CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. CrowdStrike secures the most critical areas of enterprise risk – endpoints and cloud workloads, identity, and data – to keep customers ahead of today’s adversaries and stop breaches. Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon Platform leverages real-time indicators of attack, threat intelligence on evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities – all through a single, lightweight agent. With CrowdStrike, customers benefit from superior protection, better performance, reduced complexity and immediate time-to-value.
With more than 40 years of experience, DTCC is the premier post-trade market infrastructure for the global financial services industry. From operating facilities, data centers and offices in 16 countries, DTCC, through its subsidiaries, automates, centralizes and standardizes the processing of financial transactions, mitigating risk, increasing transparency and driving efficiency for thousands of broker/dealers, custodian banks and asset managers. Industry owned and governed, the firm simplifies the complexities of clearing, settlement, asset servicing, data management and information services across asset classes, bringing increased security and soundness to the financial markets. In 2016, DTCC’s subsidiaries processed securities transactions valued at more than U.S. $1.5 quadrillion. Its depository provides custody and asset servicing for securities issues from over 130 countries and territories valued at U.S. $49.2 trillion. DTCC’s Global Trade Repository maintains approximately 40 million open OTC positions per week and processes over one billion messages per month. To learn more, visit us at www.dtcc.com or connect with us on LinkedIn, Twitter, YouTube and Facebook.
Google's cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements. For more information, please visit http://www.google.com/apps/intl/en/business/index.html
Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world's population. Huawei's vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.
IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM's capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: - understand threats and vulnerabilities in terms of business impact - respond to security events with security controls that optimize business results - prioritize and balance your security investments. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today's business climate. IBM's cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.
Microsoft provides the most comprehensive approach to cloud computing, so that you can harness the full power of the cloud on your terms. Whether in your datacenter, with a service provider, or from a Microsoft’ datacenter and whether in a private cloud using HyperV™, a public cloud with Windows Azure™, or software as a service environment with Office365 Microsoft provides the flexibility and control to consume IT as a service in a way that best meets your unique business needs. Visit www.microsoft.com/cloud to find out more.
Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence. Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.
Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential. More than 15,800 organizations, including JetBlue, Nordstrom, Slack, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.
OneTrust is the #1 fastest growing and most widely used technology platform to help organizations be more trusted, and operationalize privacy, security, data governance, and compliance programs. More than 6,000 customers, including half of the Fortune 500, use OneTrust to build integrated programs that comply with the CCPA, GDPR, LGPD, PDPA, ISO27001 and hundreds of the world’s privacy and security laws.
The OneTrust platform is backed by 100 patents and powered by the OneTrust Athena™ AI and robotic automation engine. Our offerings include
OneTrust Privacy Management Software; OneTrust PreferenceChoice™ consent and preference management; OneTrust Vendorpedia™ third-party risk exchange; OneTrust GRC integrated risk management; OneTrust Ethics compliance and ethics; OneTrust DataGuidance™ regulatory research; OneTrust DataDiscovery™ AI-powered discovery and classification software; and OneTrust DataGovernance governance and metadata management .
Oracle Cloud is not only the lowest cost and most automated, but it's the industry's broadest and most integrated cloud, with deployment options ranging from the public cloud to your data center. Oracle Cloud offers best-in-class services across Software as a Service (SaaS), Data as a Service (DaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Oracle Cloud helps organizations drive innovation and business transformation by increasing agility and reducing IT complexity.
Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.
Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.
All Corporate Members
Avatier develops software and delivers services that automate IT operations. Our identity management and access governance solutions make organizations more secure and productive in the shortest time at the lowest costs. Avatier is the only company providing solutions that adapt to the needs of the business user delivering a unified framework for business processes across operations. Avatier Corporation offers identity access management software, cyber security audit controls, and enterprise risk management services that transform how enterprises operate. Avatier identity management solutions combine business technology with innovation to augment and sustain an organization's risk management compliance through self-service administration and automation.
From our unique user provisioning IT Store, to our first-of-its-kind self-service password reset tool, and now with our newly released universal mobile client access certification software, Avatier delivers critical identity access governance capabilities to IT operations while lowering administration costs.
Avatier offers a complete compliance management system with an ITIL service catalog, self-service provisioning, active directory group management, and self-service password reset to fortify your IT cyber security. For more information please visit https://www.avatier.com/
Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. Avaya Breeze Platform™ enables third parties to create and customize business applications for competitive advantage. The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.
