FIRST gratefully acknowledges its conference sponsors & supporters for their contributions to the security community:
AT&T is working with the public sector to transform the business of government by bringing together solutions that help protect, serve & connect. At AT&T, we’re committed to the development, growth and improvement of our country. We’re investing billions into the economy, providing quality jobs to over 200,000 people in the U.S. alone. We’re supporting the veterans who make our country stronger and providing disaster relief support to those who need it the most. We’ve invested more in the future of our country than any other public company. By bringing together solutions that help protect, serve and connect – committed AT&T professionals are working with the public sector to identify and implement technology to transform the business of government.
https://www.business.att.com/industries/portfolio/public-sector.html
Our cybersecurity knowledge isn't just based on our internal knowledge and experience, but on what we learn from customer feedback and reports from independent and industry security researchers. We greatly appreciate our partnership with the security community to protect customers around the globe.
As a leader in cloud-enabled applications and infrastructure, Microsoft is by necessity also a leader in cybersecurity. Our holistic view spans identity and access management, threat protection and response, information protection and intelligent security management. At our Microsoft Secure site (https://www.microsoft.com/en-us/security/default.aspx), we share security guidance for scenarios ranging from planning for the Security Development Lifecycle to coping with cyberattacks to applying the security features built into our products and services. Our cybersecurity knowledge isn't just based on our internal knowledge and experience, but on what we learn from customer feedback and reports from independent and industry security researchers. We greatly appreciate our partnership with the security community to protect customers around the globe.
Resecurity is a cybersecurity company that delivers an actionable platform for endpoint protection, risk management, and threat intelligence for large enterprises and government agencies worldwide. The company is headquartered in Los Angeles.
Established in 2004, ENISA is the European Union Agency for Cybersecurity. The Agency ‘s mission is securing Europe’s information society by working closely with European Union Members States (MS) and private sector to strengthen EU capabilities.
Since 2005, ENISA has been supporting MS and incident response communities to build and advance their capabilities with advisories, handbooks, trainings as well as dedicated projects. The work portfolio includes setting up and developing capabilities for Computer Security Incident Response Teams (CSIRTs). The agency’s goal is to enhance the use of common baseline practices across the EU in order to improve operational cooperation, preparedness and information exchange for the next generation of cyber-attacks.
Since new EU legislation for cybersecurity (NIS Directive) entered into force in 2016, ENISA has focused on the newly established CSIRTs Network. This is a network composed of EU MS appointed CSIRTs and CERT-EU. The CSIRTs Network provides an opportunity to cooperate, exchange information and build trust among all EU MS. The target of the Network is to improve handling of cross-border incidents in a coordinated manner. ENISA’s role in this Network is to enable the highest level of incident response in the EU by providing collaboration means and expert support.
ENISA also continues working on the ENISA CSIRT maturity assessment model and ENISA maturity evaluation methodology for CSIRTs, the Reference Security Incident Taxonomy Working group and technical trainings for specific sectors. The goal is to foster and facilitate operational cooperation and information exchange for stronger cross-border incident response in EU.
Founded in 2004, Facebook's mission is to give people the power to build community and bring the world closer together. People use Facebook to stay connected with friends and family, to discover what's going on in the world, and to share and express what matters to them.
Alibaba Group’s mission is to make it easy to do business anywhere. We enable businesses to transform the way they market, sell and operate. We provide the fundamental technology infrastructure and marketing reach to help merchants, brands and other businesses to leverage the power of the Internet to engage with their users and customers. Our businesses are comprised of core commerce, cloud computing, digital media and entertainment, innovation initiatives and others. ASRC(Alibaba Security Response Center) is the Point of Contact of Alibaba Security, wish to cooperate with everyone on incident response, conference, live event, bug bounty hack community etc.
