Sponsorship Opportunities – 2016 Fall Summit

Please find sponsorship opportunities for the NH-ISAC 2016 Cyber-Top Gun Summit outlined below.Visit the registration page to secure the desired sponsorship level and view the 2016 NH-ISAC Fall Sponsor Prospectus. Sponsor registration is open.

 

 

Platinum Sponsor: 4 Available

  • $35,000
  • 30 Minute General Session Speaking Slot: Requires Presentation Submission & Approval
  • 5 Full Conference Passes Maximum: Includes Speaker(s)
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • 1/2 Page Ad (7.5″W x 4.75″H) in Conference Brochure
  • Logo/Description on Conference Website & Signage
  • AV Coverage
  • Limited Board Room Access to Host Meetings

Grand Rounds Sponsor: 8 General Available / 4 Deception Technology Available

    • $15,000
    • Service/Product Presentation Opportunity
    • 3 Full Conference Passes Maximum
    • Exhibit Space: Electrical & 6′ x 30″ Table Included
    • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
    • Logo/Description on Conference Website & Signage

Silver Sponsor: 8 Available

  • $10,000
  • 2 Full Conference Passes Maximum
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • Logo/Description on Conference Website & Signage

Gold A Sponsor: 5 Available

  • $25,000
  • 30 Minute Concurrent Session Slot: Requires Presentation Submission & Approval
  • 4 Full Conference Passes Maximum: Includes Speaker(s)
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • 1/4 Page (3.75″W x 4.75″H) Ad in Conference Brochure
  • Logo/Description on Conference Website & Signage
  • AV Coverage

Gold B Sponsor: 3 Available

  • $12,500
  • 30 Minute Concurrent Session Slot: Requires Presentation Submission & Approval
  • 2 Full Conference Passes Maximum: Includes Speaker(s)
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • 1/4 Page (3.75″W x 4.75″H) Ad in Conference Brochure
  • Logo/Description on Conference Website & Signage
  • AV Coverage

Full Pass: 10 Available

  • $5,000
  • 1 Full Conference Pass Maximum (only sponsors with 1 attendee pass as part of their sponsorship can add 1 extra Full Pass; sponsors with 2 or more passes are not eligible for Full Passes; any attempt to manipulate passes for additional sponsor attendees could result in a penalty of organization exclusion from future NH-ISAC Summits.)
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hardcopy (Title/Company/Name Opt-in Only)

 

Please see the vendor prospectus for additional sponsorship opportunities.

 

 

Sponsorship Opportunities – 2017 Spring Summit

Please find sponsorship opportunities for the NH-ISAC 2017 Masters of Deception Summit outlined below. Visit the registration page to secure the desired sponsorship level and click the graphic below to view the 2017 NH-ISAC Spring Sponsor Prospectus. Sponsor registration is open.

 

Platinum Sponsor: Sold Out

  • $35,000
  • 30 Minute General Session Speaking Slot: Requires Presentation Submission & Approval
  • 5 Full Conference Passes Maximum: Includes Speaker(s)
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • 1/2 Page Ad (7.5″W x 4.75″H) in Conference Brochure
  • Logo/Description on Conference Website & Signage
  • AV Coverage
  • Limited Board Room Access to Host Meetings (Based on Availability)

 

Grand Rounds Sponsor: Sold Out

    • $15,000
    • Service/Product Presentation Opportunity
    • 3 Full Conference Passes Maximum
    • Exhibit Space: Electrical & 6′ x 30″ Table Included
    • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
    • Logo/Description on Conference Website & Signage
    • AV Coverage

 

Silver Sponsor: Sold Out

  • $10,000
  • 2 Full Conference Passes Maximum
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • Logo/Description on Conference Website & Signage

 

Gold A Sponsor: Sold Out

  • $25,000
  • 60 Minute Concurrent Session Slot: Requires Presentation Submission & Approval
  • 4 Full Conference Passes Maximum: Includes Speaker(s)
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • 1/4 Page (3.75″W x 4.75″H) Ad in Conference Brochure
  • Logo/Description on Conference Website & Signage
  • AV Coverage

 

Gold B Sponsor: Sold Out

  • $12,500
  • 30 Minute Concurrent Session Slot: Requires Presentation Submission & Approval
  • 2 Full Conference Passes Maximum: Includes Speaker(s)
  • Exhibit Space: Electrical & 6′ x 30″ Table Included
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hard copy (Title/Company/Name Opt-in Only)
  • 1/4 Page (3.75″W x 4.75″H) Ad in Conference Brochure
  • Logo/Description on Conference Website & Signage
  • AV Coverage

 

Full Pass: 10 out of 10 Available

  • $5,000
  • 1 Full Conference Pass Maximum (only sponsors with 1 attendee pass as part of their sponsorship can add 1 extra Full Pass; sponsors with 2 or more passes are not eligible for Full Passes; any attempt to manipulate passes for additional sponsor attendees could result in a penalty of organization exclusion from future NH-ISAC Summits.)
  • Attendee Lists: Pre-event email (Title/Company Opt-in Only) & On-site hardcopy (Title/Company/Name Opt-in Only)

 

Please see the vendor prospectus for additional sponsorship opportunities.

 

 

 

 

 

 

Current Sponsors – 2016 Fall Summit

Thank You Sponsors!

 

Platinum Sponsors

 

CISCO
Cisco delivers intelligent cybersecurity for the real world. This vision is based on a threat-centric approach to security that reduces complexity while providing superior visibility, continuous control, and advanced threat protection across the entire attack continuum. With this new security model organizations can act smarter and more quickly before, during, and after an attack.

KPMG
KPMG LLP’s Cyber practice assists organizations in transforming their security, privacy, and continuity controls into business-enabling platforms while maintaining the confidentiality, integrity, and availability of critical business functions. The KPMG Cyber approach strategically aligns with our clients’ business priorities and compliance needs.

Our experienced IT security and forensic partners and professionals possess leading technical experience and are well regarded in their specialties. We have extensive experience building, delivering and supporting cybersecurity programs to Fortune 500 and Global 2000 companies across a multitude of industries. KPMG Cyber’s approach—Prevent, Improve, Detect, Respond—is designed to be simple and effective, and most importantly aligned with your business needs.

CrowdStrike
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries. We Stop Breaches. Find out how: www.crowdstrike.com

Gurucul
Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit http://www.gurucul.com/ and follow us on LinkedIn and Twitter.

 

Gold A Sponsors

 

Attivo Networks
Attivo Networks® is the leader in deception for cybersecurity defense, providing real-time detection and forensic analysis of in-network threats and solutions for continuous threat management and incident response. The Attivo ThreatMatrix Deception Platform detects stolen credentials, ransomware, man-in-the-middle, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis, actionable alerts, and 3rd party integrations empower accelerated incident response and staff resource efficiency.

Flashpoint
Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations to make better decisions and mitigate risk. The company’s unique Deep & Dark Web data, expertise, and technology enable our customers to glean intelligence that informs risk and protects their ability to operate. Fortune 500 and government customers utilize Flashpoint’s intelligence across the enterprise, including bolstering cybersecurity, confronting fraud, detecting insider threats, enhancing physical security, assessing M&A opportunities, and addressing vendor risk and supply chain integrity. For corporations with limited experience availing themselves of Deep & Dark Web intelligence, Flashpoint has tailored offerings that deliver comprehensive reporting and monitoring on their behalf. Flashpoint is backed by Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.

