Previous Sponsors

Diamond Sponsor

imperva
Imperva is the cybersecurity leader that helps organizations protect critical applications, APIs, and data, anywhere, at scale, and with the highest ROI. With an integrated approach combining edge, application security, and data security, Imperva protects companies through all stages of their digital journey. Imperva Threat Research and our global intelligence community enable Imperva to stay ahead of the threat landscape and seamlessly integrate the latest security, privacy, and compliance expertise into our solutions.
Github

Millions of developers and companies build, ship, secure, and maintain their software on GitHub—the largest and most advanced development platform in the world. GitHub Advanced Security helps teams secure their supply chain and code with the only community-driven, native application security testing solution in the developer workflow. Instead of multiple tools causing friction in the process, GitHub Advanced Security offers targeted security context in the familiar GitHub flow to empower developers to fix vulnerabilities in minutes, not months, so that teams can innovate with peace of mind.

HCL AppScan

HCL AppScan pinpoints application vulnerabilities, allowing for quick remediation in every phase of the development lifecycle. Powerful DevSecOps delivering best-in-class application security testing tools to ensure your business and your customers are not vulnerable to attacks. Enabling developers to write code with fewer vulnerabilities and allowing teams to collaborate scanning activities, you’ll find an entire suite of dynamic, scalable, and comprehensive security testing tools with AppScan.

illumio

Zero Trust Segmentation – Stop Ransomware

Platinum Sponsor

sonatype
Sonatype is the software supply chain management company. Recognized by globally renowned analysts as an industry leader, Sonatype enables organizations to innovate faster in a highly competitive market. More than 2,000 organizations and 15 million software developers rely on our tools and guidance to deliver exceptional, secure software.
orca security
Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world’s most comprehensive coverage and visibility of risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure.
Palo Alto Prisma Cloud

When users are creating applications, they are always worried about the ability to keep their work secure. Prisma Cloud is designed to address this concern. Our platforms use the principles of DevSecOps to empower developers to both simplify and control the security of their application creation processes.

Prisma Cloud by Palo Alto Networks is a cloud security solution used for cloud security posture management, cloud workload protection, container security, and code security. It provides visibility, monitoring, and alerting for security issues in multi-cloud environments.

Google Cloud

Google Cloud accelerates every organization’s ability to digitally transform its business. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology – all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

Banyan Security

Secure app & infrastructure access,
purpose-built for enterprises
Banyan replaces your traditional network access boxes – VPNs, bastion hosts,
and gateways – with a cloud-based zero trust access solution.
Easy. Fast. Secure.

AppOmni

AppOmni is a leading provider of SaaS Security Management software. Its patented technology scans APIs, security controls, and configuration settings to compare the current state of enterprise SaaS deployments against best practices and business intent. AppOmni was founded by top security practitioners and is trusted by many of the world’s largest enterprises across technology, healthcare, banking, and security. For more information, please visit https://appomni.com.

Emerald Sponsor

Zyston Logo

ZYSTON

Zyston is a fully managed cybersecurity MSSP solution and easily the most complete security program management offering that exists today.
” Our focus is to demonstrate continuous, measurable improvement in security preparedness that results in board-level peace of mind. Zyston goes beyond the alert – we monitor, detect, resolve and mature.”
Zyston also specializes in Human Capital Services for cybersecurity. Our global network of talent and relationships with key players in cyber education provide our clients with unprecedented access to top cyber talent at every level.

Gold Sponsor

Praetorian

Praetorian

Praetorian helps companies adopt a prevention-first cybersecurity strategy by actively uncovering vulnerabilities and minimizing potential weaknesses before attackers can exploit them.

adlumin

Adlumin provides a multi-layered security approach with full transparency. Our Managed Detection and Response (MDR) offering extends your team with continuous threat detection and response. Plus, you get everything you need for effective threat hunting, incident response, vulnerability management, darknet exposure monitoring, compliance support, and much more.

