Affiliates

Affiliate Board Advisors

Accenture is a global management consulting, technology services and outsourcing company, with more than 293,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$28.6 billion for the fiscal year ended Aug. 31, 2013. Its home page is www.accenture.com.

Email is the most popular communication tool and the entry point for up to 95% of security breaches. The Agari Email Trust Platform protects employees and their customers and trusted business partners from receiving untrusted and malicious emails. It is the only solution that verifies trusted email identities based on insight into 10 Billion emails per day to stop advanced email threats that use identity deception. Agari restores user confidence in their inbox.

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. Booz Allen is headquartered in McLean, Virginia, employs more than 25,000 people, and had revenue of $5.59 billion for the 12 months ended March 31, 2011. To learn more, visit www.boozallen.com. (NYSE: BAH)

For enterprises concerned about their exposure to increasing online risk, BrandProtect™ provides a complete suite of world class cyber threat detection analysis and intelligence services to monitor the entire social Internet spectrum and mitigate business risk arising from illegal, infringing, or threatening online activity.

BrandProtect deploys an unmatchable combination of advanced proprietary threat detection technology, along with a professional team of deeply experienced threat analysts to quickly identify, analyze, and mitigate cyber threats against intellectual property, physical locations, executives and employees, as well as reputational and compliance risks. These risks can occur as a result of online brand abuse, trademark infringement incidents, phishing attacks, web traffic diversions, website integrity issues, defamatory discussions and other fraudulent or unauthorized online activity. www.brandprotect.com

Deloitte’s Cyber Risk Services help complex organizations more confidently leverage advanced technologies to achieve their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. With deep experience across a broad range of industries, Deloitte’s more than 1600 practitioners provide advisory and implementation services, spanning executive and technical functions, to help transform legacy IT security programs into proactive Secure.Vigilant.Resilient. cyber risk programs that better align security investments with risk priorities, establish improved threat awareness and visibility, and strengthen the ability of organizations to thrive in the face of cyber incidents.

Learn more about Deloitte’s Cyber Risk Services

EY Advisory believes a better working world means helping clients solve big, complex industry issues and capitalize on opportunities to grow, optimize and protect their businesses. A global mindset, diversity and collaborative culture inspires EY consultants to ask better questions, create innovative answers and realize long-lasting results. The better the question. The better the answer. The better the world works. ey.com/fscyber

Flexera Software delivers market-leading Software Vulnerability Management solutions enabling enterprises to proactively identify and remediate software vulnerabilities, effectively reducing the risk of costly security breaches. Our solutions leverage verified vulnerability intelligence to drive prioritization, and technology to integrate assessment and remediation, bridging the gap between IT security and operations and streamlining critical processes. Serving more than 1,000 enterprise customers globally and leveraging proprietary vulnerability research that tracks more than 50,000 applications and systems, our solutions empower organizations to assess risk, prioritize resources and automate processes to continuously minimize the attack surface that could be exploited by cybercriminals and hackers.

IBM helps financial services firms gain insight and agility through information-led transformation. Forward thinking institutions will use these insights to transform their business within four imperatives: attract and retain customers, develop new revenue sources, streamline operations and pro-actively address risk and regulatory requirements. IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services supported by world-renowned IBM X-Force® research, enabling organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations comprising over 12 Security Operations Centers, 15 software security development labs and over 50 Cloud Data Centers in the United States, Europe, India and Asia Pacific. IBM Security monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.

Learn more: ibm.com/banking | ibm.com/security | securityintelligence.com

KPMG provides audit, tax and advisory services and industry insight to help organizations negotiate risks and perform in today's dynamic and challenging environments. KPMG’s advisory risk consulting professionals help organizations transform risk into enduring competitive advantage while navigating their most complex business issues. Our people offer deep knowledge and insightful opinions to help you enhance risk and create value in a dynamic environment in which outcomes must be managed strategically and with agility. KPMG’s client focus, commitment to excellence, global mind-set, and consistent delivery build trusted relationships that are at the core of our business and reputation. Our experienced IT security and forensic partners and professionals possess leading technical experience and are well regarded in their specialties. We have extensive experience building, delivering and supporting cybersecurity programs to Fortune 500 and Global 2000 companies across a multitude of industries. KPMG Cyber’s approach - Prevent, Improve, Detect, Respond -is designed to be simple and effective, and most importantly aligned with your business needs. For additional insights about KPMG’s Cyber Security Services please visit: advisory.kpmg.us/kpmg-cyber.html

MSA is a specialized security company that began in 1987 and has since grown into a recognized industry leader in high consequence threat protection and specialized training for corporate and government clients. MSA's team of security professionals - comprised of veteran members of the law enforcement, military, and business communities - provides unparalleled perimeter security, training and explosive detection services domestically and internationally. MSA combines hands-on experts with information and technology to provide our clients with the best resources for reducing their vulnerabilities to threats and protecting their personnel and property.

MSA has a robust operational protection capability that includes facility and perimeter security, executive protection, special event planning, WMD detection, and the largest privately owned single handler explosive detection canine company in North America. MSA's comprehensive consulting services consist of counterterrorism threat and intelligence analysis, risk and vulnerability assessment, maritime training and protection services, and physical security design. We also offer complete security systems design and integration, continuity of operations planning, and security program audits. Learn more: msasecurity.net

NC4 delivers safety and security solutions for both business and government organizations. NC4 revolutionizes how organizations and communities collect, manage, share and disseminate information to reduce cyber threats, fight crime, mitigate risks and manage incidents. NC4 also provides cyber threat sharing solutions both through secure collaboration services and recently (via Soltra Edge), through automated, structured, and standardized (STIX/TAXII) mechanisms..

NC4 currently provides services to the FS-ISAC through its secure collaboration portal and as the Soltra Edge cyber threat sharing repository. NC4 has also launched the Cyber Defense Network for Financial Services as an advanced community focusing on defensive actions..

