Fortinet secures the largest enterprise, service provider, and government organizations around the world, empowering customers with intelligent, seamless protection across the expanding attack surface and today’s borderless network. Fortinet ranks #1 in the most security appliances shipped worldwide, and more than 320,000 customers trust Fortinet to secure their businesses.
Lieberman Software proactively mitigates cyber-attacks that bypass conventional enterprise defenses and penetrate the network perimeter. By delivering an adaptive identity threat response in real-time, the company continuously secures your environment, countering malicious attacks from the outside, and within. Customers who use the Lieberman Software Adaptive Privilege Management Platform to continuously change privileged credentials and SSH keys are no longer exposed to unbounded business risk caused by sophisticated attacks. That’s why the largest companies and governments across the globe trust Lieberman Software to secure their assets, protect their finances, and guard their reputation.
Malwarebytes protects businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide.
Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Darktrace is a world-leading cyber-threat defense company. Its Enterprise Immune System technology automatically detects and responds to threats, powered by machine learning and mathematics developed by specialists.
Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s behaviors and intent as they interact with critical data and IP wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to data while protecting intellectual property and simplifying compliance.
iboss has created the first and only Distributed Gateway Platform specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, iboss leverages an elastic, node-based architecture that provides advanced security for today’s decentralized organizations and scales to meet the ever-increasing bandwidth needs of tomorrow.
It is Javelin’s mission to educate the industry and other security personnel about Active Directory exposure and, in the process, protect every machine connected to the corporate domain.
Founded in 1989, MicroStrategy is a leading worldwide provider of enterprise software platforms. The Company's mission is to provide enterprise customers with a world-class software platform and expert services so they can deploy unique intelligence applications. To learn more, visit MicroStrategy online, and follow on Facebook and Twitter.
eLearnSecurity has proven to be a leading innovator in the field of practical security training. Best of breed virtualization technology, in-house projects such as Coliseum Web Application Security Framework and Hera Network Security Lab, have changed the way students learn and practice new skills.
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. KnowBe4 was created to help organizations manage the problem of social engineering tactics through new school security awareness training. Thousands of organizations use KnowBe4, including highly regulated fields such as finance, healthcare, energy, and government.
LogRhythm is the pioneer in Threat Lifecycle ManagementTM (TLM) technology, empowering organizations on six continents to rapidly detect, respond to and neutralize damaging cyberthreats. LogRhythm’s TLM platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments.
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including four of the five largest U.S. financial instituti stop targeted cyberattacks.
Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions that help organizations streamline and consolidate their security and compliance solutions and build security into digital transformation. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously across global IT assets.
Avatier software and services automate IT operations. Our identity management and access governance solutions make organizations more secure and productive in the shortest time at the lowest costs. Avatier is the only company providing solutions that adapt to the needs of the business user delivering a unified framework for business processes across operations.
Bomgar’s Secure Access solutions enable customers to easily support people, access and protect endpoints, and defend privileged credentials, in order to fight cyber threats and speed business performance. More than 12,000 organizations around the globe use Bomgar to deliver superior support services and reduce threats to valuable data and systems. Bomgar clients include some of the world’s leading IT outsourcers, systems integrators, software vendors, healthcare organizations, government agencies, universities, financial institutions, and retailers.
BTB Security goes Beyond The Basics of information security services by practicing with expertise and integrity. BTB founders have leveraged their 45+ years of information security experience to build an organization that has become a security services industry leader. BTB earns clients' trust by exceeding expectations and aligning focused expertise to achieve goals and become valued trusted advisors for clients nationwide.
For over three decades, the Software Engineering Institute (SEI) has been helping government and industry organizations to acquire, develop, operate, and sustain software systems that are innovative, affordable, enduring, and trustworthy. We serve the nation as a Federally Funded Research and Development Center (FFRDC) sponsored by the U.S. Department of Defense (DoD) and are based at Carnegie Mellon University, a global research university annually rated among the best for its programs in computer science and engineering.
Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications.
CorreLog, Inc. is the leading ISV for cross-platform IT security log management and event log correlation. Our solutions provide best-in-class, real-time event log collection across both distributed and mainframe systems. Event logs generated from CorreLog Agents are ready-format for the CorreLog SIEM Correlation Server or any SIEM correlation engine.
