Interested in Sponsoring the CSO50 Conference + Awards?

The CSO50 Conference + Awards attracts a powerful and influential audience of security decision makers. Sponsorship packages are designed to provide value and interaction through brand visibility and networking opportunities.
Learn how to become a sponsor of the 2017 CSO50 Conference.

2017 Sponsors


Underwriter

HP creates technology that makes life better for everyone, everywhere. Through our portfolio of printers, PCs, mobile devices, solutions, and services, we engineer experiences that amaze.

HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers’ most complex challenges in every region of the world.

Printer security is a topic of growing importance and HP recently announced the new Laser Jet Printer portfolio that delivers increased protection against malicious attacks. The stronger security is part of a broader HP strategy to provide the deepest security across PCs and printers. More information about the new HP LaserJet Enterprise portfolio is available at www.hp.com/go/PrintersThatProtect.

HP will continue to focus on security for its printing portfolio by delivering market leading security technology for new and existing printers, helping customers better protect their devices, data and documents. Learn more at www.hp.com/go/reinventsecurity

 

Zscaler™ secures thousands of cloud-first organizations in IT transformation. Zscaler delivers the entire security stack as a service, continuously applying policies and threat intelligence for comprehensive protection. Every day, the Zscaler cloud processes more than 30 billion requests, blocking 125 million threats for 5,000 organizations in 200 countries. Visit Zscaler.com.


Champion

Code42, the leader in cloud-based endpoint data security and recovery protects more than 39,000 organizations worldwide. Code42 enables IT and security teams to centrally manage and protect critical data for some of the of most recognized brands in business and education. From monitoring endpoint data movement and use, to meeting data privacy regulations, to simply and rapidly recovering from data incidents no matter the cause, Code42 is central to any organization’s data security strategy. Code42 is headquartered in Minneapolis, MN and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners. For more information,. For more information, visit http://www.code42.com/.


Partner

Attivo Networks® provides accurate detection, analysis, and automated response to in-network threats. The ThreatMatrix™ platform efficiently detects advanced, stolen credential, insider, and ransomware attacks within user networks, data centers, cloud, branch, and specialty environments by deceiving attackers into revealing themselves. ThreatOps™ playbooks and 3rd party integrations provide accelerated incident response.

BitSight is transforming how companies manage information security risk with objective, verifiable and actionable Security Ratings. Founded in 2011, the company built its Security Ratings Platform to continuously analyze vast amounts of external data on security issues and behaviors in order to help organizations manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk. Seven of the top 10 cyber insurers, 60 Fortune 500 companies, and 3 of the top 5 investment banks rely on BitSight to manage cyber risks.

Darktrace is the world’s leading machine learning company for cyber security. Created by mathematicians from the University of Cambridge, the Enterprise Immune System uses AI algorithms to automatically detect and take action against cyber-threats within all types of networks, including physical, cloud and virtualized networks, as well as IOT and industrial control systems. A self-configuring platform, Darktrace requires no prior set-up, identifying advanced threats including zero-days, insiders and stealthy, silent attackers in real time. Headquartered in San Francisco and Cambridge, UK, Darktrace has 23 offices worldwide.

Used by the Who's Who of Global Organizations for next generation data protection, GTB Technologies’ patented solutions easily integrate into an organizations’ existing infrastructure without monopolizing resources or disturbing end-users.
Recent reports by 2 of the major independent research firms have rated GTB Technologies' Enterprise DLP that Works Platform with the highest scores in:
• Intellectual Property Protection,
• Data Discovery,
• Data Classification,
• Cloud Coverage,
• Endpoint Protection
• Multi-language availability,
• Reporting,
• Risk Management,
• Customer Support,
• Favorable Pricing
• Content Aware Digital Rights Management (DRM / IRM)
• Deployment Distribution

GTB's Enterprise DLP that Works suite covers Network DLP, Endpoint DLP, Data Discovery with real-time Data Classification, Content Aware E-DRM, Cloud storage and application control. Learn more at www.gttb.com

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm.


Defender

Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and performance. Gigamon’s Visibility Fabric™ and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprises government, and service provider networks operate more efficiently.

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.

Your enterprise needs to move faster, but lack of process and legacy tools hold you back. With the ServiceNow System of ActionTM you can replace unstructured work patterns of the past with intelligent workflows of the future. ServiceNow Security Operations is powered by our System of Action. It allows you to bring incident data from security tools into a structured enterprise security response engine that uses workflows, automation, and a deep connection with IT to prioritize and resolve threats based on the impact they pose to your organization.

Learn more about ServiceNow in Security at www.servicenow.com/sec-ops

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior.  Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, up to 90%.


Protector

For over 30 years, Boldon James has been a leader in data classification and secure messaging solutions, helping organisations of all sizes manage sensitive information securely and in compliance with legislation and standards, in some of the most demanding messaging environments in the world.

Boldon James is a wholly-owned subsidiary of QinetiQ plc, a FTSE 250 company, with offices worldwide.

Dataminr provides real-time, actionable breaking news alerts from all publicly available Twitter data and other public datasets, enabling professionals in security, operations, news, finance and communications to be proactively alerted the moment a relevant event happens.

InfoArmor offers industry-leading cyber intelligence services that help our clients fight emerging fraud and advanced cyber threats. We combine an unparalleled global research network with big data analysis, operatively-sourced actionable intelligence and customized service to meet clients’ dynamic security needs with our award-winning VigilanteATI® advanced threat intelligence platform. For more information, visit InfoArmor.com.

Kudelski Security is the premier advisor and cybersecurity innovator for today’s most security-conscious organizations. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to recommend solutions that reduce business risk, maintain compliance and increase overall security effectiveness. With clients that include Fortune 500 enterprises and government organizations in Europe and across the United States, we address the most complex environments through an unparalleled set of solution capabilities including advisory, technology, managed security services and custom innovation.

Leidos is a global science and technology solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company’s 32,000 employees support vital missions for government and commercial customers.

Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $7.04 billion for the fiscal year ended December 30, 2016.

As a division of this Fortune 300 company, Leidos Cyber delivers cybersecurity and network defense capabilities globally. Our portfolio addresses top cyber challenges facing organizations today:

• Network Defense Program Build
• Insider Threat Detection & Remediation
• External Threat Detection & Remediation
• ICS Asset & Threat Visibility & Management

LIFARS is an Elite Cybersecurity, Digital forensics, and Incident Response firm based in New York City. Our solutions are based on industry best practices and hands-on expertise stemming from decades of experience. LIFARS conducts digital forensic investigations, incident response, web application security testing, threat hunting and academic research.

Skyhigh Networks, the world’s leading Cloud Access Security Broker (CASB), delivers a single control point for enterprises to consistently enforce their security, compliance and governance policies across all cloud services (SaaS, PaaS and IaaS), all users (on-prem, remote, and third party) and all devices (managed and unmanaged). With Skyhigh, customers enforce risk-based cloud governance policies across all cloud services, enable activity monitoring and threat protection, enforce data loss prevention and collaboration control policies, encrypt data with customer-controlled keys and EDRM; and implement access-control policies. For more information visit: www.skyhighnetworks.com

Unisys is a global information technology company that specializes in providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

Unisys offerings include security solutions, advanced data analytics, cloud and infrastructure services, application services and application and server software.