Security & Risk

November 9 – 10, 2021  |  Live Virtual Experience

2021 Sponsors

Premier Sponsors


Contact us at to discuss 2021 exhibition, branding, and speaking opportunities, or call +1 888.343.6786.

Sponsor A Forrester Event

Forrester Forums are different. Join our experts in CX, digital transformation, privacy and security, and marketing for immersive experiences. These events offer inspirational content from industry innovators, deep-dive sessions on niche topics you care about, and high-caliber networking with peers that share your title, industry, and mindset. Add on 1:1 time with analysts and skill-building workshops for an inspiring and productive experience.

All Sponsors

IBM Logo

IBM Security

IBM Security works with you to help protect your business with an advanced and integrated portfolio of enterprise security products and services, infused with AI,  that modernize your security strategy according to zero trust principles, helping you thrive in the face of uncertainty. By aligning your security strategy to your business; integrating solutions designed to protect your digital users, assets, and data; and deploying technology to manage your defenses, we help you to manage and govern risk and grow with a modern open approach that supports today’s hybrid cloud environments.

More Information


ThreatConnect, Inc. provides cybersecurity software that reduces complexity for everyone, makes decision making easy by turning intelligence into action, and integrates processes and technologies to continually strengthen defenses and drive down risk.

More Information

Cisco Secure

Cisco, the worldwide leader in technology that powers the internet, and the largest enterprise cybersecurity company in the world, has applied its unparalleled networking, data, and application expertise to provide an integrated, open platform of intelligent security products and services, supported by hundreds of third-party integrations. Save time, cut costs, and gain flexibility with built-in security that accelerates transformative IT initiatives, such as hybrid work, modern applications, and multicloud initiatives. Protect, detect, analyze, and respond everywhere with insights and assistive automation informed by the world’s most extensive network telemetry, and largest commercial threat hunting team. Secure work wherever it happens with Cisco Secure.

More Information


Code42 is the leader in Insider Risk Management. Native to the cloud, Code42 Incydr rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s Insider Risk solution is FedRAMP authorized and can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

More Information


FireMon is the only agile network security policy management platform for hybrid cloud enterprises. FireMon delivers persistent network security for multi-cloud environments through a powerful fusion of real-time asset visibility, compliance, and automation. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world.

More Information

Google Cloud

Google Cloud provides organizations with leading infrastructure, platform capabilities and industry solutions. We deliver enterprise-grade cloud solutions that leverage Google’s cutting-edge technology to help companies operate more efficiently and adapt to changing needs, giving customers a foundation for the future. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to solve their most critical business problems.

More Information

HP Wolf Security

From the maker of the world’s most secure PCs and Printers, HP Wolf Security is a new breed of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services.

More Information


Ketch is the leading data control company for Programmatic Privacy™  and governance. The company was founded in 2020 by data management veterans and serial entrepreneurs who successfully built and scaled enterprise systems for world-leaders like Salesforce and Microsoft. Ketch’s ‘Deploy Once, Comply and Secure Everywhere’™ architecture delivers comprehensive data privacy, governance, and security to organizations seeking to protect data, build trust with consumers, and successfully compete in data-driven markets. Thanks to Ketch’s ability to dynamically adapt to the ever-changing legal landscape, customers can future-proof their businesses while cutting operational and privacy engineering costs by 80%.

More Information

Key Resources

Key Resources, Inc. is a visionary in mainframe vulnerability management. We advocate for comprehensive and proactive mainframe security scanning and analysis. Our approach reflects our belief that traditionally reactive mainframe security systems and processes don’t do enough to fully protect corporate assets. The z/Assure® suite of products exclusively protects your organization’s core assets with real-time, automated, and consistent reporting of vulnerabilities. We guarantee a return on our clients’ security investments by minimizing their exposure to data and integrity security risks. We are widely known for our vulnerability detection technology – both configuration and code based.