DG Technology believes the foundation for success is through partnerships. There is no single entity that can be everything to every company. As a network we can bring the right skills to the right situation at the right time at the right price. DG Technology is uniquely positioned to provide solutions to our clients through partnerships. These solutions are backed and supported by a network of the best of breed technologies and the most talented technologists.
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
At Duo, we combine security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools for the modern era. It’s so simple and effective, you get the freedom to focus on your mission and leave protection to us.
enSilo's single lightweight security agent gives customers comprehensive pre-infection Next Generation Anti-Virus (NGAV) as a first line of defense and post-infection automated, blocking-enabled Endpoint Detection and Response (EDR) as a last line of defense, enabling security teams to contain attacks, prevent data leakage and block malware communications in real time to stop post-infection impact.
eSentire® provides managed detection and response services to mid-sized organizations, keeping them safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. Delivering an unmatched, premium-level service, eSentire protects more than $3.2 trillion in Assets under Management (AuM) and is the award-winning choice for security decision-makers.
Fox Technologies is a global security company that helps organizations centralize Linux and Unix access management across hybrid IT environments. Enterprises world-wide rely on Fox’s security solutions to enforce granular security controls, simplify compliance, and increase over-all IT department efficiencies. By empowering IT and security teams with control over security – they can proactively prevent internal and external critical system attacks – before they start.
Hitachi ID Systems delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. Follow @Hitachi_ID on Twitter.
InteliSecure provides a portfolio of Consulting, Technical, Penetration Testing, GRC and Managed Security Services to develop data and threat protection programs that adapt and grow as client needs change. Our proprietary Critical Asset Protection Program (CAPP) methodology provides a more effective security solution than traditional Managed Security Service Provider offerings.
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget. ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford. From network and device management to security and service desk software, we're bringing IT together for an integrated, overarching approach to optimize your IT.
We live in a net-centric world where new information technologies arrive at lightning speed, allowing us to share information across town or around the world faster than ever before. The National Security Agency's Information Assurance Mission is dedicated to providing information assurance solutions that will keep our information systems secure.
OneTrust is the leading and fastest growing privacy management software platform used by hundreds of organizations globally to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and Privacy Shield. Our comprehensive, integrated, technology-based solutions include readiness and privacy impact assessments, data inventory and mapping automation, website scanning and consent management, subject rights requests, incident reporting, and vendor risk management.
Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. SecureONE takes a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access. Nothing else makes PAM this easy. With no agents to install or password vault to manage, SecureONE is the “easy” button for PAM.
In 2005, we set out to create a new type of company – one that promised to provide innovative solutions to business problems and an exciting, collaborative work environment for identity rock stars. Together, we’re redefining identity’s place in the security ecosystem. SailPoint loves taking on new challenges that seem daunting to others. We hold ourselves to the highest standards, and deliver upon our promises to our customers. We bring out the best in each other, and we’re having a lot of fun along the way.
Your mission is to unleash your creativity, productivity and success. Ours is to ensure that a hostile cyber environment can’t stop you. Secure Channels’ innovative platforms build security into endpoints, applications, and networks from the inside out, securing access to your critical resources while protecting your data from breach, theft and misuse.
Signal Sciences' web protection platform enables companies to find and stop attackers from breaching critical customer data via vulnerabilities in their code. Our technology focuses on democratizing attack information beyond just security experts. We enable entire technology teams, including both dev and ops, to find and stop attacks as they happen.
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints.
Headquartered in Cleveland, Ohio, TrustedSec is an IT Security Consulting company, made up of researchers, hackers, advisors, who all share a passion for Security. Information Security does not need to be complex. Our mission: to help organizations defend against threats of all kind and change the security industry for the better. Simple and challenging. Behind closed doors you will find us researching, developing new tools, conducting training classes, keynoting and presenting at conferences throughout the world.
TruShield's award-winning suite of cybersecurity services solves complex problems for businesses around the world. Our comprehensive solutions include 24/7/365 MSSP Continuous Security Monitoring, expert Incident Response Consulting, Pen-testing, Risk and Compliance Assessments, and PhiShield, a next-gen phishing assessment platform which identifies your posture and delivers targeted training to at-risk users.
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, up to 90%.
ZeroFOX, the innovator of social media & digital security, protects modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using targeted data collection and artificial intelligence-based analysis, ZeroFOX protects modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more.
