| Name | Title | Contact Details |
|---|
AttackIQ, a leader in the emerging market of continuous security validation, built the industry`s first platform that enables red and blue teams to test and measure the effectiveness of their security controls and staff. An open platform, FireDrill™ supports the MITRE ATT&CK Matrix, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying defenses work as expected. AttackIQ`s platform is trusted by leading companies around the world. Kennedy joins AttackIQ from Bridgewater Associates where he was head of security for infrastructure technology and controls engineering and brings more than 20 years of cybersecurity risk and operations practitioner experience. Previously, Kennedy led the development of the U.S. Department of Treasury’s and the U.S. Marine Corps’ cybersecurity operations programs, defense and federal contracting for Northrop Grumman, and is a former Marine Corps Officer and Operation Iraqi Freedom veteran.
Authen2cate is a secure, cloud-based identity management provider of Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Identity Management solutions for cloud, web, VPN, and mobile resources.
Panda Security is a Orlando, FL-based company in the Computers and Electronics sector.
Visium Technologies, is making TruContext (enhanced CyGraph) available to commercial customers for the first time. CyGraph was developed by MITRE Corporation. CyGraph is a comprehensive, scalable, high performance system for analyzing network attack relationships to provide actionable information. CyGraph is currently widely used within the Federal government to secure our country`s networks.
Digital Shadows monitors and manages an organization`s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation. The Digital Shadows SearchLight™ service combines scalable data analytics with human data analysts to manage and mitigate risks of an organization`s brand exposure, VIP exposure, cyber threat, data exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the minute view of an organization`s digital risk with tailored threat intelligence.