 

Gold B Sponsors

 

Cylance
Cylance® is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can’t, while using a fraction of the system resources associated with endpoint antivirus and detect and respond solutions that are deployed in enterprises today. For more information and thought provoking blogs, visit: www.cylance.com

EY
EY Advisory combines a wealth of consulting capabilities — strategy, customer, finance, IT, supply chain, people advisory, program management and risk — with a complete understanding of a client’s most complex issues and opportunities, such as digital disruption, innovation, analytics, cybersecurity, risk and transformation. Visit ey.com to learn more.

Invincea
Invincea’s endpoint protection minimizes the trade-off executives are forced to make between security and business performance. Over 25,000 customers rely on Invincea to prevent and detect threats while enabling their workforces to conduct business—in the office or on the road. Invincea protects endpoints by blocking known and unknown malware without signatures, including threats that originate from Weaponized Office docs and spear phishing emails.
With Invincea, your workforce won’t know it’s there, but you will.

Protiviti
Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. Protiviti and our independently owned Member Firms serve clients through a network of more than 70 locations in over 20 countries. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies.

 

Silver Sponsors

 

Acalvio
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation. A Silicon Valley based company, Acalvio is led by an experienced team with a track record of innovation and market leadership and backed by marquee investors.

Axiad IDS
The U.S. healthcare industry is a top target for data breaches, to the tune of $6.2 billion a year. According to the Ponemon Institute, nearly 90 percent of healthcare organizations represented in a recent study had a data breach in the past two years, and nearly half had more than five data breaches in the same time period. Beyond the financial risk, there are also significant threats to patient privacy and trust. For this reason, healthcare providers face an increasing number of government mandates to protect against breaches, some of which bring costly fines for non-compliance.

Axiad IDS, the leading provider of trusted identities for enterprise, government and financial organizations, is helping healthcare organizations manage the complexity of these mandates. In particular, section 3.5 of NIST SP800-171 which demands a multi-factor solution for identification and authentication. Axiad IDS’ fully hosted cloud offering, enables quick compliance with even the most rigorous mandates. And it does so with reliable and predictable cost containment. Axiad ID Cloud eliminates the potential for human error by automating the set-up, while getting organizations compliant and operational in days versus months. To learn more, visit Axiad IDS at Booth #16.

Cigital
Cigital is one of the world’s largest application security firms. We go beyond traditional testing services to help organizations identify, remediate, and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services, and products tailored to fit your specific needs. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications.
For more information, visit us at https://www.cigital.com/.

Coalfire
Coalfire is the trusted leader in cybersecurity risk management and compliance services. We offer advisory, technical assessments and testing services to organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Our approach addresses your specific cyber risk challenges while developing a long-term strategy and partnership to prevent security breaches and data theft.

LightCyber
LightCyber is a leading provider of Behavioral Attack Detection solutions that provide accurate and efficient security visibility into attacks that have slipped through the cracks of traditional security controls. With LightCyber, health care organizations can detect network attackers early to curtail or minimize a data breach, prevent the network spread of ransomware or protect network-connected medical equipment. The LightCyber Magna™ platform is the first security product to integrate user, network and endpoint context to provide security visibility into a range of attack activity. Founded in 2012 and led by world-class cyber security experts, the company’s products have been successfully deployed by top-tier customers around the world in health care and other industries.

Resilient
Resilient, an IBM Company, empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s industry-leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, smarter, and more efficiently.

Part of IBM Security, the Resilient IRP also integrates security technologies into a single hub and provides easy workflow customization and process automation. With Resilient, security teams can have best-in-class response capabilities.

Resilient has more than 100 global customers, including 30 of the Fortune 500 and partners in more than 20 countries. Learn more at www.resilientsystems.com.

RiskRecon
“RiskRecon, your trusted source for third-party risk information, provides a SaaS platform that delivers frequent, comprehensive and actionable security performance measurements and management tools to more effectively manage the risk reality of increasingly interconnected organizations.

Using proprietary data gathering techniques, RiskRecon creates a comprehensive risk management view of an extended enterprise’s public IT footprint. Clients rely on RiskRecon to bring greater transparency, accountability and productivity to their third-party risk management processes. And, they trust that RiskRecon’s continuous monitoring solution employs only ethical techniques – no proprietary vendor data, no permissions and no invasive scans. Learn more at www.riskrecon.com.”

SecureWorks
SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.”

To learn more, visit www.secureworks.com and https://www.secureworks.com/about/partners

Synack
The Synack platform leverages the best combination of humans and technology to create an offensive security service that delivers ongoing and on-demand vulnerability intelligence. Synack’s security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment. For more information, visit www.synack.com.

Tripwire
Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operations solutions for enterprises, service providers and government organizations. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.

 

Grand Rounds Sponsors

 

Booz Allen Hamilton
Booz Allen is the leading provider of advanced cyber security services to many government agencies, including those involved in regulating and providing health technology and services. This experience gives us unique capabilities and insight into the cyber security challenges facing the US National Health community.

Cymmetria
Founded in 2014, Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Cymmetria’s cyber deception solution, MazeRunner, is at the forefront of deception-based cybersecurity technology.
MazeRunner gives organizations a platform for creating effective deception stories, which create realistic environments for hunting cyber attackers. Deception stories are comprised of breadcrumbs and decoys; they lead attackers to believe that they have successfully gained access to a target machine. Having gained a false sense of security, attackers reveal their attack tools and methods, which defenders are then able to document and analyze. Finally, MazeRunner communicates with an organization’s existing defense infrastructure, exporting information that allows for the creation of attack signatures.
Fully customizable and easily deployed, MazeRunner does not burden organizational networks or IT security teams. It is a dynamic solution that helps organizations defend their valuable assets from ever-changing cyber threats.
Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. The company is backed by leading investors such as Y Combinator and Sherpa Capital, and has already gained traction throughout the InfoSec community and global media.

Illusive Networks
illusive networks is the first purpose-built Distributed Deception Platform. Its award winning, patent pending Deceptions Everywhere technology neutralizes targeted and Advanced Persistent Threats by creating a deceptive layer across the entire network – agentlessly deployed on every endpoint, server, and network component – with an endless source of false information. illusive networks disrupts and detects breaches with source-based and real time forensics and without interrupting business. For more information, please visit us at www.illusivenetworks.com

Palo Alto Networks
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. Find out more at www.paloaltonetworks.com.

Security Scorecard
SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary SaaS platform helps enterprises gain operational command of the security posture for themselves and across all of their partners, and vendors. It provides continuous, non-intrusive monitoring for any organization including third and fourth parties. The platform offers a breadth and depth of critical data points not available from any other service provider including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering and Passwords Exposed.

Skycure
Skycure offers the most complete, accurate and effective mobile threat defense (MTD) solution, delivering unparalleled depth of threat intelligence to predict, detect and protect against the broadest range of existing and unknown threats. Skycure’s predictive technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and vulnerability exploits while preserving user privacy and experience. Skycure’s mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise.