AVEVA creates industrial software used in engineering, operations and performance of industrial assets in diverse sectors, across the world. We have a track record of leading edge innovation, including IIoT, Cloud, industrial AI, Digital Twin, predictive and prescriptive analytics, big data and mixed, virtual and extended reality.
Axis Security’s Application Access Cloud introduces a new, simple, and secure solution for application access. Built on a zero-trust, agentless-first approach, Application Access Cloud enables more use cases, covering more apps than any other access solution. Axis eliminates the need for VPNs, VDI’s, network changes, or agents on every device. Reduce risk by significantly minimizing the attack surface as users never touch the network, or vulnerable applications. By collecting and analyzing real-time user behavior, Application Access Cloud continuously ensures the right users access the right apps making access fast to deploy, simple to use, and more secure than ever.
Axon Enterprise, formerly known as TASER International, creates a technological ecosystem that enables truth in public safety. Building on a history of innovation in policing, our solutions rival the best of Silicon Valley.
Customers are constantly gathering evidence in the form of body-worn
camera video, audio, photos, and other digital media. Axon Cloud Services
is delivered as software-as-a-service (SaaS) and offers an end-to-end cloud
application that provides customers with a centralized location to store,
categorize, manage, and share that data.
Customers upload content from Axon and TASER devices and other systems
easily, manage it simply with search and retrieval features, and
collaborate effortlessly with prosecutors through powerful case sharing
features. When storage needs increase, the cloud-based system allows
agencies to scale instantly and cost-effectively.
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, user accounts, and SaaS applications, for customers around the world. For more, visit Axonius.com.
BARR Advisory is a cloud-based security and compliance solutions provider specializing in cybersecurity consulting and compliance for companies with high-value information in cloud environments like AWS, Microsoft Azure, and Google Cloud Platform. A trusted advisor to some of the fastest growing cloud-based organizations around the globe, BARR simplifies compliance across multiple regulatory and customer requirements in highly regulated industries including technology, financial services, healthcare, and government.
BARR Advisory services include:
Compliance Program Assistance
SOC 1 Examinations
SOC 2 and 3 Examinations
SOC for Cybersecurity
PCI DSS Assessment Services
ISO 27001 and 27701 Assessments
FedRAMP Security Assessments
Penetration Testing and Vulnerability Assessments
Virtual CISO Services
People and Culture Services
Bay-Pac Systems Private Limited
Bay-Pac Systems (Pvt) Ltd is based on Chennai, India. It was started a by a small group of Human Resources professionals and Technocrats to provide a ready back-office facility to smaller organizations in the US so that they can take advantage of a ready made infrastructure, and have an office running literally overnite.
It came about because of a need in the market place where larger organizations with deep pockets and resources have taken advantage of low-cost, highly qualified labor pool in India by setting up footprints where most grunt work such as data-scrubbing, data conversions, call-centers and support are being run from. Smaller organizations have struggled to compete because of lack of resources needed to set up shop in a new country, and to manage peoples belonging to different cultures and value systems.
The founder, Reddy Chada is originally from India, but has spent 15 years in the US, both going to professional school and working in the west coast in large organizations implementing HRMS systems and providing global data integration solutions. With this unique perspective, he is able to tie the needs of the US clients with the delivery options available using local resources in India.
To this end, a highly successful operation delivering ready-made back-office services are available for small and medium organizations needing full-service or specific areas in Human Resources domain
BDO provides audit, tax and advisory services through its global network that extends to over 160 countries and 1700 offices across the world. BDO'sthird party assurance practice helps leading global and rising tech companies meet the cloud security and privacy requirements of their enterprise customers and business partners. BDO efficiently delivers a client's required set of audit reports and certifications through a unified audit process. This increasingly includes SOC 2 plus reporting, ISO 27701 privacy certification, CSA STAR, and country-specific requirements.
Contact [email protected] or see https://www.bdo.com/services/assurance/service-organization-control-attestation/overview for more information.
