Affiliates

Affiliate Board Advisors

Accenture is a global management consulting, technology services and outsourcing company, with more than 293,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$28.6 billion for the fiscal year ended Aug. 31, 2013. Its home page is www.accenture.com.

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. Booz Allen is headquartered in McLean, Virginia, employs more than 25,000 people, and had revenue of $5.59 billion for the 12 months ended March 31, 2011. To learn more, visit www.boozallen.com. (NYSE: BAH)

For enterprises concerned about their exposure to increasing online risk, BrandProtect™ provides a complete suite of world class cyber threat detection analysis and intelligence services to monitor the entire social Internet spectrum and mitigate business risk arising from illegal, infringing, or threatening online activity.

BrandProtect deploys an unmatchable combination of advanced proprietary threat detection technology, along with a professional team of deeply experienced threat analysts to quickly identify, analyze, and mitigate cyber threats against intellectual property, physical locations, executives and employees, as well as reputational and compliance risks. These risks can occur as a result of online brand abuse, trademark infringement incidents, phishing attacks, web traffic diversions, website integrity issues, defamatory discussions and other fraudulent or unauthorized online activity. www.brandprotect.com

Deloitte’s Cyber Risk Services help complex organizations more confidently leverage advanced technologies to achieve their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. With deep experience across a broad range of industries, Deloitte’s more than 1600 practitioners provide advisory and implementation services, spanning executive and technical functions, to help transform legacy IT security programs into proactive Secure.Vigilant.Resilient. cyber risk programs that better align security investments with risk priorities, establish improved threat awareness and visibility, and strengthen the ability of organizations to thrive in the face of cyber incidents.​

Learn more about Deloitte’s Cyber Risk Services

Technology executives are focused on managing IT across the organization and keeping the business running cost effectively. Soon, an organization's future success will depend on IT delivering tangible value to the business. It will mean transcending day-to-day operational needs to help bring real change. EY's experienced professionals can help you rethink how you architect, deploy and manage technology. We can work with you to help accelerate business performance through technology transformation, enterprise intelligence, enabling technology and technology risk and security.

Guardian Analytics uses behavioral analytics to prevent banking fraud. Financial institutions rely on our patented FraudMAP solutions to protect their account holders from the diverse and ever-expanding mix of fraud attacks and schemes. By focusing on account holder behavior, FraudMAP can detect account takeover, reconnaissance, and fraudulent payments that result from cross-channel attacks. FraudMAP, available as a Software-as-a-Service (SaaS) solution with versions for wire and ACH payments plus online and mobile channels, uses sophisticated behavioral analytics to accurately distinguish suspicious activity from established normal behavioral patterns, and offers easy-to-use investigation and case management tools. Hundreds of institutions of all sizes are using FraudMAP to improve competitiveness and growth, reduce fraud risk and losses, increase operational efficiency, and enhance compliance. Learn more: www.guardiananalytics.com

IBM helps financial services clients gain insight and agility through information-led transformation. Forward thinking institutions will use these insights to transform their business within four imperatives: attract and retain customers, develop new revenue sources, streamline operations and pro-actively address risk and regulatory requirements. IBM Security, supported by world-renowned Trusteer® and X-Force® research and development, provides the security intelligence to help organizations holistically protect their people, infrastructure, data and applications. This enables organizations to more effectively manage risk and implement integrated security solutions for cloud, analytics, mobile and other enterprise business architectures. IBM operates one of the world’s largest security research and development and delivery organizations comprising over 10 Security Operations Centers, 15 software security development labs with over 40 Softlayer Cloud Data Centers in the United States, Europe, India and Asia Pacific. IBM monitors over 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents. A smarter business needs smarter systems. Let's build a Smarter Planet.

Learn more: ibm.com/banking  |  ibm.com/security  | securityintelligence.com

MSA is a specialized security company that began in 1987 and has since grown into a recognized industry leader in high consequence threat protection and specialized training for corporate and government clients. MSA's team of security professionals - comprised of veteran members of the law enforcement, military, and business communities - provides unparalleled perimeter security, training and explosive detection services domestically and internationally. MSA combines hands-on experts with information and technology to provide our clients with the best resources for reducing their vulnerabilities to threats and protecting their personnel and property.

MSA has a robust operational protection capability that includes facility and perimeter security, executive protection, special event planning, WMD detection, and the largest privately owned single handler explosive detection canine company in North America. MSA's comprehensive consulting services consist of counterterrorism threat and intelligence analysis, risk and vulnerability assessment, maritime training and protection services, and physical security design. We also offer complete security systems design and integration, continuity of operations planning, and security program audits. Learn more: msasecurity.net

PwC’s cybersecurity consulting team helps organizations understand dynamic cyber challenges, adapt and respond to risks inherent to their business ecosystem, and prioritize and protect the most valuable assets fundamental to their business strategy. For more information on PwC’s cybersecurity point of view, visit: www.pwc.com/cybersecurity.

