Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
CISO Forum - Dallas 2013 - Sponsors

We would like to thank the following sponsors for their thought leadership and support of the May 2013 CISO Executive Forum.

AccessData Group has pioneered digital investigations for 25+ years and is the maker of FTK, SilentRunner and the CIRT security framework. CIRT is the first software solution to integrate computer forensics, network forensics, malware analysis, large-scale auditing and remediation into a single platform. It reduces incident response time, facilitates compliance auditing and continuous monitoring, and provides automated malware triage and analysis.

Code 42 Software has been protecting the world’s information since 2001. Its enterprise backup solution, CrashPlan PROe, provides people-friendly, enterprise-tough backup. Engineered with laptops in mind, PROe is continuous backup that won’t slow you down, and its self-service restores free up IT. The cross-platform, multi-destination solution is used by thousands of companies around the world to safeguard their data. Download your free, 30-day trial today at And for more information visit or

Coverity is the trusted standard for companies that need to protect their brands and bottom lines from software failures. Over 1,100 Coverity customers use Coverity's development testing suite of products to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches, or catastrophic failure.

IBM offers security solutions for data security, identity and access management, application, mobile, cloud, endpoint management, network security and more. IBM InfoSphere Guardium data security software is an integrated platform for monitoring, auditing, protecting data integrity and enforcing compliance of trusted information. IBM solutions reduce risk and build confidence for better business decisions.

Boston-based Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect businessesagainst advanced threats and prevent data breach. Hundreds of organizations and millions of end users rely on Trusteerto protect critical endpoint applications on computers and mobile devices from advanced malware and spear-phishingattacks. Trusteer’s Cybercrime Prevention Architecture combines multi-layer security software with real-time threatintelligence to stop emerging threats that are invisible to legacy security solutions.

WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s agship product family, is the most accurate and cost-eective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.

Wombat Security Technologies combats cyber security threats with uniquely effective and engaging software-based training solutions for employees. The training solutions have been shown to reduce employee susceptibility to attack over 80%, and are in use today by small to medium businesses, Fortune 1000 companies and various government agencies.

Community Search
Sign In

Forgot your password?

Haven't registered yet?


ISSA International Conference Preview: Computer Science Curricula’s Failure

ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

11/2/2016 » 11/3/2016
2016 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information