ThinAir
ThinAir’s mission is to provide companies security through simplicity. Using the platform, organizations instantly gain complete visibility, context and control over all their data no matter where it goes, without any user friction. ThinAir delivers security through simplicity against insider threats, automatic data exfiltration, and human error, and can be deployed in seconds by organizations of any size or architecture. Learn more at www.thinair.com.

Veriphyr
Veriphyr User Behavior Analytics – Understanding the Haystack Reveals the Needles
Efficiently detect insider breaches by transcending the Sisyphean task of modeling each new attack. Veriphyr automatically identifies insider attacks by understanding your organization’s “”haystack”” – the legitimate work activity of your employees, contractors and providers within your applications, databases, and file servers.
Learn how understanding the operational context of user work behavior in healthcare’s complex, dynamic environment provides the key to proactively detecting the “needles” – the malicious behavior of insiders and hackers using compromised credentials.
Discover how Veriphyr analytics enhances your existing security investments with a continuous automated structural analysis of your organization’s operations using data you already collect on the activity of your employees, contractors, and providers.

 

Additional Sponsors

 

Agari
“Agari, a leading cybersecurity company, is trusted by leading Fortune 1000 companies, including 6 of the top 10 banks, to protect their enterprise, partners and customers from advanced email phishing attacks.

The Agari Email Trust Platform™ is the industry’s only solution that ‘understands’ the true sender of emails, leveraging the company’s proprietary, global email telemetry network and patent-pending, predictive Agari Trust Analytics to identify and stop phishing attacks.

The platform powers Agari Enterprise Protect, which help organizations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands.

Agari is a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security. Learn more at http://www.agari.com and follow us on Twitter @AgariInc.”
Cyberfit

Global Cyber Alliance

Mimecast

NH-ISAC

Perch Security

SecureWorks
SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.

To learn more, visit www.secureworks.com and https://www.secureworks.com/about/partners

Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Current Sponsors – 2017 Spring Summit

Thank You to Our Current Sponsors!

 

PLATINUM SPONSORS

 

EY
EY Advisory combines a wealth of consulting capabilities — strategy, customer, finance, IT, supply chain, people advisory, program management and risk — with a complete understanding of a client’s most complex issues and opportunities, such as digital disruption, innovation, analytics, cybersecurity, risk and transformation. Visit ey.com to learn more.

Gurucul
Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit http://www.gurucul.com/ and follow us on LinkedIn and Twitter.

Prevalent
Prevalent is the leader in third-party risk management and cyber threat intelligence, helping global organizations manage and monitor the security threats and risks associated with third and fourth-party vendors. With the release of Prevalent Synapse™, organizations now have a purpose-built, unified platform that reduces both risk and cost in a shared assessment model, leveraging standardized content, automation, and threat intelligence.

For more information regarding Prevalent, please visit www.prevalent.net

Securonix
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management. For more information visit www.securonix.com.

 

GOLD A SPONSORS

 

Deloitte
Deloitte Risk and Financial Advisory helps organizations turn critical and complex business issues into opportunities for growth, resilience and long-term advantage. Our market-leading teams help our clients manage strategic, financial, operational, technological, and regulatory risk to enhance enterprise value, while our experience in mergers and acquisitions, fraud, litigation and reorganizations helps clients emerge stronger and more resilient.

Flashpoint
Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations to make better decisions and mitigate risk. The company’s unique Deep & Dark Web data, expertise, and technology enable our customers to glean intelligence that informs risk and protects their ability to operate. Fortune 500 and government customers utilize Flashpoint’s intelligence across the enterprise, including bolstering cybersecurity, confronting fraud, detecting insider threats, enhancing physical security, assessing M&A opportunites, and addressing vendor risk and suplly chain integrity. For corporations with limited experience availing themselves of Deep & Dark Web intelligence, Flashpoint has tailored offering that deliver comprehensive reporting and monitoring on their behalf. Flashpoint backed by Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.

 

GOLD B SPONSORS

 

Global Cyber Alliance
The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to confronting cyber risk and improving our connected world. It is a catalyst to bring communities of interest and affiliations together in an environment that sparks innovation with concrete, measurable achievements. While most efforts at addressing cyber risk have been industry, sector, or geographically specific, GCA partners across borders and sectors. GCA’s mantra “Do Something. Measure It.” is a direct reflection of its mission to eradicate systemic cyber risks. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney’s Office, the City of London Police and the Center for Internet Security. Learn more at www.globalcyberalliance.org.

Netskope
Netskope is the leader in cloud security. Trusted by the world’s largest companies, Netskope’s cloud-scale security platform enables security professionals to understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work. Netskope – security evolved.

SecurityScorecard
SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary SaaS platform helps enterprises gain operational command of the security posture for themselves and across all of their partners and vendors. It provides continuous, non-intrusive monitoring for any organization including 3rd and 4th parties. The platform offers a breadth and depth of critical data points not available from any other service provider in a broad range of risk categories.

Skycure
Skycure offers the most complete, accurate and effective mobile threat defense solution, delivering unparalleled depth of threat intelligence to predict, detect and protect against the broadest range of threats. Skycure’s predictive technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in additional to both device- and server- based analysis.

Weblife
Weblife helps organizations solve the security, privacy, and regulatory challenges associated with employee web use. Weblife uses advanced threat isolation to eliminate the risk of web-based malware, providing employees an anonymous and secure environment in which to conduct personal and high risk web browsing. The Weblife service is fully cloud-based and simple to deploy, manage, and support. It requires no software and works with any modern web browser. Weblife is used by some of the world’s largest global organizations to eliminate the risk of web-based malware and easily comply with growing global privacy regulations such as the EU’s General Data Protection Regulation (GDPR.) Weblife is a privately held company based in Los Angeles, CA.

Preempt
Preempt protects organizations from insider threats by responding in real-time to suspicious behavior in order to stop malicious threats and validate legitimate activities. Preempt’s adaptive and policy-based approach ensures that proper level of response is used based on the type of severity of threat. This proactive approach allows organizations to eliminate their insider threat problem and maintain business continuity without engaging already overwhelmed security teams. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com.

Veriphyr
Veriphyr detects impermissible use of ePHI by employees without the false positives of rule-based approaches. When two employees access a co-worker’s medical data, Veriphyr reliably detects which employee’s access is not permissible and which employee is doing their job. Even employees in the same department with the same titles. Even if the employees access the patient data only once.

Attivo Networks
Attivo Networks®, the leader in deception technology, provides accurate in-network threat detection, analysis, and accelerated response to advanced, credential, insider, and ransomware attacks. The ThreatMatrix™ Deception and Response Platform provides continuous visibility and efficient threat management for user networks, data centers, cloud, branch, IoT, ICS-SCADA, and POS environments. Camouflage dynamic deception sets high-interaction traps to misdirect and lure attackers into revealing themselves. The solution’s advanced attack analysis and lateral movement tracking automate investigation, deliver evidence-based alerts, and in-depth forensic reports. Incident response is simplified with ThreatOps™ playbooks and 3rd party integrations for automated attack block, quarantine, and threat hunting. www.attivonetworks.com

IBM
IBM is a global organization that delivers an integrated system of analytics, real-time defenses and proven experts, so our clients can make strategic decisions about how to safeguard their business. Like an immune system, IBM solutions provides an integrated and comprehensive approach to prevent and repair the damage attacks can impose on your enterprise’s security.