Association & Media Sponsors
The (ISC)2 Central Florida Chapter is a professional association created by (ISC)² members for (ISC)² members & IT / Information Security professionals in the community. Our mission is to provide members and other security professionals the opportunity to share knowledge, grow professionally, raise security awareness and advance information to those in the Community. This is accomplished by delivering material that educates, connects, inspires and helps our members secure their environments and our community. While many of our members have a (ISC)² credential, having a (ISC)² credential is not required to become a member of our chapter. Please visit our site to learn about upcoming events where we can secure, educate, connect, and inspire you!
Code Like A Girl Inc. is an online publication whose goal it is to change the perceptions of Women In Technology by Amplifying their voices. Our mission is to inspire girls and women to choose a career in tech and support them once they are there.
Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.
Learn about the most current cybercrime tactics, cyberheist schemes, social engineering and ransomware attacks, as well as hints and tips from the pros to help you prevent hackers penetrating your network. If you are frustrated by employees in your organization who regularly fall for phishing attacks that infect your network, this weekly e-zine gives you the ammo to defend your network against the latest cybercrime.
HACKNYC 2018 Conference & Expo
May 7-10, 2018 | 11 Times Square, New York City
Because the difference between a hard target and a soft target … is everything.
Founded in 2000 and achieving operational capability in 2001, the Information Technology-Information Sharing and Analysis Center (IT-ISAC) is a non-profit, limited liability corporation formed by members within the Information Technology sector as a unique and specialized forum for managing risks and corporations' IT infrastructure. Members participate in national and homeland security efforts to strengthen the IT infrastructure through cyber information sharing and analysis. As a result, members help their companies improve their incident response through trusted collaboration, analysis, coordination, and drive decision-making by policy makers on cybersecurity, incident response, and information sharing issues.
The National Defense Information Sharing and Analysis Center (NDISAC or National Defense ISAC) is the national defense sector’s non-profit organization formed to enhance the security and resiliency of the defense industry and its strategic partners.
National Health Information Sharing and Analysis Center (NH-ISAC), is a global, non-profit, member-driven organization offering healthcare stakeholders a trusted community and forum for coordinating, collaborating and sharing vital Physical and Cyber Threat Intelligence and best practices with each other. Members use this information to extend their security operations team and to create situational awareness, inform risk-based decision-making and mitigate against threats. Membership is open to private & public hospitals, ambulatory providers, health insurance payers, pharmaceutical/biotech manufacturers, laboratory, diagnostic, medical device manufacturers, medical schools, medical R&D organizations and other relevant health care stakeholders. Joining NH-ISAC is one of the best ways health care and public health firms can actively participate to protect the industry and its vital role in critical infrastructure.
The Open Web Application Security Project (OWASP) is a 501(c)(3)worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible,so that individuals and organizations are able to make informed decisions. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. For more information, please visit: www.owasp.org.
SearchSecurity.com is a trusted source for advancing your knowledge in the security industry. Uncover immediate access to breaking industry news, virus alerts, new hacker threats, security certification training, compliance best practices, as well as a selection of webcasts, white papers, podcasts, Security Schools, and more -- all at no cost.
The Security Weekly mission is to provide free content within the subject matter of IT security news, vulnerabilities, hacking, and research. We strive to use new technologies to reach a wider audience across the globe to teach people how to grow, learn, and be security professionals.
Security Weekly is the 6-time winner of the RSA Social Security Awards Best Security Podcast. For the past 12 years, we have successfully distributed security information through our blog, social media, lead generating webcasts, podcasts, and Internet TV.
Established in 2009, TVP Strategy is an analyst organization focused on analyzing, researching and reporting about virtualization and cloud trends that impact businesses today. Our analysts all ‘come from the trenches’ and therefore have a unique insight into how technology can deliver business value. We also have the battle scars to know how not to do things. This experience means we provide our clients with a variety of analytical content that can really move the needle for their business. Focusing primarily on the vendor community, TVP Strategy has delivered projects for premiere organizations within the cloud and virtualization space, including VMware, Veeam, HyTrust, Turbonomic, and, Puppet. We frequently attend, and speak at, some of the major industry events, such as VMworld, OpenStack Summit, DockerCon and many more. Reporting from these events provides our members and partners a level of insight that they could only obtain by attending in person.