“We live in a society exquisitely dependent on science
and technology, in which hardly anyone knows anything
about science and technology.” – Carl Sagan
Partner Spotlight
Partner Spotlight
Proofpoint is a leading cybersecurity company that protects organizations’ biggest risks and greatest assets: their people. With an integrated suite of cloud-based threat, information and user protection solutions, we help organizations around the world mitigate their most critical security and compliance risks.
More than half of the Fortune 1000 trust us to stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks and compliance risks across email, the cloud, social media, and the web.
Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go. Because it’s built into the foundation of the internet, Umbrella delivers complete visibility into internet activity across all locations, devices, and users.
By analyzing and learning from this activity, Umbrella automatically uncovers attacker infrastructure staged for current and emerging threats, and proactively blocks requests before a connection is established. With Umbrella, you can stop attacks earlier, identify already infected devices faster, and prevent data exfiltration.
Umbrella provides an effective solution that is open, automated, and simple to use. https://umbrella.cisco.com
Infoblox is the leader in Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems, managed through a single pane of glass. Infoblox has 8,000 customers, including 350 of the Fortune 500, representing 50 percent market share in the DDI space. Learn more at Infoblox.com.
Secureworks® (NASDAQ: SCWX) is a leading global cybersecurity company that protects organizations in the digitally connected world. We close gaps in security layers with a Defense in Concert that combines visibility from thousands of clients, aggregates and analyzes data from any source, anywhere, to prevent security breaches, detect malicious activity in real time, respond rapidly, and predict emerging threats. We offer our clients a cyber-defense that is Collectively Smarter.
Exponentially Safer.™ www.secureworks.com
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation.
With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business. Learn more at www.extrahop.com.
Info-Tech Research Group is the world’s fastest growing information technology research and advisory company, proudly serving over 30,000 IT professionals.
We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.
Synack, the crowdsourced security testing leader, provides real security to modern enterprises. The world’s most trusted ethical hackers find critical issues via the Synack platform.
Companies access the best worldwide talent without compromising trust or resources. Synack has helped over 100 global organizations reduce risk and increase cyber attack resistance.
SentinelOne, headquartered in Mountain View, California, is a provider of next-generation endpoint security, serving more than 2000 customers globally, including 3 of the Fortune 10. Leveraging a single autonomous agent architecture and cloud analytics platform – the SentinelOne solution enables customers to defend against the most advanced cyber threats, including malware, ransomware, and non-malware attacks.
Deployed via the cloud, on premise or as a multitenant managed service, customers use SentinelOne to protect their servers, VDI, cloud and endpoint systems (including cross platform coverage for Windows, Windows legacy, macOS, and Linux), hunt threats, and replace legacy antivirus.
Expel (@expel_io) provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, check us out at https://www.expel.io.
CISO, security and IT professionals are awakening their organizations to the many challenges posed by expanding volumes of unstructured data including lack of visibility and control.
Fasoo products span the life-cycle of sensitive unstructured data to discover, classify, protect, monitor, control, track and expire access to content wherever it travels or resides. Our unified solution enables users to securely collaborate internally and externally with sensitive information while consistently meeting corporate governance and regulatory requirements.
Our file centric approach using encryption with a unique identifier allows organizations to have more visibility and control over unstructured data without interrupting workflows. We’ve engaged in this journey with over 1,500 enterprises to field data-centric solutions that proactively protect corporate brand, competitive position and meet ever-increasing regulatory demands.
Veridium’s Passwordless Authentication Platform delivers strong multifactor authentication. Financial institutions and governments depend on Veridium’s open platform for biometric identity – VeridiumID – for secure mobile initiated MFA for employees, customers and transactions around the world.
Veridium helps institutions increase user engagement while ensuring security and reducing fraud with biometric security that also reduces costs per user. As a founding Steward of the Sovrin Foundation, Veridium is dedicated to open standards that will facilitate self-sovereign identify networks. Veridium also engages with Evernym to encourage live pilots of decentralized identity in action.
Get to know us at https://www.veridiumid.com/.
RiskIQ is the global leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social, and mobile exposures.
Trusted by thousands of security analysts, security teams, and CISOs, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action. Its software protects businesses, brands, and customers.
Having the right cybersecurity talent with the right skills is essential to safeguard systems and mitigate risks while taking advantage of today’s new technologies.
Mitchell Martin understands the role of a skilled workforce in minimizing potentially crippling threats and has built a niche practice focusing on cybersecurity. Our dedicated cyber team keeps a finger on the pulse of industry best practices and shifting competency requirements and has built a focused pipeline of top candidates ready to deliver high-impact solutions, customized to your unique needs.
At Ixia a Keysight Business, we deliver a powerful combination of innovative solutions and trusted insight to support your network and security products, from concept to operation. Whether you are preparing your product for launch, deploying an application, or managing a product in operation, we offer an extensive array of solutions in testing, visibility, and security—all in one place.
Whether you are seeking greater visibility into your network or better performance, our solutions validate network functions, test the integrity of security infrastructure, and deliver an end-to-end view of your network. The result: stronger applications, better performance, increased security resilience, happier customers, and maximum ROI. For more information please visit www.ixiacom.com.
Got questions? We’ve got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
HolistiCyber provides end-to-end, state-of-the-art cyber security consultancy solutions by a world class, multidisciplinary team of cyber experts.
These top cyber security professionals assist organizations in staying ahead of the most sophisticated cyber threats used by attackers who leverage Nation State tools developed by the NSA and other top worldwide defense agencies that have leaked into the darknet.
HolistiCybers experts ,veterans of the Intelligence branch of the Israel Defense Forces (IDF) and government agencies bring to the private and public sector sophisticated and practical nation-state cyber defense and attack experience.
HolistiCyber has gained significant credibility through its holistic approach based on a comprehensive understanding of business processes and identification of organization’s critical and strategic assets, all from the view point of highly sophisticated hackers and attackers to help organizations manage cybersecurity risks .
HolistiCyber has become a trusted cyber defense advisor to leading organizations and businesses in multiple countries world wide .