Fortinet secures the largest enterprise, service provider, and government organizations around the world, empowering customers with intelligent, seamless protection across the expanding attack surface and today’s borderless network. Fortinet ranks #1 in the most security appliances shipped worldwide, and more than 320,000 customers trust Fortinet to secure their businesses.
HackerOne is the #1 hacker-powered security platform. More than 1,000 organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google Play, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Starbucks, Dropbox and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities.
Lieberman Software proactively mitigates cyber-attacks that bypass conventional enterprise defenses and penetrate the network perimeter. By delivering an adaptive identity threat response in real-time, the company continuously secures your environment, countering malicious attacks from the outside, and within. Customers who use the Lieberman Software Adaptive Privilege Management Platform to continuously change privileged credentials and SSH keys are no longer exposed to unbounded business risk caused by sophisticated attacks. That’s why the largest companies and governments across the globe trust Lieberman Software to secure their assets, protect their finances, and guard their reputation.
Malwarebytes protects businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide.
Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Darktrace is a world-leading cyber-threat defense company. Its Enterprise Immune System technology automatically detects and responds to threats, powered by machine learning and mathematics developed by specialists.
Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s behaviors and intent as they interact with critical data and IP wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to data while protecting intellectual property and simplifying compliance.
iboss has created the first and only Distributed Gateway Platform specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, iboss leverages an elastic, node-based architecture that provides advanced security for today’s decentralized organizations and scales to meet the ever-increasing bandwidth needs of tomorrow.
It is Javelin’s mission to educate the industry and other security personnel about Active Directory exposure and, in the process, protect every machine connected to the corporate domain.
The Escape Room - Booth #120
Living Security specializes in intelligence driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behavior. Living Security is hosting 12 escape rooms at InfoSec World 2018.
Founded in 1989, MicroStrategy is a leading worldwide provider of enterprise software platforms. The Company's mission is to provide enterprise customers with a world-class software platform and expert services so they can deploy unique intelligence applications. To learn more, visit MicroStrategy online, and follow on Facebook and Twitter.
eLearnSecurity has proven to be a leading innovator in the field of practical security training. Best of breed virtualization technology, in-house projects such as Coliseum Web Application Security Framework and Hera Network Security Lab, have changed the way students learn and practice new skills.
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. We are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core—enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
KnowBe4 is the world’s largest integrated platform for new-school security awareness training and simulated phishing. KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. Organizations leverage KnowBe4 to enable their employees to make smarter security decisions and create a human firewall as an effective last line of defense.
LogRhythm is the pioneer in Threat Lifecycle ManagementTM (TLM) technology, empowering organizations on six continents to rapidly detect, respond to and neutralize damaging cyberthreats. LogRhythm’s TLM platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments.
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including four of the five largest U.S. financial instituti stop targeted cyberattacks.
Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions that help organizations streamline and consolidate their security and compliance solutions and build security into digital transformation. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously across global IT assets.
Sophos makes IT security simple. Focused on innovation in next-generation protection, Sophos solutions are simple to deploy, maintain and manage, enabling organizations to protect and defend their networks, their information and their people. Sophos – Security made Simple.
Founded by thought leaders of Cisco’s IronPort solutions, Agari's mission is to build new internet scale data driven security solutions that eliminate email as a channel for cyber attacks and enable businesses and consumers to interact safely. Agari is trusted by leading Fortune 1000 companies, including 6 of the top 10 banks and 5 of the world’s leading social media networks, as well as Government Agencies, to protect their organizations, partners, customers and citizens from advanced email phishing attacks.
Avatier software and services automate IT operations. Our identity management and access governance solutions make organizations more secure and productive in the shortest time at the lowest costs. Avatier is the only company providing solutions that adapt to the needs of the business user delivering a unified framework for business processes across operations.
Barkly replaces legacy antivirus with the strongest, smartest protection against fileless attacks, malicious executables and exploits at every stage of the attack chain. Barkly’s fast, lightweight endpoint agent leverages patented, CPU-level visibility to block attacks. Barkly is simple to deploy and can be managed from any desktop or mobile device.
