March 24 - 26, 2019
InterContinental San Diego, San Diego, CA

Sponsors


Current Exchange Sponsors

Accellion
Website: http://Accellion.com

Accellion provides the leading mobile content platform that increases enterprise productivity and ensures data security and compliance.  Accellion enables healthcare providers to increase the productivity of their healthcare workers and external collaborators. With Accellion, users can securely complete their work across mobile, web or desktop devices, anywhere, anytime. By implementing... Read More

Balbix
Website: www.balbix.com

The Balbix predictive breach risk platform, BreachControl™, is the industry’s first system to leverage specialized artificial intelligence (AI) to provide enterprises with a comprehensive and continuous predictive assessment of breach risk.  Visualized via a searchable and clickable risk heat-map, Balbix BreachControl is designed for CISOs, CIOs and IT security teams... Read More

Bay Dynamics
Website: www.baydynamics.com

Bay Dynamics leverages businesses’ existing security investments to provide a cyber risk analytics platform that delivers actionable risk insights and out-of-the-box business value. With a rich history in Security Analytics that dates back to 2001, Bay Dynamics is focused on providing automated cyber security and risk solutions for the enterprise. Read More

CMMI Institute
Website: cmmiinstitute.com

CMMI Institute’s promise is to inspire cultures of continuous improvement that elevate performance and create sustainable competitive advantage.CMMI Institute enables organizations to elevate and benchmark performance across a wide range of critical business capabilities, including product development, service excellence, workforce management, data management, supplier management, and cybersecurity.For over 25 years,... Read More

CyberArk
Website: www.cyberark.com

CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets.... Read More

CybeReady
Website: www.cybeready.com

CybeReady offers enterprises the only autonomous cyber security training platform. Our solutions guarantees corporate resilience by using Machine-Learning powered training that implements adaptive learning methodology and boosts significant change in employe behavior. Starting to use and operate CybeReady’s smart platform requires nearly zero effort, making it the awareness training solution with... Read More

KnowBe4
Website: http://www.KnowBe4.com

KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using... Read More

OneTrust
Website: www.OneTrust.com

OneTrust is the largest and most widely used dedicated privacy management technology platform for compliance with global privacy laws. More than 2,000 customers, including 200 of the Global 2,000, use OneTrust to comply with global data privacy regulations across sectors and jurisdictions, including the EU GDPR, ePrivacy (Cookie Law), the... Read More

Perception Point
Website: www.perception-point.io

Advanced collaboration security. Cutting-edge threat detection for email, shared drives, messaging and more.Advanced hackers are now easily bypassing current security solutions, and with the proliferation of new collaboration, the ways in are growing. It's time for a new type of defense.Perception Point is a next gen cybersecurity company offering the... Read More

Pixm
Website: pixm.net

Pixm stops enterprise phishing breaches with computer vision software that runs on user devices. We make the only product capable of proactively detecting and stopping new phishing attacks in real time, instead of merely tracking blacklists or patterns from past attacks. Using cutting edge yet lightweight deep learning models, our... Read More

SafeGuard Cyber
Website: www.safeguardcyber.com

SafeGuard Cyber offers a cloud-based platform to detect, prevent, and defend against cyber threats in social media and digital channels, including data loss, brand damage, phishing attacks, insider threats, VIP exposure, and compliance risks. The platform offers comprehensive channel coverage, integrating with more than 50 social media and digital channels,... Read More

SecureAuth
Website: www.secureauth.com

SecureAuth is leveraged by leading companies, their employees, their customers and their partners to eliminate identity-related breaches. As a leader in access management, identity governance, and penetration testing, SecureAuth is powering an identity security revolution by enabling people and devices to intelligently and adaptively access systems and data, while effectively... Read More

Siemplify
Website: https://www.siemplify.co/

Siemplify provides a holistic Security Operations Platform that empowers security analysts to work smarter and respond faster. Siemplify uniquely combines security orchestration and automation with patented contextual investigation and case management to deliver intuitive, consistent and measurable security operations processes. Leading enterprises and MSSPs leverage Siemplify as their SOC Workbench,... Read More

Source Defense
Website: www.sourcedefense.com

Prevent 3rd Party JavaScript Attacks on your Website (Magecart)Websites today are at risk from a significant security vulnerability introduced through the integration of 3rd Java Script code. Unfortunately, the 3rd party tools that enrich customer experience and help extract insightful analytics introduce a universal client-side vulnerability that provides threat actors... Read More

SpecterOps
Website: https://specterops.io/

SpecterOps is a boutique information security solutions company specializing in adversary tradecraft to simulate, defend, and harden our clients against sophisticated attackers.  With professional backgrounds rooted in the U.S. intelligence community, we focus on cutting edge techniques and technologies in attack simulation, threat detection and resilience. Unlike many of our... Read More

Thoughtexchange
Website: www.thoughtexchange.com

Thoughtexchange provides software and services that bring people together to build trust and make progress on important topics. Whether it’s employees, customers or whole communities, our solutions effortlessly connect you to your stakeholders. People can confidentially and independently share their thoughts, appreciate other points of view and understand how their... Read More

Supporting Portfolio Sponsors

Axonius
Website: www.axonius.com

At Axonius, we’re solving an ugly, nagging problem: asset management. You could call asset management the Toyota Camry of cybersecurity: it’s not flashy, it’s not all that exciting, but it’s everywhere. With trends like cloud, IoT, virtualization, and BYOD, getting a credible, always up-to-date asset inventory, understanding managed and unmanaged... Read More

Comodo Cybersecurity
Website: www.comodo.com

In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey,... Read More

Demisto
Website: http://www.demisto.com/?utm_campaign=MH-Financial-Services-Exchange&utm_medium=Conference&utm_sourc

You valiantly work to protect your company’s business assets within a complex technology and threat landscape. Problem is, while there are more security products, compliance concerns and incidents than ever, there are fewer people like you. And many aren’t well prepared to help you meet your daily challenges.Enter Demisto.  Demisto... Read More

Duo Security
Website: http://www.duosecurity.com

Duo Security provides cloud-based two-factor authentication to more than 4,000 organizations worldwide. In as little as fifteen minutes, Duo’s innovative and easy-to-use technology can be deployed to protect users, data, and applications from credential theft and account takeover. Try it for free at www.duosecurity.com. Follow us @duosec Read More

Nyotron
Website: www.nyotron.com/

Nyotron provides the industry’s first OS-Centric Positive Security to strengthen laptop, desktop and server protection. By mapping legitimate operating system behavior, Nyotron’s PARANOID understands all normative ways that may lead to damage, such as file deletion, data exfiltration, encryption, sabotage and more. Focusing on finite “good” actions allows PARANOID to... Read More

IBM
Website: www.ibm.com/maas360

IBM MaaS360 is the trusted enterprise mobility management solution to thousands of customers worldwide - from Fortune 500 companies to small businesses. We make working in a mobile world simple and safe by delivering comprehensive mobile security and management for applications, documents, email, and devices. Instantly web accessible, MaaS360 is... Read More