Beisen, the top brand of talent management in China, the pathfinder of talent management software. Beisen was established in 2002. As the first enterprise of talent management in China, for 10 years, Beisen is committed to the R&D of talent management technology. Beisen has been through the development of talent management in China and makes its due contribution. In September 2010, iTalent, the first cloud computing platform of talent management in China was constructed by Beisen. The platform seamlessly integrates 6 core products including talent assessment system, recruiting management system, performance management system, succession and planning system, 360 degree evaluation system and employee survey system. With the help of iTalent platform, the fragmental human resource works in the past can be replaced by integrated talent management. And with the assists of cloud computing, the complicated and frustrating enterprise software becomes much more simple, flexible and easy-in-use. Outstanding products is the basis of Beisen, helps Beisen win the trust of a great amount of customers. By now, Beisen’s market share of talent assessment is over 70% as well as the largest amount of customers of recruiting management system in the whole industry. Beisen set up its headquarter in Beijing, and have 10 branches, which provide service all over China, including Shanghai, Guangzhou, Shenzhen, Chengdu, Nanjing, Xiamen, Ningbo, Dalian, Shenyang and Qingdao.
Bell is Canada's largest communications company, providing consumers and business customers with wireless, TV, Internet, home phone and business communications services. Bell Media is Canada's premier multimedia company, with leading assets in television, radio, out of home and digital media. Bell is wholly owned by Montréal's BCE Inc. (TSX, NYSE: BCE). For more information, please visit http://Bell.ca.
BetterCloud is the first SaaS Operations Management platform, empowering IT and security teams to define, remediate, and enforce management and security policies for SaaS applications. Over 2,500 customers in 60+
countries rely on BetterCloud for continuous event monitoring, threat remediation, and fully-automated policy enforcement. To further guide customers on their SaaS strategy, the company established the first-ever "SaaS Application Management and Security Framework" in its newly published book, Controlling Your SaaS Environment. BetterCloud is headquartered in New York City with an engineering office in Atlanta, GA. For more information, please visit www.bettercloud.com.
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry's most advanced
PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. Our products enable the right level of privileges for just the time needed, creating a frictionless experience for users that enhances productivity.
With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network. Learn more at www.beyondtrust.com.
Based in New York and Tel Aviv, BigID uses advanced machine learning and identity intelligence to help enterprises better protect their customer and employee data at petabyte scale. Using BigID, enterprises can better safeguard and assure the privacy of their most sensitive data, reducing breach risk and enabling compliance with emerging data protection regulations like the EU’s General Data Protection Regulation and California Consumer Privacy Act. BigID has raised $46M in funding since its founding in 2016 and has been recognized for its privacy innovation as the 2018 RSA Conference Innovation Sandbox winner, a CB Insights 2018 Cyber Defender, Network Products Guide 2018 IT World Awards “Hot Company of the Year” winner, a 2019 InformationWeek Vendor to Watch, and a 2019 Business Insider enterprise vendor “to bet your career on.” Learn more at http://bigid.com or visit us at http://bigid.com/demo to schedule a demo.
Born in Italy in 2003, Bip is one of the fastest growing company in the world who gathered the historical experience of consulting and added two key ingredients: innovation and digital. Thanks to this path, Bip is today an international company of 4,000 professionals, in 13 countries.
BIP Cybersec is the Center of Excellence of Bip focused on supporting clients in the adoption and implementation of Cyber Security transformation programs. Competence, ability to execute and an innovative approach allowed BIP CyberSec to gain relevant experience on important clients in several market sectors: Energy & Utilities , Financial Services, Public Sector, Telco & Media and. Transport.
BIP CyberSec's offer is articulated into three main areas of expertise:
Cyber Security Strategy, Governance, Risk Management and Compliance services.
Cyber Security Technology & Innovation: scouting, selection and implementation of innovative cyber-security technologies and platforms.
Cyber Defense: managed services provided by highly skilled Ethical Hacker able to test the cyber security readiness of digital services and ICT infrastructures (Red Team) and qualified support in managing Cyber Security incident response (Blue Team).
Thanks to a team of more than 250 professionals with over 500 Cyber Security certifications, BIP CyberSec developed hundreds of projects in the last 2 years in more than 25 countries.
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums.For more information, please visit www.bitsighttech.com or follow us on Twitter (@BitSight).
