iPad Air 2, Samsung Galaxy Tab A, or $350 Off with SANS Online Training Right Now!

10th Annual ICS Security Summit

Orlando, FL | Sun, Feb 22, 2015 - Mon, Mar 2, 2015
This event is over,
but there are more training opportunities.

Exhibitors

Our events incorporate external vendor partners showcasing some of the best security solutions available. Take advantage of the opportunity to interact with the people behind the products and learn what they have to offer you and your organization.

Vendor Showcase

  • Monday, February 23
    • 10:30 am - 11:00 am
    • 3:45 pm - 4:15 pm
  • Tuesday, February 24
    • 10:30 am - 11:00 am
    • 3:30 pm - 4:00 pm

Interested in our Vendor Showcase but not registered for a course or Summit? Sign up here


Bronze Sponsors

Check Point Software Technologies, Inc.

http://www.checkpoint.com

Check Point Software Technologies (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises' networks to mobile devices with comprehensive and intuitive security management.


Rapid7 Inc.

http://www.rapid7.com

Rapid7 security analytics software and services reduce cyber threat exposure and detect compromise for 3,000 organizations across 78 countries, including over 250 of the Fortune 1000. We understand the attacker better than anyone and build that insight into our solutions to help you improve risk management and stop threats faster.


KPMG

www.kpmg.com

Launched in 2007, the KPMG Global Energy Institute (GEI) interacts with its over 30,000 members through multiple media channels, including audio and video webcasts, publications and white papers, podcasts, events, and quarterly newsletters. In February 2011, the GEI opened the doors of its physical space in the downtown offices of KPMG in U.S.'s Houston office. The leading knowledge center features over 5,000 square feet of executive training facilities, which provide the perfect backdrop to GEI's in-person share forums and conferences


Ioactive Inc.

http://www.ioactive.com

Advances in technology create new opportunities and unforeseen risks. Thats why cutting-edge research is central to IOActive services. We are the only global security consultancy conducting chip-to-code assessments with a state-of-the-art hardware lab and deep expertise spanning hardware, software, and wetware. We help industrial clients stay ahead of tomorrow's threats.


Securicon

www.securicon.com

Securicon provides expert application, system and network security consulting services. These services include: cyber program development, vulnerability assessments, compliance audits and consulting, security architecture consulting, application security evaluations, penetration testing, EMS and DCS assessments, device testing, and more. These services are delivered across corporate America, with special focus in the Utilities, Water, Oil & Gas, Transportation , Manufacturing, Pharmaceutical and Financial Services industries, as well as Government and all Corporate Enterprise networks and Real-time system infrastructures.


Palo Alto Networks

http://www.paloaltonetworks.com

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters in today's dynamic computing environments: applications, users, and content.


Waterfall Security

http://www.waterfallsecurity.com

WaterfallŽ Security Solutions Ltd. is the leading provider of Unidirectional Security Gateways™, securely integrating industrial control systems with business networks, without incurring the safety and reliability risks which accompany firewalls. Unidirectional Gateways simplify regulatory and standards compliance, and reduce security program operating costs. For true security, demand Unidirectional Security Gateways.


Rockwell Automation

www.rockwellautomation.com

Rockwell Automation, the world's largest company dedicated to industrial automation, makes its customers more productive and the world more sustainable. Every day we help solve automation challenges and help support the safe, secure and reliable operation of industrial control systems that are owned and operated by private companies and local, state and national governments. In the normal course of business, we supply customers around the world with industrial products, services and capabilities to automate and optimize critical processes, enhance productivity and increase the value derived from these systems. Cybersecurity for processes and manufacturing automation is integral to the Rockwell Automation industrial control system philosophy and we are committed to constantly evolving our security solutions to best meet the needs of our customers and industry alike.


Dexa Systems

http://www.dexasystems.com

Dexa Systems is a global, privately held company that provides cyber and physical security solutions for Critical Infrastructure industries, including oil and gas, utilities, petro chemicals, pipeline, upstream, refineries, etc. We have a strategic security model for today's cyber environment and assist our clients in developing a next generation security strategy.


Codenomicon

http://www.codenomicon.com/

Codenomicon provides a suite of next-generation testing solutions that improve the security and robustness of technology that powers our connected world. Codenomicons tools empower developers and asset owners to proactively discover, identify, and remediate vulnerabilities in business-critical software and devices ahead of attacks. Build a more resilient world with Codenomicon.