Preempt

Perch Security

 

Booz Allen Hamilton
Booz Allen provides end-to-end cyber security services to healthcare and life sciences companies and civil and government agencies, including those involved in regulating and providing health technology and services. The unique position of operating within the entire U.S. National Health community enables us to bridge government cyber tradecraft to the private health sector.

 

GRAND ROUND SPONSORS

 

Security Risk Advisors
We deliver cybersecurity services to industry-leading, global companies. Our approach emphasizes training and knowledge transfer to help you build confidence in your cybersecurity controls. We bring specialized skills that are hard to find – deep security testing, independent advice, engineering capability with emerging security controls, threat modeling, and compliance program development.

Fireglass
Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email without an endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through Fireglass’ True Isolation™ technology, where all web traffic is executed remotely and does not reach endpoints. Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.

Anomali
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Acalvio Technologies
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.

RiskRecon
RiskRecon brings greater transparency, accountability and productivity to your third-party risk management process. Our SaaS platform delivers frequent, comprehensive and actionable security performance measurements and management tools. Unlike alternative providers, we originate our own information by directly measuring the ever-changing attack surface area of any organization. www.riskrecon.com

SecureWorks

SecureWorks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.

Adlumin Inc.
Adlumin is revolutionizing that way corporations secure sensitive data and intellectual property while achieving their compliance objectives. These tenants of business are routinely under attack by insider and outsider threats using rogue accounts, credential theft, and identity-based attacks to subvert defenses, damaging your reputation and bottom line. Organizations like yours simply can’t wait weeks to get the answers you need. You need real time detection and flexible options. Adlumin provides real time visibility and analysis into every identity within the enterprises – even across the largest networks – using machine learning and industry expertise from the world’s finest investigators and the U.S. Intelligence Community. Futhermore, using confirmation technology, Adlumin goes beyond detection and is capable of confirming anomalies as malicious. Adlumin significantly reduces HIPAA compliance costs, satisfies multiple NIST/SANS (CIS) critical security control requirements, and enhances your privileged account access management strategy. To see Adlumin in action, visit www.adlumin.com, call (571)334-4777 or email info@adlumin.com.

Coalfire
As cybersecurity risk management and compliance experts, Coalfire delivers cybersecurity advice, assessments, testing, and implementation support to IT and security departments, executives, and corporate directors of leading enterprises and public sector organizations. By addressing each organization’s specific challenges, we’re able to develop a long-term strategy that improves our clients’ overall cyber risk profiles. Armed with our trusted insights, clients can get to market faster with the security to succeed. Coalfire has offices throughout the United States and Europe.

ThinAir
ThinAir provides 360 degree visibility into all interactions with organization’s most important assets – its data. Whether malicious insider or malware or human error caused the data loss, ThinAir enables you to assess the scope and source of the leak within seconds. See everything. Protect what matters.

Blue Cedar
Blue Cedar helps enterprises and software vendors secure access to mobile data by injecting security directly into mobile apps. By securing individual apps, not the device, organizations can easily secure and deploy apps to any user on any endpoint device. It’s transparent to users, non-invasive to privacy, and provides policy controls that encrypt data-at-rest and data-in-transit.

Veriphyr
Veriphyr detects impermissible use of ePHI by employees without the false positives of rule-based approaches. When two employees access a co-worker’s medical data, Veriphyr reliably detects which employee’s access is not permissible and which employee is doing their job. Even employees in the same department with the same titles. Even if the employees access the patient data only once.

Cisco
Cisco® Cloud Security helps you adopt the cloud with confidence and better manage security for the way the world works today. It protects users against threats anywhere they access the Internet and secures your data and applications in the cloud. Cisco Cloud Security provides an effective security platform that is open, automated, and simple to use.

SILVER SPONSORS

 

Digital Shadows
Digital Shadows provides insight into an organization’s external digital risks and the threat actors targeting them. Digital Shadows SearchLight™ combines scalable data analytics with human analysts to monitor for risks beyond the boundary identifying cyber threats, data leakage and reputation risks, creating an up-to-the minute view of an organization and digital risks requiring mitigation.

Bitglass
Bitglass’ Cloud Access Security Broker (CASB) solution provides enterprises with end-to-end data protection from the cloud to the device. It deploys in minutes and works with any cloud app on any device. Bitglass protects data on mobile devices without the hassles of MDM and enables enterprises to enforce corporate data security policies across apps like Office 365, Salesforce, and Exchange. Bitglass, based in Silicon Valley with European headquarters in Amsterdam, was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.

Okta
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud connect and protects employees of many of the world’s largest enterprises. It also securely connect enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device.

Resilient, an IBM Company
IBM Resilient’s mission is to help organizations thrive in the face of any cyberattack or business crisis. The industry’s leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, more intelligently, and more efficiently. The Resilient IRP is the industry’s only complete IR orchestration and automation platform, enabling teams to integrate and align people, processes, and technologies into a single incident response hub. With Resilient, security teams can have best-in-class response capabilities. IBM Resilient has more than 150 global customers, including 50 of the Fortune 500, and hundreds of partners globally. Learn more at www.resilientsystems.com.

Veracode, Inc.
Veracode is a leader in securing web, mobile and third-party applications for the world’s largest global enterprises. By enabling organizations to rapidly identify and remediate application-layer threats before cyberattackers can exploit them, Veracode helps enterprises speed their innovations to market – without compromising security. Learn more at www.veracode.com.

DigiCert
DigiCert addresses the security challenges of the Internet of Things with automated identity and encryption solutions for connected devices. Whether choosing the cloud or on-premise, we support your certificate-based deployments at any scale for mutual authentication, access control, data encryption, data integrity, secure boot, patch management and IP protection. A trusted certificate provider for the Global 2000, DigiCert supports SSL/TLS and other digital certificates for PKI deployments at any scale through its certificate lifecycle management platform, CertCentral®. The company has been recognized with dozens of awards for its enterprise-grade management platform, fast and knowledgeable customer support, and market-leading growth. For the latest DigiCert news and updates, visit digicert.com or follow @digicert.

Synopsys
Synopsys offers the most comprehensive solution for integrating security and quality into the SDLC and supply chain. Whether you’re well-versed in software security or just starting out, we provide the tools you need to ensure the integrity of the applications that power your business. Our holistic approach to software security combines best-in-breed products, industry-leading experts, and a broad portfolio of managed and professional services that work together to improve the accuracy of findings, speed up the delivery of results, and provide solutions for addressing unique application security challenges. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure software. For more information go to www.synopsys.com/software.

OASIS
OASIS is a nonprofit consortium, home to STIX and TAXII standards for threat intelligence sharing and the CSAF standard for automated cyber vulnerabilities disclosure. OASIS organizes the Borderless Cyber conference, 21-22 June, NYC. Stop by our table for a chance to win a free conference pass. NH-ISAC members receive $100 discount when registering for Borderless Cyber with the code NH-ISAC.

Mimecast
Mimecast (NASDAQ: MIME) makes business email and data safer for 24,900 customers and their millions of employees worldwide. Founded in 2003, the company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management.

Agari
Agari protects the inboxes of the world’s largest organizations from the #1 cyber security threat of advanced email attacks including phishing and business email compromise. URL: www.agari.com

Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian intelligence networkds, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com/healthcare.