Blackbaud is the world’s leading cloud software company powering social good. Serving the entire social good community—nonprofits, foundations, corporations, education institutions, and individual change agents—Blackbaud connects and empowers organizations to increase their impact through software, services, expertise, and data intelligence. The Blackbaud portfolio is tailored to the unique needs of vertical markets, with solutions for fundraising and relationship management, digital marketing, advocacy, accounting, payments, analytics, school management, grant management, corporate social responsibility, and volunteerism. Serving the industry for more than three decades, Blackbaud is headquartered in Charleston, South Carolina and has operations in the United States, Australia, Canada, Ireland, and the United Kingdom. For more information, visit www.blackbaud.com.
One in four organizations suffered from a cyber attack in the last year, resulting in production, reputation and financial losses. The real problem is adversaries attack companies via third parties, island-hopping their way into target organizations. At Black Kite, we're redefining vendor risk management with the world’s first global third-party cyber risk monitoring platform, built from a hacker's perspective. With 200+ customers across the globe and counting, we're committed to improving the health and safety of the entire planet's cyber ecosystem with the industry’s most accurate and comprehensive cyber intelligence. While other security ratings service (SRS) providers try to narrow the scope, Black Kite provides the only standards-based cyber risk assessments that analyze your supply chain's cybersecurity posture from three critical dimensions: technical, financial and compliance.
The only real-time deep learning platform for agentless cloud security and network detection and response. Powered by our patented architecture of deep learning neural networks, Blue Hexagon delivers Real Time Threat Detection in less than a second, at near 100% efficacy, Actionable Visibility, and Continuous Compliance. Please visit https://bluehexagon.ai/ for more information.
At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem.
Booz Allen Hamilton
For nearly four decades, Booz Allen has helped clients defend against cyber threats. As one of the largest cybersecurity firms in the world, our elite talent provides cyber defense, sophisticated tradecraft, and real-time cyber threat intelligence. Key activities include operational technology security, 5G, cloud security, IoT, Secure Connected Health, and weapon system security.
We solve the most consequential cyber challenges for clients at Fortune 500 and Global 2000 companies, and nearly every civil, defense, and intelligence agency. Teams of security researchers, penetration testers, reverse engineers, network analysts, and data scientists collaborate to help solve ever evolving challenges. Using expert tradecraft to combat the most advanced adversaries, we are often the first company to work on really challenging problems. Together, we help you keep your business and mission secure.
- Cybersecurity at Booz Allen
- Cloud Computing
- Cyber Threat Trends and Threat Landscape
- 4 Key Questions about Cloud Migrations, Answered
- Edge Computing Series
- Technology Events
Bow Valley College
Bow Valley College is a public, board-governed college operating as a comprehensive community institution under the Post-Secondary Learning Act of Alberta. The branch campuses are: Airdrie, Banff, Canmore, Cochrane, High River, Okoktoks, and Strathmore.
Box (NYSE:BOX) is a leading cloud content management platform that enables organizations to accelerate business processes, power workplace collaboration, and protect their most valuable information, all while working with a best-of-breed enterprise IT stack. Founded in 2005, Box simplifies work for leading organizations globally, including AstraZeneca, JLL and Morgan Stanley. Box is headquartered in Redwood City, CA, with offices in the United States, Europe, and Asia. To learn more about Box, visit http://www.box.com. To learn more about how Box powers nonprofits to fulfill their missions, visit Box.org.
British Standards Institution
BSI Global HQ
389 Chiswick High Road London W4 4AL United Kingdom [email protected] +44 20 8996 9000
12110 Sunset Hills Road, Suite 200 Reston, VA 20190-5902 [email protected] Telephone: 1.800.862.4977
BSI has 58 offices serving over 80,000 clients in 150 countries To find the office closest to you visit: http://www.bsigroup.com/
Britive is an award-winning, cloud-native solution delivering unified access cross-cloud. Our solution empowers teams across cloud infrastructure, DevOps, and security functions to control privileged access, mitigate account and data risk, address security health checks and posture audits, and improve operational efficiency. We do this through enabling cloud-first security best practices such as cloud JIT permissioning, cloud secrets governance, and intelligent privilege right-sizing.
Bureau Veritas is a world leader in testing, inspection and certification. We help clients across all industries address challenges in quality, health & safety, environmental protection, enterprise risk and social responsibility. We support them in increasing performance throughout the life of their assets and products and via continuous improvement in their processes and management systems. Our teams worldwide are driven by a strong purpose: to preserve people, assets and the environment by identifying, preventing, managing and reducing risks.
