Interested in Sponsoring the CSO50 Conference + Awards?

The CSO50 Conference + Awards attracts a powerful and influential audience of security decision makers. Sponsorship packages are designed to provide value and interaction through brand visibility and networking opportunities.
Learn how to become a sponsor of the 2018 CSO50 Conference.

2018 Sponsors


Underwriter

Print security is more than document security. Today’s security threats require attention to data in transit and endpoint devices on the network. HP Print Security offers a comprehensive strategy that includes solutions to help secure data and documents, plus visibility and reporting to optimize your environment and meet compliance regulations. Only HP Enterprise printers offer real-time detection, automated monitoring, and built-in software validation to help stop threats the moment they start. Learn more at www.hp.com/go/reinventsecurity

 

Zscaler 100% cloud-delivered services secure the traffic of thousands of organizations in 185 countries, including more than 200 of the Global 2000. Zscaler delivers the inbound and outbound gateway security stacks as a service—securely connecting users to apps and services, no matter where users connect or where the applications are hosted. The multi-tenant Zscaler platform is elastically scalable, delivers a fast, seamless user experience, and provides a single console for unmatched global visibility, reporting, and policy control.

The two flagship services of the platform include:
• Zscaler Internet Access, which provides inline inspection of every byte of traffic to make sure nothing bad comes in and nothing good leaves
• Zscaler Private Access, which provides secure access to internal apps hosted in the data center or public clouds without allowing users onto the network or exposing apps to the internet


Defender

Attivo Networks® provides accurate detection, analysis, and automated response to in-network threats. The ThreatDefend™ platform efficiently detects advanced, stolen credential, insider, and ransomware attacks within user networks, data centers, cloud, branch, and specialty environments by deceiving attackers into revealing themselves. ThreatOps™ playbooks and 3rd party integrations provide accelerated incident response

Code42, the leader in cloud-based endpoint data security and recovery, protects more than 47,000 organizations worldwide. Code42 enables IT and security teams to centrally manage and protect critical data for some of the most recognized brands in business and education. From monitoring endpoint data movement and use, to meeting data privacy regulations, to simply and rapidly recovering from data incidents no matter the cause, Code42 is central to any organization’s data security strategy. Code42 is headquartered in Minneapolis, MN and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners.

Darktrace is the world’s leading AI company for cyber defense. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide.

Used by the Who's Who of Global Organizations for next generation data protection, GTB Technologies’ patented solutions easily integrate into an organizations’ existing infrastructure without monopolizing resources or disturbing end-users.
Recent reports by 2 of the major independent research firms have rated GTB Technologies' Enterprise DLP that Works Platform with the highest scores in:
• Intellectual Property Protection,
• Data Discovery,
• Data Classification,
• Cloud Coverage,
• Endpoint Protection
• Multi-language availability,
• Reporting,
• Risk Management,
• Customer Support,
• Favorable Pricing
• Content Aware Digital Rights Management (DRM / IRM)
• Deployment Distribution

GTB's Enterprise DLP that Works suite covers Network DLP, Endpoint DLP, Data Discovery with real-time Data Classification, Content Aware E-DRM, Cloud storage and application control. Learn more at www.gttb.com

Leveraging the popular Chrome browser as its principle user interface, Chrome OS is the easy-to-use and easy-to-manage computing platform for high-level functionality in virtualized work environments. Built specifically for the cloud, Chrome OS powers a new generation of business-ready devices, enabling organizations of all sizes to transform the way they work and maximize the benefits of cloud technology. With always-on, multilayered security and automatic updates, Chrome browser and Chrome OS allow businesses to securely mobilize employees while reducing IT support burden and the associated costs. Chrome Enterprise license adds to the strengths of Chrome OS – providing the functionality that enterprises need to control their Chrome device fleet at scale, and create an optimal user experience for enhanced productivity and security.

JD.com is China’s largest e-commerce company by revenue, and the country’s largest retailer, online or offline. The company strives to offer Chinese consumers the most enjoyable online shopping experience with authentic products covering everything from consumer electronics and luxury goods, to fresh food, household products and clothing. Building on its reputation for product authenticity and fast, reliable delivery, JD.com recorded GMV of US$135.3 billion in 2016, and was the largest Chinese internet company by revenue, and the third largest globally with net revenues of US$37.5 billion. JD.com is currently on pace to become China’s largest B2C e-commerce platform by 2021.