More Information


KnowBe4 is the world’s largest integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using real-world mock attacks, engaging interactive training, continuous assessment through simulated phishing, and vishing attacks and enterprise-strength reporting. Tens of thousands of organizations worldwide use KnowBe4’s platform to mobilize their end-users as a last line of defense and enable them to make smarter security decisions.

More Information


Founded in 1975, Microsoft (Nasdaq “MSFT”) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft offers modern, connected business applications that unify your business – from data to people to processes – and adapt to your changing needs.​

More Information

Palo Alto Networks

We are the global cybersecurity leader, known for always challenging the security status quo. Our mission is to protect our way of life in the digital age by preventing successful cyberattacks. This has given us the privilege of safely enabling tens of thousands of organizations and their customers. Our pioneering Security Operating Platform safeguards your digital transformation with continuous innovation that combines the latest breakthroughs in security, automation, and analytics. By delivering you a true platform and empowering a growing ecosystem of change-makers like us, we provide you highly effective and innovative cybersecurity across clouds, networks, and mobile devices.

More Information


Venafi is the cybersecurity market leader in the machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms;  four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa.

More Information


Auth0’s modern approach to identity enables organizations to provide secure access to any application, for any user. The Auth0 Identity Platform is a highly customizable identity operating system that is as simple as development teams want, and as flexible as they need. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. For more information, visit

More Information


BitSight transforms how organizations manage information cybersecurity risk with objective, verifiable and actionable Security Ratings. Founded in 2011, the company built its Security Ratings Platform to continuously analyze vast amounts of data on security issues. Fifty percent of the world’s cybersecurity premiums are underwritten by BitSight customers, and 20 percent of Fortune 500 companies, and four out of the top five investment banks rely on BitSight to manage cyber risks.

For more information, please visit, read our blog or follow @BitSight on Twitter.

More Information


Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.

More Information


ColorTokens Inc., a leader in proactive cybersecurity solutions that enable organizations to become cyber resilient. Through our cloud-delivered, frictionless ColorTokens Xtended ZeroTrust PlatformTM, ColorTokens enables businesses to leverage real-time visibility, workload protection, endpoint protection, application security, and zero-trust network access—all while seamlessly integrating with existing security tools. Our solutions are designed for modern distributed environments, and drastically reduce operation complexity and cost of ownership.  

More Information


Confiant is a cybersecurity provider specialized in detecting and stopping threats that leverage advertising technology infrastructure, also known as Malvertising. We help digital publishers and advertising technology platforms around the world take back control of the ad experience in real-time. In addition, Confiant helps enterprises protect themselves and their customers from threat actors performing these attacks. Confiant oversees trillions of monthly ad impressions with innovative integrations embedded deep into the ad tech ecosystem, giving us a unique vantage point. Our superior detection set for phishing, crypto scams and malware attacks using ads as a vector is one-of-a-kind in the industry. Confiant executes our mission everyday to protect users and organizations of all sizes, including Microsoft, Orange, Paramount and IBM. We offer unique and actionable insights into threats that systematically target brands, businesses, individuals and supply chains via ads. Our recently published Malvertising Matrix maps the tactics, techniques and procedures active in Malvertising today. inclusive of emerging Web3 Layer 4 threats. To learn more about Confiant and our technology visit:

More Information


Data443 Risk Mitigation is a leader in data security and privacy management – a critical element of IT security protecting access to All Things Data Security™ across the enterprise and in the cloud. Data443 provides the necessary visibility and control needed to protect at-scale, obtain compliance objectives, and enhance operational efficiencies.

The mounting threat landscape has accelerated security adoption rates and our extensive portfolio provides a holistic methodology to data privacy as a new security standard. Our offering is anchored in privacy management, equipping organizations with a seamless approach to safeguarding their data, protecting against attacks and mitigating the most critical risks.

More Information


HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces.

