Train From Home on Your Schedule with OnDemand - Special Offers Available Now

Cyber Defense Initiative® 2019

Washington, DC | Tue, Dec 10 - Tue, Dec 17, 2019
This event is over,
but there are more training opportunities.

Exhibitors

Our events incorporate external vendor partners showcasing some of the best security solutions available. Take advantage of the opportunity to interact with the people behind the products and learn what they have to offer you and your organization.

Solutions Expo

  • Friday, December 13
    • 12:00 pm - 1:30 pm
    • 5:15 pm - 6:15 pm

Interested in our Solutions Expo but not registered for a course? Sign up here


Become an Exhibitor! Click here to view Exhibitor Packages

Platinum Sponsors

IBM

http://www.ibm.com/security


Gold Sponsors

Anomali

https://www.anomali.com/

AnomaliŽ delivers intelligence-driven cybersecurity solutions. Organizations rely on Anomali to harness threat data, information, and intelligence to make effective cybersecurity decisions that reduce risk and strengthen defenses. Anomali solutions enable collaboration and sharing of threat information among trusted ISACs and enterprises worldwide. For more information, visit us at www.anomali.com.


Cequence

https://www.cequence.ai/

Cequence Security provides an innovative security software platform for hyper-connected enterprises targeted with sophisticated attacks on their web, mobile and API applications that power their business. The Cequence solution deploys in the cloud or on-premises. It uses its patented CQAI analytics engine to automatically discover web application and detect in near real-time advanced attacks.


Cisco Systems Inc.

http://www.cisco.com/

Cisco is building truly effective security solutions that are simple, open and automated. Drawing on unparalleled cloud, endpoint and network presence as well as the industrys broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco Security, companies are poised to securely take advantage of a new world of digital business opportunities.


DomainTools

http://www.domaintools.com

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.


Fidelis Cybersecurity

http://www.fidelissecurity.com/


Qualys

http://www.qualys.com

Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions that help organizations streamline and consolidate their security and compliance solutions and build security into digital transformation. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously across global IT assets.


VMRay

https://www.vmray.com/

VMRay Analyzer combines rapid reputation scoring of files with a unique agentless hypervisor-based monitoring approach for deep analysis. With this combination VMRay Analyzer delivers rapid threat detection at scale coupled with the most comprehensive dynamic threat analysis in the industry. www.VMRay.com


Silver Sponsors

A10 Networks

http://www.a10networks.com/


Arctic Wolf Networks

http://arcticwolf.com/

Arctic Wolf delivers the industry-leading security operations center (SOC)-as-a-service. The Arctic Wolf Managed Detection and Response and Managed Risk services are anchored by the Arctic Wolf Concierge Security Team. Arctic Wolfs purpose-built, cloud-based SOC-as-a-service offers 24×7 monitoring, risk management, threat detection, and response. For more information, visit www.arcticwolf.com.


Argent

https://www.argent.com/


Armis

https://www.armis.com/


BluVector

https://www.bluvector.io/


Centripetal Networks

http://www.centripetalnetworks.com/


Corelight

https://www.corelight.com/

From the Acropolis to the edge of space, defenders have sought the high ground in order to see farther and turn back attacks. Corelight delivers a commanding view of your network so you can outsmart and outlast adversaries. We capture, interpret, and connect the data that means everything to defenders.


Eclypsium

Eclypsium.com


Keysight Technologies, Inc.

https://www.keysight.com/us/en/home.html


King & Union

https://www.kingandunion.com/


RSA

https://www.rsa.com/en-us/products/threat-detection-response


SentinelOne

http://www.sentinelone.com/

SentinelOne was formed by an elite team of cyber security and defense experts from IBM, Intel, Check Point, McAfee, and Palo Alto Networks.

SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects and responds to attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real time for both on-premise and cloud environments and is the only solution to provide full visibility across networks directly from the endpoint. To learn more visit sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook.


Swimlane

https://swimlane.com

Swimlane is a leader in security orchestration, automation and response (SOAR). By automating time-intensive, manual processes and operational workflows and delivering powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure, Swimlane maximizes the incident response capabilities of over-burdened and understaffed security operations.


ThreatConnect

http://threatconnect.com/

Designed by analysts but built for the team, ThreatConnects intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. To learn more about our TIP and SOAR solutions, visit www.ThreatConnect.com.


ThreatQuotient

https://www.threatq.com/

ThreatQuotients mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform with automation, prioritization and visualization. By integrating an organizations existing processes and technologies into a single security architecture, ThreatQ accelerates and simplifies investigations and collaboration within and across teams and tools.


ZeroNorth

https://www.zeronorth.io/


Become an Exhibitor! Click here to view Exhibitor Packages