Sponsors

Advocate: Our professional association and chapters are working every day to advance understanding, policies, standards and professional networking that will grow the industry to ensure that the voice of our members and sponsors are heard by our nation’s influential decision makers, industry leaders and the general public.

Connect: Tap into our member network and a Who’s Who of Information Security Professionals.

Grow: Sponsoring provides your company with the opportunity to engage with security professionals Meet qualified decision makers - attendees responsible for influencing, purchasing and implementing security technologies. Cultivate your ever-growing network through direct contact with industry peers, decision makers and certified professionals. Sell products and services. Promote company brand awareness.

Timeframe: Sponsorship program will last for 12 months from time of agreement.

The Central Florida (ISC)2 Chapter is excited that you are considering becoming a sponsor of our chapter. If agreed upon, a Co-marketing Agreement and Memorandum of Understanding will be signed by both parties.

 

Please email sponsorship@isc2chapter-centralflorida.org to sign up for sponsorship!

Beyond Trust

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. 

Optiv

Optiv is a global cybersecurity solutions integrator – a “one-stop” trusted partner with a singular focus on cybersecurity. Our end-to-end cybersecurity capabilities span risk management and transformation, cyber digital transformation, threat management, cyber operations, identity and data management, and integration and innovation, helping organizations realize stronger, simpler and more cost-efficient cybersecurity programs that support business requirements and outcomes. At Optiv, we are modernizing cybersecurity to enable clients to innovate their consumption models, integrate infrastructure and technology to maximize value, achieve measurable outcomes, and realize complete solutions and business alignment.

Intrado

Intrado develops innovative, cloud-based technology to make it easier, more effective and efficient to deliver connections that count in this increasingly complex world. Our solutions connect people with each other and the information needed to gain insights for better decisions on the issues that matter most.

Intrado has sales and/or operations in the United States, Canada, Europe, the Middle East, Asia Pacific, Latin America and South America. Intrado is controlled by affiliates of certain funds managed by Apollo Global Management, LLC.

Veeam

Veeam Software is the leader in Cloud Data Management, providing a simple, reliable and flexible solution for all organizations, from SMB to Enterprise!

Palo Alto

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. 

ISG

Our innate passion for defending and protecting people has led us to form ISG. We understand companies are facing criminal entities, rogue nation states and internal threats that cannot be addressed by traditional methods.  

 

As former intelligence/law enforcement operatives and technology practitioners we have come together to apply our DNA in helping companies protect their data and manage risks.

CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArkLinkedIn or Facebook.

ICM

ICM's HQ is in Jackson, MS and has three main focuses; high quality security integration, broad penetration testing and full assessments of security architecture. It's critical that all companies protect their data, and we work with all size organisations to solve their information security concerns. Founded in 2001 ICM is proud to serve over 250 companies across the entire business spectrum.

Crowdstrike

WE STOP BREACHES

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture. CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 50 billion events per day from millions of sensors deployed across more than 170 countries, uniquely providing crowdsourced protection for the entire customer community.

Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

Checkpoint Software

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud, endpoint and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system.

Rapid7

Rapid7 (Nasdaq: RPD) is advancing security with visibility, analytics, and automation delivered through our Insight cloud. Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. 7,400 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organizations. For more information, visit our website, check out our blog, or follow us on Twitter.

Fortress InfoSec

Fortress Information Security offers total managed solutions for Third Party/Supply Chain and Vulnerability Risk Management. We are one of the first security organizations to natively bundle technology, people, and security best practices into a risk orchestration and analytics platform.  Using our API-enabled platform, customers can integrate with current scanners, CMDB, GRC tools; meet compliance; and build a “single source of truth” for third party visibility, asset, vulnerability, patch, and cyber risk operations in one place. Our Security-as-a-Service offering is co-managed, high-impact, and based on delivering positive security outcomes – such as analyzing, correlating, and prioritizing security threats, vulnerabilities, and risks across IT, OT, and Supply Chain security silos.

