top of page

Thank you to our sponsors!



Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. Based in Austin, Texas, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries. Engage with Forcepoint on www.forcepoint.comTwitter and LinkedIn.

Security has gotten too complicated, and it doesn’t need to be. Forcepoint has taken a huge step forward to simplifying security for organizations across the globe with Forcepoint ONE. Security is simplified by unifying technologies into a single platform, providing just one management console to manage one set of security policies, and one unified endpoint agent. With Forcepoint ONE, it is easier for organizations to implement Zero Trust with certainty, to stop ransomware and other malware in their tracks, to know data is safe wherever you need it. We look forward to partnering with you to drive forward this mission.


armis_PRPL-BLK_lrg (2).png

Armis is the global leader in cyber asset security. Fortune 500 companies trust our real-time, comprehensive asset intelligence to deliver full visibility and automated enforcement across every connected asset and environment. Armis helps organizations across any industry continuously secure their entire cyber-asset attack surface.


Abnormal Security provides the leading cloud-native email security platform that leverages behavioral AI to stop socially-engineered attacks that evade traditional secure email gateways. Abnormal delivers a fundamentally different approach that precisely detects and prevents a wide range of modern attacks including business email compromise, invoice fraud, credential phishing, and more.

Thank you to our sponsors

Balbix is the cybersecurity posture automation company. We use AI to reinvent how the world’s leading organizations reduce the likelihood and impact of a breach. With the advanced analytics and automation of the Balbix Security Cloud, security teams can accurately inventory their cloud and on-premise assets, conduct risk-based vulnerability management, and quantify their cyber risk in monetary terms. As a result, security leaders can measure and improve SLA compliance and other key metrics in real time, demonstrate the ROI of their cybersecurity program, and confidently report on their security posture to the board of directors and other key stakeholders.

Team Cymru’s mission is to save and improve human lives.  We are unrivalled at providing threat intelligence and digital business risk platforms to private organizations, offer free to use community services that maintain internet integrity,  and deliver support services to over 143 CSIRT teams worldwide.  Since 2005, our reputation remains unchallenged.

GitLab is The One DevOps platform for software innovation. As The One DevOps Platform, GitLab provides one interface, one data store, one permissions model, one value stream, one set of reports, one spot to secure your code, one location to deploy to any cloud, and one place for everyone to contribute. The platform is the only true cloud-agnostic end-to-end DevOps platform that brings together all DevOps capabilities in one place.

With GitLab, organizations can create, deliver, and manage code quickly and continuously to translate business vision into reality. GitLab empowers customers and users to innovate faster, scale more easily, and serve and retain customers more effectively. Built on Open Source, GitLab works alongside its growing community, which is composed of thousands of developers and millions of users, to continuously deliver new DevOps innovations.

Netwrix makes data security easy thereby simplifying how professionals can control sensitive, regulated and business-critical data, regardless of where it resides. More than 11,500 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers.


Founded in 2006, Netwrix has earned more than 150 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.

Orca Security provides comprehensive security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents. Orca’s Cloud Security Platform detects and prioritizes risks in minutes ﹣ not months ﹣ and is trusted by global innovators, including Databricks, Autodesk, and Gannett.

VMRay’s advanced threat detection and analysis platform helps enterprises, governments and MSSPs identify the real threats from the noise and get deeper insights into those genuine threats. With the most accurate and actionable insights into malware and phishing behavior, VMRay Analyzer completes customers’ security stack and improves SOC team productivity by enabling the automation of time-consuming tasks and processes. Learn more at 


Black Kite Logo - Vertical for Light BG (2).png
ICM CYBER LOGO-line 121 -Trans.png
ISLAND - Logo_Vertical_for White BG.png

One in four organizations suffered from a cyber attack in the last year, resulting in production, reputation and financial losses. The real problem is adversaries attack companies via third parties, island-hopping their way into target organizations. At Black Kite, we’re redefining vendor risk management with the world’s first global third-party cyber risk intelligence platform, built from a hacker’s perspective.

With 400+ customers across the globe and counting, we’re committed to improving the health and safety of the entire planet’s cyber ecosystem with the industry’s most accurate and comprehensive cyber intelligence. While other security ratings service (SRS) providers try to narrow the scope, Black Kite provides the only standards-based cyber risk assessments that analyze your supply chain’s cybersecurity posture from three critical dimensions: technical, financial and compliance.

SentinelOne is the only cybersecurity solution encompassing AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle.

Revelstoke radically simplifies security orchestration, automation and response (SOAR), so security teams can work faster, smarter and more effectively. With a low-code, drag-and-drop interface, dozens of built-in integrations, incredible visibility into performance metrics, and robust reporting capabilities, Revelstoke empowers analysts to stop threats fast, and gives security leaders a clear picture on the business impact of security operations.

Tines is no-code automation for security teams. The world's best companies — from startups to the Fortune 10 – trust Tines to powerfully manage their mission-critical workflows, automatically responding to and remediating alerts in real-time.

Conceal enables organizations to protect users from malware and ransomware at the edge. Our Conceal Platform uses Zero Trust isolation technology to defend against sophisticated cyber threats. Conceal is used by Fortune 500 and government organizations to ensure users and IT operations remain secure, anonymous, and isolated from cyber-attacks.

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. The Netskope platform provides optimized access and zero trust security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit

BlackBerry Cylance is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.

BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect
identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our
integrated products and platform offer the industry's most advanced privileged access management (PAM) solution,
enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy,
manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network


Happy Hour


bottom of page