Polymer Logo
Polymer is human-centric data loss prevention (DLP) that reduces the risk of data exposure in collaborative SaaS apps and AI tools.
Go beyond violation alerts to automatically detect and protect sensitive data. Take immediate action on real threats and quickly become HIPAA, PCI, CMMC 2.0, and ISO-27001 compliant.
edgescan

Edgescan was founded in 2011 by Eoin Keary with offices in Dublin and New York City; and offers an award-winning software as a service (SaaS) cybersecurity platform. The platform unifies all required security solutions into a single combative platform protecting and managing thousands of assets around the globe for organizations of all sizes and varies industries. It allows companies to view and map assets across their entire global attack surface providing actionable and verified vulnerability data that is free of false positives. The platform reduces the complexity and overhead associated with tool proliferation, speeds up remediation, cuts operational costs, while reducing risk associated with digital transformation and cloud deployments. From application, host development and production deployment; from the desktop to API to cloud to mobile devices; Edgescan secures the web applications and infrastructure that people rely on in their personal and professional lives.

TPX

TPx is a leading cyber security service provider supporting 18,000 customers. TPx offers threat assessment, pen testing, security gap assessment, MDR services, and inbox detection and response. We are one of Fortinet and Cisco’s top perimeter defense partners in the U.S., and currently rank #9 on the MSP 501. For more information, visit https://www.tpx.com/services/managed-security/ or follow TPx on LinkedIn, Twitter and Facebook.

QWIET.AI

QWIET AI is the first AppSec platform to utilize AI and ML to provide highly accurate and relevant findings that enable our customers to spend less time chasing false positives and more time focusing on fixing the vulnerabilities that truly matter.

D3 Security

D3 Security’s Smart SOAR platform is the only SOAR platform that combines automation and orchestration across unlimited integrated tools with an automated event pipeline that reduces event volume by 90% or more.
Smart SOAR’s codeless playbooks automate enrichment and remediation tasks, while making it easy for enterprises and MSSPs to build, modify, and scale workflows for security operations, incident response, and threat hunting.

CRITICALSTART

CRITICALSTART is the only Managed Detection and Response provider committed to eliminating acceptable risk. Leveraging our Zero Trust Analytics Platform (ZTAP) plus industry-leading Trusted Behavior Registry, we eliminate false positives at scale. Driven by 24x7x365 human-led, monitoring, investigating, and remediation, our MOBILESOC application provides on-the-go threat detection and response capabilities.

eSentire

eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption.
Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire’s award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.

Forcepoint

Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. Based in Austin, Texas, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries. Engage with Forcepoint on www.forcepoint.com, Twitter and LinkedIn.

Ontinue

Ontinue is the only MDR provider that leverages AI-driven automation, human expertise, and the Microsoft security platform to continuously assess and protect your environment and advance your security posture for digital transformation.

SecureOps

SecureOps was founded in 1999 specifically to protect organizations and their critical assets from Cyber Threats.
Our certified experts build and deliver tailored security services to monitor and protect our client’s most critical IT assets 24 hours a day, 7 days a week. Our exclusive focus on information security and IT risk management has enabled SecureOps to become a global IT Security Support Provider with clients in over 50 countries, protecting +100,000 endpoints and networks worldwide.
SecureOps provides managed and professional security services, empowering security teams with our world-class technology, information security analysts, and proven security processes. We offer support capabilities in areas such as information and log management, security event management, incident reporting, management, and response. In addition, our professional services team evolves our client’s security programs by implementing best-in-class processes that enable clients to progressively close potential security gaps, remediate risks, and protect mission-critical data.

IriusRisk

IriusRisk is the industry-trusted Threat Modelling Platform that speeds up time to market, provides consistency beyond human capacity, reduces cost of remediation, and powers security and development teams to collaborate.

Traceable

Traceable is the industry’s leading API security platform that identifies APIs, evaluates API risk posture, stops API attacks, and provides deep analytics for threat hunting and forensic research. With visual depictions of API paths at the core of its technology, its platform applies the power of distributed tracing and machine learning models for API security across the entire development lifecycle. Visual depictions provide insight into user and API behaviors to understand anomalies and block API attacks, enabling organizations to be more secure and resilient.

Synopsys Logo

Synopsys builds trust in software by enabling organizations to manage application security, quality, and compliance risks at the speed their business demands.

