Sponsors

Principal Keynote


Strategic Sponsors

BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect identities, stop threats, and deliver dynamic access. We offer the only platform with both intelligent identity threat detection and a privilege control plane that delivers zero-trust based least privilege to shrink your attack surface and eliminate security blind spots.  


BeyondTrust protects identities, access, and endpoints across your organization, while creating a superior customer experience and operational efficiencies.  We are leading the charge in innovating identity-first security and are trusted by 20,000 customers, including 75 of the Fortune 100, plus a global ecosystem of partners. Learn more at www.beyondtrust.com. 
 

 


Leader in the detection of cyber threats, Gatewatcher has been protecting the critical networks of worldwide large companies and public institutions since 2015. Our Network Detection and Response (NDR) and Cyber Threats Intelligence (CTI) solutions, quickly detect and respond to any cyber-attacks. Thanks to AI converging with dynamic analysis techniques, Gatewatcher delivers a real-time 360-degree view of threats, covering both cloud and on-premise infrastructures.
 


Education seminar sponsors

Binalyze is the developer of AIR, an innovative Investigation and Response Automation platform powered by digital forensics.
Binalyze empowers incident response and SOC teams to accelerate the time to close threat investigations with end-to-end investigation capabilities. AIR provides the powerful combination of forensic-level visibility, automation, alongside an easy to use, collaborative interface.
AIR delivers speed, efficiency, and accuracy that elevates the investigation experience and enables teams to more effectively and proactively respond to cybersecurity incidents improving response outcomes and bolstering cyber resilience.


Organizations trust Cequence Security to protect their web apps and APIs with the most effective and adaptive defense against online fraud, business logic attacks, exploits and unintended data leakage, which enables them to remain resilient in today’s ever-changing business and threat landscape.


Cyberwise is a leading cybersecurity solutions provider, with a a holistic approach to cybersecurity including IT, OT, IoT, IIoT and Cyber Physical Systems (CPS). Cyberwise with its “one-stop-shop” business model offers various cybersecurity products from leading global technology vendors, consulting, auditing and managed security services to enterprises in diverse industries, such as Finance, Telecommunications, Manufacturing, Energy and Government. Cyberwise, with 275+ employees and having offices in Ankara, Istanbul, İzmir, Dubai and Amsterdam , is committed to delivering superior customer experience and providing best-in-class solutions and services to over 750 enterprise customers in the EMEA region. Cyberwise was established through the merger of leading cybersecurity companies, Biznet and Securrent (SECURRENT ME), gathering more than 30 years of experience.


Darksight provides Vulnerability Intelligence and Patch Management solutions to worldwide organizations. It aims to help corporations with improved responsiveness and tightened IT infrastructure security.
The challenge for organizations today is not only to identify and understand what vulnerable applications exist on their end-user devices, but their major problem is to remediate them. The lack of a quick and efficient way of developing the updated packages is slowing down the remediation process, resulting in 3rd party applications remaining unpatched. With the multiple update package creation and automated patch deployment methods, DarkSight resolves this issue and makes the patch management process much more efficient.
DarkSight handles patch management as a process which starts with Scanning in order to identify the vulnerable non-Microsoft applications and ends with patch deployment and verification to ensure the vulnerabilities are remediated.
DarkSight research team collects, analyses and validates information from all multinational Cert organizations, as well as many other sources found on the net providing you with the latest alerts. Not only does it detects Secure, Insecure, End of Life applications but also discontinued ones.
Creating cycles to patch manually or automatically one or more packages. Daily, weekly, monthly, or quarterly patch cycles can be scheduled.
It allows you to customize the solution to self-trigger the remediation process as soon as a new vulnerability is detected.
Darksight goal is to help companies achieve a higher level of Security as well as comply with many governmental regulations and international compliance and standards like ISO 27001.
 


Entrust keeps the world moving safely by enabling trusted identities, payments and data protection. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us. Entrust nShield HSMs are among the highest-performing, most secure and easy-to-integrate HSM solutions available, facilitating regulatory compliance and delivering the highest levels of data and application security for enterprise, financial and government organizations. The unique nShield Security World key management architecture provides strong, granular controls over access and usage of keys. To learn more visit www.entrust.com/hsm


The Exclusive Networks Group connects new and growing global technology providers for the pan-European market through their "Super Value Add Distributor" model. The company specializes in security, networking, infrastructure, and storage solutions for the "Smarter Social Enterprise." Known as early adopters and technology experts, they distribute products from leading and emerging manufacturers from Europe, the USA, and the Far East exclusively through the indirect channel.

With their integrated solution platform, CARM (Cyber Attack Remediation and Mitigation), they are at the forefront of post-breach security, which involves security measures after security breaches have occurred. This unique platform seamlessly integrates provider technologies into a comprehensive, fully traceable end-to-end solution, enabling companies to identify, contain, respond to, eliminate, and restrict the impact of security breaches.

The question is not "if" but "when" a security breach will occur. And when it does, you need the right providers for integrated security who can act accordingly, identifying the time and place of the breach and deciding what to do next. The Cyber Attack Remediation & Response Platform (CARM) from Exclusive Networks ensures that you are prepared when the inevitable happens!

For more information please visit: www.exclusive-networks.com


As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget. ManageEngine crafts comprehensive IT management software with a focus on making your job easier. With our 90+ products and free tools cover everything your IT needs, you can take complete control of your IT infrastructure and services—both on-premises and in the cloud. For more information, visit https://www.manageengine.com/

 


Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.