Menlo Security
Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors. The company’s patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security products can be deployed in the public or private cloud and are trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Company headquarters are in Menlo Park, California. For more information, please visit www.menlosecurity.com or @menlosecurity.

 

ADDITIONAL SPONSORS

 

Bandura
Bandura is a cybersecurity company that enables organizations to control their exposure to the internet. Our users are able to leverage Bandura technology in conjunction with their existing security infrastructure to simplify the deployment and enforcement of their vast threat intelligence repositories, eliminating large amounts of threatening infrastructure from being able to interact with their environment. The Bandura PoliWall can deploy 100 MILLION malicious IP’s or CIDR blocks in line and likewise automate activities such as ACL’s to eliminate traffic from threatening countries with a click.

Booz Allen Hamilton
Booz Allen provides end-to-end cyber security services to healthcare and life sciences companies and civil and government agencies, including those involved in regulating and providing health technology and services. The unique position of operating within the entire U.S. National Health community enables us to bridge government cyber tradecraft to the private health sector.

Cobalt
Cobalt’s hacker-powered application security solution transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of trusted ethical hackers, Cobalt’s SaaS crowdsourced pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget. Visit www.cobalt.io to learn how Cobalt is securing apps at the speed of business.

GuidePoint Security
GuidePoint Security provides innovative and valuable cybersecurity solutions and expertise that enable organizations to successfully achieve their missions. By embracing new technologies, GuidePoint helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Learn more at: http://guidepointsecurity.com.

IMMUNIO
IMMUNIO is a pioneer in runtime application self-protection (RASP) providing a cutting edge technology platform for real-time, instantaneous and automatic detection of an protection against security vulnerabilities for web applications. Our mission is to align security with the speed of application development easily, efficiently and effectively for the enterprise. To learn more about IMMUNIO please visit www.immun.io.

Pindrop
Pindrop is the pioneer in voice fraud prevention and authentication. Pindrop provides enterprise solutions to reduce fraud losses and authentication expense for some of the largest call centers in the world. Pindrop’s patented PhoneprintingTM technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Pindrop has been selected by the world’s largest banks, insurers, brokerages and retailers, detecting over 80% of fraud, even for attackers never seen before. Pindrop’s solutions are allowing customers to reduce call time and improve their customers’ experience even while reducing fraud losses. Pindrop was founded in 2011 and is venture backed by Andreessen Horowitz, Citi Ventures, Felicis Ventures, CapitalG, GV and IVP.

Phantom
Phantom is the first community-powered security automation and orchestration platform. It integrates your existing security technologies, providing a layer of connective tissue between them. The Phantom platform helps you work smarter by automating repetitive tasks, effectively force multiplying your team’s efforts and allowing them to focus their attention on mission-critical decisions. It also helps you respond faster and reduce dwell times with automated detection, investigation, and response. Using Phantom helps you strengthen your defenses by integrating your entire security infrastructure together so that each part is actively participating in your defense strategy. For more information visit: https://phantom.us/

Tanium

Arxan Technologies

Accenture

NC4

Presentations – 2016 Fall Summit

The NH-ISAC 2016 Cyber-Top Gun Summit Call for Presentations is Now Closed.

Thank you to everyone that provided a presentation for consideration including NH-ISAC members and potential Platinum and Gold level sponsors.

Deadline for submissions was Friday, August 26th, 2016 at 5:00PM Easter Standard Time.

Notification of acceptance will be on or before Thursday, September 8th, 2016.

Please direct all presentation questions to nhisac@nhisac.org.

Special Events – 2017 Spring Summit

Click here to register for the Summit Grand Finale: Indiana Jones Epic Stunt Theater – Cairo Dinner Show at Hollywood Studios

Click Here to Register!

Rather than race to the airport, we welcome all attendees to join us the evening of Wednesday, May 10th for our Grand Finale. Your Summit investment would not be complete without a great networking send off. Who else to host such an event, but Indiana Jones!

Indiana enters the ruins of a temple, dodging spears and blow darts as he seeks the golden idol. A dangerous series of life-threatening surprises are liable to doom our hero, but soon Indy has the treasure in his grasp.

In a flash, the set parts to reveal a street event in a Cairo bazaar. In the center of it all, a feast fit for a sultan awaits, right in the middle of the stage! All guests are invited to leave their seats from Scene I, and walk down on to the stage to be seated for dinner! As you dine on the stage, a DJ and Belly Dancer entertain you. With the conclusion of the lavish and elegant banquet scene, there’s one more shot to capture: the grand finale! This thrilling event is the perfect closer to the Masters of Deception Summit.

Please visit the registration desk prior to 5:00pm on the day of the event to pick up your wristband to attend this event. You may walk or take the boat to the Guest Relations Booth in front of Disney’s Hollywood Studios at 7:00pm to be escorted to the theater. After the closing event is over, guests may walk or take the boat back to the hotel; a bus will be available after 10:30pm. Transportation will not be provided.

Register here for the Spouse/Partner Event – Keys to the Kingdom Tour

While your spouse/partner is busy at the conference, you should have some fun too! No better place to find it than Disney World! Disney’s Keys to the Kingdom tour offers an in-depth 5 hour tour of Disney’s most magical park: Magic Kingdom. Learn the in-and-outs of Disney’s great park while seeing several backstage areas regular tourists are not able to see.

Be sure to wear comfortable shoes on Tuesday, May 9th’s expedition that begins at the Town Square Theater. This tour is only available to spouses/partners of NH-ISAC 2017 Spring attendees and has three different start times: 8:30am, 9:00am, and 9:30am. Participants must be at least 16 years of age and have a valid ID. You better hurry to reserve your tickets, because this magical experience will fill up quickly!

New Member & First-Time Attendee Lunch

Join us for our inaugural New Member/First-Time Attendee Luncheon on Monday, May 8th from noon to 1PM. Come meet members of the Board, NH-ISAC Staff and each other in a small setting before the big conference kick off.

Dine Arounds

Sponsor: Veracode, Inc.
Location: Todd’s English Bluezoo
Date: Monday, May 8, 2017 | 6:30 – 9:00PM
Join Veracode for an evening of relaxed networking and industry insights at Bluezoo, where celebrity chef Todd English combines the freshest seafood with coastal cuisines from around the world in an unforgettable setting. Please email Dakota at ddeno@prodevmeetings.com by Monday, May 1, 2017 of your intent to attend this event

Sponsor: Skycure
Location: Shula’s Steak House
Date: Monday, May 8, 2017 | 7:30 – 9:00PM
Come enjoy a delicious meal and great conversation, while networking with your fellow healthcare and mobile security peers. Please email events@skycure.com of your intent to attend this event. We will continue to accept RSVPs on site.

Tuesday Evening Beach Event

Volleyball

All attendees are welcome to join us Tuesday, May 9th after the conference day ends when we’ll head over to the Swan and Dolphin’s White Sand Beach. Enjoy food, drink, games, and the company of your industry peers! No registration necessary.

Disney World Tickets

Walt Disney World Theme Park Ticket prices have changed.

Although the prices changed, we are pleased to be able to provide you with a “Grace Period” if you would like to purchase your Disney tickets at 2016 prices until Saturday, March 11, 2017 at 4:00 PM EST.  After this date, our new ticket offers and pricing will go into effect.