Brinqa

Brinqa provides the only attack surface intelligence platform that orchestrates the entire cyber-risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber hygiene — across all security programs. Brinqa Attack Surface Intelligence Platform is your single source of truth for cyber risk. It empowers organizations to elevate the security conversation across the business, hold risk owners accountable for fixing critical issues, and to manage and track all vulnerabilities in a single platform.

HPE aruba

At Aruba, a Hewlett Packard Enterprise company, we believe the most dynamic customer experiences happen at the Edge—an office, a hospital, a school, or at home. It’s anyplace work gets done and data is generated by users, devices, and things across your network. Our mission is to help customers capitalize on these opportunities by providing secure edge-to-cloud networking solutions. We use AI-based machine learning to deliver simpler, faster, and more automated networks that analyze data to help businesses thrive.

Check Point

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Armor Code Logo

The ArmorCode AppSecOps platform helps organizations reduce application exposure and risk while scaling AppSec effectiveness and impact by 10X or more. ArmorCode delivers AppSec Posture Management, Universal Vulnerability Management, DevSecOps Automation, and Compliance Management, in a single platform. ArmorCode customers get complete visibility of the application inventory and are able to automate and simplify their AppSec processes. ArmorCode’s marquee customers include #1 brands in Media and Entertainment, Big 4 consulting companies and several leading organizations in Finance, Business Services and Software Development among others.

BlackBerry Cylance Logo

BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.

Red Canary Logo

Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners.

GitLab Logo

GitLab is The DevOps platform that empowers organizations to maximize the overall return on software development by delivering software faster and efficiently, while strengthening security and compliance. With GitLab, every team in your organization can collaboratively plan, build, secure, and deploy software to drive business outcomes faster with complete transparency, consistency and traceability.

Absolute

Absolute Software is the only provider of self-healing, intelligent security solutions. Embedded in more than 600 million devices, Absolute is the only platform offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network connections – helping customers to strengthen cyber resilience against the escalating threat of ransomware and malicious attacks. Trusted by nearly 18,000 customers, G2 recognized Absolute as a leader for the tenth consecutive quarter in the Summer 20022 Grid® Report for Endpoint Management and as a high performer in the G2 Grid Report for Zero Trust Networking.

Probely Logo

Bright Security is a developer-first Dynamic Application Security Testing Tool, also known as a DAST. Founded in 2018, Bright’s mission is to enable AppSec teams to provide the governance for securing APIs and WebApps while enabling developers to take ownership of the actual security testing and remediation work early in the SDLC. The evidence of this mission being fulfilled lies in Bright being the first of its kind to integrate DAST testing into unit tests, Bright’s finesse in integrating into CI/CD pipelines, and Bright’s many educational programs designed for developers to adapt an ‘early and often’ posture when it comes for testing for security vulnerabilities. With the Bright engine’s stellar technical and business logic, minimal false positives, and developer-centric design, there is no need for manual validation of security findings, removing costly and time consuming human bottlenecks that cripple rapid releases and drain dev team’s limited security resources. To learn more and try Bright out today, visit www.brightsec.com

Probely Logo

Probely is a web vulnerability scanner for agile teams. It finds vulnerabilities or security issues in web applications & APIs and provides guidance on fixing them. It can be integrated into development processes (SDLC) and continuous integration pipelines (CI/CD) to automate security testing. Probely narrows the gap between development, security, and operations by making security an intrinsic characteristic of the web development life-cycle and achieving fast time-to-market.

Darktrace

World leaders in Autonomous Cyber AI
Darktrace AI interrupts in-progress cyber-attacks in seconds, including ransomware, email phishing, and threats to cloud environments and critical infrastructure. Join over 6,800 organizations worldwide that rely on a digital immune system to avoid cyber disruptions, without impacting regular business operations.

simspace

The SimSpace Platform is powered by our cyber range, a safe, open, and secure hyper-realistic environment delivering advanced risk mitigation solutions
Optimize your cybersecurity using real-world attack simulations, product evaluations, specialized training content, and individual/team-based assessments.

