Security
& Risk

November 8 – 9, 2022  |  Washington, D.C. & Digital Experience

2022 Sponsors

Sponsors

Contact us at sponsorships@forrester.com to discuss 2022 exhibition, branding, and speaking opportunities, or call +1 888.343.6786.


Sponsor A Forrester Event

Forrester Events brings together a premium audience of top business and technology leaders and influencers across our B2B, Customer Experience, Security & Risk, Data Strategy & Insights and Technology & Innovation Forums.

Gain valuable exposure through speaking opportunities, product demos, a centrally located exhibit space, conference passes, and more.

All Sponsors

IBM

A smarter business is more resilient because it can scale up and down and can change how work gets done. Forward-looking enterprises utilize automation and AI to augment their core strengths, supplement their weaknesses, and empower their people to focus on what’s important. With a diverse set of intelligent automation software and services, IBM can accelerate your journey to automate more types of work at greater speed and lower cost. We’ll meet you at any stage, helping you adapt and thrive by turning momentary challenges into long-term opportunities.

More Information

ThreatConnect

ThreatConnect, Inc. provides cybersecurity software that reduces complexity for everyone, makes decision making easy by turning intelligence into action, and integrates processes and technologies to continually strengthen defenses and drive down risk.

More Information

ThreatLocker

To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from blocking known threats, to blocking everything that is not trusted. Combined with Ringfencing and storage policies, you enhance your zero-trust protection and block attacks that live off the land.

More Information

BeyondTrust

BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering companies to secure and manage their entire universe of privileges.  The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance.

More Information

Code42

Code42 is the leader in Insider Risk Management. Native to the cloud, Code42 Incydr rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s Insider Risk solution is FedRAMP authorized and can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

More Information

Kyndryl

Kyndryl works at the core of businesses that move the world. With more than 90,000 skilled professionals serving customers in over 100 countries, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. We are committed to the health and continuous improvement of the vital systems at the heart of the digital economy. With our partners and thousands of customers, we co-create solutions to help enterprises reach their peak digital performance. Our world has never been more alive with opportunities. Together, we can seize them. To learn more, visit www.kyndryl.com

More Information

Orca

Orca Security provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars. Simplify cloud security operations with a single CNAPP platform for workload and data protection, cloud security posture management, vulnerability management, and compliance. Orca Security prioritizes risk based on the severity of the security issue, its accessibility, and business impact. This helps you focus on the critical alerts that matter most. Orca Security is trusted by global innovators, including Databricks, NCR, Autodesk, Lemonade, and Gannett. Connect your first account in minutes: https://orca.security

More Information

StrikeReady

StrikeReady helps organizations enhance and modernize their security operations in order to be more effective, efficient, and affordable, while empowering their workforce through skill and knowledge enhancements.

More Information

Censys

At Censys, we work relentlessly to make the internet a secure place for everyone. As the leading Attack Surface Management provider, we take the guesswork out of understanding and protecting the organization’s digital footprint. From the world’s most comprehensive real-time view of global networks and devices, Censys provides a comprehensive profile of the exposed assets on the internet, delivering the tools and insights to manage potential risks. We are on the forefront of helping organizations stay one step ahead of risk, and seeing threats before they become complications. From the corporate network to the cloud and beyond, a secure internet starts with Censys.

More Information

Confiant

Confiant is a cybersecurity provider specialized in detecting and stopping threats that leverage advertising technology infrastructure, also known as Malvertising. We help digital publishers and advertising technology platforms around the world take back control of the ad experience in real-time. In addition, Confiant helps enterprises protect themselves and their customers from threat actors performing these attacks. Confiant oversees trillions of monthly ad impressions with innovative integrations embedded deep into the ad tech ecosystem, giving us a unique vantage point. Our superior detection set for phishing, crypto scams and malware attacks using ads as a vector is one-of-a-kind in the industry. Confiant executes our mission everyday to protect users and organizations of all sizes, including Microsoft, Orange, Paramount and IBM. We offer unique and actionable insights into threats that systematically target brands, businesses, individuals and supply chains via ads. Our recently published Malvertising Matrix maps the tactics, techniques and procedures active in Malvertising today. inclusive of emerging Web3 Layer 4 threats. To learn more about Confiant and our technology visit: www.confiant.com

More Information

CyberProof

CyberProof is a security services company that intelligently manages your incident detection and response. Our solution provides complete transparency to dramatically reduce the cost and response time needed to mitigate security threats. We collaborate with our global clients, academia and the tech ecosystem to continuously advance the art of cyber defense.

