NH-ISAC 2016 Spring Summit
 

Platinum Sponsors

 
CrowdStrike

Crowdstrike
www.crowdstrike.com

CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries. We Stop Breaches. Find out how: www.crowdstrike.com

EY

EY
www.ey.com

EY Advisory combines a wealth of consulting capabilities — strategy, customer, finance, IT, supply chain, people advisory, program management and risk — with a complete understanding of a client’s most complex issues and opportunities, such as digital disruption, innovation, analytics, cybersecurity, risk and transformation. Visit www.ey.com to learn more.

riskrecon

RiskRecon
riskrecon.net

Dell SecureWorks

SecureWorks
www.secureworks.com

Securonix

Securonix
www.securonix.com

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management. For more information visit www.securonix.com.

 

Gold Sponsors

 
Cylance

Cylance
www.cylance.com

Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT™ stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Visit www.cylance.com/ or call 877-973-3336 for more information.

Deloitte

Deloitte
www2.deloitte.com

Gurucul

Gurucul
gurucul.com

Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit www.gurucul.com/ and follow us on LinkedIn and Twitter.

Ionic Security

Ionic Security
www.ionic.com

Ionic Security is a distributed data service which enables lifetime control over your data while providing real-time visibility and analytics of data-type, location, and use. When data access is requested, policies are checked in real time, every time, to ensure that sensitive information is only shared when allowed. This enables continuous control of your data both inside and outside your perimeter through Ionic's hybrid cloud on-premise service.

Optiv

Optiv
www.optiv.com

Optiv is the largest holistic pure-play cyber security solutions provider in North America. The company’s diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security. Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv is a Blackstone (NYSE: BX) portfolio company that has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers. For more information, please visit www.optiv.com.

Security Risk Advisor

Security Risk Advisors
securityriskadvisors.com

Security Risk Advisors provides expert consulting services with specializations in advanced threats controls implementation and 24x7 operation, red and blue teams, financial services control frameworks, and GRC process improvement. Our approach emphasizes ongoing knowledge transfer and access to our analysts.

Symantec

Symantec
www.symantec.com

 

Grand Rounds Sponsors

 
Cymmetria

Cymmetria
www.cymmetria.com

Security Scorecards

SecuriyScorecard
securityscorecard.com

SecurityScorecard is the most accurate cybersecurity rating across the entire business ecosystem. The cloud-based platform helps enterprises gain operational command of the security posture for themselves and across all their partners and vendors. It offers a measurement and analysis of critical risk factors not available from any other service provider and in a completely self-service and automated tool. It's based on the ThreatMarket™ data engine which collects over 30 million daily security risk signals from the entire Internet. SecurityScorecard was founded in 2013 by two former Chief Information Security Officers, Dr. Aleksandr Yampolskiy and Sam Kassoumeh. It is made up of veteran security researchers, cryptographers, data scientists, and software engineers. The company is privately held with headquarters in New York City. Security Scorecard investors include Sequoia Capital, Evolution Equity Partners, Boldstart Ventures, and others.

Soltra

Soltra
soltra.com

About Soltra®
Soltra, which developed Soltra Edge, is a joint venture between the Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The Depository Trust & Clearing Corporation (DTCC), the premier post-trade market infrastructure for the global financial services industry. Soltra Edge is an on premise software solution that enables critical entities to import structured and unstructured threat information, standardize and organize that threat information using STIX formats, and instantly route that uniform threat intelligence via the TAXII standard to devices and analysts in order to take immediate action to prevent cyber incidents. The software takes only a few minutes to download, install and configure and a basic license is available at no cost. Learn more at www.soltra.com and download a free copy of Soltra Edge at forums.soltra.com.

Veracode

Veracode
www.veracode.com

Veracode delivers the application security solutions and services today’s user- and software-centric world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can fully realize the benefits of the applications they build, buy and deploy as well as the components they integrate into their environments.

