Say

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

What!

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

ISSA Sponsors

We appreciate our sponsors for their contributions and support.

   

 

Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.  Our solutions stop 99% of attachment-based attacks. And every day, we detect and block advanced threats and compliance risks in more than 600 million emails, more than 7 million mobile apps, and hundreds of thousands of social-media accounts.

 

We also help customers share large files securely and protect sensitive information as it’s sent, stored, and archived.
 
   

 

Optiv is the most advanced, most comprehensive and most trusted partner for cyber security solutions. We provide a full suite of information security services and solutions that help define cyber security strategy, identify and remediate threats and risks, select and deploy the right technology, and achieve operational readiness to protect from malicious attack.
 
 LogRhythm Logo    
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
 
   

 

Veracode’s cloud-based service is a simpler and more scalable approach to reduce application-layer risk across your entire global software infrastructure -- including web, mobile and third-party applications -- without hiring more consultants or installing more servers and tools. With Veracode's smart approach to application security, you can drive your innovations to market faster -- without sacrificing security in the process.
 
     
As the next-generation security company, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. We are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud. 
 
 
Please refer to our Sponsorship Program if you would like to become a sponsor or to read more about the program.
   

 

Subscribe

Sign up to receive news
about our upcoming events

 

Recent Posts

View recent blog posts about
industry trends and events

View Blog