Attendees of the 2017 Spring Summit, as well as those friends and family members that are traveling with them, are able to individually purchase specially priced Disney Meeting & Convention Tickets here or by calling 404-566-5600. Plus, these tickets are good for pre and post conference stays, too!

These tickets offer pre-arrival savings of 10% on Disney’s Full-Multi-Day (2 days or longer) Tickets and include one (1) complimentary admission to an additional Disney Experience at any one (1) of the following (additional details are listed on the web site):

  • Disney’s Typhoon Lagoon Water Park
  • Disney’s Blizzard Beach Water Park
  • Disney’s Winter Summerland or Disney’s Fantasia Gardens Miniature Golf Courses (before 4 p.m.)
  • Greens Fees for one round of golf at Disney’s Oak Trail Golf Course, our 9-hole walking course

*The site also contains our partial-day tickets, which are exclusive to the meetings market.

Networking – 2016 Fall Summit

We listened to your feedback from our 2016 Spring Summit and are excited to offer even more options for networking and relationship building at our fall conference. We’ve organized a few events for all Summit attendees to enjoy – plan to arrive early and stay through Wednesday night!

Sunset Beach Dinner

Volleyball

Join us Tuesday evening from 6:00-9:00 PM when we’ll head over to the Silver Strand State Beach, just a quick walk from the Loews Coronado Bay Resort. We’ll have food and drink, live music, fire pits, volleyball and games, and so much more! Annual temperatures this time of year are a balmy 74 degrees, but this event will be HOT!

MCAS Miramar

JetPic

On Wednesday night, we’ll wrap up the 2016 Fall Summit with a once in a lifetime experience. Join your peers at the MCAS Miramar: an active military base made famous by the movie Top Gun® where memorable scenes were filmed inside the now infamous Officer’s Club! We will arrive at the base by shuttle where we’ll have the opportunity to witness fighter jets practice their touch and go landings, and Marine Corps Officers will guide us to an actual working hanger for a close up view of the Marine Corp’s most technologically advanced equipment. From here it will be time for some “R&R” at the “O Club” where dinner and drinks will be served and good cheer will be shared. Do not miss this unique experience!

USS Midway Outing Event

Is your spouse or significant other registered as a guest for the Summit? If yes, he or she is eligible to attend our USS Midway Outing Event! While you are attending the conference on Tuesday, November 15th, your partner can join other registered guests on a tour of the USS Midway – one of America’s longest serving aircraft carriers. Transportation and admission to the USS Midway is included!

RSVP to attend the USS Midway Outing Event is required.

Other Area Attractions

SDSeaport

The 2016 Fall Summit is being held in a warm location bursting with many iconic locales and themes. We encourage everyone to take advantage of the rich history of San Diego through our organized events as well as on your own. The Loews Coronado Bay Resort provides a complimentary shuttle into Downtown Coronado Village where you can stroll the area on your own or sign up for a guided walking tour. Of course the San Diego Zoo, Gaslight District, and Balboa Park are not to be missed. Extend your stay and coordinate with other attendees outside of the conference agenda to create your own networking outing.

 

Agenda – 2016 Fall Summit

The fall brochure is now available. View the brochure here.

Time Sunday, 13 November
6:30 PM – 9:00 PM Board Dinner
Time Monday, 14 November
8:00 AM – 9:00 AM Board Breakfast
9:00 AM – 12:00 PM Board Meeting
12:00 PM – 2:00 PM Committee Meetings
12:00 PM – 6:00 PM Registration
2:00 PM – 3:45 PM Member Meeting
4:00 PM – 5:00 PM
Grand Rounds
Deception Technology – Cymmetria Deception Technology – Illusive Networks UBA/Identity & Access Intelligence – Veriphyr Cybersecurity Breach Prevention – Palo Alto Networks
5:15 PM – 6:15 PM Welcome Reception
6:30 PM – 9:00 PM Sponsor Dine Arounds
9:00 PM – 11:00 PM Hospitality Suite – Sponsored by Securonix
Time Tuesday, 15 November
7:00 AM – 8:00 AM Breakfast
8:00 AM – 8:30 AM Opening Remarks: Learn. Plan. Train. Share. Win.
Jim Routh, Aetna
8:30 AM – 9:15 AM Keynote: Blunting/Disrupting Adversary Actions Through Sharing
General Keith Alexander, USA (Retired)
9:15 AM – 9:45 AM Effective Security Planning for Regulatory Compliance
Shawn Henry, Crowdstrike
9:45 AM – 10:15 AM Networking Break – Sponsored by Pindrop
10:15 AM – 11:15 AM
Grand Rounds
Advanced Cyber Intelligence – Booz Allen Hamilton Intelligent Data Protection – Thin Air Continuous Third Party Risk Monitoring – Security Scorecard Mobile Threat Defense – Skycure
11:15 AM – 11:30 AM Transition Break
11:30 AM – 12:00 PM Learning from Traditionalists – Industrial OT & the Internet of Things
Doug Clifton, EY
Bullet Proof Multi-Factor Authentication (MFA)
Damon Becknel, Horizon BCBSNJ
Lessons Learned From a Real Work Implementation of User Behavioral Analytics (UBA)
Kurt Lieber, Aetna
Recommendations for Improving the Cybersecurity Relationship Between Medical Device Manufacturers and Health Care Authorities
Bill Hagestad, Smiths-Medical
12:00 PM – 1:00 PM Lunch – Sponsored by Agari
1:00 PM – 2:00 PM Sustainable Security Operations – Leveraging Managed Services
Carlos Amaya, Deloitte; Deepak Lakhiani, Hoag Hospital Memorial Presbyterian
The ‘Crawl’ in Crawl Walk Run is Overrated…Lessons in SDLC Childhood Development
Alan Leung, BCBSNJ
Application Security – Full Static Analysis on 2 Hours a Month
Robert Sullivan, Surescripts
Medical Device Vulnerability Sharing: Post Market Regulatory Perspectives of an ISAO
Denise Anderson, NH-ISAC; Dr. Dale Nordenberg, MDISS; Dr. Suzanne Schwartz, FDA
2:00 PM – 2:15 PM Transition Break
2:15 PM – 3:15 PM The Art of Deception for Advanced Threat Detection in Healthcare Organizations
Tushar Kothari, Attivo Networks
Insider Threats: Combating Risk With Formal Insider Threat Programs
Brenda Ferraro, Aetna; Kostas Georgakopoulos, Procter & Gamble; Rocco Grillo, Stroz Friedberg, LLC
Not all Sinkholes are Bad – Leveraging Response Policy Zones for Intelligence and Blocking
David Crawford, Aetna; Sean Kallaugher, Aetna
Overview of AAMI TIR 57: Principles for Medical Device Information Security Risk Management
Michelle Jump, Stryker; Michael Seeberger, Boston Scientific; Nick Sikorski, Deloitte
3:15 PM – 3:45 PM Networking Break
3:45 PM – 4:15 PM Heart Attacks vs. Headaches: Balancing Security and Healthcare
Norm Laudermilch, Invincea
Using the Intelligence Cycle to Build Your Threat Intelligence Program
Matt Ambrose, Philips; Cam Macomber, Philips
Catch and Release: Organizational Health through Phishing Exercises
Michael Schymanski, HM Health Solutions; Mark Vescovi, HM Health Solutions
Medical Device Security: The Transition from Patient Privacy to Patient Safety
Adam Brand, Protiviti
4:15 PM – 4:30 PM Transition Break
4:30 PM – 5:00 PM O365 Strategies, Considerations and Concerns for Healthcare/CEs
Michael Ebert, KPMG; Kerri Murphy, KPMG
6:00 PM – 9:00 PM Beach Event
9:30 PM – 11:00 PM Hospitality Suite – Sponsored by Perch Security
Time Wednesday, 16 November
7:00 AM – 8:00 AM Breakfast
8:00 AM – 8:15 AM Opening Remarks
8:15 AM – 8:45 AM Open Source Security With Cisco
Joel Esler, Cisco
8:45 AM – 9:15 AM UEBA Closed Loop Deployments and Identity Analytics for IAM
Nathan Harris, Aetna; Kurt Lieber, Aetna
9:15 AM – 9:45 AM Networking Break
9:45 AM – 10:45 AM A Smarter Approach to Third-Party Risk Management & Threat Monitoring
Norman Menz, Prevalent
Feeding the Pandas
Tarik Rahmanovic, Blue Cross Blue Shield Association
Healthcare Aggregators: A Call to Action
Brian Heemsoth, Aetna
Threat Analysis and Vulnerability Assessment
Mehmet Turner, Medtronic


