Sponsors

Strategic Sponsors

Attivo Networks®, the leader in deception technology, provides accurate in-network threat detection, analysis, and accelerated response to advanced, credential, insider, and ransomware attacks. The ThreatDefend™ Deception and Response Platform provides continuous visibility and efficient threat management for user networks, data centers, cloud, branch, IoT, ICS-SCADA, and POS environments. Camouflage dynamic deception sets high-interaction traps to misdirect and lure attackers into revealing themselves. The solution’s advanced attack analysis and lateral movement tracking automate investigation, deliver evidence-based alerts, and in-depth forensic reports. Incident response is simplified with ThreatOps™ playbooks and 3rd party integrations for automated attack blocking, quarantine, and threat hunting.

www.attivonetworks.com


Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.

The company has over 900 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage


LexisNexis® Risk Solutions leverages comprehensive digital and physical identity intelligence, machine learning and advanced big data analytics to accelerate risk management decisions and fortify fraud defenses for global businesses in over 100 countries. Our solutions combine innovative technology and intuitive analytics with more than 78 billion data records augmented by the digital identity coverage of the ThreatMetrix® Digital Identity Network to deliver a concise 360-degree view of risk at any point in the customer lifecycle. By correlating and consolidating the complex and ever-changing attributes that make up a consumer or business identity, LexisNexis Risk Solutions provides robust, actionable risk insights enabling secure and seamless transactions while limiting friction intelligently across every channel via a multi-layered approach. For more information, please visit www.risk.lexisnexis.com.

Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy.

From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.

www.mimecast.com


Paladion is a global cyber defense company that provides Managed Detection and Response Services,  Cyber Forensics, Incident Response, and more by tightly bundling its semi-autonomous AI driven cyber platform and managed services with leading security technologies. Paladion is consistently rated and recognized by analyst firms such as Gartner, Forrester, and IDC, and awarded by CRN, Asian Banker, Red Herring, amongst others.

For over 19 years, Paladion has been actively managing cyber risk for 700+ customers from its six cyber operations centers placed across the globe. It houses 900+ cyber security professionals including security researchers, threat hunters, ethical hackers, incident responders, solution architects, consultants and more. Paladion is also actively involved in several information security research forums such as OWASP, and has authored several books on security monitoring, application security, and more.

For more information, please visit www.paladion.net.

 

 


Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organisations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organisations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. More information is available at https://www.proofpoint.com/uk


Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future.

www.recordedfuture.com/ 


Synack, the most trusted crowdsourced security platform, delivers comprehensive and continuous penetration testing with actionable results. The company combines the world's most skilled and trusted ethical hackers with AI-enabled technology to create a scalable, effective security solution. The Synack platform delivers data-driven insights to help organizations understand their risk from a hacker's perspective and then mitigate that risk with a hacker's help. These insights secure critical infrastructure and leading brands and businesses around the world. Headquartered in Silicon Valley with regional offices around the world, Synack protects leading global banks, federal agencies, DoD classified assets, and close to $1 trillion in Fortune 500 revenue. Synack was founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO. For more information, please visit www.synack.com


Education seminar sponsors

The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world.

With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 global corporations and government agencies, including NYC Health + Hospitals; KPMG; Kaiser Permanente; Latham & Watkins; National Park Service; Umpqua Bank; Tyler Technologies; and the National Institute for Standards and Technology (NIST).


Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone - and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access and video delivery solutions is supported by unmatched customer service, analytics and 24/7/365 monitoring. To learn why the world’s top brands trust Akamai, visit www.akamai.comblogs.akamai.com, or @Akamai on Twitter.


Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases. As traditional network perimeters dissolve, organizations must discard the old model of “trust but verify” which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Organizations may consider approaching Privileged Access Management by solely implementing password vaults, leaving gaps that can easily be exploited. Centrify Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions. Centrify’s industry-recognized solution redefines legacy Privileged Access Management and goes beyond simple password vaulting to converge the core tenets of Zero Trust Privilege. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.

 


Cyxtera Technologies combines a worldwide footprint of 50+ best-in-class data centers with a portfolio of modern, cloud- and hybrid-ready security and analytics offerings – providing more than 3,500 enterprises, government agencies and service providers an integrated, secure and cyber-resilient infrastructure platform for critical applications and systems. For more information about Cyxtera visit, http://www.cyxtera.com/.


Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 400,000 customers trust Fortinet to protect their businesses. Learn more at http://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs.