About PwC’s Advisory Practice - PwC’s Advisory professionals help organizations improve business performance, respond quickly and effectively to crisis, and extract value from transactions. We understand our clients’ industries and unique business challenges, and look across the entire organization — focusing on strategy, structure, people, process and technology — to help clients build their next competitive advantage. See www.pwc.com/us/consulting for more information or follow us @PwCAdvisory.

About PwC US - PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 158 countries with more than 180,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/US. Learn more about PwC by following us online: @PwC_LLP, YouTube, LinkedIn, Facebook and Google +.

RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle - no matter where it moves, who accesses it or how it is used. Learn more: www.rsa.com

Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. Secunia’s proven, complementary portfolio aids businesses in their handling of complex IT security risks and compliance requirements across industries and sectors – a key component in corporate risk management assessment, strategy, and implementation. Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base. For more information, visit secunia.com.

Stroz Friedberg is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected and regulated business world. We are trusted advisers—a collection of the brightest minds in the fields of cybersecurity—who are leading experts in digital forensics, incident response, and security science; investigation; eDiscovery; and due diligence. We work proactively to minimize risk, and respond in real time to contain issues and crisis situations when the inevitable occurs. Our multi-disciplinary teams tackle the most complex, time-sensitive, and far-reaching issues and guide businesses through the maze of complexities found at the intersection of law, technology, investigations, compliance and security science. The skills, backgrounds, and integrity of our people, combined with our industry-leading proprietary incident response and digital forensics tools, are a powerful force when getting it right matters most. At Stroz Friedberg, we are united by a common goal — to maximize the health of an organization, ensuring its longevity, protection and resilience.

PPISC Affiliates
Affiliates

Accume Partners provides internal audit, regulatory compliance, risk management and advisory services to banks and financial institutions, and has done so for more than 20 years. As the level of regulatory and business complexity has surged, so has the need for specialized knowledge and focus. In response to the increasing number and complexity level of system breaches and other security incidents, Accume expanded capabilities dramatically and added a dedicated Cybersecurity practice. In 2015, Accume introduced 3 innovative cybersecurity services, offering a much needed capability, particularly to the community banking market.

Founded in 2012 by cyber defense veterans, Adallom, a 2014 Gartner Cool Vendor, is a cloud access security broker which delivers visibility, governance and protection for cloud applications. Its innovative platform is simple to deploy, seamless to users, and is available as a SaaS-based or on-prem solution. Powered by SmartEngine(tm) advanced heuristics and backed by an elite cybersecurity research team, Adallom makes it easy to protect data in the cloud. For more information, visit www.adallom.com or follow @adallom.

Agari builds new, internet scale, data driven security solutions that eliminate email as a channel for cyberattacks and enable businesses and consumers to interact safely. The Agari cloud-based SaaS solution aggregates data from 2.5 billion mailboxes hosted by email receivers including Gmail and Yahoo! to help global brands including JPMorgan Chase, Facebook, Aetna, and UPS eliminate email threats, protect customers and their personal data, and proactively guard brand reputation. Today, Agari analyzes over 6 billion messages per day, identifies over 2 million malicious URLs per month, and blocks over 200 million malicious emails per month. Based in Silicon Valley.

Agio is a leading IT and Security Managed Services Provider, offering technology hosting, monitoring, management, disaster prevention and recovery, security, and other high-end technology services. With 130+ employees, Agio is headquartered in New York City with operational headquarters in Norman, OK. Learn more at agio.com.

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

Privately-held since 1983, Alvarez & Marsal (A&M) is a leading global professional services firm that delivers performance improvement, turnaround management and business advisory services to organizations seeking to transform operations, catapult growth and accelerate results through decisive action. With a dedicated team of senior professionals advising the financial services industry, A&M provides operational solutions to business leaders looking to decipher cybersecurity. We work with our clients to identify risks in their evolving business objectives and assist in implementing business-focused cybersecurity strategies tailored for their enterprise risk management programs.

ANX is a global provider of secure, managed solutions to help companies achieve compliance and collaborate more effectively. As a compliance expert, ANX helps companies protect brand value and franchise owner investments by reducing the risk of a data breach. The flagship solution, SecurePCI, simplifies the process of becoming PCI compliant and delivers enterprise-grade managed security technology to Level 4 merchants. ANX has more than 15 years of experience protecting sensitive customer information and is certified by the PCI Security Standards Council as a Qualified Security Assessor (QSA) and an Approved Scanning Vendor (ASV). Visit www.anx.com for more information.

Aqua Security enables enterprises to secure their virtual container environments (e.g. Docker) from development to production, accelerating container adoption and bridging the gap between DevOps and IT security.

Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance. For more information, visit www.aquasec.com or follow us on Twitter: twitter.com/AquaSecTeam.