Security Innovation

Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on the company’s assessment and training solutions to secure software wherever it runs. Recognized 6x on the Gartner Magic Quadrant for computer-based security training, CMD+CTRL Training combines role-based courses with hands-on cyber ranges to build skills that stick. With over 3.5 million users, CMD+CTRL helps all software security stakeholders address the risk of today’s tech stacks – flawed design, defenseless code, expanded attack surface, and misconfigured deployments.

prettyfluid

PrettyFluid Technologies is a zero-knowledge data protection company that reduces data breach exposure for companies and their customers, while simultaneously providing automated workflows for privacy law compliance. We accomplish this through Zentinel, our groundbreaking one-of-a-kind SaaS platform, which offers completely encrypted off premises data protection with real-time access and a self-managed environment.

Our leadership team and advisory board have over 150 years’ experience in the IT industry, including holding senior leadership positions in big data infrastructure environments for Fortune 100 Financial Services firms, the U.S. Military, cyber, and world-renowned international consulting firms. We’ve successfully led some of the largest mission-critical enterprise data, analytics, and cyber security projects for Fortune 500 companies and beyond, and we’ve incorporated everything we know into building PrettyFluid Technologies.

Security Advisors Logo

Our expert team can help you validate your Security Program through Risk Assessments, Network Penetration Testing, and Application Security Testing. Risk Assessments based on IT internal Controls, PCI DSS, HIPAA, and IT SOX Controls will give your company the assurances it needs for both security and compliance. We are not just talking vulnerability scanning! Contact us today to help your business: [email protected]

Tekkno Logo Blue

Because Hope is not a Strategy
Competent consulting and training in Cyber Security and Privacy for small and medium sized organizations. No geek-speak, everyone can follow. We offer specialized courses for your C-Suite and your IT-Department. Every solution we offer is affordable and designed to prevent – or significantly limit – damage through a potential breach.

Silver Sponsor

Praetorian

Praetorian

Praetorian helps companies adopt a prevention-first cybersecurity strategy by actively uncovering vulnerabilities and minimizing potential weaknesses before attackers can exploit them.

SysTools

SysTools

SysTools is leading solution provider in the area of Cyber Security, Digital Forensics, Data Recovery, Digital Transformation and Cloud Backup. We have more than 200+ products used by more than 250,000+ customers for our products across the world. We provide professional services in the area of Digital Transformation, Digital Forensics and Cyber Security. Our customers include Fortune 500 companies, law enforcement and federal agencies across the world. We are present in India and US. Our Cyber Security Services includes VAPT, Network Security Audit, Web Application Security Audit, Source Code security audit, Managed SOC, Monitor SIEM or Monitor DLP, MDR, Email Phishing Simulation etc. We have 50+ customers for Professional services.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide was built on a foundation of expertise, diligence, and responsiveness. As a full-service cybersecurity firm, we specialize in rapid-deployment incident response, compliance, and remediation. Our clients are the largest merchants, banks insurance, and e-commerce, including Fortune 100 companies. You’ve shopped in their stores, visited their websites, and carried their cards in your wallet—and we’ve helped to protect the consumer information you’ve provided.
Intersec is proud of our reputation as an industry leader in the digital security space. We’ve strategically assembled a powerful team of the most well-known, well-respected, and in-demand experts. Driven by our passion for knowledge and dedication to protecting the sensitive information of both clients and their customers, we remain on the cutting edge of emerging technologies, trends, and regulations

BlackCloak

Executives have been working remotely outside the metaphorical four walls of the office on personal mobile devices, in personal email and social media accounts, and on home networks for years. Meanwhile, they are increasingly being targeted by cyber criminals and nation states. Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. The company cannot simply extend corporate protections to personal mobile devices or accounts without invading personal lives and introducing new privacy risks.
The Verizon DBIR states that executives are twelve times more likely to be targeted. It is clear that providing Digital Executive Protection is needed to avoid the risk of a costly breach. The BlackCloak Concierge Cybersecurity & Privacy™ Platform is designed specifically to help CISOs and their security teams protect the company by protecting its executives in their personal lives, while maintaining the executives’ privacy and keeping their personal life from becoming corporate purview. By protecting their privacy, their mobile devices, and their home networks with a holistic solution combining software and services, BlackCloak fully encompasses mobile security and remote work for executives to deliver them (and their companies) peace of mind.
Used by Fortune 500 companies across all industries, the BlackCloak Platform is a holistic solution combining software and services, backed by a security operations center (SOC) and dedicated privacy experts. Learn more at www.blackcloak.io

AON Corp Logo

About Cyber Solutions:
Aon’s Cyber Solutions offers holistic cyber risk management, unsurpassed investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.
About Aon:
Aon plc (NYSE:AON) is a leading global professional services firm providing a broad range of risk, retirement and health solutions. Our 50,000 colleagues in 120 countries empower results for clients by using proprietary data and analytics to deliver insights that reduce volatility and improve performance.