NC4 solutions are used by private sector companies involved in financial services, high-tech, insurance, manufacturing, aerospace and defense, oil and gas, pharmaceuticals and healthcare, as well as other industries. In the public sector, NC4 solutions are used by federal, state and local agencies in homeland security, emergency management and law enforcement disciplines..

To learn more about how NC4 can benefit your organization, visit www.NC4.com or call 877-624-4999 or 310-606-4444.

PwC’s cybersecurity consulting team helps organizations understand dynamic cyber challenges, adapt and respond to risks inherent to their business ecosystem, and prioritize and protect the most valuable assets fundamental to their business strategy. For more information on PwC’s cybersecurity point of view, visit: www.pwc.com/cybersecurity.

About PwC’s Advisory Practice - PwC’s Advisory professionals help organizations improve business performance, respond quickly and effectively to crisis, and extract value from transactions. We understand our clients’ industries and unique business challenges, and look across the entire organization — focusing on strategy, structure, people, process and technology — to help clients build their next competitive advantage. See www.pwc.com/us/consulting for more information or follow us @PwCAdvisory.

About PwC US - PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 158 countries with more than 180,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/US. Learn more about PwC by following us online: @PwC_LLP, YouTube, LinkedIn, Facebook and Google +.

RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and, reduce business risk, fraud and cybercrime. RSA protects millions of users around the world and helps more than 90% of Fortune 500 companies thrive in an uncertain, high risk world. For more information, go to RSA.com or follow us on @RSAsecurity

Stroz Friedberg is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected and regulated business world. We are trusted advisers—a collection of the brightest minds in the fields of cybersecurity—who are leading experts in digital forensics, incident response, and security science; investigation; eDiscovery; and due diligence. We work proactively to minimize risk, and respond in real time to contain issues and crisis situations when the inevitable occurs. Our multi-disciplinary teams tackle the most complex, time-sensitive, and far-reaching issues and guide businesses through the maze of complexities found at the intersection of law, technology, investigations, compliance and security science. The skills, backgrounds, and integrity of our people, combined with our industry-leading proprietary incident response and digital forensics tools, are a powerful force when getting it right matters most. At Stroz Friedberg, we are united by a common goal — to maximize the health of an organization, ensuring its longevity, protection and resilience.

PPISC Affiliates
Affiliates

Founded in 2012 by cyber defense veterans, Adallom, a 2014 Gartner Cool Vendor, is a cloud access security broker which delivers visibility, governance and protection for cloud applications. Its innovative platform is simple to deploy, seamless to users, and is available as a SaaS-based or on-prem solution. Powered by SmartEngine(tm) advanced heuristics and backed by an elite cybersecurity research team, Adallom makes it easy to protect data in the cloud. For more information, visit www.adallom.com or follow @adallom.

Agio is a leading IT and Security Managed Services Provider, offering technology hosting, monitoring, management, disaster prevention and recovery, security, and other high-end technology services. With 130+ employees, Agio is headquartered in New York City with operational headquarters in Norman, OK. Learn more at agio.com.

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

AlienVault® has simplified the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault® Unified Security Management™, with the power of AlienVault’s Open Threat Exchange®, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource constrained IT teams.

Privately-held since 1983, Alvarez & Marsal (A&M) is a leading global professional services firm that delivers performance improvement, turnaround management and business advisory services to organizations seeking to transform operations, catapult growth and accelerate results through decisive action. With a dedicated team of senior professionals advising the financial services industry, A&M provides operational solutions to business leaders looking to unwrap the cyber black box. We work with our clients to identify risks in their evolving business objectives and assist in implementing business-focused cybersecurity strategies tailored for their enterprise risk management programs.

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred. Visit us at www.anomali.com

For fifteen years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on Arbor Networks for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with Arbor Networks.

Arxan, the global trusted leader of application protection solutions, delivers the confidence to build, deploy, and manage an organization’s most innovative and valuable applications. Currently protecting more than 1 billion application instances across industries including financial services, mobile payments, healthcare, automotive, gaming, and entertainment, the company provides the industry’s most comprehensive application protection solution. Unlike legacy security providers that rely on perimeter-based barriers to keep bad actors out, Arxan protects applications at the source and binary code level to expand the area of trust and provides a broad range of enterprise services and patented security capabilities such as code hardening, obfuscation, encryption, and whitebox cryptography. Founded in 2001, the company is headquartered in North America with global offices in EMEA and APAC.

Attivo Networks™ is the leader in dynamic deception technology with a strong customer base in financial, healthcare, and other industries that have a need to protect customer and company data from exfiltration. Attivo provides the real-time detection and visibility of inside-the-network and data center intrusions. The Attivo BOTsink® platform uses high-interaction deception to lure BOTs/APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures or database lookup to detect cyber attacks. Whether it is a reconnaissance or stolen credential attack, Attivo provides the forensics required to stop current and prevent future attacks. www.attivonetworks.com

Founded in 2010 by principals from Postini, Authentic8 is redefining how the browser is used to access sensitive web data. Silo, our flagship product, is a secure, remote browser. Silo secures access to sensitive sites, creating an insulation layer between the computer and the web service. Silo helps manage login credentials, access controls and data use policies. Silo is built fresh at session start, and destroyed at session end, ensuring that users remain secure, compliant, and anonymous online. Try Silo risk free at www.authentic8.com

The Awake Security Investigation Platform enables rapid, iterative and conclusive alert investigations and hunting by placing the context security teams need at their fingertips. This patent-pending platform builds on more than two years of R&D with over 200 security teams. Using proprietary behavioral analytics and machine learning, Awake extracts often ignored signals from full packet capture and other data sources to create a Security Knowledge Graph™. By automatically pre-correlating, profiling and tracking assets including devices, users and domains it surfaces notable behaviors previously difficult or impossible for the security team to consume. Gathering this context manually, if even possible, can take hours combing through dozens of data sources. As a result, Awake closes the investigation gap, delivering customers a 10X improvement in time to truth when responding to threats.