ME Infosec provides Information Security services and all related solutions to organizations in the Middle East. Our goal is to help organizations achieve a higher level of security. We think out of the box, thus understanding how hackers operate, and identify an effective way to secure any infrastructure, creating simple and effective processes.
For more information: https://www.meinfosec.com/


Seclore is a leading provider of data-centric security solutions, enabling organizations to control and protect their sensitive information wherever it goes, both within and outside of the organization. Founded in 2008, the company is headquartered in United States with global offices in India, the United Kingdom, the Middle East, and Asia Pacific.

Seclore’s data-centric security platform provides persistent, granular, and dynamic data-centric security for enterprises. Its flagship product, the Seclore Data-Centric Security Platform, empowers organizations to manage the usage and distribution of their sensitive information, regardless of its format or location. The platform seamlessly integrates with existing enterprise systems to provide persistent protection for files shared internally and externally, including emails, documents, and images.

The platform provides advanced data classification and rights management capabilities, enabling organizations to define policies and controls around who can access, edit, and share their sensitive information. The platform also provides audit trails and granular reporting capabilities, giving organizations visibility into the usage and distribution of their sensitive information.

 

Overall, Seclore’s data-centric security solutions enable organizations to achieve their strategic objectives by protecting their sensitive information, enhancing their regulatory compliance posture, and improving their overall security posture.


In today’s digital landscape, organizations rely on Thales to protect what matters most - applications, data, identities, and software. Trusted globally, Thales safeguards organizations against cyber threats and secures sensitive information and all paths to it — in the cloud, data centers, and across networks. Thales offers platforms that reduce the risks and complexities of protecting applications, data, identities and software, all aimed at empowering organizations to operate securely in the digital landscape. By leveraging Thales's solutions, businesses can transition to the cloud with confidence, meet compliance requirements, optimize software usage, and deliver exceptional digital experiences to their users worldwide.


Veracode is intelligent software security. 

  • The Veracode Software Security Platform continuously finds flaws and vulnerabilities at every stage of the modern software development lifecycle.
  • Using powerful AI trained on a carefully curated, trusted dataset from experience analyzing trillions of lines of code, Veracode customers fix flaws faster with high accuracy. 
  • Trusted by security teams, developers, and business leaders from thousands of the world’s leading organizations, Veracode is the pioneer, continuing to redefine what intelligent software security means. 

Networking Sponsors

iZOOlogic is dedicated to providing niche Threat Intelligence and Digital Risk Protection solutions.The iZOOlogic platform is an integrated suite of services allowing real time intelligence into the online threat landscape and provides a seamless 24x7x365 Global Incident Response. iZOOlogic provides Threat Advisory Services, Threat Intelligence, Domain Name Management, Brand Protection, Anti-Phishing, Infrastructure and Application Threat and Vulnerability Monitoring, DNS Intelligence, Dark Web Monitoring, Data Loss Recovery Services, Financial Malware and Trojan Monitoring, Web App Protection, DMARC Managed Services, Digital Asset Management, Vendor Risk Assessment and Threat Management solutions. iZOOlogic is headquartered and maintains a GSOC in the City of London, UK, with operations in California, USA and Melbourne, Australia, and protects corporate and government clients across the world.
 
iZOOlogic business outcomes:

  • Reduce fraud losses from online abuse, phishing and malware;
  • Maintain integrity and assurance of eChannel services;
  • Identify and mitigate compromised Accounts in real time;
  • Prevent cybercriminals from hijacking the corporate brand;
  • Reduce and mitigate reputational risk;
  • Disrupt the cybercriminal ecosystem.

iZOOlogic Info Security outcomes:

  • Real time monitoring and pro-active detection of phishing and abuse;
  • End point protection from phishing and malware;
  • Real time data feed and intelligence of compromised accounts;
  • Identify end users and transactions compromised by malware;
  • Security incident and event management;
  • Web based portal with alerts and reports;
  • 24x7x365 Global Security Incident Response.

 
iZOOlogic solutions:

  • Security as a Service—Subscription based Services;
  • Industry leading SLA’s;
  • Proprietary and dedicated platform, Turn Key;
  • Global Threat Intelligence Platform—intelliZOO;
  • iZOOlabs Incident Management Portal;
  • 24x7x365 Security Operation Centre & Malware Lab.

 


PhishRod is a leading anti phishing solutions provider with an objective to develop technologies that enables people in the organizations to combat cyber attacks. With our headquarter in US and regional office in Middle East, PhishRod has a strong partner network across Middle East, Africa, Europe & Australia. PhishRod was established to address the threats vector related to phishing. Our aim is to develop workable solutions that empower people in the organization to be the first line of defense and play an active role in threat identification.


Sectona is a Privileged Access Management company that helps enterprises mitigate the risk of targeted attacks on privileged accounts spread across data centres and the cloud. Sectona delivers integrated privilege management components for securing dynamic remote workforce access across on-premises or cloud workloads, endpoints and machine-to-machine communication.

Sectona, with its light, integrated approach, provides a single console for securing passwords & secrets in an embedded vault, secure access with cross-platform access technology & manage privileges over endpoints.

Sectona’s extended platform capability supports Just-in-Time privileged access for implementing zero standing privileges and provides automation capabilities with its built-in Privileged Task Automation and Account Lifecycle Management. For more details, visit https://sectona.com/ and follow @sectona1 on Twitter and @Sectona on LinkedIn.