Bomgar’s Secure Access solutions enable customers to easily support people, access and protect endpoints, and defend privileged credentials, in order to fight cyber threats and speed business performance. More than 12,000 organizations around the globe use Bomgar to deliver superior support services and reduce threats to valuable data and systems. Bomgar clients include some of the world’s leading IT outsourcers, systems integrators, software vendors, healthcare organizations, government agencies, universities, financial institutions, and retailers.
BTB Security goes Beyond The Basics of information security services by practicing with expertise and integrity. BTB founders have leveraged their 45+ years of information security experience to build an organization that has become a security services industry leader. BTB earns clients' trust by exceeding expectations and aligning focused expertise to achieve goals and become valued trusted advisors for clients nationwide.
For over three decades, the Software Engineering Institute (SEI) has been helping government and industry organizations to acquire, develop, operate, and sustain software systems that are innovative, affordable, enduring, and trustworthy. We serve the nation as a Federally Funded Research and Development Center (FFRDC) sponsored by the U.S. Department of Defense (DoD) and are based at Carnegie Mellon University, a global research university annually rated among the best for its programs in computer science and engineering.
Center for Internet Security (CIS) is a forward-thinking, nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threat.
Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications.
Circadence® is a leader in next-generation cybersecurity education and training. Circadence provides a fully immersive, AI-powered cybersecurity training and assessment platform for government and enterprise organizations. Circadence’s solutions modernize cybersecurity training with an advanced online gaming platform that delivers persistent, immersive and real-to-life experiences.
Stars can’t shine without darkness – Conventus is a cyber security software company with an accomplished track record of InfoSec consulting. We focus on providing the visibility needed to track and reduce risk.
CorreLog, Inc. is the leading ISV for cross-platform IT security log management and event log correlation. Our solutions provide best-in-class, real-time event log collection across both distributed and mainframe systems. Event logs generated from CorreLog Agents are ready-format for the CorreLog SIEM Correlation Server or any SIEM correlation engine.
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. CyberArk pioneered a new category of targeted security solutions to protect against cyber threats before attacks escalate and cause irreparable business damage.
DG Technology believes the foundation for success is through partnerships. There is no single entity that can be everything to every company. As a network we can bring the right skills to the right situation at the right time at the right price. DG Technology is uniquely positioned to provide solutions to our clients through partnerships. These solutions are backed and supported by a network of the best of breed technologies and the most talented technologists.
DNV GL is a global quality assurance and risk management company. Driven by our purpose of safeguarding life, property and the environment, we enable our customers to advance the safety and sustainability of their business. We provide classification, technical assurance, software and independent expert advisory services to the maritime, oil & gas, power and renewables industries. We also provide certification, supply chain and data management services to customers across a wide range of industries.
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
DriveLock SE is headquartered in Munich, Germany with offices in Pleasanton, CA and Sydney, Australia and has become one of the leading Endpoint Protection Platform software vendors over the past 15 years. DriveLock supports various operating systems, devices, and is available as a hybrid solution either on-premise or from the cloud.
At Duo, we combine security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools for the modern era. It’s so simple and effective, you get the freedom to focus on your mission and leave protection to us.
enSilo's single lightweight security agent gives customers comprehensive pre-infection Next Generation Anti-Virus (NGAV) as a first line of defense and post-infection automated, blocking-enabled Endpoint Detection and Response (EDR) as a last line of defense, enabling security teams to contain attacks, prevent data leakage and block malware communications in real time to stop post-infection impact.
ESET began life as a pioneer of antivirus protection, creating award-winning threat detection software. Now, ESET's goal is to make sure that everybody can enjoy the breathtaking opportunities that technology offers. Today, our security solutions allow businesses and consumers in more than 200 countries and territories to make the most of the digital world.
eSentire® provides managed detection and response services to mid-sized organizations, keeping them safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. Delivering an unmatched, premium-level service, eSentire protects more than $3.2 trillion in Assets under Management (AuM) and is the award-winning choice for security decision-makers.
