Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions that help organizations streamline and consolidate their security and compliance solutions and build security into digital transformation. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously across global IT assets.
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system.
Darktrace is a world-leading cyber-threat defense company. Its Enterprise Immune System technology automatically detects and responds to threats, powered by machine learning and mathematics developed by specialists.
Expanse provides real-time monitoring of the entire global Internet for customers’ assets. In a new era of distributed machine-speed attacks, we help the world’s most sophisticated organizations define and secure their dynamic network edge. Expanse’s customers include Fortune 500 companies and major government agencies focused on making the Internet a strategic asset instead of a liability.
Illumio, the leader in micro-segmentation, prevents the spread of breaches inside data center and cloud environments. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers.
Malwarebytes protects businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide.
OneTrust is the largest and most widely used dedicated privacy management technology platform for compliance with global privacy laws. More than 2,000 customers, including 200 of the Global 2,000, use OneTrust to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR, ePrivacy (Cookie Law) and the California Consumer Privacy Act.
Palo Alto Networks is the global cybersecurity leader who’s mission is to protect your way of life in the digital age by preventing successful cyberattacks. By delivering a true platform and empowering a growing ecosystem of change - Palo Alto Networks provides you highly effective and innovative cybersecurity across clouds, networks, and mobile devices.
Sophos makes IT security simple. Focused on innovation in next-generation protection, Sophos solutions are simple to deploy, maintain, and manage, enabling organizations to protect and defend their networks, their information, and their people. Sophos — Cybersecurity made simple
Webroot was the first to harness the cloud and artificial intelligence to protect businesses and individuals against cyber threats. As the number one security vendor for MSPs and SMBs, we provide superior endpoint protection, network protection, and security awareness training, and our threat intelligence is used by market leading companies like Cisco, F5 Networks, Citrix, and more. Discover Smarter Cybersecurity® solutions at www.webroot.com.
At BAE Systems Applied Intelligence, we help nations, governments, and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and keep their critical information and infrastructure secure.
We are an ecosystem-driven company dedicated to helping technology solution providers (TSPs) thrive. We connect TSPs to solutions and services that drive amazing user experiences. The ConnectWise applications, support, community, and ecosystem of integrations help maximize the efficiency of your team by enabling you to do more for your customers.
The iboss cloud secures user Internet access on any device, from any location, in the cloud. Shift the focus from following perimeters to following users so that consistent cloud security is applied while users are in the office or on the road.
Our mission is to make people care about security. By engaging employees with cyber security through immersive and gamified experiences we motivate change and reinforce desired security behaviors and reduce risk while fostering a positive security culture for your organization. That's game-changing security awareness.
LogRhythm is the pioneer in Threat Lifecycle ManagementTM (TLM) technology, empowering organizations on six continents to rapidly detect, respond to and neutralize damaging cyberthreats. LogRhythm’s TLM platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments.
The Oracle Dyn global business unit (GBU) helps companies build and operate a secure, intelligent cloud edge. Our services help customers operate resilient, secure and high-performance sites and applications via fully managed DNS and AI-powered Web Application Security services. More than 3,500 customers rely on Oracle Dyn’s edge services, including Netflix, Twitter, CNBC and LinkedIn.
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including four of the five largest U.S. financial instituti stop targeted cyberattacks.
Your people do business well beyond the bounds of traditional network perimeters and connected endpoints. Email, social media, and mobile devices are the new tools of the trade—and for cyber criminals, the new tools of attack. Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.
SAI Global helps organizations proactively manage risk to create trust and achieve business excellence, growth, and sustainability. Our integrated risk management solutions are a combination of leading capabilities, services and advisory offerings that operate across the entire risk lifecycle allowing businesses to focus elsewhere. Together, these tools and knowledge enable clients to develop a holistic, integrated view of risk. We have global reach with locations across Europe, the Middle East, Africa, the Americas, Asia and the Pacific.
WhiteSource integrates security into you DevOps pipeline to secure and manage open source components in your products. Our platform becomes part of your software development lifecycle (SDLC) and automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components.