Visit aon.com/cyber-solutions for more information.

Armor Code Logo

The ArmorCode AppSecOps platform helps organizations reduce application exposure and risk while scaling AppSec effectiveness and impact by 10X or more. ArmorCode delivers AppSec Posture Management, Universal Vulnerability Management, DevSecOps Automation, and Compliance Management, in a single platform. ArmorCode customers get complete visibility of the application inventory and are able to automate and simplify their AppSec processes. ArmorCode’s marquee customers include #1 brands in Media and Entertainment, Big 4 consulting companies and several leading organizations in Finance, Business Services and Software Development among others.

nrisecure

NRI Secure

NRI SecureTechnologies (NRI Secure) is a global service provider of next-gen Managed Security Services with 20+ years in InfoSec. We offer 24×7 security alert & monitoring, managed detection and response services, and security consulting and assessment services. Our mission is protecting your organization and optimizing your security resources with accuracy, speed and efficiency.

Why NRI Secure?

NeoSOC 24×7 Cybersecurity Defense ◇ Managed Detection & Response with CrowdStrike Falcon® ◇ Vulnerability Management with Qualys ◇ Security Awareness Training with Cofense PhishMe™ ◇ Security Consulting, Gap Analysis/Assessment and Policy Development

Synopsys Logo

Synopsys builds trust in software by enabling organizations to manage application security, quality, and compliance risks at the speed their business demands.

bsi

Protecting your information, people and reputation

BSI empowers organizations to safeguard its information – physical, digital and intellectual property – throughout its lifecycle from source to destruction. This requires the adoption of information security-minded practices that allow stakeholders to gather, store, access and use information securely and effectively.

Keynote Sponsors

Vulnera Logo

Vulnera

VULNERA builds solutions that help organizations with the heavy-lifting so stakeholders can focus on what matters – remediating security issues.

Zyston Logo

ZYSTON

Zyston is a fully managed cybersecurity MSSP solution and easily the most complete security program management offering that exists today.
” Our focus is to demonstrate continuous, measurable improvement in security preparedness that results in board-level peace of mind. Zyston goes beyond the alert – we monitor, detect, resolve and mature.”
Zyston also specializes in Human Capital Services for cybersecurity. Our global network of talent and relationships with key players in cyber education provide our clients with unprecedented access to top cyber talent at every level.

Lunch Sponsor

Zyston Logo

ZYSTON

Zyston is a fully managed cybersecurity MSSP solution and easily the most complete security program management offering that exists today.
” Our focus is to demonstrate continuous, measurable improvement in security preparedness that results in board-level peace of mind. Zyston goes beyond the alert – we monitor, detect, resolve and mature.”
CyberCAST enhances our managed security services, illuminating critical insights into an organization’s threat susceptibility and informing a dynamic cybersecurity strategy that matures over time.
Zyston also specializes in Human Capital Services for cybersecurity. Our global network of talent and relationships with key players in cyber education provide our clients with unprecedented access to top cyber talent at every level.

NINJIO Logo

Cybersecurity Awareness Training that changes behavior

NINJIO combines the science behind adult learning with the art of storytelling and animation to create the most engaging and behavior-changing cybersecurity awareness training on the market.
NINJIO’s episodes and methodology inspire behavior that is driven by skepticism, rather than curiosity. This safer behavior is the first step to creating a culture of cybersecurity in any enterprise.
NINJIO is the only SAT solution that has earned Gartner Peer Reviews “Customer’s Choice” ranking in each of the last 4 years

Vulnera Logo

Vulnera

VULNERA builds solutions that help organizations with the heavy-lifting so stakeholders can focus on what matters – remediating security issues.

