Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
CISO Forum - Nashville 2013 - Sponsors

We would like to thank the following sponsors for their thought leadership and support of the October 2013 CISO Executive Forum.

AccessData Group has pioneered digital investigations for 25+ years and is the maker of FTK, SilentRunner and the CIRT security framework. CIRT is the first software solution to integrate computer forensics, network forensics, malware analysis, large-scale auditing and remediation into a single platform. It reduces incident response time, facilitates compliance auditing and continuous monitoring, and provides automated malware triage and analysis.

Code 42 Software has been protecting the world’s information since 2001. Its enterprise backup solution, CrashPlan PROe, provides people-friendly, enterprise-tough backup. Engineered with laptops in mind, PROe is continuous backup that won’t slow you down, and its self-service restores free up IT. The cross-platform, multi-destination solution is used by thousands of companies around the world to safeguard their data. Download your free, 30-day trial today at And for more information visit or

As the experts in advanced threat protection, Damballa discovers active threats that bypass all security prevention layers. Damballa identifies evidence of malicious network traffic in real time, rapidly pinpointing the compromised devices that represent the highest risk to a business and reduces the time to response and remediation. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world's largest ISP and telecommunications providers. For more information,, or follow us on Twitter @DamballaInc.

Ixia develops amazing products so its customers can connect the world. Ixia helps its customers provide an always-on user experience through fast, secure delivery of dynamic connected technologies and services. Through actionable insights that accelerate and secure application and service delivery, Ixia’s customers benefit from faster time to market, optimized application performance and higher-quality deployments. For more information about Ixia’s award-winning solutions, visit us at

Temple is a pro-business community seeking to grow its economic base. Possible incentives include cash and/or land grants, personal and property tax abatements, build to suit – lease back, lease payment assistance, no capital recovery fees, lease payment assistance, fast track permitting, and workforce development grants. Please visit to get more information.

Tripwire’s IT security software reduces risk, ensures systems and data security, and automates regulatory compliance. Tripwire offerings solve the security configuration management, continuous monitoring, and incident detection problems facing organizations of all sizes, as stand-alone solutions or in concert with other IT security controls.

WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.

Wombat Security Technologies combats cyber security threats with uniquely effective and engaging software-based training solutions for employees. The training solutions have been shown to reduce employee susceptibility to attack over 80%, and are in use today by small to medium businesses, Fortune 1000 companies and various government agencies.

Community Search
Sign In

Forgot your password?

Haven't registered yet?


ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

11/2/2016 » 11/3/2016
2016 ISSA International Conference

11/3/2016 » 11/4/2016
ISSA CISO Executive Forum - November 2016

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information