Current Sponsors – 2017 Spring Summit

Thank You to Our Current Sponsors!




EY Advisory combines a wealth of consulting capabilities — strategy, customer, finance, IT, supply chain, people advisory, program management and risk — with a complete understanding of a client’s most complex issues and opportunities, such as digital disruption, innovation, analytics, cybersecurity, risk and transformation. Visit to learn more.

Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology uses machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit and follow us on LinkedIn and Twitter.

Prevalent is the leader in third-party risk management and cyber threat intelligence, helping global organizations manage and monitor the security threats and risks associated with third and fourth-party vendors. With the release of Prevalent Synapse™, organizations now have a purpose-built, unified platform that reduces both risk and cost in a shared assessment model, leveraging standardized content, automation, and threat intelligence.

For more information regarding Prevalent, please visit

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management. For more information visit




Deloitte Risk and Financial Advisory helps organizations turn critical and complex business issues into opportunities for growth, resilience and long-term advantage. Our market-leading teams help our clients manage strategic, financial, operational, technological, and regulatory risk to enhance enterprise value, while our experience in mergers and acquisitions, fraud, litigation and reorganizations helps clients emerge stronger and more resilient.

Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations to make better decisions and mitigate risk. The company’s unique Deep & Dark Web data, expertise, and technology enable our customers to glean intelligence that informs risk and protects their ability to operate. Fortune 500 and government customers utilize Flashpoint’s intelligence across the enterprise, including bolstering cybersecurity, confronting fraud, detecting insider threats, enhancing physical security, assessing M&A opportunites, and addressing vendor risk and suplly chain integrity. For corporations with limited experience availing themselves of Deep & Dark Web intelligence, Flashpoint has tailored offering that deliver comprehensive reporting and monitoring on their behalf. Flashpoint backed by Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information visit or follow us on Twitter at @FlashpointIntel.




Global Cyber Alliance
The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to confronting cyber risk and improving our connected world. It is a catalyst to bring communities of interest and affiliations together in an environment that sparks innovation with concrete, measurable achievements. While most efforts at addressing cyber risk have been industry, sector, or geographically specific, GCA partners across borders and sectors. GCA’s mantra “Do Something. Measure It.” is a direct reflection of its mission to eradicate systemic cyber risks. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney’s Office, the City of London Police and the Center for Internet Security. Learn more at

Netskope is the leader in cloud security. Trusted by the world’s largest companies, Netskope’s cloud-scale security platform enables security professionals to understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work. Netskope – security evolved.

SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary SaaS platform helps enterprises gain operational command of the security posture for themselves and across all of their partners and vendors. It provides continuous, non-intrusive monitoring for any organization including 3rd and 4th parties. The platform offers a breadth and depth of critical data points not available from any other service provider in a broad range of risk categories.

Skycure offers the most complete, accurate and effective mobile threat defense solution, delivering unparalleled depth of threat intelligence to predict, detect and protect against the broadest range of threats. Skycure’s predictive technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in additional to both device- and server- based analysis.

Weblife helps organizations solve the security, privacy, and regulatory challenges associated with employee web use. Weblife uses advanced threat isolation to eliminate the risk of web-based malware, providing employees an anonymous and secure environment in which to conduct personal and high risk web browsing. The Weblife service is fully cloud-based and simple to deploy, manage, and support. It requires no software and works with any modern web browser. Weblife is used by some of the world’s largest global organizations to eliminate the risk of web-based malware and easily comply with growing global privacy regulations such as the EU’s General Data Protection Regulation (GDPR.) Weblife is a privately held company based in Los Angeles, CA.

Preempt protects organizations from insider threats by responding in real-time to suspicious behavior in order to stop malicious threats and validate legitimate activities. Preempt’s adaptive and policy-based approach ensures that proper level of response is used based on the type of severity of threat. This proactive approach allows organizations to eliminate their insider threat problem and maintain business continuity without engaging already overwhelmed security teams. The company is headquartered in San Francisco, CA. Learn more about us at

Veriphyr detects impermissible use of ePHI by employees without the false positives of rule-based approaches. When two employees access a co-worker’s medical data, Veriphyr reliably detects which employee’s access is not permissible and which employee is doing their job. Even employees in the same department with the same titles. Even if the employees access the patient data only once.

Attivo Networks
Attivo Networks®, the leader in deception technology, provides accurate in-network threat detection, analysis, and accelerated response to advanced, credential, insider, and ransomware attacks. The ThreatMatrix™ Deception and Response Platform provides continuous visibility and efficient threat management for user networks, data centers, cloud, branch, IoT, ICS-SCADA, and POS environments. Camouflage dynamic deception sets high-interaction traps to misdirect and lure attackers into revealing themselves. The solution’s advanced attack analysis and lateral movement tracking automate investigation, deliver evidence-based alerts, and in-depth forensic reports. Incident response is simplified with ThreatOps™ playbooks and 3rd party integrations for automated attack block, quarantine, and threat hunting.