Closing Keynote Sponsors

6CDP Logo

6 Degrees Counterfeit Prevention

Six Degrees Counterfeit Prevention LLC (6DCP) is a US based firm specializing in unique identification solutions custom designed to protect National Security Interests and Intellectual Property Rights by eliminating the greatest points of failure in securing, storing, and authenticating sensitive information.

Happy Hour Sponsor

First Rays

FIRST RAYS

First Rays makes initial investment in Seed – Series A stage startups focused on B2B Enterprise Software. We specialize in helping startups to find early customers, in AI, Enterprises or Developer communities. We focus on B2B themes of AI, Cloud-Edge-Data orchestration and Automation in the Enterprise Stack.

TROMZO Logo

TROMZO

Tromzo accelerates remediation of risks from code to cloud. By integrating with existing development and security tools, Tromzo builds a comprehensive software artifact inventory and ownership model with intelligent context from code to cloud – enabling users to automate the complete remediation lifecycle of issues that truly matter.

Holistic Information Security Practitioner Institute

HISPI

Holistic Information Security Practitioner

The HISP certification approach prides itself on ensuring that an educational foundation provided by information security training is the cornerstone of the HISP certification and the HISP Institute. Certified HISPs leverage the IOCM philosophy to provide a holistic integrated information security management system that will show improved efficiency, reduce waste and cost.

Virtis

VIRTIS brings a globally unique approach to API, Web & Mobile App Security. Having built a robust, fully managed Platform-as-a-Service for CISOs with the most rigorous requirements. VIRTIS focuses on the vulnerability and not the application by removing the vulnerability from being exploited without touching the application itself and deploying custom shields & signatures. VIRTIS specializes in legacy apps that can’t be remediated, frameworks that can’t be updated, and business logic flaws WAFs cannot address. Providing Real-time risk reporting cross-validates the efficacy of our protection. Safety First, Speed Matters. ROI Delivered

Phosphorus

Phosphorus Cybersecurity® is the leading xTended Security of Things™ platform designed to secure the rapidly growing and often unmonitored Things of the enterprise xIoT landscape.

Quokka Logo

Quokka, Inc.

The world of digital security is ready to evolve beyond distrust. People want less stress, less fear, and more peace of mind: less worry, and more confidence. Quokka (formerly Kryptowire), is a different kind of digital security and privacy company. Our proactive, light-touch, easy to use solutions put users and their privacy first, helping people, teams, and enterprises around the world take back control of their digital security in the new work and live anywhere world. To learn more about how to become Quokka Secure please visit www.quokka.io

Github

More about GitHub:
Secure at every step. Ship secure applications within the GitHub flow: Stay ahead of security issues, leverage the security community’s expertise, and use open source securely. https://github.com/features/security

Resources:
https://resources.github.com/whitepapers/Scaling-GitHub-Advanced-Security/
https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security

Uptime Logo

UPTIME Energy – Better For You Premium Energy Drinks and Tablets

UPTIME Energy is a better for you premium energy drink and tablet brand that offers great tasting non-GMO, low carb, zero sodium choices for when you need energy to work, study, exercise, or just get through the day. UPTIME Energy Drinks are gluten free and have natural caffeine and natural flavors.
www.uptimeenergy.com

SentinelOne Logo

SentinelOne is redefining cybersecurity by pushing the boundaries of autonomous technology. Cloud protections are becoming more critical as the bad guys become more determined and creative. SentinelOne protects those cloud workloads (EC2, VM, GCE, Linux and Widows servers), containers (Docker), and Kubernetes environments (AKS, ACS, EKS, GKE, etc.) as easily as we already protect the desktops, laptops, and servers with our award-winning EDR software.

Barracuda Primary Logo

Barracuda

At Barracuda, we strive to make the world a safer place. We believe every business deserves access to cloud-first, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 200,000 organizations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level. For more information, visit www.barracuda.com

Coffee Sponsor

First Rays

FIRST RAYS

First Rays makes initial investment in Seed – Series A stage startups focused on B2B Enterprise Software. We specialize in helping startups to find early customers, in AI, Enterprises or Developer communities. We focus on B2B themes of AI, Cloud-Edge-Data orchestration and Automation in the Enterprise Stack.