FlowTraq, a Riverbed Company, builds network security and forensics software to empower operators to hunt for threats and investigate cybersecurity incidents in large networks. It detects a range of network traffic anomalies including DDoS, data leaks, botnets, and network traffic anomalies. Choose from our affordable and secure cloud-based or on-premises solution.
GuidePoint Security provides customized, world-class cybersecurity solutions designed to create safer IT environments for commercial and federal organizations. By helping you mitigate and identify threats, and understand solution options, GuidePoint provides the expertise that enables your organization to successfully achieve specific business and security goals.
At HelpSystems we develop powerful, easy-to-use software for cybersecurity, IT operations management and monitoring, business intelligence, and document management. Our software simplifies everyday operations to help you save time and cut costs. Our experts guide you to hit your goals. And whenever you have a question, our calls are answered the old-fashioned way: by a live member of our experienced support team.
Hitachi ID Systems delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. Follow @Hitachi_ID on Twitter.
InteliSecure provides a portfolio of Consulting, Technical, Penetration Testing, GRC and Managed Security Services to develop data and threat protection programs that adapt and grow as client needs change. Our proprietary Critical Asset Protection Program (CAPP) methodology provides a more effective security solution than traditional Managed Security Service Provider offerings.
Jazz Networks protects against accidental and intentional cybersecurity threats from inside and outside of your organization. Jazz Networks provides end-to-end security from desktop to servers to cloud, enabling network agnostic user, application and container visibility for computers and data centers. Jazz Networks has offices in London, New York and Oslo.
Lynx Technology Partners is the trusted Information Security and Risk Management Advisor that customers in highly-regulated industries depend on to improve security posture, facilitate compliance, reduce risk, and refine operational efficiency. Through consulting, security and risk assessments, managed security services, and an award-winning GRC solution, Lynx supports many critical projects for security-conscious leaders.
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget. ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford. From network and device management to security and service desk software, we're bringing IT together for an integrated, overarching approach to optimize your IT.
Novicom is a producer of solutions for the monitoring, administration and security of large networks. Using its own unique technologies, Novicom achieves premium security and operational reliability, even in large distributed networks. Novicom’s key product is AddNet – an integrated DDI/NAC solution, highly increasing the efficiency of IP address space management and network access control.
We live in a net-centric world where new information technologies arrive at lightning speed, allowing us to share information across town or around the world faster than ever before. The National Security Agency's Information Assurance Mission is dedicated to providing information assurance solutions that will keep our information systems secure.
NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape. With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face. We are passionate about making the Internet safer and revolutionizing the way in which organizations think about cyber security.
Since 2000, we have focused on using identity to create business value – measurable value, from IT and HR to marketing and sales. Identity, managed the Omada way, simultaneously improves security, efficiency, cost control and regulatory compliance throughout any organization. And it can do even more. Identity can accelerate digital transformations, smooth M&A integration, and enable deeper relationships with suppliers and customers. Belief in this essential role of identity unites our organization, fuels our innovation, and strengthens our collaboration with partners. We’ve pioneered many of the best practices in use today, and we’re passionate about taking identity management even further.
OneTrust is the leading and fastest growing privacy management software platform used by hundreds of organizations globally to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and Privacy Shield. Our comprehensive, integrated, technology-based solutions include readiness and privacy impact assessments, data inventory and mapping automation, website scanning and consent management, subject rights requests, incident reporting, and vendor risk management.
Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.
Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. SecureONE takes a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access. Nothing else makes PAM this easy. With no agents to install or password vault to manage, SecureONE is the “easy” button for PAM.
In 2005, we set out to create a new type of company – one that promised to provide innovative solutions to business problems and an exciting, collaborative work environment for identity rock stars. Together, we’re redefining identity’s place in the security ecosystem. SailPoint loves taking on new challenges that seem daunting to others. We hold ourselves to the highest standards, and deliver upon our promises to our customers. We bring out the best in each other, and we’re having a lot of fun along the way.