BAE Systems Applied Intelligence helps nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.

We do this using our set of solutions; systems, experience and processes - often collecting and analyzing huge volumes of data. These, combined with our Cyber Special forces - some of the most skilled people in the world, enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems.

We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA. For further information, visit www.baesystems.com/businessdefense.

Baffle™, the application data protection company, prevents data breaches by securing the end-to-end data access model for applications and databases. Using this method, the technology protects against some of the most recent high-profile attacks and vulnerabilities including Spectre and Meltdown. With its patent-pending technology, Baffle is the only company that can enable encryption of data at-rest, in use, in memory and in the search index without impacting the application and uses AES encryption. Baffle is also the first company to enable secure data processing on a commercial application and database to guarantee data protection.

BeyondTrust® is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks.

We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your organization goes.

BeyondTrust's security solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

The Bitglass Cloud Access Security Broker (CASB) solution provides enterprises with end-to-end data protection from the cloud to the device. It deploys in minutes and works with any cloud app on any device.

Bitglass enables enterprises to secure cloud apps like Office 365 and Salesforce, and internal apps like Exchange and Sharepoint. Corporate data security policies can be enforced across multiple cloud services. Mobile devices can be protected without the hassles of MDM.

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third-party risk, benchmark performance, and assess and negotiate cyber insurance premiums.

BlackBerry is a mobile-native security software and services company dedicated to securing people, devices, processes and systems for today's enterprise. Based in Waterloo, Ontario, the company was founded in 1984 and operates in North America, Europe, Asia, Middle East, Latin America and Africa. The Company trades under the ticker symbols "BB" on the Toronto Stock Exchange and "BBRY" on the NASDAQ. For more information, visit www.BlackBerry.com.

Created for and used by the US intelligence community, BluVector answers the challenge of too much disparate data in too many places requiring sequential handoffs between humans. Using state-of-the-art machine learning and AI technology – in combination with existing investments - BluVector massively accelerates and automates the process of correlating, prioritizing and reporting on even the newest and most sophisticated threats, in minutes rather than months, so that security staff can anticipate and stop the threat before damage is done. Join the Hunt – www.bluvectorcyber.com.

Blueliv is a leading cyber threat intelligence provider with a world-class in-house Labs team. We scour the web, the deep web and the dark internet to deliver fresh, automated and actionable threat intelligence to organizations across multiple industries to protect their networks from the outside in. Our scalable cloud-based platform turns global threat data into sophisticated and relevant intelligence, enabling organizations to save time and resource by improving their incident response performance and empowering Security Operations team with real-time intelligence. Quantify and qualify malicious attack vectors with our plug and play MRTI feed; delivered in STIX/TAXII standard, integration is easy.Blueliv.com

Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware and business email compromise. Today, this is all made real for thousands of global organizations. Learn more

Context is a leading cyber security consultancy with a comprehensive portfolio of advisory and advanced technical services, from cyber strategy and risk assessments, penetration testing and assurance to incident management and response, training and technical security research. We focus on helping clients avoid potential breaches and to deter, detect and respond to the most sophisticated cyber-attacks. Established in 1998, Context’s client base includes some of the world’s leading blue chip companies, alongside public sector and government organisations. With offices in the UK, Australia, Germany and USA, Context is ideally placed to work with clients worldwide.

Hundreds of services used by employees are not protected by the security platforms enterprises use. In the quest for agility, great user experience, and productivity, users connect to services through any infrastructure on private devices, entirely bypassing security.

Integrating these services into the current security infrastructure is often complex, slow, expensive, isn’t scalable and sometimes, unnecessary.

Coronet provides an alternative to heavy integration: An all-in- one cloud based security platform that enables the enterprise to introduce services in minutes, with zero impact on user experience, at a fraction of the cost.

By enabling employees to securely use any internal or SaaS service on any device using any infrastructure - without integration efforts, Coronet empowers the user’s productivity while enabling the enterprise’s ability to maintain needed security.

CrowdStrike is the leader in cloud-delivered endpoint protection. The CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. CrowdStrike Falcon seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed. CrowdStrike Falcon protects customers against all cyberattack types, using sophisticated signatureless artificial intelligence/machine learning and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates more than 70 billion security events from across the globe to immediately prevent and detect threats.

Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide.

Cylance’s award-winning product, CylancePROTECT™, stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. CylancePROTECT is a radically different technological approach to cybersecurity that employs artificial intelligence to analyze the DNA of files before they execute.

Complementing CylancePROTECT are professional services that provide pre-attack penetration and vulnerability testing, compromise assessments and post-attack incident response. Cylance specializes in securing critical infrastructure and key resources for education, energy, financial services, government, healthcare, heavy industry, oil and gas, retail, technology, and other industries.

Standing apart from a cybersecurity industry reliant upon an outdated detection and response model, Cylance secures through prediction and pre-response at the enterprise endpoint, preventing malware and advanced persistent threat breaches before they cause harm.

Founded in 2014, Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. The company is backed by leading investors such as Y Combinator and Sherpa Capital, and has already gained traction throughout the InfoSec community and global media.

DefenseStorm is a security data platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective. Built from the ground up in the cloud, DefenseStorm unifies detection, investigation, reporting, and compliance into a single place to manage cybersecurity data. Formed by bankers and technology experts, DefenseStorm aggregates event data across all cybersecurity tools and links policies to real-time alerts, so that financial institutions can prove to regulators they are both secure and compliant with evolving FFIEC cybersecurity requirements. For more information please visit www.DefenseStorm.com.

