizations improve business performance, respond quickly and effectively to crisis, and extract value from transactions. We understand our clients’ industries and unique business challenges, and look across the entire organization — focusing on strategy, structure, people, process and technology — to help clients build their next competitive advantage. See for more information or follow us @PwCAdvisory.

About PwC US - PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 158 countries with more than 180,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at Learn more about PwC by following us online: @PwC_LLP, YouTube, LinkedIn, Facebook and Google +.

RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle - no matter where it moves, who accesses it or how it is used. Learn more:

Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. Secunia’s proven, complementary portfolio aids businesses in their handling of complex IT security risks and compliance requirements across industries and sectors – a key component in corporate risk management assessment, strategy, and implementation. Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base. For more information, visit

PPISC Affiliates

ACA Aponix are specialists in the assessment of cybersecurity and IT risk for the financial sector. Staffed by senior technologists from investment banks, hedge funds, asset managers and service providers, we have a deep understanding of both business process and technology. We apply a holistic, analytical and thoughtful approach to identifying risks and advise on how to address these through policy, controls and training. ACA Aponix works with numerous asset managers, financial advisors, hedge fund managers, and private equity firms, ranging from $200 million to over $200 billion AUM, and from 4 to over 3,000 employees.

Accume Partners provides internal audit, regulatory compliance, risk management and advisory services to banks and financial institutions, and has done so for more than 20 years. As the level of regulatory and business complexity has surged, so has the need for specialized knowledge and focus. In response to the increasing number and complexity level of system breaches and other security incidents, Accume expanded capabilities dramatically and added a dedicated Cybersecurity practice. In 2015, Accume introduced 3 innovative cybersecurity services, offering a much needed capability, particularly to the community banking market.

Founded in 2012 by cyber defense veterans, Adallom, a 2014 Gartner Cool Vendor, is a cloud access security broker which delivers visibility, governance and protection for cloud applications. Its innovative platform is simple to deploy, seamless to users, and is available as a SaaS-based or on-prem solution. Powered by SmartEngine(tm) advanced heuristics and backed by an elite cybersecurity research team, Adallom makes it easy to protect data in the cloud. For more information, visit or follow @adallom.

Agari builds new, internet scale, data driven security solutions that eliminate email as a channel for cyberattacks and enable businesses and consumers to interact safely. The Agari cloud-based SaaS solution aggregates data from 2.5 billion mailboxes hosted by email receivers including Gmail and Yahoo! to help global brands including JPMorgan Chase, Facebook, Aetna, and UPS eliminate email threats, protect customers and their personal data, and proactively guard brand reputation. Today, Agari analyzes over 6 billion messages per day, identifies over 2 million malicious URLs per month, and blocks over 200 million malicious emails per month. Based in Silicon Valley.

Agio is a leading IT and Security Managed Services Provider, offering technology hosting, monitoring, management, disaster prevention and recovery, security, and other high-end technology services. With 130+ employees, Agio is headquartered in New York City with operational headquarters in Norman, OK. Learn more at

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit or, and follow @Akamai on Twitter.

Privately-held since 1983, Alvarez & Marsal (A&M) is a leading global professional services firm that delivers performance improvement, turnaround management and business advisory services to organizations seeking to transform operations, catapult growth and accelerate results through decisive action. With a dedicated team of senior professionals advising the financial services industry, A&M provides operational solutions to business leaders looking to decipher cybersecurity. We work with our clients to identify risks in their evolving business objectives and assist in implementing business-focused cybersecurity strategies tailored for their enterprise risk management programs.

ANX is a global provider of secure, managed solutions to help companies achieve compliance and collaborate more effectively. As a compliance expert, ANX helps companies protect brand value and franchise owner investments by reducing the risk of a data breach. The flagship solution, SecurePCI, simplifies the process of becoming PCI compliant and delivers enterprise-grade managed security technology to Level 4 merchants. ANX has more than 15 years of experience protecting sensitive customer information and is certified by the PCI Security Standards Council as a Qualified Security Assessor (QSA) and an Approved Scanning Vendor (ASV). Visit for more information.

For fifteen years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on Arbor Networks for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with Arbor Networks.