For fifteen years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on Arbor Networks for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with Arbor Networks.

Arxan is the world's strongest and most deployed application protection solution that secures mobile applications from hacker attacks and malware exploits. Arxan’s scalable, multi-OS approach mitigates application risk to protect financial institutions from malware, fraud, data compromise, IP theft and ultimately financial loss and brand compromise by ensuring critical code is hardened from unauthorized access and repacking/redistribution attempts. Our customers leverage Arxan's patented ‘Guarding’ technology, which is embedded directly into application binaries to yield self-defending, tamper-proof apps that are resistant to unauthorized code tampering and reverse engineering attacks. Arxan’s mobile app protection products enable financial institutions to launch advanced and feature-rich financial services with confidence. Arxan’s application protection is deployed on over 250 million devices by Fortune 500 organizations in financial services, retail, healthcare, ISV, entertainment, and other enterprises. Arxan Technologies is headquartered in the Bethesda, MD with global offices in EMEA and APAC. Visit us at www.arxan.com.

Attivo Networks™ is the leader in dynamic deception technology with a strong customer base in financial, healthcare, and other industries that have a need to protect customer and company data from exfiltration. Attivo provides the real-time detection and visibility of inside-the-network and data center intrusions. The Attivo BOTsink® platform uses high-interaction deception to lure BOTs/APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures or database lookup to detect cyber attacks. Whether it is a reconnaissance or stolen credential attack, Attivo provides the forensics required to stop current and prevent future attacks. www.attivonetworks.com

BAE Systems Applied Intelligence helps nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.

We do this using our set of solutions; systems, experience and processes - often collecting and analyzing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world, enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems.

We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA. For further information, visit www.baesystems.com/businessdefense.  

Bay Dynamics® is a cyber risk analytics company that helps IT and security executives understand and action their cyber security data. The company's flagship analytics software, Risk Fabric, automates the process of analyzing security information so that it's traceable, trustworthy and prioritized. The platform makes cyber risk everyone's business – from employees to LoBs to the board – and actively engages all parties in measurably reducing it. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders, vendors and bad actors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com

Launched in 2014, Bastille is the first security company to detect and mitigate threats affecting the Internet of Things. Bastille secures the IoT on corporate campuses by identifying airborne threats and allowing for preemptive response. Through proprietary software and sensor technology, Bastille scans a corporation’s airspace, giving visibility into and location of every RF-emitting device.

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third-party risk, benchmark performance, and assess and negotiate cyber insurance premiums.

Organizations worldwide use Black Duck Software's industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com.

BluVectorT, a product of Acuity Solutions Corporation, is a malware detection platform that incorporates breakthrough, patented machine learning techniques to analyze content coming into your network, allowing security teams to see, organize, prioritize and manage threats in near real time that are targeting their critical infrastructures. It can collect and analyze millions of packets and hundreds of files per second, providing deep network protocol analysis. This results in increased malware detection rates at network speeds, and higher throughput without the hassle of having to manage and update multiple engines, allowing analysts to see beyond 'the known bad' identified by their signature-based workflow, and identify threats to their networks that have been - until now - undetectable. Please visit www.bluvectorcyber.com for more information.

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2015 Awards.

Cigital is one of the world’s largest application security firms. We go beyond services to help organizations find, fix and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.

Our proactive methods helps clients reduce costs, speed time to market, improve agility to respond to changing business pressures and threats, and focus resources where they are needed most. Cigital’s managed services maximize client flexibility, while reducing operational friction and cost. Cigital gives organizations of any size access to the scale, security expertise, and practices needed to build a successful software security initiative. For more information, visit us at www.Cigital.com.

Citrix® powers business mobility in the financial services industry with a fully integrated and secure solution, uniting technologies in virtualization, mobility management, networking, and cloud. Financial Services companies can improve customer experience and employee productivity by providing secure instant access to apps, data and communication on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are trusted by the top 10 largest global banks, as well as the top 10 global companies in investment; property and casualty insurance; and life insurance. Learn more at www.citrix.com/financialservices.

Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process outsourcing services, dedicated to helping the world's leading companies build stronger businesses. Headquartered in Teaneck, New Jersey (U.S.), Cognizant combines a passion for client satisfaction, technology innovation, deep industry and business process expertise, and a global, collaborative workforce that embodies the future of work. With over 100 development and delivery centers worldwide and approximately 217,700 employees as of March 31, 2015, Cognizant is a member of the NASDAQ-100, the S&P 500, the Forbes Global 2000, and the Fortune 500 and is ranked among the top performing and fastest growing companies in the world. Visit us online at www.cognizant.com or follow us on Twitter: Cognizant.

