Our sponsorship packages gives you the opportunity to foster quality engagements and position your company as an industry thought leader to over 2,000 IT security professionals.
Primary market research for the cybersecurity industry, with business-driven application through proprietary market insights, client thought leadership and decision support. Executing original quantitative and qualitative research among and for senior security professionals, and managed by on-staff subject matter experts.
Ridge IT Corporation is a leader in implementing Cloud Technologies, cyber security, and Zero Trust Architectures with over 700 protected or managed clients covering over 250,000 users. We curate solutions through the integration and layering of best-in-class cyber security software so we can detect and act on any potential threats our clients face. We believe in consistently attacking, validating, and hardening our clients’ security posture, keeping them in a constant state of Cyber Readiness. Our clients enjoy peace of mind knowing they have the industry’s best solutions implemented and are constantly tested against the most recent adversaries. Using this methodology, we excel at delivering reliable cyber security to our customers.
Abnormal Security provides the leading behavioral AI-based security platform that leverages machine learning to stop email attacks that evade traditional solutions. The anomaly detection engine understands identity and context to block socially-engineered attacks including business email compromise, ransomware, credential phishing, account takeover, and more.
Atlantic Data Security is one of the fastest growing cybersecurity consultancies and solutions providers in the country as recognized by Inc, CRN, Forbes and by our growing list of clients. Atlantic Data Security (ADS) provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions and minimize risk.
We are a global digital security company, protecting millions of customers and thousands of companies worldwide.
Privately owned, ESET is still run by the same engineers who started the company three decades ago. Maintaining our independence allows us to focus on our primary goal - protecting customers and businesses towards a better future.
Exterro’s Legal GRC software is the only comprehensive platform that automates the complex interconnections of privacy, legal operations, digital investigations, cybersecurity response, compliance and information governance. Thousands of legal teams around the world in corporations, law firms, government and law enforcement agencies trust the Exterro Legal GRC platform to manage their risks and drive successful outcomes at a lower cost.
Hyperproof is your security assurance and compliance operations platform transforming the way you manage and do the work—empowering people and organizations to make the most of their compliance work to build trust inside and out. Streamlining security assurance & compliance ops for companies like: Motorola, Instacart, 3M, and more.
Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyberprotection for every one. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions in the home, on-the-go, at work, or on campus. A world-class team of threat researchers and security experts enable Malwarebytes to protect millions of customers and combat existing and never-before-seen threats using artificial intelligence and machine learning to catch new threats rapidly. With threat hunters and innovators across the world, the company is headquartered in California with offices in Europe and Asia.
RISCPoint provides business-focused risk, technology and cybersecurity solutions, custom-tailored to an organization’s unique needs. Founded with the vision to seamlessly integrate with your team, we only utilize high-performing professionals with deep technical and operational experience to fulfill all of your security and compliance goals.
Synopsys builds trust in software by enabling organizations to manage application security, quality, and compliance risks at the speed their business demands.
With Synopsys, organizations can transform the way they build and deliver software, aligning people, processes, and technology to intelligently address software risks across their portfolio and at all stages of the application lifecycle.
The leading digital destination for MSPs, IT service providers, channel partners and strategic investors seeking to maximize their business valuations, mitigate business risk and maximize security -- from Entrepreneur to Exit.
An invitation-only community of cybersecurity executives dedicated to peer-driven collaboration, knowledge sharing, and technology education. Through live and digital events, members exchange best practices, share lessons learned, and build trusted relationships with peers and technology partners to support their needs.
A private, member-only peer council that facilitates collaboration and provides resources to senior security leaders across sectors and industries. Serving CISOs seeking to network with peers, mid-size organizations needing tools and guidance, and associations wanting to offer their members customized cybersecurity value.
The authoritative news, analysis and research channel for managed security services providers, MDR (managed detection & response) and security driven MSPs worldwide.
The essential resource for independent news analysis, forward-looking features, product reviews, events, and professional recognition programs. Sharing insight and guidance in partnership with, and for, top-level information security executives and their technical teams.
Engaging and informative podcast and video programming for a loyal subscriber base of cybersecurity practitioners from the industry’s market validator. Presenting a range of topical series covering the cyber landscape, from the latest threats to specialized coverage of enterprise security, compliance and more.
The nation’s premier producer of professional job fairs and leading online career center for professionals with a security clearance, transitioning military, and veterans. TECHEXPO helps top defense contractors, technology companies, consulting firms, and U.S. government agencies fill their recruitment & hiring needs.
A leading provider of premium thought leadership and networking events, The Official Cyber Security Summit delivers critical knowledge on combatting cybercrime to senior executives and industry leaders through one-day invitation-only events that gather renowned information security experts and innovative solution providers.
Cyderes (cyber-defense-and-response) provides best-in-class managed security services on a global scale, for the modern digital workforce. Born from the best of two award-winning cybersecurity companies, Herjavec Group and Fishtech Group, Cyderes provides the people, processes, and technology to manage risk, and detect and respond to any threats – in ways that are better, faster, more scalable, and more cost-effective than traditional in-house solutions.
eSentire, Inc., the Authority in Managed Detection and Response helps organizations anticipate, withstand, and recover from cyberattacks. Founded in 2001, eSentire protects the critical data of 2000+ organizations in 80+ countries with 65% of its global customer base recognized as critical infrastructure. Learn more at www.esentire.com and @eSentire.
At Picus Security, we prioritize making it easy for security teams to validate and enhance cyber resilience. Our Complete Security Validation Platform simulates real-world threats to identify unknown risks and help optimize defenses. As the pioneer of Breach and Attack Simulation, we empower our customers to be threat-centric and proactive.