Arxan is the world's strongest and most deployed application protection solution that secures mobile applications from hacker attacks and malware exploits. Arxan’s scalable, multi-OS approach mitigates application risk to protect financial institutions from malware, fraud, data compromise, IP theft and ultimately financial loss and brand compromise by ensuring critical code is hardened from unauthorized access and repacking/redistribution attempts. Our customers leverage Arxan's patented ‘Guarding’ technology, which is embedded directly into application binaries to yield self-defending, tamper-proof apps that are resistant to unauthorized code tampering and reverse engineering attacks. Arxan’s mobile app protection products enable financial institutions to launch advanced and feature-rich financial services with confidence. Arxan’s application protection is deployed on over 250 million devices by Fortune 500 organizations in financial services, retail, healthcare, ISV, entertainment, and other enterprises. Arxan Technologies is headquartered in the Bethesda, MD with global offices in EMEA and APAC. Visit us at

Attivo Networks™ is the leader in dynamic deception technology with a strong customer base in financial, healthcare, and other industries that have a need to protect customer and company data from exfiltration. Attivo provides the real-time detection and visibility of inside-the-network and data center intrusions. The Attivo BOTsink® platform uses high-interaction deception to lure BOTs/APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures or database lookup to detect cyber attacks. Whether it is a reconnaissance or stolen credential attack, Attivo provides the forensics required to stop current and prevent future attacks.

BAE Systems Applied Intelligence is a business division of BAE Systems that delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. We operate in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation.

Leading enterprises and government departments use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, corporate information, reputation and customer relationships, competitive advantage and financial success. For further information about BAE Systems Applied Intelligence, please visit

Bay Dynamics® is a cyber risk analytics company that helps IT and security executives understand and action their cyber security data. The company's flagship analytics software, Risk Fabric, automates the process of analyzing security information so that it's traceable, trustworthy and prioritized. The platform makes cyber risk everyone's business – from employees to LoBs to the board – and actively engages all parties in measurably reducing it. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders, vendors and bad actors are doing, which is key to effective cyber risk management. For more information, please visit

Launched in 2014, Bastille is the first security company to detect and mitigate threats affecting the Internet of Things. Bastille secures the IoT on corporate campuses by identifying airborne threats and allowing for preemptive response. Through proprietary software and sensor technology, Bastille scans a corporation’s airspace, giving visibility into and location of every RF-emitting device.

BioCatch is a leading provider of Cognitive Biometric™, Authentication and Malware Detection solutions for mobile and web applications. Available as a cloud-based solution, BioCatch proactively collects and analyzes more than 400 cognitive parameters to generate a unique user profile. Banks and online & mobile stores use BioCatch to significantly reduce friction associated with risky transactions and protect users against cyber threats, such as Account Takeovers, Man-in-the-Browser (MitB) Malware and Remote Access (RAT) attacks. Additionally, BioCatch provides an enterprise tool that improves the employee authentication experience while protecting access to critical IT assets. The Company was founded in 2011 by experts in neural science research, machine learning and cyber security and is currently deployed in leading banks across North America, Latin America and Europe. For more information, please visit

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third-party risk, benchmark performance, and assess and negotiate cyber insurance premiums.

Organizations worldwide use Black Duck Software's industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit

Founded in 2012 by a team of security experts, Bluebox Security provides the leading mobile app security and analytics solution. Pairing deep mobile security expertise with comprehensive analytics, Bluebox ensures consistent enterprise-grade app security moves at the speed of mobile. The cloud-based solution helps enterprises securely enable mobile by protecting apps, detecting threats, and responding quickly to keep data secure while providing actionable threat intelligence for mobile assets. With Bluebox Security, companies obtain security and visibility into the new enterprise endpoint—the mobile app.

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

BluVectorT, a product of Acuity Solutions Corporation, is a malware detection platform that incorporates breakthrough, patented machine learning techniques to analyze content coming into your network, allowing security teams to see, organize, prioritize and manage threats in near real time that are targeting their critical infrastructures. It can collect and analyze millions of packets and hundreds of files per second, providing deep network protocol analysis. This results in increased malware detection rates at network speeds, and higher throughput without the hassle of having to manage and update multiple engines, allowing analysts to see beyond 'the known bad' identified by their signature-based workflow, and identify threats to their networks that have been - until now - undetectable. Please visit for more information.