The Corvil platform transforms network data into streaming intelligence to see, understand and act on business as it's happening. Corvil provides the full picture of customers, business and IT infrastructure all interacting together in real-time. It does this by making sense of raw packet data streaming through the network, enriching it with analytics and making it searchable and consumable. Proven in the world's most demanding environments, monitoring over 50 petabytes of data and over $170 billion worth of transactions daily, Corvil is trusted to provide real-time analytics that powers decision and action in the Now.

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to more than 1,500 global businesses, including 17 of the world’s top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, www.cyberark.com/blog, follow on Twitter @CyberArk or Facebook at www.facebook.com/CyberArk.

Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide.

Cylance’s award-winning product, CylancePROTECT™, stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. CylancePROTECT is a radically different technological approach to cybersecurity that employs artificial intelligence to analyze the DNA of files before they execute.

Complementing CylancePROTECT are professional services that provide pre-attack penetration and vulnerability testing, compromise assessments and post-attack incident response. Cylance specializes in securing critical infrastructure and key resources for education, energy, financial services, government, healthcare, heavy industry, oil and gas, retail, technology, and other industries.

Standing apart from a cybersecurity industry reliant upon an outdated detection and response model, Cylance secures through prediction and pre-response at the enterprise endpoint, preventing malware and advanced persistent threat breaches before they cause harm.

DefenseStorm is a security data platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective. Built from the ground up in the cloud, DefenseStorm unifies detection, investigation, reporting, and compliance into a single place to manage cybersecurity data. Formed by bankers and technology experts, DefenseStorm aggregates event data across all cybersecurity tools and links policies to real-time alerts, so that financial institutions can prove to regulators they are both secure and compliant with evolving FFIEC cybersecurity requirements. For more information please visit www.DefenseStorm.com.

DFLabs is a Technology and Services company specialized in Cyber Security Incident and Data Breach Response. Our mission is: eliminating the complexity of Cyber Security Incident and Data Breach, reducing reaction time and risk exposure. In other words: Cyber Incidents Under Control.

With this goal in mind, we ve created IncMan NG, the cutting edge technology platform for managing and responding to cyber incidents and share intelligence. IncMan has been created for SOC and CSIRT orchestration, and It is currently being used by many Fortune 100/1000, and Financial Services Institutions worldwide.

More info here.

Since 1999, Digital Defense, Inc., (DDI) has assisted financial organizations to protect sensitive data through managed security risk assessment solutions. DDI has received numerous industry recognitions including a top 25 ranking in Cybersecurity Ventures’ listing of the World’s 500 Hottest Cybersecurity Companies, and inclusion in CSO Outlook’s Top 10 Network Security Companies and CIO Review’s 20 Most Promising Cyber Security Solutions. Vulnerability scanning, penetration testing, and security awareness training are DDI’s most popular offerings, each of which proactively improves the security of an organization. DDI’s unique Vulnerability Management as a Service (VMaaS) delivery model helps organizations bolster information security.

Distil Networks, the global leader in bot detection and mitigation, is the only easy and accurate way to protect web applications from bad bots, API abuse, and fraud. With Distil, you automatically block 99.9% of malicious traffic without impacting legitimate users.

Distil Web Security defends websites against web scraping, brute force attacks, competitive data mining, account takeovers, online fraud, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.

Distil API Security protects all types of APIs including those serving web browsers, mobile applications, and Internet of Things (IoT) connected devices. Distil API Security defends APIs against developer errors, integration bugs, automated scraping, and web and mobile hijacking.

For more information on Distil Networks, visit us at www.distilnetworks.com or follow @DISTIL on Twitter.

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Many large financial services institutions, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.

Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection.

EclecticIQ is an applied cyber intelligence technology provider, enabling enterprise security programs and governments to bootstrap a threat intelligence practice. Empowering analysts to take back control of their threat reality and mitigate exposure accordingly.

EclecticIQ's mission is to restore balance in the fight against cyber adversaries. Its flagship product EclecticIQ Threat Intelligence Platform enables operationalization of security information exchange, empowers collaborative analyst workflow and ensures timely integration of cyber threat intelligence detection, prevention and response capabilities.

For more information, please visit: www.EclecticIQ.com. Follow us on @EclecticIQ

Consumers, citizens and employees increasingly expect anywhere-anytime experiences, whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable, secure and cost-effective. We offer solutions for financial card issuance, secure credential production, transaction authentication, secure network access, encrypted communications, identity verification, website security and more. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, we are able to serve customers in more than 150 countries worldwide.

Exabeam is a user behavior analytics solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Unique among UBA products, Exabeam’s Stateful User Tracking™ automatically creates a complete timeline of every event and anomaly tied to an attack -- across devices, IP addresses, and credentials -- and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks.

FICO is a leading analytics software company, helping businesses in 80+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. FICO provides analytics software and tools across multiple industries to manage risk, fight fraud, build profitable customer relationships, optimize operations and meet strict government regulations.