 

Silver Sponsors

 
Anomali

Anomali
www.anomali.com

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Appthority, Inc

Appthority
www.appthority.com

Appthority is the pioneer and global leader in enterprise mobile app risk management. Our automated, scalable solution scans and analyzes mobile apps on corporate or personal devices. Our service leverages the largest database of analyzed public and private apps (3.5 million and growing), features dynamic and behavioral app analysis and offers advanced policy management tools for scalable, automated control of mobile app risks. Appthority delivers visibility and trust to the rapidly expanding app ecosystem within enterprises. Headquartered in San Francisco, Appthority is backed by U.S. Venture Partners and Venrock, Blue Coat Systems, and Knollwood Investment Advisory. Visit www.appthority.com for more information.

Arxan

Arxan
www.arxan.com

Arxan provides the world’s strongest application protection solutions.

Our unique patented guarding technology

  1. Defends applications against attacks
  2. Detects when an attack is being attempted, and
  3. Responds to detected attacks with alerts and repairs.
Arxan offers solutions for software running on mobile devices, desktops, servers, and embedded platforms – including those connected as part of the Internet of Things (IOT) – and is currently protecting applications running on more than 500 million devices across a range of industries.

Cigital

Cigital
www.cigital.com

Cigital is one of the world’s largest application security firms. We go beyond traditional testing services to help organizations identify, remediate, and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services, and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications. Our proactive methods helps clients reduce costs, speed time to market, improve agility to respond to changing business pressures and threats, and focus resources where they are needed most. For more information, visit us at https://www.cigital.com/.

Prevalent

Prevalent
www.prevalent.net

Prevalent is a vendor risk management and cyber threat intelligence analytics innovator with a reputation for developing cutting-edge technologies and highly-automated services that are proven to help organizations reduce, manage and monitor the security threats and risks associated with third and fourth-party vendors.

For more information regarding Prevalent, please visit www.prevalent.net, email info@prevalent.net or call 877-PREVALENT.

Saviynt, Inc.

Saviynt
saviynt.com

Saviynt is an innovative leader in providing application, data and infrastructure access governance and intelligence platform for Cloud and Enterprise. Saviynt uniquely delivers IGA 2.0 by integrating advanced usage & risk analytics with fine-grained privilege management. Saviynt’s completely managed IDaaS platform ensures a worry free adoption of IGA services to secure critical enterprise assets.

Skyhigh Networks

Skyhigh
www.skyhighnetworks.com

Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Cisco, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia, and Salesforce.com.
For more information visit http://www.skyhighnetworks.com or follow us on Twitter @skyhighnetworks

Threat Connect

ThreatConnect
www.threatconnect.com

Topspin

Topspin Security
www.topspinsec.com

TopSpin Security provides a real-time offensive deception platform that allows companies to accurately detect attacks in progress and eliminate the threats without wasting time on false positives. Our technology is based on a unique combination of active decoys and in-depth egress analysis. TopSpin's network of decoys lures attackers by mirroring valuable network assets. Once engaged, the decoy interacts with the attacker, deceiving it and slowing its advance, while providing accurate, actionable alerts and a full forensics trail. TopSpin’s DECOYnet is currently deployed by leading Global2000 companies. Learn more at www.topspinsec.com.

 

Additional Sponsors

 
Agari

Agari
www.agari.com

Anomali

Anomali
www.anomali.com

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Coalfire Systems, Inc

Coalfire
www.coalfire.com

Coalfire’s healthcare and life sciences practice helps covered entities and business associates optimize their cyber risk advisory, assessment/compliance, and testing programs. We work with their security teams, the C-suite and boards to ensure they achieve a security maturity posture that allows them to be proactive in their stance against cyber threats. We understand that healthcare organizations have multiple types of data to protect as well as several regulations to comply with, including HIPAA, PCI, ISO, SOC, FISMA, and FedRAMP. As such, we provide consolidated audit programs with success metrics of up to 40% savings in time, cost and security team productivity.