DFLabs is a Technology and Services company specialized in Cyber Security Incident and Data Breach Response. Our mission is: eliminating the complexity of Cyber Security Incident and Data Breach, reducing reaction time and risk exposure. In other words: Cyber Incidents Under Control.

With this goal in mind, we ve created IncMan NG, the cutting edge technology platform for managing and responding to cyber incidents and share intelligence. IncMan has been created for SOC and CSIRT orchestration, and It is currently being used by many Fortune 100/1000, and Financial Services Institutions worldwide.

More info here.

Since 1999, Digital Defense, Inc., (DDI) has assisted financial organizations to protect sensitive data through managed security risk assessment solutions. DDI has received numerous industry recognitions including a top 25 ranking in Cybersecurity Ventures’ listing of the World’s 500 Hottest Cybersecurity Companies, and inclusion in CSO Outlook’s Top 10 Network Security Companies and CIO Review’s 20 Most Promising Cyber Security Solutions. Vulnerability scanning, penetration testing, and security awareness training are DDI’s most popular offerings, each of which proactively improves the security of an organization. DDI’s unique Vulnerability Management as a Service (VMaaS) delivery model helps organizations bolster information security.

Digital Guardian's unique data awareness and transformative endpoint visibility, combined with network security, behavioral threat detection and response, and cloud data protection secures organizations' sensitive data by enabling a data centric security strategy. The company's flagship product, the Digital Guardian Data Protection Platform, is purpose built to stop data theft and performs across the network, traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. This platform is recognized as a leader in the 2016 Gartner Magic Quadrant for Enterprise Data Loss Prevention.

Distil Networks, the global leader in bot detection and mitigation, is the only easy and accurate way to protect web applications from bad bots, API abuse, and fraud. With Distil, you automatically block 99.9% of malicious traffic without impacting legitimate users.

Distil Web Security defends websites against web scraping, brute force attacks, competitive data mining, account takeovers, online fraud, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.

Distil API Security protects all types of APIs including those serving web browsers, mobile applications, and Internet of Things (IoT) connected devices. Distil API Security defends APIs against developer errors, integration bugs, automated scraping, and web and mobile hijacking.

For more information on Distil Networks, visit us at www.distilnetworks.com or follow @DISTIL on Twitter.

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Many large financial services institutions, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.

Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection.

EclecticIQ helps organizations turn cyber threat intelligence into business value with a suite of products built for cyber security professionals in threat intelligence, threat hunting, SOC, and Incident Response roles. EclecticIQ Platform is the analyst-centric threat intelligence platform based on STIX/TAXII that meets the full spectrum of intelligence needs. EclecticIQ Fusion Center enables the acquisition of thematic bundles of human-qualified cyber threat intelligence from leading suppliers with a single contract. Learn more at www.EclecticIQ.com. and follow us on @EclecticIQ for daily threat news.

Endgame's converged endpoint security platform is transforming security programs - their people, processes and technology - with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors at scale with a single agent. For more information, visit www.endgame.com and follow us on Twitter @EndgameInc.

Fastly helps the world’s most popular digital businesses keep pace with their customer expectations by delivering fast, secure, and scalable online experiences. Businesses trust the Fastly edge cloud platform to accelerate the pace of technical innovation, mitigate evolving threats, and scale on demand. Founded in 2011, Fastly serves 14 trillion requests each month, more than 10 percent of all internet requests. Learn more at Fastly.com and follow us on Twitter @fastly.

FICO is a leading analytics software company, helping businesses in 80+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. FICO provides analytics software and tools across multiple industries to manage risk, fight fraud, build profitable customer relationships, optimize operations and meet strict government regulations.

Flashpoint delivers Business Risk Intelligence (BRI) to empower business units and functions across organizations with a decision advantage over potential threats and adversaries. The company’s sophisticated technology and human-powered analysis enable enterprises and public sector organizations globally to bolster cybersecurity, confront fraud, detect insider threats, enhance physical security, assess M&A opportunities, and address vendor risk and supply chain integrity. Flashpoint is backed by Georgian Partners, Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information, visit www.flashpoint-intel.com or follow us on Twitter at @FlashpointIntel.

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people's intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.

Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Fortinet hardware and virtual solutions are recommended by NSS Labs and with over 2.5M threat sensors worldwide, are reinforced by FortiGuard Labs, a team of over 200 cyber-security researchers focused solely on industry threat research, analytics, and intelligence for preventing and detecting the latest attacks while delivering incident response. Fortinet provides broad, high-performance protection against dynamic security threats whether inside the perimeter or out and custom ASIC technology radically increases throughput 5 - 10X more than other solutions, enabling the world's first 1 terabit per second throughput firewall.

Global cybersecurity leader Fox-IT's 200+ employees create solutions for a more secure society. Dedicated to clients, and our integrity, Fox-IT delivers solutions before, during and after attacks. InTELL provides global visibility into on-line threats. Our world-wide customers value the unique context and attribution. Our rich STXI/TAXII feeds power their defenses. DetACT delivers real-time web and mobile event analytics, detecting attacks and anomalies to on-line channels. It is the only solution to detect and stop past and present channel attacks like Dyre & Dridex in real-time. Powered by intelligence, it provides 100% visibility, allowing companies to be in full control.

Genpact (NYSE: G) stands for "generating business impact." We design, transform, and run intelligent business operations including those that are complex and specific to a set of chosen industries. The result is advanced operating models that foster growth and manage cost, risk, and compliance across a range of functions. We have hundreds of long-term clients including more than one-fourth of the Fortune Global 500 and currently employ over 66,000 employees in 25 countries, with key management and corporate offices in New York City. Behind our passion for process and operational excellence is the Lean and Six Sigma heritage of a former General Electric division that has served GE businesses for more than 16 years.