Bromium has transformed endpoint security with its revolutionary isolation technology which prevents data breaches. Unlike antivirus or other detection-based defenses, which can't stop modern attacks, Bromium uses micro-virtualization to hardware isolate every user task-such as opening a webpage or PDF-in a micro-VM, keeping users secure while streamlining IT. Bromium improves the resilience of enterprise endpoints, substantially reduces investment in security, and boosts operational efficiency. Our breakthrough micro-virtualization technology vastly reduces and even eliminates compromises on endpoints, false alerts, urgent patching, and costly remediation. We reduce management overhead, enable security teams to focus on strategic tasks rather than deflecting threats, and empower users to be more

Centripetal Networks Inc. has developed an entirely new category for cyber-security solutions: Real-Time Active Network Defense. Centripetal has achieved several breakthroughs in the scale and speed of network protection. Centripetal’s RuleGate® product is the first and only system able to action threat indicators at scale, at full line-rate speed, and with agility. Threat intelligence can now directly drive an active cyber defense without negatively impacting network performance or user experience. Centripetal’s offering includes the RuleGate® a unique ultra high performance network appliance, QuickThreat™ the industry’s first real-time threat visualization and analytics platform, and the Advanced Cyber Threat (ACT) service. Please visit

Cigital is one of the world’s largest application security firms. We go beyond services to help organizations find, fix and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.

Our proactive methods helps clients reduce costs, speed time to market, improve agility to respond to changing business pressures and threats, and focus resources where they are needed most. Cigital’s managed services maximize client flexibility, while reducing operational friction and cost. Cigital gives organizations of any size access to the scale, security expertise, and practices needed to build a successful software security initiative. For more information, visit us at

Citrix® powers business mobility in the financial services industry with a fully integrated and secure solution, uniting technologies in virtualization, mobility management, networking, and cloud. Financial Services companies can improve customer experience and employee productivity by providing secure instant access to apps, data and communication on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are trusted by the top 10 largest global banks, as well as the top 10 global companies in investment; property and casualty insurance; and life insurance. Learn more at

CloudPassage® Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process outsourcing services, dedicated to helping the world's leading companies build stronger businesses. Headquartered in Teaneck, New Jersey (U.S.), Cognizant combines a passion for client satisfaction, technology innovation, deep industry and business process expertise, and a global, collaborative workforce that embodies the future of work. With over 100 development and delivery centers worldwide and approximately 217,700 employees as of March 31, 2015, Cognizant is a member of the NASDAQ-100, the S&P 500, the Forbes Global 2000, and the Fortune 500 and is ranked among the top performing and fastest growing companies in the world. Visit us online at or follow us on Twitter: Cognizant.

Confer offers a fundamentally different approach to endpoint security through the Converged Endpoint. Our patented technology—developed in the military intelligence space—enables an adaptive defense that integrates prevention, detection and incident response. We automate this approach to secure millions of devices, regardless of where they are, allowing security teams to focus on more important activities. By preventing over 99% of advanced attacks, Confer facilitates an intelligent and efficient approach to securing the enterprise.

The Corvil platform transforms network data into streaming intelligence to see, understand and act on business as it's happening. Corvil provides the full picture of customers, business and IT infrastructure all interacting together in real-time. It does this by making sense of raw packet data streaming through the network, enriching it with analytics and making it searchable and consumable. Proven in the world's most demanding environments, monitoring over 50 petabytes of data and over $170 billion worth of transactions daily, Corvil is trusted to provide real-time analytics that powers decision and action in the Now.

CSG Invotas, an enterprise security business unit of CSG International Inc. (NASDAQ: CSGS), is focused on automated threat response capabilities built on proven carrier-grade activation technology. For more than 30 years, CSG has amassed a track record in building automated systems that solve business challenges, improve operations, preserve continuity and enhance profitability. CSG Invotas builds on this heritage with innovative security strategies that inspire CIOs and CISOs to think differently about secure enterprise management.

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to more than 1,500 global businesses, including 17 of the world’s top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit, read the company blog,, follow on Twitter @CyberArk or Facebook at

Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide.

Cylance’s award-winning product, CylancePROTECT™, stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. CylancePROTECT is a radically different technological approach to cybersecurity that employs artificial intelligence to analyze the DNA of files before they execute.

Complementing CylancePROTECT are professional services that provide pre-attack penetration and vulnerability testing, compromise assessments and post-attack incident response. Cylance specializes in securing critical infrastructure and key resources for education, energy, financial services, government, healthcare, heavy industry, oil and gas, retail, technology, and other industries.

Standing apart from a cybersecurity industry reliant upon an outdated detection and response model, Cylance secures through prediction and pre-response at the enterprise endpoint, preventing malware and advanced persistent threat breaches before they cause harm.