CrowdStrike

Crowdstrike
www.crowdstrike.com

CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries. We Stop Breaches. Find out how: www.crowdstrike.com

Digicert

Digicert
www.digicert.com

FlashPoint Intel

FlashPoint Intel
www.flashpoint-intel.com/

Gurucul

Gurucul
gurucul.com

Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit www.gurucul.com/ and follow us on LinkedIn and Twitter.

NH-ISAC
www.nhisac.org/

Phantom

Phantom
www.phantom.us

Prevalent

Prevalent
www.prevalent.net

Prevalent is a vendor risk management and cyber threat intelligence analytics innovator with a reputation for developing cutting-edge technologies and highly-automated services that are proven to help organizations reduce, manage and monitor the security threats and risks associated with third and fourth-party vendors.

For more information regarding Prevalent, please visit www.prevalent.net, email info@prevalent.net or call 877-PREVALENT.

Dell SecureWorks

SecureWorks
www.secureworks.com

Securonix

Securonix
www.securonix.com

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management. For more information visit www.securonix.com.

Shape Security

Shape Security
www.shapesecurity.com

Soltra

Soltra
soltra.com

About Soltra®
Soltra, which developed Soltra Edge, is a joint venture between the Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The Depository Trust & Clearing Corporation (DTCC), the premier post-trade market infrastructure for the global financial services industry. Soltra Edge is an on premise software solution that enables critical entities to import structured and unstructured threat information, standardize and organize that threat information using STIX formats, and instantly route that uniform threat intelligence via the TAXII standard to devices and analysts in order to take immediate action to prevent cyber incidents. The software takes only a few minutes to download, install and configure and a basic license is available at no cost. Learn more at www.soltra.com and download a free copy of Soltra Edge at forums.soltra.com.

Tanium

Tanium
www.tanium.com

Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations. Follow us on Twitter at @Tanium and use #CONVERGE16 for conference information.

ThreatQuotient

ThreatQuotient
www.threatq.com

ThreatQ is a cyber threat intelligence platform that focuses on centralizing, structuring, and strengthening a security team’s Intel-driven defensive posture against attacks! ThreatQ was designed by a team of security and intelligence analysts who collectively took their expertise and a blank canvas to design a masterful cyber intelligence tool to flll the gaps within the current industry. The cornerstone of ThreatQ is taking cyber threat indicators and adversaries’ TTPs and making them “ACTIONABLE” through seamless automation.

Topspin

Topspin Security
www.topspinsec.com

TopSpin Security provides a real-time offensive deception platform that allows companies to accurately detect attacks in progress and eliminate the threats without wasting time on false positives. Our technology is based on a unique combination of active decoys and in-depth egress analysis. TopSpin's network of decoys lures attackers by mirroring valuable network assets. Once engaged, the decoy interacts with the attacker, deceiving it and slowing its advance, while providing accurate, actionable alerts and a full forensics trail. TopSpin’s DECOYnet is currently deployed by leading Global2000 companies. Learn more at www.topspinsec.com.

Transmit Security

Transmit Security
www.transmitsecurity.com

Trusona

Trusona
www.trusona.com

By fusing True and Persona, Trusona’s users are completely guaranteed. Trusona ensures the identity of the user for risky online or call-center transactions – thus, chosen to protect the world’s most sensitive assets.

Trusona is designed for privileged accounts, high-dollar wires, DTC stock transfers, critical infrastructure, government and homeland security, VIP and high net-worth individuals, news outlets social media, CEO/CFO wire fraud, healthcare records, etc.

Trusona’s authentication platform is comprised of:

  • In-person identity-proofing
  • In-person distribution of TruToken
  • Patented anti-replay technology
  • Insured up to $1M per wire
Created by cyber security expert Ori Eisen, Trusona is backed by the largest venture capital firm, Kleiner Perkins Caufield & Byers.

Trusona – when you truly need to know.

Twistlock

Twistlock
www.twistlock.com