December 6 2022
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners.
GitLab is The DevOps platform that empowers organizations to maximize the overall return on software development by delivering software faster and efficiently, while strengthening security and compliance. With GitLab, every team in your organization can collaboratively plan, build, secure, and deploy software to drive business outcomes faster with complete transparency, consistency and traceability.
Absolute Software is the only provider of self-healing, intelligent security solutions. Embedded in more than 600 million devices, Absolute is the only platform offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network connections – helping customers to strengthen cyber resilience against the escalating threat of ransomware and malicious attacks. Trusted by nearly 18,000 customers, G2 recognized Absolute as a leader for the tenth consecutive quarter in the Summer 20022 Grid® Report for Endpoint Management and as a high performer in the G2 Grid Report for Zero Trust Networking.
Our expert team can help you validate your Security Program through Risk Assessments, Network Penetration Testing, and Application Security Testing. Risk Assessments based on IT internal Controls, PCI DSS, HIPAA, and IT SOX Controls will give your company the assurances it needs for both security and compliance. We are not just talking vulnerability scanning! Contact us today to help your business: [email protected]
Competent consulting and training in Cyber Security and Privacy for small and medium sized organizations. No geek-speak, everyone can follow. We offer specialized courses for your C-Suite and your IT-Department. Every solution we offer is affordable and designed to prevent – or significantly limit – damage through a potential breach.
About Cyber Solutions:
Aon’s Cyber Solutions offers holistic cyber risk management, unsurpassed investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.
Aon plc (NYSE:AON) is a leading global professional services firm providing a broad range of risk, retirement and health solutions. Our 50,000 colleagues in 120 countries empower results for clients by using proprietary data and analytics to deliver insights that reduce volatility and improve performance.
Visit aon.com/cyber-solutions for more information.
VULNERA builds solutions that help organizations with the heavy-lifting so stakeholders can focus on what matters – remediating security issues.
Zyston is a fully managed cybersecurity MSSP solution and easily the most complete security program management offering that exists today.
” Our focus is to demonstrate continuous, measurable improvement in security preparedness that results in board-level peace of mind. Zyston goes beyond the alert – we monitor, detect, resolve and mature.”
Zyston also specializes in Human Capital Services for cybersecurity. Our global network of talent and relationships with key players in cyber education provide our clients with unprecedented access to top cyber talent at every level.
Open Web Application Security Project, Los Angeles
OWASP is a not-for-profit, worldwide organization focused on improving the security of all software. Our mission is to make software security visible, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.
The OWASP LA Chapter meets the 4th Wednesday of each month.
Information Systems Security Association, Los Angeles
Connecting the Southern California Information Community since 1982
The Los Angeles Chapter is the founding chapter of the Information Systems Security Association (ISSA ®), a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. Join us: issala.org
Women’s Society of Cyber Jutsu
“The Women’s Society of Cyberjutsu (WSC), a 501(c)3 non-profit, is dedicated to raising awareness of cybersecurity career opportunities and advancement for women in the field, closing the gender gap and the overall workforce gap in information security roles. “
Cloud Security Alliance, LA Chapter
The Southern California (SoCal) Chapter of the Cloud Security Alliance (CSA) is an organization formed to promote the use of leading practices for providing security assurance within Cloud Computing and provide education on the uses of Cloud Computing to help secure all other forms of computing.
The Southern California (SoCal) Chapter of the Cloud Security Alliance (CSA) is comprised of many subject matter experts from a wide variety of disciplines, united in our objectives:
• Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance.
• Promote independent research into best practices for cloud computing security.
• Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions.
• Create consensus lists of issues and guidance for cloud security assurance.