Your mission is to unleash your creativity, productivity and success. Ours is to ensure that a hostile cyber environment can’t stop you. Secure Channels’ innovative platforms build security into endpoints, applications, and networks from the inside out, securing access to your critical resources while protecting your data from breach, theft and misuse.
Securonix, the leader in Security Analytics, uses the power of Hadoop and machine learning technology to radically transform enterprise security with actionable intelligence. Our purpose-built UEBA and Next-Gen SIEM platforms consume, enrich and analyze massive volumes of data in real-time to detect and prioritize the highest risk threats to organizations. Using out of the box content, Securonix detects insider threat, cyber threat, cloud and fraud attacks automatically and accurately.
Signal Sciences' web protection platform enables companies to find and stop attackers from breaching critical customer data via vulnerabilities in their code. Our technology focuses on democratizing attack information beyond just security experts. We enable entire technology teams, including both dev and ops, to find and stop attacks as they happen.
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints.
Engineering has been a part of Texas A&M University since its inception in 1876 as the Agricultural and Mechanical College of Texas. Today, the College of Engineering is the largest college on the Texas A&M campus with more than 600 faculty members and more than 17,000 engineering students in our 14 departments.
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics.
Headquartered in Cleveland, Ohio, TrustedSec is an IT Security Consulting company, made up of researchers, hackers, advisors, who all share a passion for Security. Information Security does not need to be complex. Our mission: to help organizations defend against threats of all kind and change the security industry for the better. Simple and challenging. Behind closed doors you will find us researching, developing new tools, conducting training classes, keynoting and presenting at conferences throughout the world.
TruShield's award-winning suite of cybersecurity services solves complex problems for businesses around the world. Our comprehensive solutions include 24/7/365 MSSP Continuous Security Monitoring, expert Incident Response Consulting, Pen-testing, Risk and Compliance Assessments, and PhiShield, a next-gen phishing assessment platform which identifies your posture and delivers targeted training to at-risk users.
Wallix Group is a cybersecurity vendor dedicated to accompanying and defending organizations’ success and renown against cyberthreats while helping them meet regulatory compliance requirements. Wallix strives to protect private and public organizations’ most critical IT and strategic assets against data breaches, making it the European expert in Privileged Access Management.
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, up to 90%.
ZeroFOX, the innovator of social media & digital security, protects modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using targeted data collection and artificial intelligence-based analysis, ZeroFOX protects modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more.
Association & Media Sponsors
The (ISC)2 Central Florida Chapter is a professional association created by (ISC)² members for (ISC)² members & IT / Information Security professionals in the community. Our mission is to provide members and other security professionals the opportunity to share knowledge, grow professionally, raise security awareness and advance information to those in the Community. This is accomplished by delivering material that educates, connects, inspires and helps our members secure their environments and our community. While many of our members have a (ISC)² credential, having a (ISC)² credential is not required to become a member of our chapter. Please visit our site to learn about upcoming events where we can secure, educate, connect, and inspire you!
EC-Council has created CISO MAG, an information security magazine for best practice, trends, and news.CISO MAG is the handbook for Chief Information Security Officer (CISO)s, CXOs, and every stakeholder of safe internet. CISO MAG provides in-depth, impartial, business and technical information to the proficient ones in cyberspace. The magazine features news, comprehensive analysis, cutting-edge features, and contributions from thought leaders, that are nothing like the ordinary.
Code Like A Girl Inc. is an online publication whose goal it is to change the perceptions of Women In Technology by Amplifying their voices. Our mission is to inspire girls and women to choose a career in tech and support them once they are there.
Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.
Learn about the most current cybercrime tactics, cyberheist schemes, social engineering and ransomware attacks, as well as hints and tips from the pros to help you prevent hackers penetrating your network. If you are frustrated by employees in your organization who regularly fall for phishing attacks that infect your network, this weekly e-zine gives you the ammo to defend your network against the latest cybercrime.