We Are the Guardians of Amazon Customer Trust At Amazon, we are obsessed with customer trust. Information Security maintains this by guarding the confidentiality and integrity of Amazon and customer data. We assess risk, classify data and systems, detect potential intrusion, and render useless the value of data that may be leaked. Our teams span over 10 countries, and our focus areas include: security intelligence, application security, incident response, security operations, risk and compliance, acquisitions and subsidiaries, and external partner security. Our mission includes instilling awareness to safeguard all customer and employee data, applications, services, and assets. Our guidance and leadership equip our partners to maintain high security standards. Maximize your potential with Information Security
The Anomali suite of threat intelligence solutions empowers organizations to detect, investigate and respond to active cybersecurity threats. The award-winning ThreatStream threat intelligence platform aggregates and optimizes millions of threat indicators, creating a “cyber no-fly list.” Anomali integrates with internal infrastructure to identify new attacks, or search forensically over the past year to discover existing breaches, and enables security teams to quickly understand and contain threats. Anomali also offers STAXX, a free tool to collect and share threat intelligence, and provides a free, out of the box intelligence feed, Anomali Limo. To learn more, visit www.anomali.com and follow us on Twitter: @anomali.
Celerium protects important industry sectors and their members by augmenting and leveraging cyber threat intelligence to more actively defend against cyber threats and attacks.
Celerium’s flagship solution, Cyber Defense Network, is a unique community collaboration experience combining communities, processes, and underlying technology to accelerate defensive actions for its members. Members are empowered to create, share, and receive threat information easily and rapidly, assess and prioritize relevant responses to cyber threats, and feed high-quality threat intelligence directly into key security technologies, significantly enhancing their value and member responsiveness.
Celerium powers the next generation of information-sharing organizations, including ISAOs and ISACs. Relied on by government agencies, enterprise risk management teams, CISOs, and SOC analysts, Celerium supports all critical infrastructure and market sectors. Learn more at www.celerium.com.
EclecticIQ enables intelligence-powered cybersecurity for government organizations and commercial enterprises. We develop analyst-centric products and services that align our clients’ cybersecurity focus with their threat reality. The result is intelligence-led security, improved detection and prevention, and cost-efficient security investments. Our solutions are built specifically for analysts across all intelligence-led security practices such as threat investigation, threat hunting, and incident response, and are tightly integrated with their IT security controls and systems. EclecticIQ operates globally with offices in Europe, United Kingdom, and North-America, and via certified value-add partners.
Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies.
Bitdefender provides end-to-end cyber security solutions and advanced threat protection to more than 500 million users in more than 150 countries. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and has become a provider of choice for leading Independent Software Vendors (ISVs), hardware vendors, service providers and marketing companies looking to integrate security technologies into their products and services. Today, Bitdefender has over 150 technology licensing partners worldwide. More on www.bitdefender.com/oem
BitSight is the most widely adopted Security Ratings company with a mission to change the way the world addresses cyber risk. Transforming data into insights, BitSight enables security and risk leaders to make more informed security decisions that result in overall improved security outcomes for a safer, more resilient digital world. For more information, www.bitsight.com, read our blog or follow @BitSight on Twitter.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
Google is a global technology leader focused on improving the ways people connect with information. Google Security Engineering builds secure software solutions, conducts cutting-edge research on the diverse security and privacy needs of users and uses a wealth of tools, languages, and frameworks — including advanced cryptographic techniques and machine learning — from hardware up through the software stack. Our mission is to keep Google and its millions of users safe, secure, and happy. Learn more about careers and opportunities on Google’s Security & Privacy Engineering team:
VMRay is focused on a single mission: to help enterprises protect themselves against the growing global malware threat. The company’s automated malware analysis and detection solutions help enterprises around the world minimize business risk, protect their valuable data and safeguard their brand.
Arctic Security has built its products based on years of experience operating in nationwide and nation-to-nation information sharing. Our headquarters are in Oulu, Finland and regional offices are in Helsinki and Singapore. We focus on actionable threat intelligence and seek to automate the collection, harmonization, processing and distribution of that information.
Cynet is a security platform that protects organizations from breaches by automated discovery and mitigation of all threat vectors across all attack stages. Unifying all aspects pf breach protection in a single interface, Cynet eliminates the need for multi-product security stacks, and dependency on manual security skills. Visit: www.cynet.com
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com
Fujitsu is the leading Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions and services. Approximately 140,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers.