More Information


IntSights, a Rapid7 company, enables organizations of any type or size to gain the full benefits of external threat intelligence, no matter the size or sophistication of their threat intelligence programs. Unlike any other solution on the market, IntSights takes the complexity out of threat intelligence and delivers instant value without the heavy lift or sizable resource allocation that traditional threat intelligence solutions require. Designed to scale, IntSights is for any company, and frictionless integration of our real-time cyber threat intelligence with existing security infrastructure allows enterprises to maximize return on investment.

More Information


Cloud native stacks are complex. With JupiterOne, they don’t have to be. JupiterOne is a cyber asset management and governance solution, providing visibility and security into your entire cyber asset universe. With JupiterOne, teams can discover, monitor, understand, and act on changes in their digital environment. Cloud resources, ephemeral devices, identities, access rights, code, pull requests, and much more are collected, graphed, and monitored automatically by JupiterOne. JupiterOne creates a contextual knowledge-base using graphs and relations as the single source of truth for an organization’s cyber asset operations. Learn more at #KnowMoreFearLess

More Information


Kroll is uniquely positioned to deliver end-to-end cyber risk management worldwide. Fueled by unrivaled cyber risk and breach response expertise, our security leaders and elite responders can fortify preparedness and provide managed detection and response 24x7x365. With over 450 experts, our global team handles 2,700+ incidents every year, including some of the most complex and highest profile matters in the world.

More Information

McKinsey & Company

Digital networks and assets are more valuable and prolific than ever—and threats to digital ecosystems are multiplying. Senior leaders, boards, and investors increasingly see cybersecurity as a strategic business issue with enormous financial, reputational, and regulatory implications.

We believe cybersecurity should be an enabler of, rather than a barrier to, capturing and extending value in the digital economy. Our experienced, highly skilled experts help organizations measure their digital resilience, identify and prioritize critical assets for protection and investment, build leadership capabilities to neutralize threats, and make cybersecurity build-or-buy decisions.

Digital-security transformation: We help transform security programs to enable and derisk digital-business strategies.

Crisis preparedness and response: We help build capabilities to prepare for and respond to cybersecurity incidents and breaches across business functions, geographies, and vendor ecosystems.

Navigation of cybersecurity markets: We help those who create, scale, and trade on cybersecurity capabilities create value in competitive markets.

More Information


Reciprocity is powering the next generation of information security with the fastest, easiest and most prescriptive solutions in the market. Its fully integrated and automated ZenGRC platform delivers a full catalog of compliance, risk and other infosec applications through one simple user interface that drives greater transparency, actionable insights and benchmark reporting.

Recognized for its GRC expertise and its accelerated time-to-value, Reciprocity is transforming risk and compliance from a cost-center to a value-creator for businesses across the globe. The company is headquartered in San Francisco with global offices in Ljubljana, Slovenia and Argentina.

More Information

Reversing Labs

ReversingLabs automatically detects and analyzes sophisticated file-based threats built to evade security controls from development to the SOC. Our hybrid-cloud Titanium Platform verifies binaries at the speed, accuracy and scale required for software development, 3rd party software acceptance, and security operations teams to take confident action.

More Information


SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting businesses from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of companies worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, ensuring that each worker has the right access to do their job – no more, no less. With SailPoint as foundational to the security of their business, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.

More Information

Security Scorecard

SecurityScorecard is the global leader in cybersecurity ratings and the only service with over two million companies continuously rated. SecurityScorecard’s patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the only provider of instant risk ratings that automatically map to vendor cybersecurity questionnaire responses – providing a true 360-degree view of risk.

More Information

strongDM, Inc.

strongDM combines authentication, authorization, networking, and observability into one infrastructure access platform. It works with all resources past, present, and future, while providing a delightful user experience to administrators and end users alike. The result is that DevOps teams can manage infrastructure access at scale while embracing modern security and compliance requirements. Trusted by the Fortune 500 to fast-growing businesses like Peloton, SoFi, Chime, Yext, and Better, strongDM gives businesses the control and visibility they need at the speed they want with one platform that works for every environment.

More Information