How financial services organizations build software. Teams across the financial services industry use GitHub to build secure software that doesn’t compromise on collaboration or customer experience. With security built into their process, teams can move fast, embrace user-driven development, and make customers happy—all while maintaining the highest regulatory standard. https://github.com.

HackerOne is the no.1 vulnerability disclosure and bug bounty platform, connecting organizations with the world’s largest community of trusted hackers. More than 800 organizations, including The U.S. Department of Defense, General Motors, Intel, Uber, Twitter, GitHub, Nintendo, LendingClub, Lufthansa, Panasonic Avionics, Qualcomm, Square, Starbucks, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before criminals can exploit them. HackerOne customers have resolved more than 50,000 vulnerabilities and awarded more than $20M in bug bounties. HackerOne is headquartered in San Francisco with offices in London, Seattle, Los Angeles and the Netherlands.

iboss has created the first and only web gateway as a service specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, the iboss Distributed Gateway Platform leverages an elastic, cloud-based node architecture that provides advanced security for today’s decentralized organizations with more financial predictability. Backed by more than 110 patents and patents pending, and protecting over 4,000 organizations worldwide, iboss is one of the fastest growing cybersecurity companies in the world. To learn more, visit iboss.com.

Illumio, the leader in micro-segmentation, prevents the spread of cyber threats inside data centers and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, Workday, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. Illumio’s Adaptive Security Platform™ uniquely protects critical information with real-time application dependency mapping and micro-segmentation that works in any data center, public cloud, or across hybrid deployments on bare-metal, virtualization, and containers. For more information about Illumio, visit www.illumio.com/what-we-do and follow us @Illumio.

illusive networks is pioneering deception-­based cybersecurity. Its patent pending Deceptions Everywhere® technology neutralizes targeted attacks and Advanced Persistent Threats (APT). By creating a deceptive layer across the entire network — agentlessly deployed on every endpoint, server, and network component — illusive networks disrupts and detects breaches with real-­time forensics and without interrupting business. Learn more at www.illusivenetworks.com

Infoblox delivers Actionable Network Intelligence to enterprises, government agencies, and service providers around the world—Including 7 of the top 10 telecommunications providers, 8 of the top 10 retailers, 8 of the top 10 major banks, and 9 of the top 10 automakers. As the industry leader in DNS, DHCP, and IP address management (DDI), Infoblox provides control and security from the network core. We’re empowering thousands of organizations to pursue the big initiatives that drive business success today—next-generation data centers, security, compliance, and digital transformation—and to achieve increased efficiency and visibility, reduced risk, and better customer experience.

Intel 471 provides unique, high-value actor-centric cyber threat intelligence collection in support of our customers’ information security operations. Whilst some companies may offer indicators/feeds as threat intelligence, Intel 471 focuses on the individual threat actors and groups that pose a threat to your organization and sector.

Intel 471 employs specialists on the ground globally who are experts in their region and is incorporated in the United States.

Intel 471 provides two products accessible via a web portal and API:
Cyber Crime – Covers cyber threat activity from financially motivated cyber criminals.
Hacktivism – Covers cyber threat activity from politically motivated cyber criminals.

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.


IntSights is redefining cyber security with the industry’s first and only enterprise threat management platform that transforms tailored threat intelligence into automated security operations. Our groundbreaking data-mining algorithms and unique cyber reconnaissance capabilities continuously monitor an enterprise's external digital profile across the surface, deep and dark web, categorize and analyze tens of thousands of threats, and automate the risk remediation lifecycle -- streamlining workflows, maximizing resources and securing business operations. This has made IntSights’ one of the fastest growing cybersecurity companies in the world. IntSights’ has offices in Amsterdam, Boston, New York, Dallas and Tel Aviv. To learn more, visit: https://www.intsights.com.

KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using mock attacks, engaging interactive training, continuous assessment through simulated phishing, vishing and smishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Thousands of organizations use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance. Learn more at www.KnowBe4.com

Kroll is the leading global provider of risk solutions. For more than 40 years, Kroll has helped clients make confident risk management decisions about people, assets, operations and security through a wide range of investigations, cyber security, due diligence and compliance, physical and operational security and data and information management services. Headquartered in New York with more than 35 offices in 20 countries, Kroll has a multidisciplinary team of nearly 1,000 employees and serves a global clientele of law firms, financial institutions, corporations, non-profit institutions, government agencies and individuals.

Lookingglass Cyber Solutions delivers unified threat protection against sophisticated cyber attacks to global enterprises and government agencies by operationalizing threat intelligence across its end-to-end portfolio. Scalable threat intelligence platforms and network-based threat response products consume our machine-readable data feeds to provide comprehensive threat-driven security. Augmenting the solutions portfolio is a worldwide team of security analysts who continuously enrich our data feeds and provide customers unprecedented understanding and response capability into cyber, physical and 3rd party risks. Prioritized, relevant and timely insights enable customers to take action on threat intelligence across the different stages of the attack life cycle. Learn more at lookingglasscyber.com/.

The ManTech Commercial Services (MCS) and the ManTech Advanced Cyber Range Environment (ACRE) highly skilled experts are equipped to provide collaborative solutions to critical cyberproblems. The MCS innovative approach increases efficiency and lowers costs while incorporating your businesses current process and tools within ManTech’s architecture methodology. The ACRE is a unique physical and virtualized facility that brings best-in-class cyberdefense expertise to a new generation of professionals. Collaborative solutions include compliance and log retention, security information and event management and security operations center supplement or replacement, risk reduction, insider threat, information assurance, cyber-range customization and hands-on cybertraining. mantech.com/cyber

The Media Trust is the global leader in protecting the online and mobile environment. Functioning as a security operations center for the world’s most heavily-trafficked websites, The Media Trust monitors digital properties from the consumer perspective to detect web-based anomalies.