Darktrace is a cyber threat defense company with a fundamental new approach to helping organizations manage the risk of advanced cyber-attacks, including insider threat. Darktrace's Enterprise Immune System is based on machine learning and mathematics developed at the University of Cambridge, combined with expertise from US and UK intelligence agencies. Darktrace’s technology is uniquely capable of detecting previously-unseen threats in real time, from within the network. The company is headquartered in Cambridge, UK and Washington D.C., with offices in London, Milan, New York, Paris, San Francisco and Singapore.

Since 1999, Digital Defense, Inc., (DDI) has assisted financial organizations to protect sensitive data through managed security risk assessment solutions. DDI has received numerous industry recognitions including a top 25 ranking in Cybersecurity Ventures’ listing of the World’s 500 Hottest Cybersecurity Companies, and inclusion in CSO Outlook’s Top 10 Network Security Companies and CIO Review’s 20 Most Promising Cyber Security Solutions. Vulnerability scanning, penetration testing, and security awareness training are DDI’s most popular offerings, each of which proactively improves the security of an organization. DDI’s unique Vulnerability Management as a Service (VMaaS) delivery model helps organizations bolster information security.

DFLabs is a Technology and Services company specialized in Cyber Security Incident and Data Breach Response. Our mission is: eliminating the complexity of Cyber Security Incident and Data Breach, reducing reaction time and risk exposure. In other words: Cyber Incidents Under Control.

With this goal in mind, we ve created IncMan NG, the cutting edge technology platform for managing and responding to cyber incidents and share intelligence. IncMan has been created for SOC and CSIRT orchestration, and It is currently being used by many Fortune 100/1000, and Financial Services Institutions worldwide.

More info here.

Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection.

EclecticIQ is an applied cyber intelligence technology provider, enabling enterprise security programs and governments to bootstrap a threat intelligence practice. Empowering analysts to take back control of their threat reality and mitigate exposure accordingly.

EclecticIQ's mission is to restore balance in the fight against cyber adversaries. Its flagship product EclecticIQ Threat Intelligence Platform enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of cyber threat intelligence detection, prevention and response capabilities.

For more information, please visit: Follow us on @EclecticIQ

Consumers, citizens and employees increasingly expect anywhere-anytime experiences, whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable, secure and cost-effective. We offer solutions for financial card issuance, secure credential production, transaction authentication, secure network access, encrypted communications, identity verification, website security and more. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, we are able to serve customers in more than 150 countries worldwide.

Exabeam is a user behavior analytics solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Unique among UBA products, Exabeam’s Stateful User Tracking™ automatically creates a complete timeline of every event and anomaly tied to an attack -- across devices, IP addresses, and credentials -- and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks.

FICO is a leading analytics software company, helping businesses in 80+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. FICO provides analytics software and tools across multiple industries to manage risk, fight fraud, build profitable customer relationships, optimize operations and meet strict government regulations.

Flashpoint provides the reports, tools, data, and access to experts necessary to obtain tactical, operational, and strategic intelligence from the Deep & Dark Web. The company offers a state-of-the-art platform with data curated by world-class subject matter experts. Flashpoint’s products illuminate threatening actors, relationships, behaviors, and networks concealed within these hidden areas of the Internet. Security and intelligence teams across the Fortune 500 and government use the company’s data, tools, and expertise to reduce the costs of fraud, data loss, reputational damage, or other attacks. Flashpoint is backed by TechOperators, Greycroft Partners, K2 Intelligence, Bloomberg Beta, and Cisco Investments.

ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of October 2015, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Fortinet hardware and virtual solutions are recommended by NSS Labs and with over 2.5M threat sensors worldwide, are reinforced by FortiGuard Labs, a team of over 200 cyber-security researchers focused solely on industry threat research, analytics, and intelligence for preventing and detecting the latest attacks while delivering incident response. Fortinet provides broad, high-performance protection against dynamic security threats whether inside the perimeter or out and custom ASIC technology radically increases throughput 5 - 10X more than other solutions, enabling the world's first 1 terabit per second throughput firewall.

Global cybersecurity leader Fox-IT's 200+ employees create solutions for a more secure society. Dedicated to clients, and our integrity, Fox-IT delivers solutions before, during and after attacks. InTELL provides global visibility into on-line threats. Our world-wide customers value the unique context and attribution. Our rich STXI/TAXII feeds power their defenses. DetACT delivers real-time web and mobile event analytics, detecting attacks and anomalies to on-line channels. It is the only solution to detect and stop past and present channel attacks like Dyre & Dridex in real-time. Powered by intelligence, it provides 100% visibility, allowing companies to be in full control.