Bureau Veritas has offered management systems certification to our clients since the first such international standard, ISO 9001 for quality, came into being in 1987; with 150,000 active ISO certificates and +8,000 skilled auditors, Bureau Veritas is present in 140 countries with local specialists in 80 countries. Subsequently Bureau Veritas began offering Information security management systems certifications since the early 2000s.
Today Bureau Veritas is recognized by over 40 national and international accreditation bodies across the world, Bureau Veritas holds United Kingdom Accreditation Service (UKAS) global accreditations for Cyber Security and Business continuity to standards including ISO 27001, ISO 55001 and ISO 22301.
C2 Labs serves as a security focused and agile digital transformation partner that blends Art and *Science *to enable our customers to expand their vision, drive cultural change, and avoid being left behind. Our engineers and products deliver proven results, bringing DevSecOps to Compliance.
Founded in 1957, the China Academy of Information and Communications Technology(hereinafter referred to as CAICT) is a scientific research institute directly under the Ministry of Industry and Information Technology(MIIT) of China. It cherishes the cultural philosophy of "Boosting prosperity with virtues and expertise" for years while adhering to the development positioning of "a specialized think-tank for the government and an innovation and development platform for the industry". Committed to "the think-tank and enabler for innovation and development in an information society", CAICT has provided strong support for major strategies, plans, policies, standards, tests and certification for the development of the national ICT sector and the IT application, thus proving itself an important facilitator in the leapfrog development and innovation of China's information and communications sector. It has been granted hundreds of scientific and technological awards at both national and provincial levels. In recent years, with a view to adapting to the new eco-social backdrop and requirements, CAICT has strengthened its efforts in innovation to achieve wider and deeper research landscape. It has conducted in-depth research and foresighted planning in the fields of 4G/5G, industrial Internet, smart manufacturing, mobile Internet, Internet of Things(loT), Internet of Vehicles (loV), cloud computing, big data, blockchain, artificial intelligence (Al), future networks, virtual reality/augmented reality (VR/AR), intelligent hardware, and cyber and information security. This enables CAICT to play an important role in strategy and policy study, technological innovation, industrial development, and international cooperation related to the ICT sector and the integration between industrialization and informatization.
CaixaBank is a financial group, leader within the Spanish market, comprising a banking and insurance business, as well as undertaking investments in international banks and in leading service sector companies. The Group's essence – and what sets it apart from others – is its level of implication and unswerving commitment to society. CaixaBank is committed to banking based on corporate values of quality, confidence and social commitment. CaixaBank has the largest customer base in Spain – 14 million people – and is the main bank for 1 in every 4 Spanish customers. The bank has the most extensive network in Spain, with over 5,000 branches and nearly 9,500 ATMs, complemented by a mobile and online banking service of the highest quality.
CaixaBank is also the tenth largest bank in the Eurozone in terms of market capitalisation.
CAS Assurance, LLC
CAS Assurance, LLC is a CPA firm based in Miramar, Florida, assisting entities with their taxes and accounting, attestation, compliance, and cybersecurity governance needs. With services designed to meet the specific and unique needs of each client, our team of experienced and resourceful consultants provide better insights for better solutions and results. Our services are aimed at helping clients to improve operational efficiency, cybersecurity risks governance, accountability, and privacy regulatory compliance posture to facilitate an overall healthy, secure, compliant, and thriving organization.
CAS Assurance, LLC cybersecurity and compliance related services include attestation for SOC 1 and 2,
SOC for Supply Chain, and Cloud Security Alliance (CSA) STAR. We assist clients with audit readiness
assessment and gap remediation, including developing or enhancing requisite security policies and
procedures for leading standards, frameworks, and regulations such as NIST SP800-53, CSF, ISO27001,
ISO27017, CCM, PCI-DSS, HIPAA, CMMC, SWIFT CSC, CCPA, and GDPR. Our consulting services also
include helping clients to implement a SaaS solution from our partner for continuous monitoring,
maintenance, and maturation of organization cybersecurity and compliance efforts.
Cendyn is a cloud-based software and services provider that develops integrated technology platforms for driving sales and marketing performance in the travel and hospitality industry. The Cendyn Hospitality Cloud offers the most complete set of innovative software and services in the industry, covering hotel marketing, guest engagement, group sales, and event management. With offices in Boca Raton, Atlanta, Boston, San Diego, Toronto, Whistler, London and Singapore, Cendyn proudly serves more than 30,000 clients in 143 countries with enterprise spend levels in excess of $1 billion. For more information on Cendyn, visit www.cendyn.com.