Clients access this original source, real-time malware data through a threat intelligence feed or SaaS-based solution to secure networks, protect websites and mitigate the risk of everyday employee internet use.

More than 500 enterprises and digital publishers—including 41 of comScore's AdFocus Top 50 web properties—rely on our comprehensive suite of detection and alerting services to protect their digital properties, their revenue and, most importantly, their brand. Learn more at www.TheMediaTrust.com.

Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors. The company’s patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security products can be deployed in the public or private cloud and are trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Company headquarters are in Menlo Park, California. For more information, please visit www.menlosecurity.com or @menlosecurity.

Netskope™ is the leading cloud access security broker (CASB). Netskope gives IT the ability to find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence.

NetSPI helps enterprises tackle today’s dynamic security challenges. Using industry-vetted solutions, integrated technologies, and trusted expertise, the company enables top-tier IT organizations to build more efficient processes, more stable application development lifecycles, and more responsive teams. NetSPI’s proven vulnerability management platform, CorrelatedVM®, automates basic testing and tracking, data integration and correlation, and cross-team communication and collaboration to save valuable time and increase efficiencies by 30% or more. Trusted by today’s Fortune 500, NetSPI’s integrated, proactive security strategy helps identify 20% more vulnerabilities and (more importantly) identify and mitigate the most critical threats to your business. Learn more at www.netspi.com.

NowSecure is the mobile app security software and services company trusted by the world’s most demanding organizations and most advanced security teams. Only the NowSecure Platform delivers automated 360-degree coverage of mobile app security testing 8X faster and 3X deeper than any alternative. The NowSecure Services team of accomplished mobile security experts delivers comprehensive app security testing program development, penetration testing, and training services for enterprise mobility security. NowSecure identifies the broadest array of security, privacy, and compliance gaps in custom, third-party, and business-critical mobile apps through its unrivaled threat research team, superior testing and analysis, and multiple deployment models.

NSS Labs, the security insight company, is trusted by the world's largest and most demanding enterprises to help make their organizations more secure. Focused exclusively on IT security, NSS provides CEOs, CIOs, CISOs, and information security professionals with data-driven insight to help them make informed security decisions. NSS' heritage is its best-in-class security product testing laboratory, which offers in-depth test reports as well as research and analyst services. This expertise is the premise for its Cyber Advanced Warning System™ - the industry's revolutionary cloud-based security and risk management platform designed to identify and expose active threats that matter. For more information visit: www.nsslabs.com

At Palo Alto Networks, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. As the next-generation security company, we are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud. View our website for more information.

Your biggest asset is also your biggest risk. Whether it is trusted third parties, privileged users, or business users, people – and the lack of visibility many security teams have into their actions - pose the biggest security challenge to organizations. Insiders present a massive risk because they have been given access to critical applications, systems and data to do their jobs. With more than 1,700 global customers across all major verticals, ObserveIT is the only insider threat management solution that empowers security teams to detect insider threats, streamline the investigation process, and prevent data exfiltration.

Phantom is the first community-powered security automation and orchestration platform. It integrates your existing security technologies, providing a layer of connective tissue between them. The Phantom platform helps you work smarter by automating repetitive tasks, effectively force multiplying your team’s efforts and allowing them to focus their attention on mission-critical decisions. It also helps you respond faster and reduce dwell times with automated detection, investigation, and response. Using Phantom helps you strengthen your defenses by integrating your entire security infrastructure together so that each part is actively participating in your defense strategy. For more information visit: phantom.us.

PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial-of-service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust. To learn more contact us at info@phishlabs.com or 1-877-227-0790. Visit www.phishlabs.com, read The Phishlabs Blog, and follow PhishLabs on Twitter and LinkedIn.

Pindrop Security provides enterprise solutions that help prevent phone-based fraud and provide phone authentication. Pindrop’s breakthrough phoneprinting technology can identify phone devices uniquely based on only the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop’s customers include two of the top five banks and two of the leading online brokerages. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions. View their website for more information.

Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that couples User and Entity Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com

Recently named a Leader in the Gartner Magic Quadrant for IT Vendor Risk Management, Prevalent, is helping global organizations manage and monitor the security threats and risks associated with third and fourth-party vendors. Prevalent introduced the only unified platform for Third-Party Risk Management and the first vendor evidence sharing portal that enables collaboration between both enterprises and vendors. Prevalent is the chosen platform powering the NH-ISAC CYBERFIT(tm) Shared Risk Assessments program and was named the Fastest Growing Cybersecurity Company by the 2017 Cybersecurity Excellence Awards. For more information regarding Prevalent, visit www.prevalent.net.

Proofpoint - As advanced threats increase in frequency and sophistication, it’s never been more important to secure your financial organization's email, by far the number one threat vector. Proofpoint, positioned by Gartner in the Leaders Quadrant in their 2015 Magic Quadrant for Secure Email Gateways, uniquely combines a world class email gateway solution with the industry’s leading Targeted Attack Protection technology, catching and stopping cyber threats from malicious links and attachments hours or even days before traditional defenses.

Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders confidently face the future. Protiviti and our independently owned Member Firms provide consulting solutions in finance, technology, operations, data, analytics, governance, risk and internal audit to our clients through our network of more than 70 offices in over 20 countries.

We have served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index.

Quann, formerly known as e-Cop, is a Singapore-based cyber security services provider and a business unit of security organisation Certis Group.

Quann has been in the cyber security business for over 15 yeas and is now a leading regional managed security services provider in Asia Pacific. Quann's circle of protection delivers end-to-end cyber security solutions that prevent, detect and rapid respond to cyber attacks through four service pillars - Quann Consult, Quann Empower, Quann Protect, and Quann Rescue.

It is one of the largest cyber security service providers with more than 300 certified security professionals and multiple ISO/IEC 27001 certified, in-country, next generation Security Operations Centres (SOCs) running on patented technologies.