Assurance Data

Assurance Data is a security focused IT consulting firm offering a wide range of solutions and services that enable our customers to mitigate risk, secure data and optimize performance. Assurance Data is committed to helping organizations achieve their goals and manage threats in their evolving IT environments with the right combination of products, services and solutions that fit their specific needs. Through a comprehensive knowledge of the marketplace and strategic partnerships, Assurance Data can assist with a full range of technology projects and solutions.

GoldSky Security

GoldSky is a full service cyber security solutions firm. Our services are custom designed for each client depending on the specific needs they have. Our objective for all of the companies we partner with is to identify IT security vulnerabilities and provide the resources necessary to reduce the risk of cyber attacks.

GoldSky offers a wide range of security services to meet your security and compliance needs. All our services are delivered to exacting standards and industry best-practices to provide your organization with a world-class delivery experience. For our clients who are looking for a full-service CSO/CISO offering, we’re proud to offer our CSO-as-a-Service (CSOaaS™). Our CSO’s help your organization build lasting and robust security program in your small-midsized business.

ECPI University

Contact ECPI University today and learn more about earning your bachelor’s in Computer and Information Science with a major in Cyber and Network Security and a track in Cybersecurity.

Valencia College

Recognized nationally as the best community college in America, Valencia is also one of the largest, with more than 71,000 students enrolled in 2011. We also award more associate degrees than any other community college in the nation, with our graduates going on to successful futures. Our A.S. and A.A.S. degree graduates have a 95 percent job-placement rate with an average annual salary of about $43,000.

UCF Business Incubator

Since its founding in 1999, the UCF Business Incubation Program has helped several hundred emerging companies (including more than 120 current clients and more than 90 graduates). 

From October 2011 to December 2012, the UCF network of current and graduated clients has helped create a regional output of over $400 million resulting in a $5.93 return for every $1.00 invested in the program. 

With nine facilities across the Greater Orlando community, the program is an example of a successful community partnership.  The UCF Business Incubation Program was named “Incubator Network of the Year” for 2013 by the National Business Incubation Association. 

For more information visit www.incubator.ucf.edu.  

Javelin Networks

Javelin Network's mission is to protect what the cyber security industry neglects: the Active Directory. Our all-in-one, A.I. driven-platform protects the Active Directory from illegitimate use, providing autonomous breach prevention and containment, incident response, and threat hunting capabilities. By combining A.I., obfuscation, and advanced forensic methodologies right at the point of breach, we respond automatically and in real-time to contain the attack. It is the only agentless solution that immediately contains attackers after they compromise a machine, preventing them from using Active Directory credentials and moving laterally into the network. Javelin greatly reduces the effort, time, and error when detecting and containing a breach. To learn more, please email us at hello@javelin-networks.com or call us directly at (888) 867-5179.

Jask Labs

Headed by industry leaders from ArcSight, Carbon Black, Cylance and the counter-intelligence community, JASK brings together decades of experience solving real-world SOC issues. Founded to address the technology gaps that restrict security modernization efforts, JASK is revolutionizing security operations to reduce organizational risk and improve efficiency through technology consolidation, enhanced AI and machine learning. JASK is backed by Dell Technologies Capital, TenEleven Ventures, Battery Ventures and Vertical Venture Partners and is headquartered in San Francisco, California and Austin, Texas.

ForcePoint

Purpose-built and ready to protect, Forcepoint is driven by an understanding of human behavior and intent. Our innovative technology, decades of experience and clear vision help solve critical security issues to protect employees, business data and IP.

We offer a systems-oriented approach to insider threat detection and analytics, cloud-based user and application protection, next-gen network protection, data security and systems visibility. It’s a new approach to cybersecurity never seen before. And as technology and users’ needs evolve, we are constantly looking to expand our offerings while staying true to our core in protecting the human point.

Through our 20 years of frontline experience, proactive and context-based technologies, and data-centric, integrated solutions, Forcepoint enables better decision-making and more efficient security at the human point for more than 20,000 government organizations and enterprises world-wide.