Attivo Networks® provides accurate detection, analysis, and automated response to in-network threats. The ThreatDefend™ platform efficiently detects advanced, stolen credential, insider, and ransomware attacks within user networks, data centers, cloud, branch, and specialty environments by deceiving attackers into revealing themselves. ThreatOps™ playbooks and 3rd party integrations provide accelerated incident response.
Binary Defense is your managed security partner—real people, detecting real threats, in real time. We manage every aspect of endpoint security to identify and isolate all endpoint threats. Experience advanced endpoint solutions that will predict, prevent, detect, deceive, and respond to keep your company ahead of all next-generation attacks.
BlackBerry Cylance® uses artificial intelligence to deliver prevention-first, predictive security products and services that change how organizations approach endpoint security. Cylance’s security solutions provide full spectrum predictive threat prevention and visibility across the enterprise, combatting threats such as malware, ransomware, fileless malware, malicious scripts, weaponized docs, and other attack vectors. Learn more at www.cylance.com.
Bromium uses virtualization-based security to protect our customers. Our patented hardware-enforced containerization delivers application isolation and control stopping malware in its tracks. Unlike traditional security, Bromium automatically isolates threats and adapts to new attacks using behavioral analysis and instantly shares threat intelligence to eliminate the impact of malware.
For over three decades, the Software Engineering Institute (SEI) has been helping government and industry organizations to acquire, develop, operate, and sustain software systems that are innovative, affordable, enduring, and trustworthy. We serve the nation as a Federally Funded Research and Development Center (FFRDC) sponsored by the U.S. Department of Defense (DoD) and are based at Carnegie Mellon University, a global research university annually rated among the best for its programs in computer science and engineering.
Centripetal delivers intelligence-driven security. Centripetal invented the Threat Intelligence Gateway and leverages its technologies to deliver CleanINTERNET, a comprehensive intelligence-led cyber service. With Centripetal, customers across every vertical and of every size can persistently prevent over 90% of known threats with intelligence applied in advance. Gartner, Inc. has named Centripetal a "Cool Vendor" in security for 2017, and the Security Innovation Network (SINET) named Centripetal a “SINET-16” awardee. Centripetal’s technology is protected by over 50 US and international patents.
Stars can’t shine without darkness – Conventus is a cyber security software company with an accomplished track record of InfoSec consulting. We focus on providing the visibility needed to track and reduce risk.
Corelight delivers powerful network security monitoring (NSM) solutions that help organizations defend themselves by transforming raw network traffic into rich logs, extracted files, and security insights. Corelight Sensors are built on Zeek (formerly called “Bro”), the open-source NSM framework that generates actionable, real-time data for thousands of security teams worldwide.
DNV GL is a global quality assurance and risk management company. Driven by our purpose of safeguarding life, property and the environment, we enable our customers to advance the safety and sustainability of their business. We provide classification, technical assurance, software and independent expert advisory services to the maritime, oil & gas, power and renewables industries. We also provide certification, supply chain and data management services to customers across a wide range of industries.
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
eLearnSecurity has proven to be a leading innovator in the field of practical security training. Best of breed virtualization technology, in-house projects such as Coliseum Web Application Security Framework and Hera Network Security Lab, have changed the way students learn and practice new skills.
Endgame's endpoint protection platform brings certainty to security with the most powerful scope of protections and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft.
enSilo's single lightweight security agent gives customers comprehensive pre-infection Next Generation Anti-Virus (NGAV) as a first line of defense and post-infection automated, blocking-enabled Endpoint Detection and Response (EDR) as a last line of defense, enabling security teams to contain attacks, prevent data leakage and block malware communications in real time to stop post-infection impact.
Health-ISAC (Health Information Sharing and Analysis Center), is a global, non-profit, member-driven organization offering healthcare stakeholders a trusted community and forum for coordinating, collaborating and sharing vital Physical and Cyber Threat Intelligence and best practices with each other.
Membership is open to private & public hospitals, ambulatory providers, health insurance payers, pharmaceutical/biotech manufacturers, laboratory, diagnostic, medical device manufacturers, medical schools, medical R&D organizations and other relevant healthcare stakeholders.
ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. The COBIT framework and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals for the benefit of their enterprises. Our CSX training programs are the ideal way to help your entire staff become well-versed in critical cybersecurity concepts, and to develop and build technical skills. In addition, our CSX Practitioner certification validates actual skill and ability, and keeps them up to date with the latest cyber trends.