For more information, visit www.quannsecurity.com.

Recorded Future delivers threat intelligence powered by patented machine learning to significantly lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to security alerts 10 times faster. To supercharge the efforts of analysts and SOC teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources. Recorded Future delivers measurably more context than threat feeds alone, updates in real time so intelligence stays relevant, and packages information ready for human analysis or instant integration with existing security technology. 86% of the Fortune 100 use Recorded Future.

RiskIQ provides organizations the visibility and intelligence they need to secure their Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of managed, unmanaged and rogue web and mobile assets. This “Digital Footprint” is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com.

SailPoint, the undisputed leader in identity governance, brings the Power of Identity™ to enterprise customers around the world. SailPoint’s open identity platform gives enterprises the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis – securely and confidently. The company pioneered the identity governance market, and provides an integrated set of cloud-based services, including compliance controls, provisioning, password management, single sign-on and data access governance, all built on the belief that identity is a business enabler. SailPoint's customers are among the world’s largest companies in virtually every industry.


Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills and tools to write secure code from the beginning.

We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and Asia Pacific. 

SecureWorks provides an early warning system for evolving cyber threats, enabling organizations to prevent, detect, rapidly respond to and predict cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimizes risk and delivers actionable, intelligence-driven security solutions for clients around the world.”

To learn more, visit www.secureworks.com

At Security Compass, we have extensive cross industry knowledge, technical prowess, and have developed the right expert tools to predict, plan  and prevent a security breach. We guide your team in building a customized security blueprint based on your industry, software development  lifecycle, and business needs to cost-effectively mitigate risks. For more information, visit www.securitycompass.com, or read the Security Compass Blog.

Since 2002, Security Innovation has been helping financial services organizations reduce enterprise risk where they are most vulnerable - at the application layer. We have trained development teams on code security, mitigated risk in critical applications, and improved processes by which applications are built for customers like HSBC, Charles Schwab, Guardian, Capitol One, Metlife and others. The company's flagship CMD+CTRL training platform offers the industry's largest secure development library and a cyber range for staff to hone security skills in real-world banking and e-commerce applications. In a heavily regulated industry where standards such as PCI DSS & OWASP demand the safeguarding of sensitive data, we understand compliance, and the need to go above and beyond standard regulations to prevent malicious attacks. We can help you develop secure applications and avoid the risk of a data breach.For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.

ServiceNow was started in 2004 with the belief that getting simple stuff done at work can be easy, and getting complex multi step tasks completed can be painless. From the beginning, ServiceNow envisioned a world where anyone could create powerful workflows to get enterprise work done. Today, ServiceNow’s cloud-based platform simplifies the way we work through a structured security response engine. ServiceNow Security Operations automates, predicts, digitizes, and optimizes security and vulnerability response to resolve threats quickly based on business impact. Reduce manual processes and increase efficiency across security and IT teams. ServiceNow is how work gets done.

Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

Skyhigh Networks, the cloud security and enablement company, helps enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, Comcast, DIRECTV, HP, and Western Union use Skyhigh to gain visibility into all cloud services in use and their associated risk; analyze cloud usage to identify security breaches, compromised accounts, and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring.

Every day, developers rely on millions of third party and open source building blocks — known as components — to build the software hat runs our world. Sonatype ensures that only the best components are used throughout the development lifecycle so that organizations don't have to make the  tradeoff between going fast and being secure. Policy automation, ongoing monitoring and proactive alerts makes it easy to have full visibility and control of components throughout the software supply chain so that applications start secure and remain that way over time. Learn more at www.sonatype.com or in this FS-ISAC Third Party Software Working Group whitepaper (Control Type 3).

Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Symphony is the cloud-based messaging and collaboration platform that connects markets, organizations and individuals, securely. Powered by an open and growing app ecosystem, and protected with customer-owned encryption keys, Symphony’s communication platform increases workflow productivity while facilitating global regulatory compliance. Already the platform of choice for the financial services industry, Symphony eliminates inefficient workflows to boost productivity in information-driven businesses. Founded in October 2014 and headquartered in Palo Alto, CA, the company has offices in New York, Hong Kong, Singapore, Stockholm and London.

Based in Redwood City, California, Synack is a security company revolutionizing how enterprises view cybersecurity: through a hacker’s eyes. Synack’s hacker-powered security platform arms clients with hundreds of the world’s most skilled, highly vetted ethical hackers who provide a truly adversarial perspective of clients’ IT environments. Synack’s confidential client base is comprised of some of the largest F500/G500 enterprise organizations across banking and financial services, healthcare, consumer goods and retail, manufacturing, technology and the U.S. Federal Government. All engagements are conducted by Synack’s vetted skilled professionals and are treated with absolute privacy. Synack was founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO. For more information, please visit www.synack.com.

Synopsys offers the most comprehensive solution for integrating security and quality into your SDLC and supply chain. Whether you’re well-versed in software security or just starting out, we provide the tools you need to ensure the integrity of the applications that power your business. Our holistic approach to software security combines best-in-breed products, industry-leading experts, and a broad portfolio of managed and professional services that work together to improve the accuracy of findings, speed up the delivery of results, and provide solutions for addressing unique application security challenges. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure software. For more information go to www.synopsys.com/software.

Our vision is to put security at the heart of everything you do, from securing your digital environment to enabling your people to become your strongest line of defence. As your global security partner, we provide your business with tailored solutions to build resilience, safeguard operations and empower growth. By combining technical expertise with human ingenuity, we have a heightened understanding of you and your adversary. Our diverse background and inquisitive mindset allow us to tackle each and every challenge in a thorough and agile way. We are Tempest, Intelligence Led, Security Focused. www.tempestsi.com

TITUS solutions enable organizations to discover, classify, protect, analyze and confidently share information. Organizations can use TITUS products to meet regulatory compliance requirements by identifying and securing unstructured data – on the desktop, on mobile devices, and in the cloud. Millions of users in over 120 countries around the world trust TITUS to keep their data compliant and secure. Its customers include Safran Morpho, United States Air Force, NATO, Pratt and Whitney, and Canadian Department of National Defence. Additional information is available at TITUS.com.