Genpact (NYSE: G) stands for "generating business impact." We design, transform, and run intelligent business operations including those that are complex and specific to a set of chosen industries. The result is advanced operating models that foster growth and manage cost, risk, and compliance across a range of functions. We have hundreds of long-term clients including more than one-fourth of the Fortune Global 500 and currently employ over 66,000 employees in 25 countries, with key management and corporate offices in New York City. Behind our passion for process and operational excellence is the Lean and Six Sigma heritage of a former General Electric division that has served GE businesses for more than 16 years.

HORNE Cyber is a decidedly different IT security firm. We offer clients a unique combination of discipline, skills and knowledge that can significantly reduce their exposure to security threats, allow them to stay compliant with ever-growing regulations, and use technology as a lever for growth.

Intel 471 provides unique, high-value actor-centric cyber threat intelligence collection in support of our customers’ information security operations. Whilst some companies may offer indicators/feeds as threat intelligence, Intel 471 focuses on the individual threat actors and groups that pose a threat to your organization and sector.

Intel 471 employs specialists on the ground globally who are experts in their region and is incorporated in the United States.

Intel 471 provides two products accessible via a web portal and API:
Cyber Crime – Covers cyber threat activity from financially motivated cyber criminals.
Hacktivism – Covers cyber threat activity from politically motivated cyber criminals.

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world.

Intralinks is a trusted global leader for providing secure content management and collaboration solutions. Since our inception more than 18 years ago, we have provided solutions to support secure data sharing and transactions for multiple industries. Our platform has generated more than 1.4 billion pages, and supported more than $28.1 trillion in financial transactions. We are the standard for trusted collaboration among networks of business professionals. Our exceptional technology platform provides secure, compliant, virtual data rooms with lifetime content control. Access and share secure documents anytime, anywhere, and from any device while ensuring full lifetime document control.

Invincea is the leader in advanced endpoint threat protection, protecting more than 25,000 customers and 3 million active users.

The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls. Invincea protects enterprises against targeted threats, including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea offers the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware.

KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using mock attacks, engaging interactive training, continuous assessment through simulated phishing, vishing and smishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance. Learn more at

KnowCyber helps companies and other organizations build cybersecurity through learning. We reduce organizational risk by preparing and motivating employees to think and act differently, providing them with the know-how to become the organization’s greatest cybersecurity resource. Our training solutions combine the latest technologies and best practices in learning and development with the latest and best thinking in cybersecurity. Crisp, concise instructional modules address top threats and vulnerabilities, engaging learners through compelling narratives, rich multimedia, and meaningful interactivity and assessment. Programs are designed for seamless delivery to any device from mobile to desktop, via the client’s LMS or our own. They can be co-branded or white-labeled, with learning content customized per industry, organization, or learner roles and responsibilities. Learn more at

Kudelski Security, a division of the Kudelski Group (SIX: KUD.S), is an innovative, independent Swiss provider of tailored cybersecurity solutions to the financial institutions, defense sector, government administrations, and the media industry. The team of over 130 security experts delivers end-to-end cybersecurity consultancy, products and services, leveraging over 20 years’ experience in advanced threat detection, attack prevention, asset and reputation protection and security assessments. Kudelski Security is headquartered in Switzerland. Its global reach and multi-disciplinary incident response is reinforced by key international partnerships.

Lookingglass Cyber Solutions is the world leader in threat intelligence monitoring and management enabling global cyber threat visibility and risk decision support. With its ScoutVisionTM and CloudScoutTM products, Lookingglass leverages all-source intelligence to provide context and continuously monitor threats far and near, such as the presence of botnets, hosts associated with cybercriminal networks, unexpected route changes and the loss of network resiliency. Lookingglass’ outside-in approach accounts for a client’s entire enterprise cyber ecosystem including the extended enterprise, and other networks beyond their control. This visibility brings an unprecedented view to help organizations understand their risks and enable a more proactive approach to the management of their overall security posture. For more information, visit

Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done to an individual or an enterprise. Lookout’s cloud-based technology is fueled by a global network of more than 100 million sensors and tens of thousands of apps that are added daily. With this dataset of virtually all the mobile code in the world and the predictive machine intelligence to analyze and make sense of the data, Lookout can identify connections that would otherwise go unseen and stop cybercriminals from attacking mobile devices. The world’s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit

Malwarebytes provides anti-malware and anti-exploit software designed to protect users against zero-day threats that consistently escape detection by traditional endpoint security solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a Editor’s Choice, and was the only security software to earn a perfect malware remediation score from That’s why large Enterprise businesses worldwide, including Disney, Dole, and Samsung, trust Malwarebytes to protect their mission-critical data. For more information visit

The Media Trust is the global leader in protecting the online and mobile environment. Functioning as a security operations center for the world’s most heavily-trafficked websites, The Media Trust monitors digital properties from the consumer perspective to detect web-based anomalies.