NexDefense, Inc.

www.nexdefense.com

NexDefense empowers automation and control system operators in critical infrastructure and defense facilities with the real-time knowledge needed to maintain system integrity and combat security threats. Its software solution, Sophia, maintains constant insight into and visualization of ICS network communications, giving security professionals visibility into potential threats without disrupting productivity or performance.


L-3

http://www.iguanasecurity.com/

IGUANA Security is a brand developed specifically for the CNI market, and is brought to you by L-3 TRL Technology; with 30 years experience in developing innovative, high technology defence and security solutions. IGUANA Security provides organisations with the necessary security functions to protect the integrity, confidentiality and availability of networks whilst enabling greater business efficiency.


Pwnie Express

https://www.pwnieexpress.com

Pwnie Express provides an end-to-end security assessment solution that delivers real-time wired and wireless asset discovery, continuous vulnerability scanning, pentesting, risk trending and alerting. It provides sensors for individual locations and an enterprise-class Pwn Pulse solution using its sensors combined with central management for scalable continuous intelligence across remote locations.


SurfWatch Labs

http://www.surfwatchlabs.com/

SurfWatch Labs delivers powerful cyber risk intelligence analytics and applications through a business intelligence approach that helps organizations improve their long-term cyber resiliency. Created in 2013 by former US Government intelligence analysts, SurfWatch Labs solutions go beyond the low-level threat data and security tactics that organizations can drown in, by providing insights into cyber risks and their impact on key business operations. SurfWatch Labs: Cyber In Sight. For more information, visit www.surfwatchlabs.com.


Elbit Systems

www.elbitsystems.com

Elbit Systems of America, LLC, develops cyber security products to keep our troops safe and our critical infrastructure operating. Building on global security technology with over 20 years of legacy evidence, our employees are dedicated to supporting those who contribute daily to the safety and security of the United States.


RecordedFuture

www.recordedfuture.com

RecordedFuture arms you with real-time threat intelligence to proactively defend your organization from cyber attacks. Our patented Web Intelligence Engine indexes and analyzes the open web to provide you full context into emerging threats. Four of the top five companies in the world rely on Recorded Future to understand and mitigate threats.


Tempered Networks

http://www.temperednetworks.com/

Tempered Networks protects critical infrastructure and information from cyber attacks, misuse by trusted or untrusted users, and from other systems and devices. We provide a purpose-built, hardened security appliance that cloaks your critical infrastructure. The solution securely extends and segments your network. Our deep experience is delivering business value to Fortune 500 companies today.


SecurityMatters, LLC.

http://www.secmatters.com/

SecurityMatters is an international company that brings to the market the next generation network monitoring, intelligence and protection technology to make Critical Infrastructure organizations more secure and in control. SecurityMatters has business in a number of control industries including Oil&Gas, power generation, electric-power transmission and distribution, water supply and manufacturing.


Cylance

http://www.cylance.com/

Cylance is a next generation, endpoint protection, product company, specializing in advanced threat security that detects and stops zero-day malware and APT attacks. Using advanced math and machine learning, coupled with the understanding of a hacker's mindset, Cylance provides a proactive, preventive approach to security.


PFP Cybersecurity

http://www.pfpcyber.com/

(PFP Cybersecurity) provides a new category of cyber protection, physics-based integrity assessment, which reduces the malware time-to-discovery to mere milliseconds. The PFP physics-based solution uses patent pending, advanced signal processing on side channel data (e.g., instantaneous power consumption) to derive information about the internal execution status of the user's hardware and firmware. PFP has demonstrated its solution with many applications including Stuxnet-like attacks on industrial control systems, SCADAs and PLCs.


Ultra Electronics, 3eTI

http://www.ultra-3eti.com/

Ultra Electronics, 3eTI is a leading cyber-technology company with products and systems that secure critical infrastructure and improve operational efficiency. 3eTI helps connect and protect operations through advanced machine-to-machine (M2M) security, secure wireless networks and sensor network applications, leveraging new and legacy systems while complying with highest government and industry standards. (www.ultra-3eti.com)


Interested in becoming an exhibitor? Learn more about all our vendor opportunities.