ProcessUnity is changing GRC – making good governance, risk and compliance practices and tools available to organizations of all sizes…at a reasonable price. Our team grew up in GRC: some of us ran risk and compliance programs, some of us developed and implemented GRC software. Throughout our careers, we have all seen what works and what doesn’t. We put our collective experience together and built next-generation technology that is changing the market.
To make the Internet more secure by delivering a trusted and transparent view into enterprise security programs that will prompt all organizations to adhere to security best practices.
Tenable® is the Exposure Management company. Over 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform.
ThreatLocker is leading the cybersecurity market towards a more secure approach to blocking unknown application vulnerabilities. The ThreatLocker Control Suite combines Application Whitelisting, Ringfencing™, Storage Control, and Elevation Control solutions in ways that make security simple.
ThreatLocker’s powerful suite of security tools is designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks.
Since its founding in 2017, ThreatLocker has been recognized as one of the most efficient cyber security software. Headquartered in Maitland, Florida.
Uptycs reduces risk by prioritizing threats and vulnerabilities across cloud, containers, and endpoints—all from a single UI and data model. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next. Shift up your cybersecurity with Uptycs.
Bright Security is a developer-centric DAST (Dynamic Application Security Testing Solution) solution. Founded in 2018, Bright’s mission is to enable organizations to ship secure Applications and APIs at the speed of business. The company’s solution helps to detect and remediate vulnerabilities early in the SDLC at a much lower cost & effort, resulting in reduced risk.
Carnegie Mellon University founder Andrew Carnegie said: "My heart is in the work."
No statement better captures the passion and drive of our people to make a real difference.
At Carnegie Mellon, we're not afraid of the work.
Our educational environment creates problem solvers, drivers of innovation and pioneers in technology and the arts.
Employers in every field say our graduates are ready to hit the ground running the day they graduate.
So, join us. Whether you're looking for a career or an education. Or both.
The Center for Internet Security, Inc. (CIS®) is responsible for globally recognized best practices for securing IT systems and data including the CIS Benchmarks™ and CIS Controls®. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud.
CleanINTERNET® service works at massive scale and machine speed to dynamically shield your business from every known cyber threat identified by the global threat intelligence community. The service includes automated threat shielding and an elite team of threat hunting specialists that goes far beyond detection to provide real-time protection with Advanced Threat Detection.
Unlike other approaches, CleanINTERNET eliminates the tremendous noise and false positives that regularly consume cybersecurity teams and traditional threat intelligence solutions. That means your business no longer needs to make a false choice between full security and a smooth running business.
Contrast Security secures the code that the world economy relies on. It is the industry’s most modern and comprehensive Application Security Platform, removing security roadblock inefficiencies and empowering enterprises to write and release secure application code faster. Embedding code analysis and attack prevention directly into software with instrumentation, the Contrast platform automatically detects vulnerabilities while developers write code, eliminates false positives, and provides context-specific how-to-fix guidance for easy and fast vulnerability remediation. Doing so enables application and development teams to collaborate more effectively and to innovate faster while accelerating digital transformation initiatives. This is why a growing number of the world’s largest private and public sector organizations rely on Contrast to secure their applications in development and extend protection to cloud and on-premise applications in production.
“Services that don’t suck.” That sums up our approach in a nutshell. While that statement may seem simple, it’s the result of years of complex and sophisticated refinement to provide superior on-premise, or in the cloud, security services. If you’re evaluating your own state-of-security, and want to understand what CRITICALSTART can offer, ask yourself the following:
Cyral helps data-driven businesses succeed by enabling them to efficiently secure their heterogeneous database environments in the simplest way possible. We develop innovative solutions that enable organizations to securely deploy their database environments to the cloud, with consistent visibility, access control and authorization across all their databases.
Hailing from both the public and the private sectors, we offer a network-based security solution on-prem or in the cloud capable of ingesting both data-in-motion and data-at-rest.
Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company that provides a complete management and security solution for an Apple-first environment that is enterprise secure and consumer simple. Visit www.jamf.com to learn more.
IT Asset Management Software IT Heroes Trust Lansweeper for Complete Visibility Discover, Analyze, and Connect your IT, OT, and IoT assets - all in one place.
LogicGate is redefining the way businesses think about risk. Through the proactive management of governance, risk and compliance (GRC) processes via the no-code, agile Risk Cloud, hundreds of customers rely on Risk Cloud to improve organizational efficiency, reduce costs and enable revenue generation and retention.
Orca Security is the industry-leading agentless Cloud Security Platform that identifies, prioritizes, and remediates risks. Orca connects to your environment in minutes with patented SideScanning technology to provide complete coverage across vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, overly permissive identities and more. Founded in 2019, Orca is trusted by hundreds of customers globally.
Rublon enables multi-factor authentication on your networks, servers, endpoints and applications. Secure remote access and local logins using hardware and software authenticators. Enforce MFA across all technologies to all or selected users. Adapt MFA to your individual needs by applying custom access policies. Protect your data and comply with regulations.
Founded in 2010, Secure Ideas is a woman-owned, small-business consulting firm. An industry leader in security consulting, training, and penetration testing, Secure Ideas is continually striving to improve the state of the art and practice of information security. Our focus is collaborating with clients to improve their security management, and reduce the risk of potential losses through a proactive approach. Having architected security solutions for large enterprises, and performed penetration testing for numerous industries from government agencies to Fortune 100 companies, we are adept at assessing client needs, comprehending complex details on new technologies, and identifying risks to organizations.
TrustedSec is a security consulting team that combines high-level talent and advanced tools to help our partners achieve their security objectives and empower organizations to mature their security programs effectively with impactful recommendations. We share our passion for cybersecurity so together, we can all make the world a safer place.
For any and all inquiries please click the button below
Tim Garon
Director, Event Content and Strategy
Join our mailing list for the latest news on InfoSec World 2023.