IBM is a global organization that delivers an integrated system of analytics, real-time defenses and proven experts, so our clients can make strategic decisions about how to safeguard their business. Like an immune system, IBM solutions provides an integrated and comprehensive approach to prevent and repair the damage attacks can impose on your enterprise’s security.


Perch Security


Booz Allen Hamilton
Booz Allen provides end-to-end cyber security services to healthcare and life sciences companies and civil and government agencies, including those involved in regulating and providing health technology and services. The unique position of operating within the entire U.S. National Health community enables us to bridge government cyber tradecraft to the private health sector.




Security Risk Advisors
We deliver cybersecurity services to industry-leading, global companies. Our approach emphasizes training and knowledge transfer to help you build confidence in your cybersecurity controls. We bring specialized skills that are hard to find – deep security testing, independent advice, engineering capability with emerging security controls, threat modeling, and compliance program development.

Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email without an endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through Fireglass’ True Isolation™ technology, where all web traffic is executed remotely and does not reach endpoints. Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Acalvio Technologies
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.

RiskRecon brings greater transparency, accountability and productivity to your third-party risk management process. Our SaaS platform delivers frequent, comprehensive and actionable security performance measurements and management tools. Unlike alternative providers, we originate our own information by directly measuring the ever-changing attack surface area of any organization.


SecureWorks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.

Adlumin Inc.
Adlumin is revolutionizing that way corporations secure sensitive data and intellectual property while achieving their compliance objectives. These tenants of business are routinely under attack by insider and outsider threats using rogue accounts, credential theft, and identity-based attacks to subvert defenses, damaging your reputation and bottom line. Organizations like yours simply can’t wait weeks to get the answers you need. You need real time detection and flexible options. Adlumin provides real time visibility and analysis into every identity within the enterprises – even across the largest networks – using machine learning and industry expertise from the world’s finest investigators and the U.S. Intelligence Community. Futhermore, using confirmation technology, Adlumin goes beyond detection and is capable of confirming anomalies as malicious. Adlumin significantly reduces HIPAA compliance costs, satisfies multiple NIST/SANS (CIS) critical security control requirements, and enhances your privileged account access management strategy. To see Adlumin in action, visit, call (571)334-4777 or email

As cybersecurity risk management and compliance experts, Coalfire delivers cybersecurity advice, assessments, testing, and implementation support to IT and security departments, executives, and corporate directors of leading enterprises and public sector organizations. By addressing each organization’s specific challenges, we’re able to develop a long-term strategy that improves our clients’ overall cyber risk profiles. Armed with our trusted insights, clients can get to market faster with the security to succeed. Coalfire has offices throughout the United States and Europe.

ThinAir provides 360 degree visibility into all interactions with organization’s most important assets – its data. Whether malicious insider or malware or human error caused the data loss, ThinAir enables you to assess the scope and source of the leak within seconds. See everything. Protect what matters.

Blue Cedar
Blue Cedar helps enterprises and software vendors secure access to mobile data by injecting security directly into mobile apps. By securing individual apps, not the device, organizations can easily secure and deploy apps to any user on any endpoint device. It’s transparent to users, non-invasive to privacy, and provides policy controls that encrypt data-at-rest and data-in-transit.

Veriphyr detects impermissible use of ePHI by employees without the false positives of rule-based approaches. When two employees access a co-worker’s medical data, Veriphyr reliably detects which employee’s access is not permissible and which employee is doing their job. Even employees in the same department with the same titles. Even if the employees access the patient data only once.

Cisco® Cloud Security helps you adopt the cloud with confidence and better manage security for the way the world works today. It protects users against threats anywhere they access the Internet and secures your data and applications in the cloud. Cisco Cloud Security provides an effective security platform that is open, automated, and simple to use.



Digital Shadows
Digital Shadows provides insight into an organization’s external digital risks and the threat actors targeting them. Digital Shadows SearchLight™ combines scalable data analytics with human analysts to monitor for risks beyond the boundary identifying cyber threats, data leakage and reputation risks, creating an up-to-the minute view of an organization and digital risks requiring mitigation.

Bitglass’ Cloud Access Security Broker (CASB) solution provides enterprises with end-to-end data protection from the cloud to the device. It deploys in minutes and works with any cloud app on any device. Bitglass protects data on mobile devices without the hassles of MDM and enables enterprises to enforce corporate data security policies across apps like Office 365, Salesforce, and Exchange. Bitglass, based in Silicon Valley with European headquarters in Amsterdam, was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud connect and protects employees of many of the world’s largest enterprises. It also securely connect enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device.

