Interested in Sponsoring the CSO50 Conference + Awards?

The CSO50 Conference + Awards attracts a powerful and influential audience of security decision makers. Sponsorship packages are designed to provide value and interaction through brand visibility and networking opportunities.
Learn how to become a sponsor of the 2019 CSO50 Conference.

2019 Sponsors


Underwriter

Print security is more than document security. Today’s security threats require attention to data in transit and endpoint devices on the network. HP Print Security offers a comprehensive strategy that includes solutions to help secure data and documents, plus visibility and reporting to optimize your environment and meet compliance regulations. HP Enterprise printers are the world’s most secure printers, and are the only printers to offer real-time detection, automated monitoring, and built-in software validation to help stop threats the moment they start.

 

West Monroe is a national business and technology consulting firm that partners with dynamic organizations to reimagine, build, and operate their businesses at peak performance. Our team of more than 1,000 professionals is comprised of an uncommon blend of business consultants and deep technologists. This unique combination of expertise enables us to design, develop, implement, and run strategic business and technology solutions that yield a dramatic commercial impact on our clients’ profitability and performance.


Defender

Attivo Networks® provides accurate detection, analysis, and automated response to in-network threats. The ThreatDefend™ platform efficiently detects advanced, stolen credential, insider, and ransomware attacks within user networks, data centers, cloud, branch, and specialty environments by deceiving attackers into revealing themselves. ThreatOps™ playbooks and 3rd party integrations provide accelerated incident response

Armorblox has built the world's first natural language understanding (NLU) platform, providing a new way to intelligently detect, alert and protect against identity-related attacks and data loss. Enterprises use Armorblox to automatically create and adapt policies, continuously measure risk exposure, and reduce alert fatigue. Learn more: https://www.armorblox.com.

BitSight is transforming how companies manage information security risk with objective, verifiable and actionable Security Ratings. Founded in 2011, the company built its Security Ratings Platform to continuously analyze vast amounts of external data on security issues and behaviors in order to help organizations manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk. Seven of the top 10 cyber insurers, 60 Fortune 500 companies, and 3 of the top 5 investment banks rely on BitSight to manage cyber risks.

Checkmarx Inc. is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications. Amongst the company's 1,000 customers are 5 of the world's top 10 software vendors and many Fortune 500 and government organizations.

Code42 is the leader in data loss protection, visibility and recovery solutions. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user productivity. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak, misuse and theft while maintaining an open and collaborative culture for employees. Founded in 2001, more than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas. The company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners. For more information, visit code42.com, read Code42’s blog or follow the company on Twitter.

Dropbox is a leading global collaboration platform that's transforming the way people work together, from the smallest business to the largest enterprise. With more than 500 million registered users across more than 180 countries, our products are designed to help unleash the world’s creative energy and establish a more enlightened way of working. For more information, visit dropbox.com/business.

Ixia provides testing, visibility and security solutions, strengthening applications across physical and virtual networks for enterprises and governments, service providers, and network equipment manufacturers.

Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live. We remove the traditional constraints of networking to enable our customers and partners to deliver automated, scalable and secure networks that connect the world.

Proofpoint protects organizations’ biggest risks and greatest assets: their people. With an integrated suite of cloud-based threat, information, and user protection solutions, Proofpoint helps leading organizations mitigate their most critical security and compliance risks.

SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. Learn more at www.sailpoint.com.
+
BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing privilege-related breaches. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. We are trusted by 20,000 customers. Learn more at www.beyondtrust.com.

Tessian is building the world’s first Human Layer Security platform to fulfil our mission to keep the world’s most sensitive data and systems private and secure. Using stateful machine learning to analyze historical email data, Tessian’s Parallax Engine can predict for this user, at this point in time, does this email look like a security threat? Tessian protects leading enterprises across the financial, legal and technology sectors from being compromised by spear phishing, misdirected emails, unauthorized emails and other threats executed by humans.


Protector

Boldon James is an industry specialist in data classification and secure messaging, delivering globally-recognised innovation, service excellence and technology solutions that work.

Part of the QinetiQ group, a major UK plc and FTSE 250 company, we integrate with powerful data security and governance ecosystems to enable customers to effectively manage data, streamline operations and proactively respond to regulatory change.

We're a safe pair of hands, with a 30 year heritage of delivering for the world’s leading commercial organisations, systems integrators, defence forces and governments.

Darktrace is the world’s leading AI company for cyber defense. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide.

Founded to enhance the safety and security of international and domestic travelers, Global Guardian provides corporate organizations and families alike with an integrated suite of security, medical, and emergency response services with a single point of contact. Headquartered in Washington D.C., Global Guardian’s 24/7 Operations Center identifies, monitors, and responds to threats and emergencies with global on-the-ground teams in over 100 countries.

Gurucul helps enterprises protect themselves against cyber fraud, insider threats and external intruders on-premises and in the cloud. User and entity behavior analytics (UEBA) and identity analytics (IdA) from machine learning anomaly detection and predictive risk-scoring algorithms reduces the attack surface for accounts, unnecessary access rights, and to identify, predict and prevent breaches.

Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP and Oracle cyber-security, Onapsis’ patented solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Onapsis serves over 180 Global 2000 customers and are the de-facto standard for leading consulting and audit firms.

PacketViper is cybersecurity deception technology featuring agentless, lightweight deception earlier in the cyber kill chain. It is both internal and external facing providing detection and prevention while providing heavyweight results including: dynamic network defense, relief of security related operational costs and burdens, and 3rd party risk monitoring with policy enforcement.

Companies rely on the Akana API platform to integrate applications and databases to deliver better digital applications, improving the customer experience and positively impacting ROI.

SecureAuth is leveraged by leading companies, their employees, customers and partners to secure all identities everywhere: cloud, hybrid and on premises. As a leader in identity and access management, SecureAuth is powering an identity security revolution by enabling people and devices to intelligently and adaptively access systems and data, while effectively keeping bad actors from doing harm. SecureAuth makes it easier for organizations to establish trust and prevent the misuse of credentials, and exponentially reduce the threat surface. To learn more, visit www.secureauth.com, or connect with us at info@secureauth.com, Twitter, and LinkedIn.