Flashpoint provides the reports, tools, data, and access to experts necessary to obtain tactical, operational, and strategic intelligence from the Deep & Dark Web. The company offers a state-of-the-art platform with data curated by world-class subject matter experts. Flashpoint’s products illuminate threatening actors, relationships, behaviors, and networks concealed within these hidden areas of the Internet. Security and intelligence teams across the Fortune 500 and government use the company’s data, tools, and expertise to reduce the costs of fraud, data loss, reputational damage, or other attacks. Flashpoint is backed by TechOperators, Greycroft Partners, K2 Intelligence, Bloomberg Beta, and Cisco Investments.

ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of October 2015, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Fortinet hardware and virtual solutions are recommended by NSS Labs and with over 2.5M threat sensors worldwide, are reinforced by FortiGuard Labs, a team of over 200 cyber-security researchers focused solely on industry threat research, analytics, and intelligence for preventing and detecting the latest attacks while delivering incident response. Fortinet provides broad, high-performance protection against dynamic security threats whether inside the perimeter or out and custom ASIC technology radically increases throughput 5 - 10X more than other solutions, enabling the world's first 1 terabit per second throughput firewall.

Global cybersecurity leader Fox-IT's 200+ employees create solutions for a more secure society. Dedicated to clients, and our integrity, Fox-IT delivers solutions before, during and after attacks. InTELL provides global visibility into on-line threats. Our world-wide customers value the unique context and attribution. Our rich STXI/TAXII feeds power their defenses. DetACT delivers real-time web and mobile event analytics, detecting attacks and anomalies to on-line channels. It is the only solution to detect and stop past and present channel attacks like Dyre & Dridex in real-time. Powered by intelligence, it provides 100% visibility, allowing companies to be in full control.

Genpact (NYSE: G) stands for "generating business impact." We design, transform, and run intelligent business operations including those that are complex and specific to a set of chosen industries. The result is advanced operating models that foster growth and manage cost, risk, and compliance across a range of functions. We have hundreds of long-term clients including more than one-fourth of the Fortune Global 500 and currently employ over 66,000 employees in 25 countries, with key management and corporate offices in New York City. Behind our passion for process and operational excellence is the Lean and Six Sigma heritage of a former General Electric division that has served GE businesses for more than 16 years.

HORNE Cyber is a decidedly different IT security firm. We offer clients a unique combination of discipline, skills and knowledge that can significantly reduce their exposure to security threats, allow them to stay compliant with ever-growing regulations, and use technology as a lever for growth.

illusive networks is pioneering deception-­based cybersecurity. Its patent pending Deceptions Everywhere® technology neutralizes targeted attacks and Advanced Persistent Threats (APT). By creating a deceptive layer across the entire network — agentlessly deployed on every endpoint, server, and network component — illusive networks disrupts and detects breaches with real-­time forensics and without interrupting business. Learn more at www.illusivenetworks.com

Intel 471 provides unique, high-value actor-centric cyber threat intelligence collection in support of our customers’ information security operations. Whilst some companies may offer indicators/feeds as threat intelligence, Intel 471 focuses on the individual threat actors and groups that pose a threat to your organization and sector.

Intel 471 employs specialists on the ground globally who are experts in their region and is incorporated in the United States.

Intel 471 provides two products accessible via a web portal and API:
Cyber Crime – Covers cyber threat activity from financially motivated cyber criminals.
Hacktivism – Covers cyber threat activity from politically motivated cyber criminals.

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.

Invincea is the leader in advanced endpoint threat protection, protecting more than 25,000 customers and 3 million active users.

The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls. Invincea protects enterprises against targeted threats, including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea offers the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware.

Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization's weaknesses. Kenna accomplishes this by automating the integration of vulnerability data and exploit data, analyzing security vulnerabilities against active Internet breaches. For more visit kennasecurity.com.

KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using mock attacks, engaging interactive training, continuous assessment through simulated phishing, vishing and smishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance. Learn more at www.KnowBe4.com

KnowCyber helps companies and other organizations build cybersecurity through learning. We reduce organizational risk by preparing and motivating employees to think and act differently, providing them with the know-how to become the organization’s greatest cybersecurity resource. Our training solutions combine the latest technologies and best practices in learning and development with the latest and best thinking in cybersecurity. Crisp, concise instructional modules address top threats and vulnerabilities, engaging learners through compelling narratives, rich multimedia, and meaningful interactivity and assessment. Programs are designed for seamless delivery to any device from mobile to desktop, via the client’s LMS or our own. They can be co-branded or white-labeled, with learning content customized per industry, organization, or learner roles and responsibilities. Learn more at www.knowcyber.com.