Clients access this original source, real-time malware data through a threat intelligence feed or SaaS-based solution to secure networks, protect websites and mitigate the risk of everyday employee internet use.

More than 500 enterprises and digital publishers—including 41 of comScore's AdFocus Top 50 web properties—rely on our comprehensive suite of detection and alerting services to protect their digital properties, their revenue and, most importantly, their brand. Learn more at

Netskope™ is the leading cloud access security broker (CASB). Netskope gives IT the ability to find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence.

Niara aggregates security data from disparate sources, ensuring that security teams can identify and quickly respond to sophisticated, multistage attacks that regularly thwart legacy detection technologies. Niara’s Security Intelligence solution delivers contextually relevant security analytics by fusing data from disparate sources to discover compromised users, provide insight into malicious insiders, enable advanced threat hunting efforts, and efficiently investigate incidents. Headquartered in Sunnyvale, Calif., the company is backed by NEA, Index Ventures and Venrock. For more information, visit

Norse is the leading innovator of live dark intelligence and adaptive security solutions that enable the proactive defense, rapid detection, risk-based response, and faster resolution of advanced cyberattacks. Norse's live dark intelligence platform continuously analyzes high-risk network traffic from the global Internet's darknets and the deep web, to proactively identify the sources, characteristics, and risk-levels of cyberattacks. Leveraging organizations' existing security infrastructure, Norse integrates with SIEM, big data security, and traditional security controls to provide an early detection system against advanced and emerging attacks enabling a more risk-aware and proactive security posture.

Novetta’s analytics solutions are used at the heart of our nation’s cyber defense. Now available for commercial enterprises, Novetta Cyber Analytics actually does what our competitors have only claimed to do for years: provide complete, truthful, near real-time network security visibility and awareness. The solution dramatically increases the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers to subtle questions almost instantly. Customers using the solution handle an estimated 30 times the number of incidents, and have found an immeasurable number of previously unknown intrusions. Learn more at

NSS Labs, the security insight company, is trusted by the world's largest and most demanding enterprises to help make their organizations more secure. Focused exclusively on IT security, NSS provides CEOs, CIOs, CISOs, and information security professionals with data-driven insight to help them make informed security decisions. NSS' heritage is its best-in-class security product testing laboratory, which offers in-depth test reports as well as research and analyst services. This expertise is the premise for its Cyber Advanced Warning System™ - the industry's revolutionary cloud-based security and risk management platform designed to identify and expose active threats that matter. For more information visit:

At Palo Alto Networks, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. As the next-generation security company, we are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud.​

Phantom automates enterprise security operations. In the face of problematic trends including the dramatic increase and volume of attacks, severe shortages in qualified personnel, growth in the diversity and complexity of IT security environments and unforgiving consumers, investors and regulators holding management to task for breaches, Phantom arms security operations with the automation and orchestration solutions that ready them to defend their company’s business. Visit to register for Phantom Community Edition, a free version of Phantom Enterprise.

PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial-of-service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust. To learn more contact us at or 1-877-227-0790. Visit, read The Phishlabs Blog, and follow PhishLabs on Twitter and LinkedIn.

Pindrop Security provides enterprise solutions that help prevent phone-based fraud and provide phone authentication. Pindrop’s breakthrough phoneprinting technology can identify phone devices uniquely based on only the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop’s customers include two of the top five banks and two of the leading online brokerages. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions.

Praesidio is a Security Data Platform designed exclusively for banks and credit unions. Built from the ground up in the cloud using technology that wasn’t available to legacy vendors, Praesidio monitors your entire network without an exorbitant price tag, searches events up to 120x faster, ingests up to 10 million events per minute and links cybersecurity policies to alerts in real-time, so that Financial Institutions can prove to regulators that they are both secure and compliant with new FFIEC cybersecurity requirements.