We are Censys. Founded by the creators of zMap, we invented internet-wide scanning, and have continued to invest and innovate using our knowledge of the Internet and cloud to help security teams protect their organizations. We provide an attacker-centric view of all internet and cloud assets, and we are the best at finding the exposures attackers will exploit.
CEPREI Certification Body
CEPREI HQ No.110 Dongguan Zhuang RD. Guangzhou, P.R.China Telephone: +86-20-87236606 [email protected] As a leading provider of management system certification body in China and the first Executive Member of CSA in Asia, CEPREI Certification Body Provides information security related professional services such as ISO20000 & ISO27001 certification, risk assessment, IT governance, Business Continuity Management etc. Also, newly launched C-STAR assessment scheme is provided to help our client fully understand cloud security issues they’re facing and how to put the appropriate controls in place. CEPREI Certification Body with unique legal status is a registrar authorized and accredited by national department and/or accreditation bodies home and abroad, to conduct third-party certification. It grew out of Inspection Division of China Electronic Product Reliability and Environmental Research Institute （the Fifth Electronic Institute） established in 1956, which is the first scientific research organization at national level engaged in product quality and reliability research in China. As early as 1979, CEPREI Certification Body introduced the concept of Certification into China. Ever since then CEPREI has issued more than ten thousand certificates of various types to its clients. It sets foot in all administrative regions in mainland China and other countries and regions including Hongkong Special Administration Region, Taiwan, USA, German, Holland, Denmark, Australia, Japan, Korea, Malaysia, Thailand and Singapore. As one of the most authoritative accreditation bodies in the world, America National Standard Institute-Registrar Accreditation Board (ANAB) has authorized CEPREI Certification Body to issue ISO9000, ISO14000 and ISO27001 certificates with ANAB logo since 2001. The certificate will be helpful for your products and services in improving reputation and enhancing competitiveness home and abroad.
Certego Srl (www.certego.net) is an Italian firm specialized in the provision of advanced Managed Detection & Response services against Cybercrime. Established in May 2013 and based in Modena, Certego developed a proprietary Security Orchestration, AutomatIon and Response Platform, formerly known as Certego PanOptikon, which make possible to gather and analyze security events in real-time, investigate and hunt possibile cyber threats and follow the entire life cycle of a security incident thanks to the in-depth investigations provided by the Certego Computer Security Incident Response Team (CSIRT).
Certego CSIRT is made up of a highly skilled team of resources which are specialized in cyberattack detection and security incident management; it operates 24/7/365 with the goal of translating a complex cyber threat or an information security issue into a series of specific IT activities that the customer’s organization can easily understand and handle to prevent or mitigate business impacts.
Certego works to assists customers to detect and contain the propagation of a cyber attack through all the kill-chain phases when they occurs; it assists customers in recovering systems and understanding the “root-cause” of a cyber attack and it provides all necessary information so that an organization can optimize resilience against cyber attacks and reduce the chance for an attack to have effective results and, eventually, reducing impacts on their core business.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, , which defends enterprises’ cloud, network and mobile device held information. Specifically, Check Point CloudGuard, provides unified cloud native security for assets and workloads, across multi-cloud environments to automate security, prevent threats, and manage posture.
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.
The concept of solutions being driven to address specific customer challenges has been with Cisco since its inception. Husband and wife Len Bosack and Sandy Lerner, both working for Stanford University, wanted to email each other from their respective offices located in different buildings but were unable to due to technological shortcomings. A technology had to be invented to deal with disparate local area protocols; and as a result of solving their challenge - the multi-protocol router was born.
Clearwater is the leading provider of Enterprise Cyber Risk Management and HIPAA compliance software and services for healthcare organizations, including health systems, physician groups, and health IT companies. Our solutions include our proprietary SaaS-based platform IRM|Pro®, which helps organizations manage cyber risk and HIPAA compliance across the enterprise, and advisory support from our deep team of information security experts.
Cloudbric is a cloud-based web security provider based in Seoul, South Korea. It offers a WAF, DDoS protection, and SSL solution and protects websites from SQL injection, cross-site scripting, identity theft, website defacement, and application layer DDoS attacks.