Applications and Practices for Medical Equipment Security
Mike Busdicker, Intermountain Healthcare; Priyanka Updendra, Intermountain Healthcare

10:45 AM – 11:00 AM Transition Break
11:00 AM – 12:00 PM Solving Healthcare’s Security and Compliance Crisis with Big Data Security Analytics
Mike Lipinski, Securonix
One if By Land, Two if By Sea
Vitali Kremez, Flashpoint; Jim Routh, Aetna; Joe Stewart, SecureWorks
Homeland Security Fusion Center’s Role in Public Health
Daniel Mahoney, NCRIC; Craig Rosenberg, NCRIC
Smart PKI for Connected Medical Device Security
Roberta Hansen, Abbott Laboratories; Mike Nelson, DigiCert
12:00 PM – 1:00 PM Lunch – Sponsored by Digital Shadows
1:00 PM – 2:00 PM What We Can Learn From How SJM Approaches Threat Intelligence
Russ Staiger, St. Jude Medical
Four CISO Tribes and Where to Find Them
Greg Barnes, BCBSNJ; Steve Katz, Retired; Spencer Mott, Amgen; Jim Routh, Aetna;
Moderator: Gary McGraw, Cigital
Into the (Security) Breach!
Brad Sanford, Emory University and Emory Healthcare
Securing B2B Data Transmissions – Addressing Key Control Gaps
Paul Jones, HM Health Solutions
2:00 PM – 2:15 PM Transition Break
2:15 PM – 2:45 PM Navigating the New Normal of Third Party Risk Management
Brenda Ferraro, Aetna; Brian Depersiis, EY; Moderator: Nana Ahwoi Larsen, EY
Application Security Zero to Hero
Jeremy Anderson, Cambia Health Solutions
Workstation Defend Thyself – A Discussion of Wins and Challenges in
Deploying Windows Advanced Firewall
Branden Carter, Blue Cross of Idaho Health Services, Inc.
Security Control Considerations for Mobile Medical Applications on iOS
Chris Reed, Eli Lilly and Company
2:45 PM – 3:00 PM Transition Break
3:00 PM – 4:00 PM Hacking Healthcare: Ransomware Becomes a New Norm
Vitali Kremez, Flashpoint
Gaining Visibility and Control Within Your Security Program
Jigar Kadakia, Partners Healthcare
Changing Risky Behavior
Karolyn Maloney, Aetna
Medical Device Security Throughout the Product Lifecycle
Rob Bathurst, Cylance


Introduction to UL’s Cybersecurity Assurance Program (UL CAP)
Anura Fernando, UL

4:00 PM – 4:15 PM Transition Break
4:15 PM – 4:45 PM Closing Remarks & Wrap Up
5:30 PM – 10:00 PM Closing Event: MCAS Miramar

