As we embark on our Fifth Summit, the cyber threats to the global aviation ecosystem are changing by the hour. Aviation remains one of the most appealing targets for credential theft, financial attacks, ransomware, and hostile nation-state actions. Companies in the aviation industry operate in a shared risk environment. Airlines and airports are equally dependent upon the resiliency of each other’s systems as well as the those of their supply chain, the air traffic management systems, and more.
The Aviation ISAC enables organizations to become more resilient to cyberattacks by virtue of trusted communities. We enable swift exchange of threat information and best practices for CISOs and all those supporting the CISOs’ areas of responsibility: intelligence analysts, network architects, compliance, and product security functions. Of all the tools and services offered by the A-ISAC, our most important pillar is the trusted relationships built upon our face-to-face gatherings such as our upcoming Annual Summit. Our members need the services you offer. They are on the front lines of the cyber threat battle and are dependent upon the tools and services provided by organizations such as yours. By working together, we can better prepare ourselves against the evolving cyber threat landscape. The annual summit is held in mid-September this year, when many companies are reviewing their toolsets and planning for 2019.
Your support enables us to provide members an informative and educational program. It would not be possible for us to hold this event without your support. Our challenges are your challenges—the solutions you create are invaluable in our global effort to protect the aviation industry. We welcome your engagement and look forward to learning more about your expertise.
We welcome your participation in this year’s “Navigating the Threat Landscape” Summit and look forward to working with you to make our Summit the must-attend aviation cyber networking event of the year!
As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale with over 200,000 servers across 130 countries, giving customers superior performance and threat protection. Akamai’s portfolio of web and mobile performance, cloud security, enterprise access, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media & entertainment providers, and government organizations trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter.
ReliaQuest is pushing the boundaries of IT security — past allegiance to any one security tool, workforce limitations, or definitions of existing market categories. Our technology is delivered as a customized service, allowing enterprise security teams to stay agile without compromising quality. It maximizes investments organizations have already made, adding access to broader sources of data. We transform organizations into their own security platforms – providing unmatched visibility while normalizing spend. ReliaQuest operates 24 hours a day, 365 days a year from Security Operations Centers in Tampa, FL, and Las Vegas, NV. ReliaQuest’s model is recognized by industry experts as the emerging standard for large and complex organizations. The company has received numerous accolades for its commitment to maintaining a positive company culture. In 2017, ReliaQuest was named a national Great Place to Work®, listed as one of FORTUNE Magazine’s Top 100 Medium Workplaces and ranked No. 171 on Deloitte’s Technology Fast 500™, a list of the 500 fastest growing technology companies in North America. Also in 2017, ReliaQuest CEO Brian Murphy was named EY Entrepreneur of the Year for Florida. In January of 2018, ReliaQuest was named one of the Best Workplaces in Technology by FORTUNE Magazine and Great Place to Work.
Wednesday Evening Dinner
Agari is the only cloud-native solution that uses predictive AI to stop advanced email attacks. Winner of Best Email Security Solution by SC Magazine in 2018, the Agari Email Trust Platform™ prevents ransomware, ATO, phishing, BEC and other identity deception attacks, restoring trust to digital channels for businesses, governments, and consumers worldwide. Learn more at www.agari.com.
Anomali delivers critical threat intelligence capabilities, allowing organizations to detect, investigate and respond to serious external threats. The company’s unmatched customer base spans all major verticals and includes partnerships with many ISACs and threat exchanges. Anomali integrates with internal infrastructure to identify new attacks, or search forensically over the past year to discover existing breaches, and enables security teams to quickly understand and contain threats. To learn more, visit www.anomali.com and follow us on Twitter: @anomali and LinkedIn.
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates over 100 billion security events a day from across the globe to immediately prevent and detect threats.
There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
CrowdStrike was positioned the highest in ability to execute and furthest in completeness of vision in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP).
IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. We address the evolving security landscape and our clients’ most critical needs with AI innovation in the cloud and intelligent orchestration.
The Oracle Cloud offers complete SaaS application suites for ERP, HCM and CX, plus best-in-class database Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) from data centers throughout the Americas, Europe and Asia. For more information about Oracle (NYSE:ORCL), please visit us at oracle.com.
Symantec Corporation (NASDAQ: SYMC), one of the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.
Description coming soon.
Darktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders, and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has 32 offices worldwide. For more information, visit www.darktrace.com
Flashpoint delivers Business Risk Intelligence (BRI) to empower organizations worldwide with meaningful intelligence and information that combats threats and adversaries. The company’s sophisticated technology, advanced data collections, and human-powered analysis uniquely enables large enterprises and the public sector to bolster cybersecurity, confront fraud, detect insider threats and build insider threat programs, enhance physical security, improve executive protection, and address vendor risk and supply chain integrity. Flashpoint is backed by Georgian Partners, Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments. For more information, visit https://www.flashpoint-intel.com/ or follow us on Twitter at @FlashpointIntel.
HackerOne is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security partner. Organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google, Twitter, GitHub, Nintendo, Lufthansa, Panasonic Avionics, Qualcomm, Starbucks, Dropbox, Intel and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities. HackerOne customers have resolved over 69,000 vulnerabilities and awarded over $27M in bug bounties. HackerOne is headquartered in San Francisco with offices in London and the Netherlands.