Cyclewriter 3 Espresso

Cyclewriter 3 Espresso Coffee Company

“Bringing Hope to the World, One Espresso at a time”

Supporting Partner

EmberRiver
EmberRiver

Ember River is comprised of leaders from the cybersecurity industry, the intelligence community, and the defense industry. We are senior executives, engineers, thought leaders, CISOs, and operators who are focused on difficult to solve challenges in the enterprise, federal and state government, and the IC. Our team has built, tested, and implemented world class solutions in nearly every area of cybersecurity, compliance, risk management, ranging from major initiatives in national security and critical infrastructure to implementation of enterprise wide security offering strategy.

Org Sponsors / Exhibitors

San Diego CISO Roundtable

San Diego CISO Roundtable

The focus of this group is to share current threats, Intel, and concerns as well as mentor the younger/newer CISO’s with in the group. This promotes an atmosphere of learning and engagement for all members. The motto for the group is – Lead, Learn, Teach.

Cloud Security Alliance

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

Students with an Interest in the Future of Technology
SWIFT
Students with an Interest in the Future of Technology, or SWIFT, is the premier cybersecurity organization at Cal Poly Pomona. They emphasize learning through hands-on workshops, various mentorship programs, and club-hosted competitions. Additionally, SWIFT trains students to compete in various nationally recognized competitions with successful outcomes. All of this is to serve their main purpose of providing passionate students a collaborative and inclusive environment to learn cybersecurity.
AITP LA

AITP, Los Angeles
AITP Los Angeles (Association of Information Technology Professionals) focuses on cutting-edge technology topics, talented speakers with practical insights, and offers impactful professional networking.
As a local and national nonprofit association, we provide members with professional development, mentoring, and major leadership opportunities. With AITP-LA, you can exchange experiences, communicate with industry leaders, keep up with emerging technologies, enhance your skills, and contribute to the knowledge community.
Join now to show your commitment to the future of IT and to connect with a strong LinkedIn community.

OWASP LA

Open Web Application Security Project, Los Angeles
OWASP is a not-for-profit, worldwide organization focused on improving the security of all software. Our mission is to make software security visible, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.

The OWASP LA Chapter meets the 4th Wednesday of each month.
https://owasp.org/www-chapter-los-angeles/

ISSA LA

Information Systems Security Association, Los Angeles
Connecting the Southern California Information Community since 1982

The Los Angeles Chapter is the founding chapter of the Information Systems Security Association (ISSA ®), a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. Join us: issala.org

OWASP OC

OWASP – Orange County, Ca
The Open Web Application Security Project (OWASP) is a 501c3 worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

Cyber Jutsu Logo

Women’s Society of Cyber Jutsu

“The Women’s Society of Cyberjutsu (WSC), a 501(c)3 non-profit, is dedicated to raising awareness of cybersecurity career opportunities and advancement for women in the field, closing the gender gap and the overall workforce gap in information security roles. “

United States Secret Service

CSA LA SoCal Chapter Logo

Cloud Security Alliance, LA Chapter

The Southern California (SoCal) Chapter of the Cloud Security Alliance (CSA) is an organization formed to promote the use of leading practices for providing security assurance within Cloud Computing and provide education on the uses of Cloud Computing to help secure all other forms of computing.
The Southern California (SoCal) Chapter of the Cloud Security Alliance (CSA) is comprised of many subject matter experts from a wide variety of disciplines, united in our objectives:
• Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance.
• Promote independent research into best practices for cloud computing security.
• Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions.
• Create consensus lists of issues and guidance for cloud security assurance.

International Institute of Business Analysis

International Institute of Business Analysis

The IIBA Orange County, CA Chapter is committed to advancing the profession of Business and Systems Analysis throughout Orange County and neighboring communities. We provide educational and networking sessions, training and career opportunities, forums for knowledge sharing, and connections to other professional organizations.
IIBA® and IEEE Computer Society have partnered to offer a robust learning and certification program to be prepared for today’s cybersecurity challenges. Please contact us to learn more about the Certificate in Cybersecurity Analysis (IIBA®-CCA).

ISSA Orange County

INFORMATION SYSTEMS SECURITY ASSOCIATION OF ORANGE COUNTY

ISSA is a not-for-profit international organization of information security professionals and practitioners. It provides education forums, publications and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.