| Name | Title | Contact Details |
|---|---|---|
Jason Hart |
Chief Technology Officer | Profile |
AttackIQ, a leader in the emerging market of continuous security validation, built the industry`s first platform that enables red and blue teams to test and measure the effectiveness of their security controls and staff. An open platform, FireDrill™ supports the MITRE ATT&CK Matrix, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying defenses work as expected. AttackIQ`s platform is trusted by leading companies around the world. Kennedy joins AttackIQ from Bridgewater Associates where he was head of security for infrastructure technology and controls engineering and brings more than 20 years of cybersecurity risk and operations practitioner experience. Previously, Kennedy led the development of the U.S. Department of Treasury’s and the U.S. Marine Corps’ cybersecurity operations programs, defense and federal contracting for Northrop Grumman, and is a former Marine Corps Officer and Operation Iraqi Freedom veteran.
Wheeler Electronics is a Cleveland, TN-based company in the Computers and Electronics sector.
BJSS is an award winning delivery-focused IT Consultancy. With over 20 years` software delivery and IT advisory experience we`re renowned for technical excellence, cost-effective delivery and our proven BJSS Enterprise Agile approach. Our clients include some of the world’s largest organisations including government departments, investment banks, retail banks, energy companies and financial institutions. Founded in 1993 and with offices in London, New York, Leeds, Manchester and Bristol, the company employs over 500 technologists and has established a reputation for the successful design and delivery of reliable, scalable, high-availability enterprise applications.
American Portwell Technology is a Fremont, CA-based company in the Computers and Electronics sector.
Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.