Help AG provides leading enterprise businesses and government organizations across the Middle East with tailored Cyber Security Assurance services and solutions that addresses the most diverse and complex requirements. Founded in Germany in 1995, we have been present in the Middle East since 2004 and have firmly established ourselves as the region’s leading cyber security advisor.

Our Cyber Security Analysis Division offers essential security services which are imperative to uncovering security vulnerabilities that would otherwise go unnoticed. We offer extensive technical expertise in delivering Penetration Test, Detailed Web Assessment, Mobile Application Hacking, Social Engineering, and Source Code Review services, to guide our customers’ security investments so that they can best secure their information, data, and assets.

Help AG’s offering for Information Security Governance and Compliance is based on our unique Governance & Assurance Framework, which ensures that information security follows a risk based and information centric approach, to meet an organization’s specific needs and compliance requirements.

Our Cyber Security Operations Centre (CSOC) which is staffed by top-level security analysts; offers monitoring, analysis and interpretation of security events occurring within your infrastructure 24 hours a day and 7 days a week. Help AG Managed Security Services (MSS) is designed to detect, analyze and respond about security threats, malicious, abnormal and unauthorized behavior as well as anomalies and deviations in trends and baselines specific to your organization.

Help AG’s Incident Response service allows you to recognize an incident, evaluate the associated risks, and determine the most effective approach to remediate the incident. Our approach to incident response enables you to position your organization a step ahead of any incident.

We value our customers’ privacy and although local data collection is a must, we handle this in the most secure way possible by our unique service offering which ensures that data does not leave the customer’s environment.

When technology is able to act on a consistent stream of information about a person, and still keep that information safe, it can do great things. Okta is built on that understanding. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. As the foundation for secure connections between people and technology, Okta helps companies fulfill their missions as quickly as possible. Today, thousands of organizations trust Okta to help them work faster, boost revenue, and stay secure. 


Founded in 2002, OPSWAT has since grown to become a global company. Headquartered in San Francisco, they also have offices in Romania, Hungary, Vietnam, Taiwan, Japan, Israel, and the UK.

Today, they have nearly 200 employees, over 1,000 customers, hundreds of technical partners, and dozens of resellers, but their mission is the same: to provide the most effective threat prevention technology possible.

To solve the challenges faced by modern enterprises and to shut off major attack vectors, they offer two product platforms: MetaDefender for threat prevention and MetaAccess for cloud access control and endpoint compliance.  Their guiding principles: Trust No File. Trust No Device

 


PGI is a specialist British cyber-security company. We help our clients build their in-house cybersecurity capability through consultancy, assurance and training.

PGI’s Cyber Academy builds technical cybersecurity skills using UK government-certified courses and a powerful, immersive cyber range. We address skills shortages – creating new cyber security staff through reskilling, and helping practitioners develop advanced skills. Government agencies – including SAMA and CBK – and banks in six Middle Eastern countries have used PGI to reskill, train and certify staff for SOC, penetration testing, forensics, incident response and consultancy roles. Government and academic institutions in the Middle East, Europe and SE Asia have also chosen us as a training partner. And CISOs recently named PGI ‘Most Effective Training Provider’ in the AKJ Associates ‘Who Secures the UAE’ report (https://www.cyberviser.com/who-secures-the-uae-report).

PGI has worked with its corporate, critical infrastructure and government clients in the EMEA region to develop their security functions including Security Operations Centres (SOCs), Cyber Threat Intelligence Teams (CTIs), and Cyber Security Incident Response Teams (CSIRTs). We designed roles and operational processes, and advised on selecting, implementing and tuning technology solutions.

We offer a full range of cybersecurity services. We are accredited to design and implement IS management systems ranging from ISO27001 to Cyber Essentials according to business need and maturity. Our penetration testing and incident response services are approved by the UK government and registered through the CREST scheme. Our experienced consultants bring current operational experience of government and commercial cybersecurity best practice and risks.


Networking Sponsors

ARCON is a leading Enterprise Information Risk Control Solution provider, specializing in Privileged Access Management and continuous Risk Assessment solutions. Our mission is to help enterprises identify emerging technology risks and help them control by robust solutions that predict, protect and prevent.

ARCON is a privately held technology company, which was established in London in 2006 with research and development center in Mumbai.

The Mumbai-based company has now been in the domain for more than 10 years.

Having started as an upcoming tech start-up, the Company is now recognized as one of the world’s most trusted brands by Information Security professionals.