*Subject to Change

Agenda – 2017 Spring Summit

Time Monday, May 8th
12:00 PM – 1:00 PM New Member/First Time Attendee Luncheon
12:00 PM – 6:00 PM Registration
1:00 PM – 2:00 PM Committee Meetings
2:00 PM – 3:45 PM Member Meeting
4:00 PM – 5:00 PM
Grand Rounds – Coalfire
Grand Rounds – Risk Recon
Grand Rounds – Cisco
Grand Rounds – Veriphyr
5:15 PM – 6:15 PM Welcome Reception – Sponsored by IMMUNIO, Inc. & Cobalt
6:30 PM – 9:00 PM Board Dine Arounds – Sponsored by Agari
6:30 PM – 9:00 PM Attendee Dine Arounds – Sponsored by Arxan Technologies, Prevalent, Secure Works, Skycure and Veracode, Inc.
9:00 PM – 11:00 PM Hospitality Suite – Sponsored by Accenture
Time Tuesday, May 9th
6:45 AM – 7:30 AM Breakfast
7:45 AM – 8:30 AM Opening Remarks
8:30 AM – 8:40 AM Keynote Introduction – Sponsored by OKTA
8:40 AM – 9:25 AM Keynote: Driving the Conversation: A Look at the Future of Healthcare in America
Mark McClellan, M.D.
9:25 AM – 9:55 AM Securonix: Solving Healthcare’s Security Crisis with Behavior Analytics
Michael Lipinski, Securonix
9:55 AM – 10:25 AM Networking Break – Sponsored by Bandura Systems
10:25 AM – 11:25 AM
Grand Rounds – Acalvio
Grand Rounds – Security Risk Advisors
Grand Rounds – ThinAir
Grand Rounds – Blue Cedar
11:25 AM – 11:35 AM Transition Break
11:35 AM – 12:05 PM
IBM: Transform Threat Intelligence Into Prevention In Minutes
Paul Griswold, IBM
Kaiser Permanente: Leveraging Threat Intelligence to Support Secure Technology Use in Patient Care
James Goddard, Kaiser Permanente; Dr. Eric Liederman, MD, Permanente Medical Group
Allergan: Do You Still Need AV?
Chris Rose, Allergan
Eli Lilly & Company: Managing Successful Pen Tests for Medical Devices – for Manufacturers and Providers
Chris Reed, Eli Lilly & Company
12:05 PM – 12:45 PM Lunch – Sponsored by Netskope
12:45 PM – 1:15 PM
Skycure: The 3 Critical Steps to Protect Your Enterprise from Mobile Threats
Jim Routh, Aetna; Adi Sharabani, Skycure
MedStar Health: Bolstering Cyber Security and Reducing Risk Through Contracting
Aaron Heath, Medical University of South Carolina; John Rasmussen, MedStar Health
Pfizer: Crowdsourcing Cybersecurity Analytics Development
William Barnes, Pfizer
DigiCert: Cybersecurity Hygiene for Connected Medical Device Security
Mike Nelson, DigiCert
1:15 PM – 1:30 PM Transition Break
1:30 PM – 2:00 PM
Attivo Networks: Deception for Early Detection and Empowered Incident Response
Carolyn Crandall, Attivo Networks
HHS: HHS Coordinated Approach to Healthcare Cyber Security
Thad Odderstol, HHS; Maggie Amato, US Department of Health and Human Services; Rose-Marie Nsahlai, US Department of Health and Human Services; Leo Scanlon, US Department of Health and Human Services; Vik Sinha, US Department of Health and Human Services
Aetna: Mobile DevOps: Securing Application Signing and Distribution
Salil Jain, Aetna; Jay Marehalli, Aetna
Baxter Healthcare: Cybersecurity Considerations in Postmarket Surveillance
Pavel Slavin, Baxter Healthcare; Ashley Woyak, Baxter Healthcare
2:00 PM – 2:15 PM Transition Break
2:15 PM – 3:15 PM
Deloitte: Advanced Cyber Reconnaissance and Analytics Supporting Health Care Clients in the Public and Private Sector
Eric Dull, Deloitte; Bari Faudree, Deloitte
Kaiser Permanente: Our Journey of Building a Cyber Security Architecture Practice for a 50 Billion Dollar Company @ Scale
Kapil Assudani, Kaiser Permanente
Pfizer: Integrated Incident Management
Brian Coleman, Pfizer
Mayo Clinic: Setting Up Your Own Medical Device Security Program
Debra Bruemmer, Mayo Clinic; LeahAnn Clemens, Mayo Clinic
3:15 PM – 3:45 PM Networking Break
3:45 PM – 4:15 PM
Perch Security: How Your Organization Can Leverage NH-ISAC Intelligence to Detect, and Participate, Automatically
Aharon Chernin, Perch Security
Preempt: How to Build a Real-Time Insider Threat Program with UBA
Ajit Sancheti, Preempt
Allergan: Acquisition Risks and Threat
Michael Towers, Allergan
Johnson & Johnson/Abbott: Post Market Management from a Medical Device Manufacturer Perspective
Colin Morgan, Johnson & Johnson; Chris Tyberg, Abbott
4:15 PM – 4:30 PM Transition Break
4:30 PM – 5:00 PM Gurucul: Risk-Based Step-Up Authentication from Behavior Analytics
Nathan Harris, Aetna; Brian Heemsoth, Aetna
6:00 PM – 9:00 PM Beach Event
9:00 PM – 11:00 PM Hospitality Suite – Sponsored by Guidepoint Security
Time Wednesday, May 10th
7:00 AM – 8:00 AM Breakfast & Panel – Sponsored by EY and EWF
8:00 AM – 8:15 AM Opening Remarks
8:15 AM – 8:45 AM EY: From Bitcoin to Secure Health Care Information: How Blockhains are Rebooting the IT Security World
Paul Brody, EY; Dan Gietl, EY
8:45 AM – 9:15 AM Networking Break
9:15 AM – 10:15 AM
Grand Rounds – Anomali
Grand Rounds – Fireglass
Grand Rounds – SecureWorks
Grand Rounds – Adlumin, Inc.
10:15 AM – 10:20 AM Transition Break
10:20 AM – 11:20 AM
Live List Server – Making Wise Choices
Chris Rose, Allergan
Live List Server – Advanced Threat Defense Framework
Michael Towers, Allergan
Live List Server – Wickedly Smart or Highly Disciplined
Robert Smith, University of California
Live List Server – Android Security Testing
Mark Willis, Aetna
11:20 AM – 11:30 AM Transition Break
11:30 AM – 12:30 PM
Flashpoint: Threats to Healthcare: From Intelligence to Incident Response
Vitali Kremez, Flashpoint; Tarik Rahmanovic, Blue Cross Blue Shield Association; Michael Slavick, Kaiser Permanente
Horizon Blue Cross Blue Shield: Panel Discussion: Healthcare Identity and Authentication Challenges
Alan Leung, Horizon Blue Cross Blue Shield; Mollie Shields Uehling, Safe Biopharma; Peter Alterman, Safe Biopharma; Michael Towers, Allergan; Jay Marehalli, Aetna; Kurt Lieber, Aetna
Wellmark Inc: Combating Complex Threat Actors and Malware Using Virtual Technologies and Non-Persistent Environments
Andrew Neller, Wellmark Inc.
NH-ISAC/MDISS/FDA: Medical Device Security Town Hall
Denise Anderson, NH-ISAC; Dr. Dale Nordenberg, MDISS; Dr. Suzanne Schwartz, FDA
12:30 PM – 1:15 PM Lunch – Sponsored by Digital Shadows
1:15 PM – 1:45 PM Prevalent: A Smarter Approach to Third-Party Vendor Risk for the Healthcare Industry
Jonathan Dambrot, Prevalent
1:45 PM – 2:00 PM Transition Break
2:00 PM – 2:30 PM
Veriphyr: Detecting Impermissible Use of Patient Data
Alan Norquist, Veriphyr; John Vastano, PhD, Veriphyr
Aetna: The Next Tectonic Shift in Identity & Access Management: User Behavioral Analytics & Identity Data Analytics
Kurt Lieber, Aetna
Allergan: To SAP or Not to SAP – Bringing Cyber and ERP Security Together
Michael Towers, Allergan
Booz Allen Hamilton: Security by Design: The Only Option for Medical Devices
Chris Poulin, Booz Allen Hamilton
2:30 PM – 2:45 PM Transition Break
2:45 PM – 3:15 PM
Genomic and Netskope: A Journey to Safe Cloud Service Enablement
Mario Puras, Netskope; Craig Guinasso, Genomic Health
Pfizer: Cybersecurity Beyond Compliance to Enable Business Solutions
Cheryl Flannery, Pfizer; Keith Lichtenwalner, Pfizer
Abbott: Changing the Paradigm for Malicious Cyber Actors – New Strategy for Defending US Critical Infrastructure
Ronald Banks, Abbot
Texas Health Resources: Cyber Risk Stratification, Medical Devices and the Healthcare Delivery System Architecture
Ron Mehring, Texas Health Resources
3:15 PM – 3:30 PM Transition Break
3:30 PM – 4:00 PM
Weblife: What CISOs Need to Know About GDPR Requirements
David Melnick, Weblife; Spencer Mott, Amgen
Smiths Medical: Create a Cyber War Game Capability to Enhance Effective Intelligence
Bill Hagestad, Smiths Medical; Mike Seeberger, Boston Scientific
Partners HealthCare: Life Lessons From an Identity and Access Management Solution Implementation
Jigar Kadakia, Partners HealthCare
Symantec: Medical Device Security – Making it Work
Axel Wirth, Symantec
4:00 PM – 4:15 PM Transition Break
4:15 PM – 4:45 PM
SecurityScorecard: Healthcare’s Most Dangerous Security Risk Vectors
Sam Kassoumeh, SecurityScorecard
Global Cyber Alliance: DMARC: Making Email More Secure
Mirza Shehzad, Global Cyber Alliance
American Cancer Society: Supply Chain Security Risk Management
James Baird, American Cancer Society
Medtronic: Advancing Secure by Design to Mobile Health Applications
Tara Larson, Medtronic
4:45 PM – 5:15 PM Closing Remarks & Wrap Up
7:30 PM – 10:00 PM Indiana Jones Epic Stunt Theater

 *Subject to Change