ThreatConnect® arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry's only intelligence-driven, extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis and automation needs of security teams at any maturity level. More than 1,600 companies and agencies worldwide deploy the ThreatConnect platform to fully integrate their security technologies, teams, and processes with relevant threat intelligence resulting in reduced detection to response time and enhanced asset protection. To register for a free ThreatConnect account or learn more, visit: www.threatconnect.com.

ThreatQuotient Inc. (TQI) was founded in March 2013 and is dedicated to revolutionizing cyber defense capabilities by building analyst-driven applications, helping organizations manage threat intelligence and therefore defending against sophisticated cyber attacks. Our foundation is built from our operational experience to deliver a relevant vendor agnostic on-premise deployment – allowing analysts to spend more time on high-value processes rather than transferring intelligence across multiple cloud solutions and internal platforms. ThreatQ will advance threat information management through end-to-end automation that transforms disparate data into ACTIONABLE intelligence. Because of its power and ability to provide defenders with critical contextual information, ThreatQ is becoming a team’s cornerstone tool.

Transmit Security allows organizations to implement frictionless omni-channel authentication without making any modifications to their applications. The company’s technology supports any authentication technology, from any vendor, in one modular, micro-services platform that enables application owners to slash time-to-market and cost-to-market for new identity related projects. Transmit Security’s founders created Trusteer (now IBM Security) and Imperva (IMPV on NYSE). The company’s research and development team is made up of former members of Unit 8200, the elite Israeli Intelligence Corps. Transmit Security is self-funded, and based in Boston and Tel-Aviv. For more information visit http://www.transmitsecurity.com/ or follow us on Twitter @TransmitSec.

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. With over 5,000 employees in over 50 countries, and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud. Visit www.trendmicro.com.

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire's portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.

Trusona , the world’s only insured authentication, offers organizations a suite of secure no password solutions. From no typing registration to frictionless login and protected transactions, Trusona has become the standard for securing all phases of digital life for consumers and employees. By taking the pain out of security, Trusona provides a simple online experience, keeping your organization secure and your clients safe. Trusona is leading the #NoPasswords Revolution where there are no passwords to be created, remembered, stolen, or compromised - ensuring people are who they say they are and no one else can. For more information visit www.trusona.com.

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing. We break down security operations silos, helping you achieve real-time enterprise threat awareness to expedite investigation and know what’s coming next.

Many products are too focused on aggregating feeds, and not focused enough on how we can operationalize data. Any meaningful insight is distorted by information overload.

At TruSTAR, we make your data more meaningful by creating custom workflow systems for users and groups so that you can share information and make decisions faster.

Unbound applies revolutionary breakthroughs in mathematics to allow secrets to be used without ever being exposed, thus ensuring digital assets are safe—anytime, anywhere. Unbound is reinventing the future of security and privacy, enabling business to deliver with unprecedented speed and scale a new world of digital products and services which were previously beyond reach. www.unboundtech.com

ValiMail has developed the world's first cloud service that fully automates email authentication, giving our customers brand and fraud protection across 4.8 billion mailboxes worldwide. ValiMail enables organizations to stop phishing attacks, control shadow email, and improve the reputation of their email domain. ValiMail's patented, standards-compliant technology provides the only zero-administration solution to enable trusted email for enterprises. Customers include Uber, Fannie Mae, Yelp, Twilio, Time Warner, Square, OpenTable, and City National Bank. Founded in 2015, ValiMail is based in San Francisco and is backed by Shasta Ventures, Flybridge Capital Partners, and Bloomberg Beta. For more information visit www.valimail.com.

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise's financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.

Venafi is the market leading cybersecurity company in Next-Generation Trust Protection (NGTP). As a Gartner-recognized Cool Vendor, Venafi delivered the first Trust Protection Platform™ to secure cryptographic keys and digital certificates that every business and government depend on for secure communications, commerce, computing, and mobility. Today organizations that blindly trust keys and certificates are at increased risk of costly attacks, data breaches, audit failures and unplanned outages.

As part of any enterprise infrastructure protection strategy, Venafi TrustAuthority™ and Venafi TrustForce™ help organizations regain control over trust in the cloud, on mobile devices, applications, virtual machines and network devices by protecting Any Key. Any Certificate. Anywhere™. Venafi Threat Center provides primary research and threat intelligence for trust-based attacks.

CA Veracode, part of CA Technologies, enables the secure development and deployment of the software powering the application economy.

With its combination of automation, process and speed, CA Veracode seamlessly integrates into the software lifecycle, so enterprises realize the advantages of DevOps while ensuring secure code is synonymous with high-quality code. Learn more at www.veracode.com.

Virtru is a data security company that protects corporate information from unauthorized access. Our patented technology eliminates the tradeoff between data protection and ease of use by seamlessly integrating directly into platforms like Microsoft Outlook and Office 365, Google G Suite, and other SaaS applications. More than 7,000 customers trust the Virtru Data Protection Platform to easily protect and control sensitive information wherever it's created, stored, or shared.

Wapack Labs is a cyber intelligence and threat analysis company that provides early warning and threat detection services for customers worldwide. Unlike feed aggregators, they add meaning to the deluge of data CISOs and enterprise defenders struggle to deal with, provide context, and produce intelligence reports that help you make sound business and security decisions. Wapack Labs has developed a suite of products, services and training that can provide information security professionals the edge they need to prepare for ever increasing cyber threats.

To read the Affiliate Terms and Conditions (pdf), Click Here.