Our product portfolio includes three robust risk control solutions:

  • ARCON | Privileged Access Management
  • ARCON | Secure Compliance Management
  • ARCON | User Behavior Analytics

We are a team of futurists. Our product development strategy is based on constant interactions with the industry thought leaders. Close collaboration allows us to understand emerging technology-related threats for organizations. Subsequently, we brainstorm and develop best-in-class solutions that enable enterprises to overcome humongous challenges related to information security.

Our enterprise-class solutions provide seamless access and have scalable architecture. More than 250 global enterprises, spanning wide-ranging industries such as Banking, Finance, Insurance, Government organizations, Oil & Gas, Pharmaceutical, Logistics, Fintech trust ARCON solutions to safeguard critical business information.

ARCON is widely recognized by the analyst community such as Gartner and KuppingerCole.  The Company has a global presence, enabled by its well-distributed partner network.

While we continue to be a leader in India and the Middle East, we are fast gaining traction in the APAC region, Africa and Europe.

 


Bulwark is the leading provider for IT Security and Information Communications & Technology (ICT) products in the Middle East region & India. Bulwark serves the entire region with innovations from more than 20 technology vendors and works with more than 500+ partners, with the aim of bringing the best in technology to the region. Customers from various sectors including Banking & Finance, Government, Oil & gas, Manufacturing, retail chain, Hospitality, Healthcare, Education, and more rely on solutions distributed by Bulwark for securing and managing their IT infrastructure. Bulwark has won numerous industry awards for leadership in IT sales and support and has been rated as the best Cyber Security specialized VAD in the region. For more information, please visit http://www.bulwark.biz


Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with its new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.


Cloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers more than 10 trillion requests per month, which is nearly 10 percent of all Internet requests worldwide. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world's 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, New York, NY, Washington, DC, London, and Singapore.


Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation and is the company first to provide a consolidated threat detection and response platform that includes: security orchestration, automation and response (SOAR), ICS/SCADA security and endpoint detection and response (EDR). This unique platform enables detection and response across the organization’s entire IT, OT and IoT attack surface. Since founded in mid-2015 Cyberbit’s products have been rapidly adopted by enterprises, governments, higher education institutions and MSSPs. Cyberbit has offices in the US, Europe, and Asia.


Cyware Labs is a Threat Intelligence Sharing and Cyber Fusion product-based cybersecurity company headquartered in New York, USA. Cyware offers a full-stack of innovative cyber solutions for all-source strategic and tactical threat intelligence sharing, cyber fusion, and orchestrated threat response. Cyware Enterprise solutions are designed to promote secure collaboration, inculcate cyber resiliency, and enhance threat visibility by providing organizations an automated context-rich analysis of threats to proactively respond to threats. Cyware solutions leverage advanced breakthroughs in Artificial Intelligence, Machine Learning ,and Blockchain technologies to constantly challenge the security status quo and catalyze a growing ecosystem of empowered enterprises against the evolving threat landscape. Our clients include Fortune 500 financial, healthcare and defense organizations, multinational retail corporations, trade associations, industry groups (including ISACs and ISAOs), non-profits and government agencies. Our pioneering solutions enable organizations to develop proactive cyber defense capabilities, effectively exchange strategic, tactical, and operational threat intelligence, and quickly respond to and manage security threats in real-time.

About Products
Cyware Situational Awareness Platform (CSAP) - A 24x7 platform for receiving, sharing and actioning comprehensive strategic intelligence and real-time alerts on the go via the web, email, and mobile. Cyware Threat Intelligence Exchange (CTIX) - An intelligent bi-directional client-server exchange that facilitates subscriber management and full tactical Threat Intel collection from multiple sources. Cyware Fusion and Threat Response (CFTR) - A comprehensive cyber threat response solution equipped with threat intelligence, actor, malware, and vulnerability tracking, and cyber data fusion capabilities to produce a 360-degree view of the threat.


EliteVAD is a Middle East and Africa (MEA) regional Value Added Distributor of best breed leading edge technology solutions, covering areas of Cyber Security, Intelligence and Forensics, Network Performance and Optimization, Data Center and Cloud. EliteVAD executes innovative technologies that can empower our partners and customers with a real added value.