Proofpoint - As advanced threats increase in frequency and sophistication, it’s never been more important to secure your financial organization's email, by far the number one threat vector. Proofpoint, positioned by Gartner in the Leaders Quadrant in their 2015 Magic Quadrant for Secure Email Gateways, uniquely combines a world class email gateway solution with the industry’s leading Targeted Attack Protection technology, catching and stopping cyber threats from malicious links and attachments hours or even days before traditional defenses.

Recorded Future arms enterprises with real-time threat intelligence, allowing them to proactively defend against cyber attacks. With billions of indexed facts, and more added every day, the company's patented Web Intelligence Engine continuously analyzes the entire web to give unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.

Resilient, an IBM Company, empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s industry-leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, smarter, and more efficiently.

Part of IBM Security, the Resilient IRP also integrates security technologies into a single hub and provides easy workflow customization and process automation. With Resilient, security teams can have best-in-class response capabilities.

Resilient has more than 100 global customers, including 30 of the Fortune 500 and partners in more than 20 countries. Learn more at

Return Path is an email data company, helping the world's leading companies promote and protect their brands. Through our global network of mailbox and security partners, Return Path detects and eliminates more email fraud than any other company in the world, analyzing over 7 billion messages every day. Learn more at

RiskIQ provides organizations the visibility and intelligence they need to secure their Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of managed, unmanaged and rogue web and mobile assets. This “Digital Footprint” is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit

RiskRecon traces its beginnings to 2011 when our founder, Kelly White, asked himself: “is it possible to measure the security program quality of any company simply by looking at its Internet-facing presence?” Kelly is a long time infosec practitioner and CISO who witnessed first hand the need for adapting third party risk controls to meet the new challenges resulting from decentralized IT and SaaS apps.

Our breakthrough technology enables you to control third party risk by providing vendor security assessments that are comprehensive, actionable and available on demand.

Through RiskRecon, you can quickly evaluate the security program of any vendor – SaaS, outsourcer or on-prem provider. RiskRecon requires no proprietary vendor data and no invasive scans. Learn more about us at

Sage Data Security is a strategic partner and trusted advisor for financial institutions nationwide. Sage offers an award-winning portfolio of cybersecurity services designed to cost-effectively protect organizations from harm and ensure regulatory compliance. Sage’s nDiscovery℠ service expertly mines device, operating system, application, web and database logs to uncover and identify dangerous cyber activity including external attacks, malware, unauthorized access, data exfiltration and internal system misuse. Sage is proud to be the hosting organization for the 6th Annual CyberCrime Symposium, November 5th & 6th, 2015. To learn more about Sage services, nDiscovery and the Cybercrime Symposium, visit

SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform - our advanced data analytics and insights engine - SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.
To learn more, visit

At Security Compass, we have extensive cross industry knowledge, technical prowess, and have developed the right expert tools to predict, plan  and prevent a security breach. We guide your team in building a customized security blueprint based on your industry, software development  lifecycle, and business needs to cost-effectively mitigate risks. For more information, visit, or read the Security Compass Blog.

The Shape Botwall Service has deflected over $100M in fraud losses in 2015 alone for major retailers, financial institutions, airlines, and manufacturers. Shape uniquely defends Global 2000 enterprises against sophisticated automated attacks on web applications and mobile APIs. Automated attacks include credential stuffing & account hijacking, content scraping, and application DDoS. Shape uses a high performance security appliance, a sophisticated machine-learning back-end, and a world-class team of security & web experts to protect major B2C websites. Shape's Botwall can be deployed without impacting end user experience and with minimal changes to the backend infrastructure.

Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

Skycure is a mobile threat defense company with products that detect and prevent cyber attacks on both BYO and corporate-owned devices without compromising the user’s privacy or mobile experience. Skycure’s predictive technology is based on mobile threat intelligence gathered via massive crowd  knowledge to proactively identify and remediate threats.
Skycure enhances enterprise mobile security with a holistic approach that seamlessly identifies and remediates threats, vulnerabilities and attacks on all levels – physical, network, malware and application.

Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Comcast, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring.

Every day, developers rely on millions of third party and open source building blocks — known as components — to build the software hat runs our world. Sonatype ensures that only the best components are used throughout the development lifecycle so that organizations don't have to make the  tradeoff between going fast and being secure. Policy automation, ongoing monitoring and proactive alerts makes it easy to have full visibility and control of components throughout the software supply chain so that applications start secure and remain that way over time. Learn more at or in this FS-ISAC Third Party Software Working Group whitepaper (Control Type 3).