KnowBe4 is the world’s largest integrated platform for new-school security awareness training and simulated phishing. KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. Organizations leverage KnowBe4 to enable their employees to make smarter security decisions and create a human firewall as an effective last line of defense.
Lynx Technology Partners is the trusted Information Security and Risk Management Advisor that customers in highly-regulated industries depend on to improve security posture, facilitate compliance, reduce risk, and refine operational efficiency. Through consulting, security and risk assessments, managed security services, and an award-winning GRC solution, Lynx supports many critical projects for security-conscious leaders.
We live in a net-centric world where new information technologies arrive at lightning speed, allowing us to share information across town or around the world faster than ever before. The National Security Agency's Information Assurance Mission is dedicated to providing information assurance solutions that will keep our information systems secure.
NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape. With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face. We are passionate about making the Internet safer and revolutionizing the way in which organizations think about cyber security.
Netskope is the leader in cloud security. We help the world’s largest organizations take full advantage of the cloud and web without sacrificing security. Our patented Cloud XD technology eliminates blind spots by going deeper than any other security provider to quickly target and control activities across thousands of cloud services and millions of websites. With full control through one cloud-native interface, our customers benefit from 360-degree data protection that guards data everywhere and advanced threat protection that stops elusive attacks.
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Over 5,150 organizations trust Okta to securely connect their people and technology.
Since 2000, we have focused on using identity to create business value – measurable value, from IT and HR to marketing and sales. Identity, managed the Omada way, simultaneously improves security, efficiency, cost control and regulatory compliance throughout any organization. And it can do even more. Identity can accelerate digital transformations, smooth M&A integration, and enable deeper relationships with suppliers and customers. Belief in this essential role of identity unites our organization, fuels our innovation, and strengthens our collaboration with partners. We’ve pioneered many of the best practices in use today, and we’re passionate about taking identity management even further.
Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities. Visit www.pingidentity.com.
Riverbed’s unified and integrated Digital Performance Platform™ brings together a powerful combination of Digital Experience, Cloud Networking and Cloud Edge solutions that provides a modern IT architecture for the digital enterprise, delivering new levels of operational agility and dramatically accelerating business performance and outcomes.
SaltStack makes the only event-driven automation for optimizing and securing digital business at massive scale. SaltStack SecOps helps security and IT operations teams collaborate to define security policy, detect non-compliant systems, and automatically enforce or remediate violations using SaltStack intelligent automation, task orchestration, any cloud control, and configuration management.
Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills to write secure code from the beginning.
SecureAuth eliminates identity-related breaches through the continuous assessment of risk and the enablement of trust. The company is a leader in access management, identity governance, and penetration testing. SecureAuth’s Identity Security Automation platform redefines security through identity making it easier for organizations to prevent the misuse of credentials.
SGS is the largest provider of inspection, verification, testing and certification services in the world. Our dedicated team of experts have been serving the information security needs of clients for over 15 years. We are independent/vendor-neutral because our focus is providing recommendations to improve the security posture of our clients.
Siemplify is a security orchestration, automation and response (SOAR) provider that is redefining security operations for enterprises and MSSPs worldwide. Its holistic security operations platform is a simple, centralized workbench that enables security teams to better investigate, analyze, and remediate threats. And, using automated, repeatable processes and enhanced measurement of KPIs, Siemplify empowers SOC teams to create a culture of continuous improvement. Siemplify's patented context-driven approach reduces caseload and complexity for security analysts, resulting in greater efficiency and faster response times.
SynerComm works with our clients to improve many aspects of their Information Security Program. We leverage our red and blue team expertise, our key security solution experience on platforms like Palo Alto Networks, Juniper Networks and AWS to deploy, tune and validate your controls are implemented correctly. We have experienced Staff on Demand resources and OneCDR co-managed services available to assist with your project and operational staffing needs.
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations optimize security and quality in DevSecOps and throughout the software development life cycle.
Texas A&M Engineering Extension Service (TEEX) delivers comprehensive training through both classroom and hands-on instruction as well as online courses. TEEX programs include cybersecurity, fire and rescue, infrastructure and safety, law enforcement and homeland security.