Group-IB is one of the global leaders in preventing and investigating high-tech crimes and online fraud. Group-IB’s experience and threat intelligence is fused into software and hardware solutions designed to monitor, identify, and prevent cyber threats. The company is recognised by Gartner, Forrester and IDC as a leading TI vendor.
Joe Security develops Joe Sandbox, the industry’s most advanced automated and deep malware analysis engine. With a unique multi-technology approach, Joe Sandbox enables security specialists to analyze files on Windows, macOS, Linux, Android and iOS operating systems. It provides an excellent detection rate, unmatched in-depth analysis and evasion resistance.
RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures.
Uptycs takes a modern approach to CSIRT analytics with our osquery-powered security analytics platform; a unified view for intrusion detection, fleet visibility, vulnerability management, and compliance across operating systems and computing environments. Enhance incident investigation with real-time and performance optimized pre-schedule queries, complete historical state recreation, and more.
Cisco’s Security Portfolio contains the world’s most trusted and deployed security solutions. With solutions ranging from Network Security, Advanced Threat & Endpoint to Cloud, Web & Email to Integrated Security Architecture, Cisco bridges the security gap to protect your users and data against threats in this increasingly digitized word.
IBM Resilient is the industry’s leader in helping organizations thrive in the face of any cyberattack or business crisis. IBM Resilient’s proven Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, more intelligently, and more efficiently. The Resilient IRP is the industry’s only platform with Intelligent Orchestration, enabling teams to integrate and automate people, processes, and technologies in a single, open incident response hub. With Resilient, security teams can have best-in-class response capabilities. IBM Resilient has 300 global customers, including 60 of the Fortune 500, and hundreds of partners globally.
Surevine build secure, scalable collaboration environments for the most security conscious organisations who need to share highly sensitive information; joining people up securely, enabling a real-time response to cyber threats. Threatvine is a cyber-security information sharing platform designed for secure cross-organisational collaboration and analysis. Built for the UK NCSC to power CiSP, the UK's national platform for cyber security information sharing, Threatvine unites financial services and wider critical national infrastructure, moving beyond information sharing to collaborative cyber-security intelligence analysis. Threatvine’s appeal is global, from Japan to Brazil, and it enables compliance with regulations, such as NISD, mandating cyber incident reporting.
Secureworks® is a leading global cybersecurity company that protects organizations in a digitally connected world. We combine visibility from thousands of clients, aggregate and analyze data from any source, anywhere, to prevent security breaches, detect malicious activity in real time, respond rapidly, and predict emerging threats. We offer our clients a cyber-defense that is Collectively Smarter. Exponentially Safer.™
Celerium protects important industry sectors and their members by augmenting and leveraging cyber threat intelligence to more actively defend against cyber threats and attacks.
Celerium’s flagship solution, Cyber Defense Network, is a unique community collaboration experience combining communities, processes, and underlying technology to accelerate defensive actions for its members. Members are empowered to create, share, and receive threat information easily and rapidly, assess and prioritize relevant responses to cyber threats, and feed high-quality threat intelligence directly into key security technologies, significantly enhancing their value and member responsiveness.
Celerium powers the next generation of information-sharing organizations, including ISAOs and ISACs. Relied on by government agencies, enterprise risk management teams, CISOs, and SOC analysts, Celerium supports all critical infrastructure and market sectors. Learn more at www.celerium.com.
The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to gather, review, report and respond to computer security threats and incidents. CIRCL is operated by SMILE - “security made in Lëtzebuerg” GIE, which is also the host organization for CASES and the Cyber Competence Center (C3) of Luxembourg.
Hitachi arms the Social Innovation Business, which includes power & infrastructure systems, information & telecommunication systems, construction machinery, high functional materials & components, automotive systems, healthcare and others. We are proceeding with the development of new technologies and products that respond to the increasing demand for safety and security.
OASIS is a nonprofit consortium that advances open standards and open source development on a global scale. It offers standards and open source projects a path to recognition in international policy and procurement. Any initiative for developing code, APIs, specifications, or reference implementations can find a home at OASIS. Some of the most widely adopted standards are developed at OASIS including: KMIP, STIX, TAXII, OpenC2, and SAML.