Kudelski Security, a division of the Kudelski Group (SIX: KUD.S), is an innovative, independent Swiss provider of tailored cybersecurity solutions to the financial institutions, defense sector, government administrations, and the media industry. The team of over 130 security experts delivers end-to-end cybersecurity consultancy, products and services, leveraging over 20 years’ experience in advanced threat detection, attack prevention, asset and reputation protection and security assessments. Kudelski Security is headquartered in Switzerland. Its global reach and multi-disciplinary incident response is reinforced by key international partnerships.

Lookingglass Cyber Solutions is the world leader in threat intelligence monitoring and management enabling global cyber threat visibility and risk decision support. With its ScoutVisionTM and CloudScoutTM products, Lookingglass leverages all-source intelligence to provide context and continuously monitor threats far and near, such as the presence of botnets, hosts associated with cybercriminal networks, unexpected route changes and the loss of network resiliency. Lookingglass’ outside-in approach accounts for a client’s entire enterprise cyber ecosystem including the extended enterprise, and other networks beyond their control. This visibility brings an unprecedented view to help organizations understand their risks and enable a more proactive approach to the management of their overall security posture. For more information, visit www.LGScout.com.

Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done to an individual or an enterprise. Lookout’s cloud-based technology is fueled by a global network of more than 100 million sensors and tens of thousands of apps that are added daily. With this dataset of virtually all the mobile code in the world and the predictive machine intelligence to analyze and make sense of the data, Lookout can identify connections that would otherwise go unseen and stop cybercriminals from attacking mobile devices. The world’s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit www.lookout.com.

Lutech S.p.A. is a leading Italian ICT Company working for more than 15 years. Lutech S.p.A. delivers services in the following domains: Customer Engagement, Business&Mobile Applications, Datacenter, Cloud, Networking, Cybersecurity, eHealth, Financial Services, BigData&Analytics, e-Commerce, Internet of Things, Digital Payments, Video&Unified Communications. During the last years, Lutech S.p.A. has grown to more than 1,155 people, about national and international 200 customers, a turnover of around € 142m.

Lutech Cybersecurity Business Platform, serving customer organizations in more than 140 engagements, supports organizations Business Resilience through Governance, Risk & Compliance, Audit, Ethical Hacking, Breach Detection & Incident Response, Intelligence, Digital Forensic, Counter-surveillance, Data Protection, Application Security.

More informations at www.lutech.it

Malwarebytes provides anti-malware and anti-exploit software designed to protect users against zero-day threats that consistently escape detection by traditional endpoint security solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That’s why large Enterprise businesses worldwide, including Disney, Dole, and Samsung, trust Malwarebytes to protect their mission-critical data. For more information visit www.malwarebytes.com/business

The Media Trust is the global leader in protecting the online and mobile environment. Functioning as a security operations center for the world’s most heavily-trafficked websites, The Media Trust monitors digital properties from the consumer perspective to detect web-based anomalies.

Clients access this original source, real-time malware data through a threat intelligence feed or SaaS-based solution to secure networks, protect websites and mitigate the risk of everyday employee internet use.

More than 500 enterprises and digital publishers—including 41 of comScore's AdFocus Top 50 web properties—rely on our comprehensive suite of detection and alerting services to protect their digital properties, their revenue and, most importantly, their brand. Learn more at www.TheMediaTrust.com.

Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors. The company’s patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security products can be deployed in the public or private cloud and are trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Company headquarters are in Menlo Park, California. For more information, please visit www.menlosecurity.com or @menlosecurity.

Netskope™ is the leading cloud access security broker (CASB). Netskope gives IT the ability to find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence.

NetSPI helps enterprises tackle today’s dynamic security challenges. Using industry-vetted solutions, integrated technologies, and trusted expertise, the company enables top-tier IT organizations to build more efficient processes, more stable application development lifecycles, and more responsive teams. NetSPI’s proven vulnerability management platform, CorrelatedVM®, automates basic testing and tracking, data integration and correlation, and cross-team communication and collaboration to save valuable time and increase efficiencies by 30% or more. Trusted by today’s Fortune 500, NetSPI’s integrated, proactive security strategy helps identify 20% more vulnerabilities and (more importantly) identify and mitigate the most critical threats to your business. Learn more at www.netspi.com.

Niara aggregates security data from disparate sources, ensuring that security teams can identify and quickly respond to sophisticated, multistage attacks that regularly thwart legacy detection technologies. Niara’s Security Intelligence solution delivers contextually relevant security analytics by fusing data from disparate sources to discover compromised users, provide insight into malicious insiders, enable advanced threat hunting efforts, and efficiently investigate incidents. Headquartered in Sunnyvale, Calif., the company is backed by NEA, Index Ventures and Venrock. For more information, visit www.niara.com.