What we do:  

  • Value Added Distributor (VAD)
  • Covering Middle East and Africa region
  • Headquarters in Dubai, Offices and presence across the region
  • Focused in leading edge innovative

PhishRod is a global anti phishing solution provider with a vision to develop technologies that empower end users in an organizations to thwart cyber attacks. Our integrated and analytics driven approach helps an organization to determine the state of phishing readiness across the enterprise and to automate the cyber security awareness program.

PhishRod suite of products include

  1. Phishing Simulator: With over 500+ built-in templates, the phishing simulator helps an organization to simulate phishing attacks in a controlled environment and determine end user behavior.
  2. Security Awareness Manager:  is a complete and comprehensive workflow to automate the cyber security awareness program. It contains over 30+ computer based training modules in English as well as in Arabic.
  3. Policy Compliance Manager: allows the compliance and governance team to assign corporate IT / IT Security policies to the end users to monitor compliance & consent on a powerful dashboard
  4. Threat Advisory Manager: Using the PhishRod Reporter Plug-In, an end user can report a suspicious email. The security administrators have the power to analyze the reported emails within the PhishRod Threat Intelligence platform before reporting the incidents to SOC. Threat Advisory Manager integrates with the SIEM for threat intelligence sharing.

PhishRod specializes in developing enterprise cyber security awareness frameworks & awareness content. Availability of our technical & professional services team in UAE & our ability to develop security awareness programs based on regional context has helped us won credible references across Telecom, Healthcare, Banking, Oil & Gas & Government institutions.


Put simply, we are the company that is 100% focused on delivering secure access solutions for people, devices, things and services. For years, enterprises of every size and industry have been trusting our integrated virtual private network, access control, virtual application delivery controllers, and mobile security solutions to enable secure access seamlessly in their organizations.

Every single day, our global team are innovating our products to ensure that you can dramatically boost your workers' productivity, make a smooth and secure transition to the Cloud and ensure that your networks are protected without a burden on IT. We call it Secure Access for the next generation.

Pulse Secure  just announced the integration of software-defined Secure Access solutions (SDP) that provide visibility and easy, protected connectivity between users, devices, things and services. This also includes the inclusion of Pulse SDP as an add-on within its award-winning Access Suite. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers with unrivalled provisioning simplicity, security posture fortification and lower total cost of ownership.

Pulse Secure’s partner:

Pulse Secure strategic partners are part of a growing and dynamic ecosystem of solution providers that are dedicated to delivering the Pulse Secure platform.

Our partners bring the platform's enterprise security capabilities to companies of all sizes in a wide variety of industries and geographies.

Pulse Secure Access Suite :

The Pulse Secure Access Suite is a fully integrated software and services solution that is simple to purchase, deploy and use. Our customers love the ROi and TCO advantage by combining our market leading Secure Access products. Not to mention the boost in their workers' productivity.

 


Against today’s complicated cyber security challenges, SECURRENT is a trusted partner of yours by delivering the best security solutions by combining best expertise and outstanding services since 2009.

Located in Istanbul and Dubai, SECURRENT provides next generation network security, identity and access management, PCI DSS consultancy and payment security, encryption management, ICS/SCADA Security services and cloud security solutions for enterprise-class organizations.

SECURRENT is the key partner of leading security vendors like Check Point, Backbox, CyberArk, Thales, Gemalto, Forcepoint, Tufin and more.

SECURRENT will reveal the details of Check Point’s new Gen V Infinity platform and Backbox’s Intelligent Automation solutions for all network and security devices during the event.


SANS Institute is the world’s largest provider of cyber security training.

For over twenty-five years, we’ve provided cutting edge training to governments and organisations across the world. Technology may have changed in that time, but our core mission has remained constant: to protect through sharing cyber security knowledge and skills.

SANS offers over 60 cyber security courses, operates across dozens of countries and has over 200,000 alumni.

SANS training is built around a promise: students will be able to put into practice what they’ve learned as soon as they get back to their desk.

 


Vectra is transforming cybersecurity by applying advanced AI to detect in-progress attacks and hunt for hidden threats. Vectra and its flagship Cognito® platform enable the world’s most consequential organizations to detect cyberattacks in real time and empower threat hunters to perform highly conclusive incident investigations. Vectra reduces business risk by eliminating security gaps in cloud, data center and enterprise environments. Behind the Cognito platform, Vectra threat researchers identify and investigate cyberattacks, vulnerabilities and malicious behaviors that are unknown to the world. With data sets from this research, data scientists develop the machine learning algorithms and behavioral analysis that drive Cognito.


Branding Sponsor

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.