Kaspersky Lab is a global cybersecurity company founded in 1997. Its deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. Over 400 million users and 270,000 corporate clients are protected by Kaspersky Lab technologies

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm.

StackRox eliminates security blind-spots in cloud-native applications. Whether you are migrating legacy apps to a container model or adopting a microservices strategy, the StackRox system eliminates unknown risks within these environments by mapping, exposing and blocking threats across a distributed attack surface. Unlike traditional security tools which were not designed for modern software environments, the StackRox platform is a purpose-built architecture powered by an Adversarial Intent Model™ (AIM) that proactively exposes and disrupts attacks in real time, limiting their potential impact. In the last year, StackRox has become the de-facto standard for Global 2000 enterprises running cloud-native applications at scale.

SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior.  Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, up to 90%.


Protector

A subsidiary of QinetiQ plc, Boldon James has been a leader in Data Classification and Secure Messaging solutions for over 30 years.

Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach. The company’s Zero Trust framework verifies every user and device and limits the amount of access to apps and infrastructure. Centrify enables over 5,000 worldwide organizations, including over half the Fortune 50, to proactively secure their businesses from the inside out.

Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications. Amongst the company's 1,000 customers are 5 of the world's top 10 software vendors and many Fortune 500 and government organizations.

Cybereason, creators of the leading cybersecurity data analytics platform, takes a completely new approach to cybersecurity. Cybereason offers endpoint detection and response, next-generation antivirus, and active monitoring services, all powered by its proprietary data analytics platform. The Cybereason suite of products provides unmatched visibility, increases analyst efficiency, and reduces security risk.

Gurucul is a global cyber security company changing how organizations protect their most valuable assets, data and information from insider and external threats on-premises and in the cloud.  Gurucul’s real-time security analytics and intelligence technology combines machine learning behavior profiling with predictive risk-scoring algorithms to predict, prevent and detect breaches.

InfoArmor Advanced Threat Intelligence is a world-leading provider of operatively-sourced threat intelligence. InfoArmor’s elite team of Dark Web operatives and researchers source and deliver unsurpassed threat intelligence in a targeted manner. The award-winning VigilanteATI® Advanced Threat Intelligence platform has become the de facto standard in delivering true threat intelligence for any size organization.

KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. Over 15,000 organizations use KnowBe4’s platform to mobilized their end users as the last line of defense.

Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP and Oracle cyber-security, Onapsis’ patented solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Onapsis serves over 180 Global 2000 customers and are the de-facto standard for leading consulting and audit firms.

PwC’s cybersecurity and privacy global team of 3,300+ practitioners include specialized consultants, former law enforcement agents, cyber-forensic investigators, intelligence analysts, technologists, attorneys and industry leaders in cybersecurity and privacy. Our team has deep experience helping global businesses across industries strategically assess, design, deploy and improve cybersecurity programs.

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. Built by practitioners, for practitioners, it is the only solution that works seamlessly across any cloud and infrastructure. Signal Sciences customers include Under Armour, Etsy, Yelp/Eat 24, Datadog, WeWork and more. The company is headquartered in Culver City, CA.

Cloud is critical to business innovation and growth, but its use can put data, an enterprise’s most valuable asset, at risk. Skyhigh protects data across all cloud services with the speed, scale and user-centricity the cloud demands. With Skyhigh Security Cloud, enterprises can accelerate their business by leveraging technology and services to confidently identify, control and protect data and user activities across any cloud, on any device.

Spanugo enables enterprises to demonstrate and be assured that their security postures meet internal and external obligations – continuously and across their entire infrastructure. Spanugo offers IT and Security personnel the flexibility to pick specific environments and associate them with different security controls and configure the frequency of validation. Once setup, Spanugo automates the process of gathering configurations and evidences, and validating them against the selected controls. Enterprises can pick from existing industry standard set of controls or create a new collection from a large library of controls. Enterprises and consulting groups can use the authoring tool to easily create new controls – without having to write code.