NSS Labs, the security insight company, is trusted by the world's largest and most demanding enterprises to help make their organizations more secure. Focused exclusively on IT security, NSS provides CEOs, CIOs, CISOs, and information security professionals with data-driven insight to help them make informed security decisions. NSS' heritage is its best-in-class security product testing laboratory, which offers in-depth test reports as well as research and analyst services. This expertise is the premise for its Cyber Advanced Warning System™ - the industry's revolutionary cloud-based security and risk management platform designed to identify and expose active threats that matter. For more information visit: www.nsslabs.com

At Palo Alto Networks, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. As the next-generation security company, we are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud.​

Phantom automates enterprise security operations. In the face of problematic trends including the dramatic increase and volume of attacks, severe shortages in qualified personnel, growth in the diversity and complexity of IT security environments and unforgiving consumers, investors and regulators holding management to task for breaches, Phantom arms security operations with the automation and orchestration solutions that ready them to defend their company’s business. Visit TryPhantom.com to register for Phantom Community Edition, a free version of Phantom Enterprise.

PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial-of-service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust. To learn more contact us at info@phishlabs.com or 1-877-227-0790. Visit www.phishlabs.com, read The Phishlabs Blog, and follow PhishLabs on Twitter and LinkedIn.

Pindrop Security provides enterprise solutions that help prevent phone-based fraud and provide phone authentication. Pindrop’s breakthrough phoneprinting technology can identify phone devices uniquely based on only the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop’s customers include two of the top five banks and two of the leading online brokerages. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions.

Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that couples User and Entity Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com

Proofpoint - As advanced threats increase in frequency and sophistication, it’s never been more important to secure your financial organization's email, by far the number one threat vector. Proofpoint, positioned by Gartner in the Leaders Quadrant in their 2015 Magic Quadrant for Secure Email Gateways, uniquely combines a world class email gateway solution with the industry’s leading Targeted Attack Protection technology, catching and stopping cyber threats from malicious links and attachments hours or even days before traditional defenses.

Recorded Future arms enterprises with real-time threat intelligence, allowing them to proactively defend against cyber attacks. With billions of indexed facts, and more added every day, the company's patented Web Intelligence Engine continuously analyzes the entire web to give unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.

Resilient, an IBM Company, empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s industry-leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, smarter, and more efficiently.

Part of IBM Security, the Resilient IRP also integrates security technologies into a single hub and provides easy workflow customization and process automation. With Resilient, security teams can have best-in-class response capabilities.

Resilient has more than 100 global customers, including 30 of the Fortune 500 and partners in more than 20 countries. Learn more at www.resilientsystems.com.

Return Path is an email data company, helping the world's leading companies promote and protect their brands. Through our global network of mailbox and security partners, Return Path detects and eliminates more email fraud than any other company in the world, analyzing over 7 billion messages every day. Learn more at returnpath.com/stopemailfraud.

RiskIQ provides organizations the visibility and intelligence they need to secure their Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of managed, unmanaged and rogue web and mobile assets. This “Digital Footprint” is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com.

RiskRecon traces its beginnings to 2011 when our founder, Kelly White, asked himself: “is it possible to measure the security program quality of any company simply by looking at its Internet-facing presence?” Kelly is a long time infosec practitioner and CISO who witnessed first hand the need for adapting third party risk controls to meet the new challenges resulting from decentralized IT and SaaS apps.

Our breakthrough technology enables you to control third party risk by providing vendor security assessments that are comprehensive, actionable and available on demand.

Through RiskRecon, you can quickly evaluate the security program of any vendor – SaaS, outsourcer or on-prem provider. RiskRecon requires no proprietary vendor data and no invasive scans. Learn more about us at www.riskrecon.com.

Sage Data Security is a strategic partner and trusted advisor for financial institutions nationwide. Sage offers an award-winning portfolio of cybersecurity services designed to cost-effectively protect organizations from harm and ensure regulatory compliance. Sage’s nDiscovery℠ service expertly mines device, operating system, application, web and database logs to uncover and identify dangerous cyber activity including external attacks, malware, unauthorized access, data exfiltration and internal system misuse. Sage is proud to be the hosting organization for the 6th Annual CyberCrime Symposium, November 5th & 6th, 2015. To learn more about Sage services, nDiscovery and the Cybercrime Symposium, visit www.sagedatasecurity.com.

SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform - our advanced data analytics and insights engine - SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.
To learn more, visit www.secureworks.com

At Security Compass, we have extensive cross industry knowledge, technical prowess, and have developed the right expert tools to predict, plan  and prevent a security breach. We guide your team in building a customized security blueprint based on your industry, software development  lifecycle, and business needs to cost-effectively mitigate risks. For more information, visit www.securitycompass.com, or read the Security Compass Blog.

The Shape Botwall Service has deflected over $100M in fraud losses in 2015 alone for major retailers, financial institutions, airlines, and manufacturers. Shape uniquely defends Global 2000 enterprises against sophisticated automated attacks on web applications and mobile APIs. Automated attacks include credential stuffing & account hijacking, content scraping, and application DDoS. Shape uses a high performance security appliance, a sophisticated machine-learning back-end, and a world-class team of security & web experts to protect major B2C websites. Shape's Botwall can be deployed without impacting end user experience and with minimal changes to the backend infrastructure.

Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

Skycure is a mobile threat defense company with products that detect and prevent cyber attacks on both BYO and corporate-owned devices without compromising the user’s privacy or mobile experience. Skycure’s predictive technology is based on mobile threat intelligence gathered via massive crowd  knowledge to proactively identify and remediate threats.
Skycure enhances enterprise mobile security with a holistic approach that seamlessly identifies and remediates threats, vulnerabilities and attacks on all levels – physical, network, malware and application.

Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Comcast, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring.

Every day, developers rely on millions of third party and open source building blocks — known as components — to build the software hat runs our world. Sonatype ensures that only the best components are used throughout the development lifecycle so that organizations don't have to make the  tradeoff between going fast and being secure. Policy automation, ongoing monitoring and proactive alerts makes it easy to have full visibility and control of components throughout the software supply chain so that applications start secure and remain that way over time. Learn more at www.sonatype.com or in this FS-ISAC Third Party Software Working Group whitepaper (Control Type 3).

Symantec The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives. More information is available at www.symantec.com.

ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com.

ThreatMetrix®, The Digital Identity Company™, is the market-leading cloud solution for authenticating digital personas and transactions on the Internet. Verifying more than 20 billion annual transactions supporting 30,000 websites and 4,000 customers globally through the ThreatMetrix® Digital Identity Network, ThreatMetrix secures businesses and end users against account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches. Key benefits include an improved customer experience, reduced friction, revenue gain, and lower fraud and operational costs. The ThreatMetrix solution is deployed across a variety of industries, including financial services, e-commerce, payments and lending, media, government and insurance.

For more information, visit www.ThreatMetrix.com or call 1-408-200-5755. Join the cybersecurity conversation by visiting the ThreatMetrix blog, Facebook, LinkedIn and Twitter pages.

ThreatQuotient Inc. (TQI) was founded in March 2013 and is dedicated to revolutionizing cyber defense capabilities by building analyst-driven applications, helping organizations manage threat intelligence and therefore defending against sophisticated cyber attacks. Our foundation is built from our operational experience to deliver a relevant vendor agnostic on-premise deployment – allowing analysts to spend more time on high-value processes rather than transferring intelligence across multiple cloud solutions and internal platforms. ThreatQ will advance threat information management through end-to-end automation that transforms disparate data into ACTIONABLE intelligence. Because of its power and ability to provide defenders with critical contextual information, ThreatQ is becoming a team’s cornerstone tool.

Venafi is the market leading cybersecurity company in Next-Generation Trust Protection (NGTP). As a Gartner-recognized Cool Vendor, Venafi delivered the first Trust Protection Platform™ to secure cryptographic keys and digital certificates that every business and government depend on for secure communications, commerce, computing, and mobility. Today organizations that blindly trust keys and certificates are at increased risk of costly attacks, data breaches, audit failures and unplanned outages.

As part of any enterprise infrastructure protection strategy, Venafi TrustAuthority™ and Venafi TrustForce™ help organizations regain control over trust in the cloud, on mobile devices, applications, virtual machines and network devices by protecting Any Key. Any Certificate. Anywhere™Venafi Threat Center provides primary research and threat intelligence for trust-based attacks.

Verifone transforms everyday transactions into opportunities for connected commerce. We’re connecting payment devices to the cloud, merging the online and in-store shopping experience, and creating the next generation of digital engagement between merchants and consumers. We are built on a 30-year history of uncompromised security with approximately 29 million devices and terminals deployed worldwide. Our people are trusted experts that work with our clients and partners, helping to solve their most complex payments challenges. We have clients and partners in more than 150 countries, including the world’s best-known retail brands, financial institutions and payment providers.

Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric helps over 1300 customers, including 17 of the Fortune 25 and many of the world’s most security conscious financial and government organizations, to meet compliance requirements and protect what matters —their sensitive data —from both internal and external threats. The company’s scalable solution protects any file, any database and any application — within enterprise data center, cloud, big data environments — with a high performance, market-leading Vormetric Data Security Platform that incorporates application transparent encryption, access controls and security intelligence. Vormetric – because data can’t defend itself. Learn more: www.Vormetric.com

Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. WhiteHat is different because we approach application security through the eyes of the attacker. Through a combination of technology, more than a decade of intelligence metrics, and the judgment of real people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry. WhiteHat Sentinel, the company’s flagship product line, currently manages tens of thousands of websites - including sites in highly regulated industries, such as top e-commerce, financial services, and healthcare companies. For more information on WhiteHat Security, please visit www.whitehatsec.com.

To read the Affiliate Terms and Conditions (pdf), Click Here.