HACKNYC 2018 Conference & Expo
May 7-10, 2018 | 11 Times Square, New York City
Because the difference between a hard target and a soft target … is everything.
The Information Systems Security Association (ISSA) is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for international cybersecurity professional dedicated to individual growth, managing technology risk, and protecting critical information and infrastructure. The primary goal of ISSA is to promote management practices that will ensure the confidentiality, integrity and availability of information resources. ISSA facilities interaction and education to create a successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a board range of industries such as communications, education, healthcare, manufacturing, financial and government.
Founded in 2000 and achieving operational capability in 2001, the Information Technology-Information Sharing and Analysis Center (IT-ISAC) is a non-profit, limited liability corporation formed by members within the Information Technology sector as a unique and specialized forum for managing risks and corporations' IT infrastructure. Members participate in national and homeland security efforts to strengthen the IT infrastructure through cyber information sharing and analysis. As a result, members help their companies improve their incident response through trusted collaboration, analysis, coordination, and drive decision-making by policy makers on cybersecurity, incident response, and information sharing issues.
Our purpose is to empower the world through engaging learning. Founders Tim Broom and Don Pezet created the innovative concept of ITProTV with inspiration from the show The Screen Savers and years of working in a traditional IT training industry. The drive to create new content efficiently has led ITProTV to partnerships with Wiley, Amazon and PluralSight. Show production takes place in a newly renovated 28,000 square foot facility with 5 production studios.
The National Defense Information Sharing and Analysis Center (NDISAC or National Defense ISAC) is the national defense sector’s non-profit organization formed to enhance the security and resiliency of the defense industry and its strategic partners.
National Health Information Sharing and Analysis Center (NH-ISAC), is a global, non-profit, member-driven organization offering healthcare stakeholders a trusted community and forum for coordinating, collaborating and sharing vital Physical and Cyber Threat Intelligence and best practices with each other. Members use this information to extend their security operations team and to create situational awareness, inform risk-based decision-making and mitigate against threats. Membership is open to private & public hospitals, ambulatory providers, health insurance payers, pharmaceutical/biotech manufacturers, laboratory, diagnostic, medical device manufacturers, medical schools, medical R&D organizations and other relevant health care stakeholders. Joining NH-ISAC is one of the best ways health care and public health firms can actively participate to protect the industry and its vital role in critical infrastructure.
The Open Web Application Security Project (OWASP) is a 501(c)(3)worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible,so that individuals and organizations are able to make informed decisions. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. For more information, please visit: www.owasp.org.
SearchSecurity.com is a trusted source for advancing your knowledge in the security industry. Uncover immediate access to breaking industry news, virus alerts, new hacker threats, security certification training, compliance best practices, as well as a selection of webcasts, white papers, podcasts, Security Schools, and more -- all at no cost.
The Security Weekly mission is to provide free content within the subject matter of IT security news, vulnerabilities, hacking, and research. We strive to use new technologies to reach a wider audience across the globe to teach people how to grow, learn, and be security professionals.
Security Weekly is the 6-time winner of the RSA Social Security Awards Best Security Podcast. For the past 12 years, we have successfully distributed security information through our blog, social media, lead generating webcasts, podcasts, and Internet TV.
Established in 2009, TVP Strategy is an analyst organization focused on analyzing, researching and reporting about virtualization and cloud trends that impact businesses today. Our analysts all ‘come from the trenches’ and therefore have a unique insight into how technology can deliver business value. We also have the battle scars to know how not to do things. This experience means we provide our clients with a variety of analytical content that can really move the needle for their business. Focusing primarily on the vendor community, TVP Strategy has delivered projects for premiere organizations within the cloud and virtualization space, including VMware, Veeam, HyTrust, Turbonomic, and, Puppet. We frequently attend, and speak at, some of the major industry events, such as VMworld, OpenStack Summit, DockerCon and many more. Reporting from these events provides our members and partners a level of insight that they could only obtain by attending in person.