Resilient, an IBM Company
IBM Resilient’s mission is to help organizations thrive in the face of any cyberattack or business crisis. The industry’s leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, more intelligently, and more efficiently. The Resilient IRP is the industry’s only complete IR orchestration and automation platform, enabling teams to integrate and align people, processes, and technologies into a single incident response hub. With Resilient, security teams can have best-in-class response capabilities. IBM Resilient has more than 150 global customers, including 50 of the Fortune 500, and hundreds of partners globally. Learn more at

Veracode, Inc.
Veracode is a leader in securing web, mobile and third-party applications for the world’s largest global enterprises. By enabling organizations to rapidly identify and remediate application-layer threats before cyberattackers can exploit them, Veracode helps enterprises speed their innovations to market – without compromising security. Learn more at

DigiCert addresses the security challenges of the Internet of Things with automated identity and encryption solutions for connected devices. Whether choosing the cloud or on-premise, we support your certificate-based deployments at any scale for mutual authentication, access control, data encryption, data integrity, secure boot, patch management and IP protection. A trusted certificate provider for the Global 2000, DigiCert supports SSL/TLS and other digital certificates for PKI deployments at any scale through its certificate lifecycle management platform, CertCentral®. The company has been recognized with dozens of awards for its enterprise-grade management platform, fast and knowledgeable customer support, and market-leading growth. For the latest DigiCert news and updates, visit or follow @digicert.

Synopsys offers the most comprehensive solution for integrating security and quality into the SDLC and supply chain. Whether you’re well-versed in software security or just starting out, we provide the tools you need to ensure the integrity of the applications that power your business. Our holistic approach to software security combines best-in-breed products, industry-leading experts, and a broad portfolio of managed and professional services that work together to improve the accuracy of findings, speed up the delivery of results, and provide solutions for addressing unique application security challenges. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure software. For more information go to

OASIS is a nonprofit consortium, home to STIX and TAXII standards for threat intelligence sharing and the CSAF standard for automated cyber vulnerabilities disclosure. OASIS organizes the Borderless Cyber conference, 21-22 June, NYC. Stop by our table for a chance to win a free conference pass. NH-ISAC members receive $100 discount when registering for Borderless Cyber with the code NH-ISAC.

Mimecast (NASDAQ: MIME) makes business email and data safer for 24,900 customers and their millions of employees worldwide. Founded in 2003, the company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management.

Agari protects the inboxes of the world’s largest organizations from the #1 cyber security threat of advanced email attacks including phishing and business email compromise. URL:

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian intelligence networkds, allowing it to see and protect against the most advanced threats. For additional information, please visit

Menlo Security
Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors. The company’s patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security products can be deployed in the public or private cloud and are trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Company headquarters are in Menlo Park, California. For more information, please visit or @menlosecurity.




Bandura is a cybersecurity company that enables organizations to control their exposure to the internet. Our users are able to leverage Bandura technology in conjunction with their existing security infrastructure to simplify the deployment and enforcement of their vast threat intelligence repositories, eliminating large amounts of threatening infrastructure from being able to interact with their environment. The Bandura PoliWall can deploy 100 MILLION malicious IP’s or CIDR blocks in line and likewise automate activities such as ACL’s to eliminate traffic from threatening countries with a click.

Booz Allen Hamilton
Booz Allen provides end-to-end cyber security services to healthcare and life sciences companies and civil and government agencies, including those involved in regulating and providing health technology and services. The unique position of operating within the entire U.S. National Health community enables us to bridge government cyber tradecraft to the private health sector.

Cobalt’s hacker-powered application security solution transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of trusted ethical hackers, Cobalt’s SaaS crowdsourced pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget. Visit to learn how Cobalt is securing apps at the speed of business.

GuidePoint Security
GuidePoint Security provides innovative and valuable cybersecurity solutions and expertise that enable organizations to successfully achieve their missions. By embracing new technologies, GuidePoint helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Learn more at:

IMMUNIO is a pioneer in runtime application self-protection (RASP) providing a cutting edge technology platform for real-time, instantaneous and automatic detection of an protection against security vulnerabilities for web applications. Our mission is to align security with the speed of application development easily, efficiently and effectively for the enterprise. To learn more about IMMUNIO please visit

Pindrop is the pioneer in voice fraud prevention and authentication. Pindrop provides enterprise solutions to reduce fraud losses and authentication expense for some of the largest call centers in the world. Pindrop’s patented PhoneprintingTM technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Pindrop has been selected by the world’s largest banks, insurers, brokerages and retailers, detecting over 80% of fraud, even for attackers never seen before. Pindrop’s solutions are allowing customers to reduce call time and improve their customers’ experience even while reducing fraud losses. Pindrop was founded in 2011 and is venture backed by Andreessen Horowitz, Citi Ventures, Felicis Ventures, CapitalG, GV and IVP.

Phantom is the first community-powered security automation and orchestration platform. It integrates your existing security technologies, providing a layer of connective tissue between them. The Phantom platform helps you work smarter by automating repetitive tasks, effectively force multiplying your team’s efforts and allowing them to focus their attention on mission-critical decisions. It also helps you respond faster and reduce dwell times with automated detection, investigation, and response. Using Phantom helps you strengthen your defenses by integrating your entire security infrastructure together so that each part is actively participating in your defense strategy. For more information visit:


Arxan Technologies