More Information

Illumio

Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches.  Assume breach. Minimize impact. Increase resilience.

More Information

Interos

Interos is the operational resilience company reinventing how companies are managing their supply chains, through a breakthrough SaaS platform that uses artificial intelligence to model the total ecosystem of complex businesses into a living global map, down to sub-tier suppliers.

Eliminating months of backward-looking manual spreadsheets, the Interos platform helps the world’s companies achieve operational resilience by avoiding risks and managing potential disruptions. At the same time, businesses can uncover game-changing opportunities that radically change the way they see, learn, and profit from their relationships.

More Information

Key Resources

Key Resources, Inc. is a visionary in mainframe vulnerability management. We advocate for comprehensive and proactive mainframe security scanning and analysis. Our approach reflects our belief that traditionally reactive mainframe security systems and processes don’t do enough to fully protect corporate assets. The z/Assure® suite of products exclusively protects your organization’s core assets with real-time, automated, and consistent reporting of vulnerabilities. We guarantee a return on our clients’ security investments by minimizing their exposure to data and integrity security risks. We are widely known for our vulnerability detection technology – both configuration and code based.

More Information

KnowBe4

KnowBe4 is the world’s largest integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using real-world mock attacks, engaging interactive training, continuous assessment through simulated phishing, and vishing attacks and enterprise-strength reporting. Tens of thousands of organizations worldwide use KnowBe4’s platform to mobilize their end-users as a last line of defense and enable them to make smarter security decisions.

More Information

OneTrust

OneTrust is the category-defining enterprise platform to operationalize trust. More than 10,000 customers, including half of the Fortune Global 500, use OneTrust to make trust a competitive differentiator, implementing central agile workflows across privacy, security, data governance, GRC, third-party risk, ethics and compliance, and ESG programs.

The OneTrust platform is backed by 150 patents and powered by the OneTrust Athena™ AI. Our offerings include OneTrust Privacy, OneTrust DataDiscovery™, OneTrust DataGovernance™, OneTrust Vendorpedia™, OneTrust GRC, OneTrust Ethics, OneTrust PreferenceChoice™, OneTrust ESG, and OneTrust DataGuidance™.

More Information

Onspring

Onspring provides intelligent, process automation & real-time reporting through flexible, no-code, SaaS solutions for Governance, Risk & Compliance (GRC) and many other business processes. Though its acumen is technology, the company creates business automation solutions with a people-first approach, which results in simplified workflows, process transparency and elimination of manual, repetitive tasks.

More Information

Reciprocity

Reciprocity® is pioneering a first-of-its-kind approach to IT risk management that ties an organization’s risk directly to its business strategy, enabling security executives to communicate the impact of risk on high-priority business initiatives—leading to smarter, more informed decisions.

More Information

Tanium

Tanium is the platform that the most demanding and complex organizations trust to gain visibility and control across all endpoints in on-premises, cloud and hybrid environments. Tanium addresses today’s increasing IT challenges with high fidelity endpoint data — giving IT operations, security and risk teams confidence to quickly manage, secure and protect their networks at scale. Nearly half of the Fortune 100, top retailers and financial institutions, and multiple branches of the U.S. Armed Forces trust Tanium to help see and control  every endpoint, everywhere. That’s the power of certainty. Visit www.tanium.com

More Information

Tessian

Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital, and Balderton and has offices in San Francisco, Boston and London.

More Information

Critical Start

Critical Start simplifies breach prevention by delivering the most effective managed detection and incident response services powered by our Zero Trust Analytics Platform (ZTAP) and the industry’s only Trusted Behavior Registry (TBR) and MOBILESOC. With 24x7x365 expert security analysts, and Cyber Research Unit (CRU), we monitor, investigate, and remediate alerts swiftly and effectively, via a contractual Service Level Agreement (SLA) for Time to Detection (TTD) and Median Time to Resolution (MTTR), with 100% transparency into our service.

More Information

HackerOne

HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces.

More Information

JupiterOne

Cloud native stacks are complex. With JupiterOne, they don’t have to be. JupiterOne is a cyber asset management and governance solution, providing visibility and security into your entire cyber asset universe. With JupiterOne, teams can discover, monitor, understand, and act on changes in their digital environment. Cloud resources, ephemeral devices, identities, access rights, code, pull requests, and much more are collected, graphed, and monitored automatically by JupiterOne. JupiterOne creates a contextual knowledge-base using graphs and relations as the single source of truth for an organization’s cyber asset operations. Learn more at www.jupiterone.com #KnowMoreFearLess

More Information

Qmulos

Qmulos is a software company operating on top of Splunk, a big data analytics company. In short, our applications, Q-Compliance and Q-Audit, enhance our customer’s Splunk investment and make their jobs easier by improving operational security through real-time risk management and compliance automation. Legacy compliance is time consuming and costly, but our applications cater to your needs, with the flexibility to cover ANY data source, ANY framework, ANY control, or ANY environment.