The Security Awareness Company (SAC) creates and deploys Exceptional Security Awareness Programs globally for organizations large and small. Founded by security industry pioneer and visionary, Winn Schwartau in 1991 (27 years!), SAC has developed the most innovative and in-depth library of awareness materials available delivered via the SAC Center, a powerfully unique mobile-centric gamified learning and incident response portal.
Tripwire is the trusted leader for establishing a strong cybersecurity foundation. Partnering with Fortune 500 enterprises, industrial organizations and government agencies, Tripwire protects the integrity of mission-critical systems spanning physical, virtual, cloud and DevOps environments. Tripwire’s portfolio delivers top security controls, including asset discovery, secure configuration, vulnerability and log management.
Headquartered in Cleveland, Ohio, TrustedSec is an IT Security Consulting company, made up of researchers, hackers, advisors, who all share a passion for Security. Information Security does not need to be complex. Our mission: to help organizations defend against threats of all kind and change the security industry for the better. Simple and challenging. Behind closed doors you will find us researching, developing new tools, conducting training classes, keynoting and presenting at conferences throughout the world.
Trustifi is a software-as-a-services (SaaS) company offering a patented Postmarked email system that encrypts, tracks, proves delivery, and is the first federally-accepted method of sending legal documents online. The solution provides any company dealing with sensitive data with absolute confidentiality, security and legal compliance.
TSI provides high performing COTS solutions for Cyber Range as a Service (CRaaS), Lab as a Service (LaaS) and other infrastructure orchestration, automation, and virtualization environments. Technologies include a Software Defined Infrastructure Operating System (SDI OS) and High Performance Computing fabric utilizing PCI Express.
Venafi is a technology pioneer. We defined the machine identity protection market and our orchestration platform protects the most sensitive networks in the world. Our market-leading innovation is driven by a growing intellectual property portfolio of 30 patents.
WALLIX is a software company offering privileged access management, compliance, and traceability solutions. WALLIX has succeeded in combining the three core requirements of managing privileged users, password management, access control and traceability, into a single easy to deploy solution, The WALLIX Bastion.
Association & Media Sponsors
The Seventh International Cryptographic Module Conference May 14-17, 2019 * JW Marriott Parq Vancouver * Canada https://icmconference.org ICMC is the leading annual event for global expertise in commercial cryptography. At the seventh annual edition of the conference in May 14-17 in Vancouver, Canada, over 400 industry leaders from over 25 countries will convene to address the unique challenges faced by those who develop, produce, test, specify, and use cryptographic modules.
The (ISC)2 Central Florida Chapter is a professional association created by (ISC)² members for (ISC)² members & IT / Information Security professionals in the community. Our mission is to provide members and other security professionals the opportunity to share knowledge, grow professionally, raise security awareness and advance information to those in the Community. This is accomplished by delivering material that educates, connects, inspires and helps our members secure their environments and our community. While many of our members have a (ISC)² credential, having a (ISC)² credential is not required to become a member of our chapter. Please visit our site to learn about upcoming events where we can secure, educate, connect, and inspire you!
The Central Florida Chapter of Information Systems Security Association (ISSA) is dedicated to promoting Information Systems Security knowledge-sharing, monthly meetings, notice of security events within our area, and links to valuable information and related web sites.
Founded in 1986, Online Business Systems is Digital Transformation and Cybersecurity consultancy. We help enterprise customers enhance their competitive advantage by designing improved business processes enabled with robust and secure information systems. Our unsurpassed delivery, our people, and the Online culture of loyalty, trust, and commitment to mutual success set us apart. Today we have nearly 300 Digital Transformation and Cybersecurity consultants throughout Canada and the US.
SearchSecurity.com is a trusted source for advancing your knowledge in the security industry with access to our free online information security training courses in our Security School. Our courses are led by information security experts on today's most popular security topics including cloud security, data protection, IAM, compliance and more. These lessons -- many of which feature video seminars and review quizzes eligible for CPE credits -- will arm you with the foundational and tactical information needed to keep your organization compliant and secure.
- March 30 - April 1, 2020:
InfoSec World 2020 Conference & Expo!