Stroz Friedberg is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected and regulated business world. We are trusted advisers—a collection of the brightest minds in the fields of cybersecurity—who are leading experts in digital forensics, incident response, and security science; investigation; eDiscovery; and due diligence. We work proactively to minimize risk, and respond in real time to contain issues and crisis situations when the inevitable occurs. Our multi-disciplinary teams tackle the most complex, time-sensitive, and far-reaching issues and guide businesses through the maze of complexities found at the intersection of law, technology, investigations, compliance and security science. The skills, backgrounds, and integrity of our people, combined with our industry-leading proprietary incident response and digital forensics tools, are a powerful force when getting it right matters most. At Stroz Friedberg, we are united by a common goal — to maximize the health of an organization, ensuring its longevity, protection and resilience.

Symantec The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives. More information is available at

ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit:

ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation. ThreatGRID empowers security teams with continuous real-time threat intelligence, enriched by global and historical context, to prevent future attacks. ThreatGRID’s API simplifies sample submission and intelligence integration with other security products to maximize the effectiveness of existing investments. Founded by entrepreneurs with deep security expertise, ThreatGRID is privately held and is based in New York City. For more information, visit, follow us on Twitter @ThreatGRID and LinkedIn, and check out our blog.

ThreatMetrix®, The Digital Identity Company™, is the market-leading cloud solution for authenticating digital personas and transactions on the Internet. Verifying more than 20 billion annual transactions supporting 30,000 websites and 4,000 customers globally through the ThreatMetrix® Digital Identity Network, ThreatMetrix secures businesses and end users against account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches. Key benefits include an improved customer experience, reduced friction, revenue gain, and lower fraud and operational costs. The ThreatMetrix solution is deployed across a variety of industries, including financial services, e-commerce, payments and lending, media, government and insurance.

For more information, visit or call 1-408-200-5755. Join the cybersecurity conversation by visiting the ThreatMetrix blog, Facebook, LinkedIn and Twitter pages.

ThreatQuotient Inc. (TQI) was founded in March 2013 and is dedicated to revolutionizing cyber defense capabilities by building analyst-driven applications, helping organizations manage threat intelligence and therefore defending against sophisticated cyber attacks. Our foundation is built from our operational experience to deliver a relevant vendor agnostic on-premise deployment – allowing analysts to spend more time on high-value processes rather than transferring intelligence across multiple cloud solutions and internal platforms. ThreatQ will advance threat information management through end-to-end automation that transforms disparate data into ACTIONABLE intelligence. Because of its power and ability to provide defenders with critical contextual information, ThreatQ is becoming a team’s cornerstone tool.

Venafi is the market leading cybersecurity company in Next-Generation Trust Protection (NGTP). As a Gartner-recognized Cool Vendor, Venafi delivered the first Trust Protection Platform™ to secure cryptographic keys and digital certificates that every business and government depend on for secure communications, commerce, computing, and mobility. Today organizations that blindly trust keys and certificates are at increased risk of costly attacks, data breaches, audit failures and unplanned outages.

As part of any enterprise infrastructure protection strategy, Venafi TrustAuthority™ and Venafi TrustForce™ help organizations regain control over trust in the cloud, on mobile devices, applications, virtual machines and network devices by protecting Any Key. Any Certificate. Anywhere™Venafi Threat Center provides primary research and threat intelligence for trust-based attacks.

Veracode's cloud-based solutions and security services help financial institutions find vulnerabilities in internally developed software, mobile apps, web  applications, and applications across the software supply chain.

An enterprise is only as strong as its most vulnerable component; the application layer. It is no longer enough to secure the code that is developed internally, now financial institutions must secure all software used by the organization, whether built, bought, or outsourced. By securing the entire application portfolio, Veracode reduces risk associated with the most targeted and vulnerable layer. 

For more information, visit, follow us @Veracode or read the Veracode Blog.

Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric helps over 1300 customers, including 17 of the Fortune 25 and many of the world’s most security conscious financial and government organizations, to meet compliance requirements and protect what matters —their sensitive data —from both internal and external threats. The company’s scalable solution protects any file, any database and any application — within enterprise data center, cloud, big data environments — with a high performance, market-leading Vormetric Data Security Platform that incorporates application transparent encryption, access controls and security intelligence. Vormetric – because data can’t defend itself. Learn more:

To read the Affiliate Terms and Conditions (pdf), Click Here.