More Information

Rapid7

Rapid7 simplifies cybersecurity.  With powerful automation and integrated threat intelligence from our-industry researchers and SOC analysts, our Insight Platform gives security teams the visibility they need to secure their environment no matter the size or complexity.  Don’t just protect your business, drive it forward

 

 

More Information

ReversingLabs

ReversingLabs automatically detects and analyzes sophisticated file-based threats built to evade security controls from development to the SOC. Our hybrid-cloud Titanium Platform verifies binaries at the speed, accuracy and scale required for software development, 3rd party software acceptance, and security operations teams to take confident action.

More Information

Terranova Security

Terranova Security is a global security awareness training leader selected by Microsoft as their partner of choice to bring the best in security awareness training content. The security awareness and phishing simulation programs provide organizations with the highest-quality content, most multilingual security awareness platform, training and communications portfolio and intuitive phishing simulator in the industry.

More Information

ArmorCode

ArmorCode is the industry’s leading AppSecOps platform – AppSec Posture, Vulnerability, and Compliance Management and DevSecOps orchestration in a single platform. ArmorCode reduces application exposure and risk, while scaling AppSec effectiveness and impact by 10x or more across the organization.

 

More Information

BitSight

BitSight transforms how organizations manage information cybersecurity risk with objective, verifiable and actionable Security Ratings. Founded in 2011, the company built its Security Ratings Platform to continuously analyze vast amounts of data on security issues. Fifty percent of the world’s cybersecurity premiums are underwritten by BitSight customers, and 20 percent of Fortune 500 companies, and four out of the top five investment banks rely on BitSight to manage cyber risks.

For more information, please visit www.BitSight.com, read our blog or follow @BitSight on Twitter.

More Information

Centripetal Networks

Mimecast

Mimecast was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our customers around the globe; always putting them first. Our intentional and scalable design ideology solves the number one cyberattack vector – email, and thoughtfully integrates other essential capabilities.

More Information

NINJIO

NINJIO offers a cybersecurity awareness training solution that uses engaging, 3 to 4-minute Hollywood-style micro-learning videos to empower individuals and organizations to become defenders against cyberthreats.  We teach organizations, employees, and families how not to get hacked, which makes them the first line of defense against today’s increasingly sophisticated cybercriminals.

 

We serve some of the largest companies in the world and have changed the behavior of hundreds of thousands of people through engaging, emotionally-driven storytelling and simulated phishing to ensure organizations build a culture of cybersecurity.

More Information

PlainID

PlainID – The Authorization Company™, is the recognized leader in Authorization as a Service powered by Policy Based Access Control (PBAC). PlainID’s simple, straightforward solution to authorization management enables organizations to create, manage and enforce  authorization policies across an enterprise. By securely connecting identities to digital assets via PlainID Authorizers, firms can meet the digital demands of user journeys, enable zero trust architectures, and provide data security. The PlainID Authorization Platform enables rapid business growth by connecting new and legacy technologies with the latest and most advanced authorization features.

More Information

Absolute

Absolute Software is the only provider of self-healing, intelligent security solutions. Our Absolute Persistence technology is uniquely embedded in more than 600 million devices, offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities across endpoints, applications, and network connections to strengthen customers’ cyber resilience against escalating threats and malicious attacks. We’ve extended the power of self-healing to our Independent Solution Vendor (ISV) partners with Application Persistence-as-a-Service (APaaS), enabling them to strengthen the resiliency of their critical endpoint security applications – ensuring they remain healthy and working effectively for end customers, with minimal end-user impact.

More Information

LastPass

LastPass is an award-winning password manager helping more than 30 million users organize and protect their online lives. For more than 85,000 businesses of all sizes, LastPass provides identity and access management solutions that are easy to manage and effortless to use. From single sign-on and enterprise password management to adaptive multifactor authentication, LastPass for Business gives superior control to IT and frictionless access to users. For more information, visit https://lastpass.com.

More Information

Menlo Security

Menlo Security enables organizations to outsmart threats, completely eliminating attacks and fully  protecting productivity with a one-of-a-kind, isolation-powered cloud security platform. It’s the  only solution to deliver on the promise of cloud security, with the most secure Zero Trust approach to preventing malicious attacks—making security invisible to end users and removing the operational burden for security teams.

More Information