Intel 471 provides an actor-centric intelligence collection capability for the world’s leading cyber threat intelligence teams. Our collection focuses on infiltrating and maintaining access to exclusive and top tier closed sources where threat actors collaborate, communicate and plan cyber-attacks. We are active in places where barriers to entry are high such as underground marketplaces and other mediums where cybercriminals communicate. Our global teams are physically situated around the globe.
We are in their homeland, speak their language know their culture and we know how they operate. Our team is comprised of professional expertise from intelligence services, military, law enforcement and private threat intelligence companies. The mission of Intel 471 is to protect your organizations, your products, your assets and your people. To learn more, visit www.Intel471.com.
NC4® delivers safety and security solutions for both business and government organizations. NC4 revolutionizes how organizations and communities collect, manage, share and disseminate information to reduce cyber threats, fight crime, mitigate risks and manage incidents. NC4 also provides cyber threat sharing solutions both through secure collaboration services and recently (via Soltra Edge®), through automated, structured, and standardized (STIX/TAXII) mechanisms.
NC4 solutions are used by private sector companies involved in financial services, high-tech, insurance, manufacturing, aerospace and defense, oil and gas, pharmaceuticals and healthcare, as well as other industries. In the public sector, NC4 solutions are used by federal, state and local agencies in homeland security, emergency management and law enforcement disciplines.
Founded in 2016 in Tampa, FL, Perch Security was created to meet cyber security needs by enabling institutions of every size to detect the threats their sharing community warns them about — without costly equipment or analyst hours. Perch’s goals are to help customers detect 100% of the threats shared with them, connect them with their best sources of intelligence, and to strengthen sharing communities through more participation.
Qadium empowers organizations to define and secure their perimeters. Our global-scale, near realtime Internet intelligence platform offers large organizations complete visibility into and actionable insights about their true network perimeter to mitigate information security risks – including beyond-the-firewall “unknown unknowns” like shadow IT in cloud hosting, assets lost during M&A events, regional offices violating policy, and more. Our platform continually monitors the global Internet, constantly re-maps, and characterizes behavior of all public Internet-connected devices. Over the last two years, F1000 organizations like Capital One, CVS, Allergan, and Fluor have trusted Qadium to define and secure their perimeters.
ReversingLabs solutions expose undetected malware to enable more effective response, limit damages, and strengthen defenses. Our unique file decomposition and static analysis technology combined with our file
intelligence services integrate local and in-the-wild threat visibility, extract detailed threat indicators, and classify threat levels helping security teams detect and contain sophisticated attacks. Government organizations and large enterprises use our solutions to implement next-generation malware detection, threat intelligence and hunting capabilities.
Splunk Inc. (NASDAQ: SPLK) turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to discover their “aha” moments with machine data and solve their toughest IT, Internet of Things and security challenges. Use Splunk software in the cloud and on-premises to improve service levels, reduce operations costs, mitigate security risks, enable compliance, enhance DevOps collaboration and create new product and service offerings. Join millions of passionate users by trying Splunk software for free: www.splunk.com/free-trials.
Transmit Security allows organizations to implement frictionless omni-channel authentication without making modifications to their existing applications. The company’s technology supports any authentication technology, from any vendor, in one modular, micro-services platform that enables application owners to slash time-to-market and cost-to-market for new identity related projects.
Executive Women's Networking Breakfast
GE Aviation is a world-leading provider of commercial, military and business and general aviation jet and turboprop engines and components as well as avionics, electrical power and mechanical systems for aircraft. GE has a global service network to support these offerings. GE and its customers are also working together to unlock new opportunities to grow and deliver more productivity beyond traditional services. GE Aviation is becoming a digital industrial business with its ability to harness large streams of data that are providing incredible insights and in turn, real operational value for customers.
IntSights enables Aviation companies to transform their cybersecurity operations by turning tailored threat intelligence into automated security operations. Our proactive cybersecurity approach allows you to mitigate threats before they occur, so you can minimize service disruptions, protect your customers and reduce your risk of attack. Our unique cyber reconnaissance capabilities continuously monitor an enterprise's external digital profile across the surface, deep and dark web to find and mitigate specific threats that directly impact your organization and the Aviation industry. This has made IntSights’ one of the fastest growing cybersecurity companies in the world. To learn more, visit: https://www.intsights.com.
Oliver Wyman is a global leader in management consulting with offices in 50+ cities across nearly 30 countries. Our transportation practice experts advise global, regional, and cargo carriers, aerospace and defense OEMs and suppliers, airports, MROs, and other service providers in the transport and travel sector on growing shareholder and stakeholder value, capitalizing on disruption, optimizing operations, managing risk, and maximizing commercial and organizational effectiveness.
Our capabilities also include: CAVOK, technical consulting on safety and compliance, maintenance programs, and certification (www.cavokgroup.com); PlaneStats.com analytical data tools; and strategies and modeling for market share, network, and fleet planning analyses via our Network Simulation Center.
Oliver Wyman is a wholly owned subsidiary of Marsh & McLennan Companies [NYSE: MMC]. For more information, visit www.oliverwyman.com. Follow us on Twitter @OliverWyman.
Thursday Happy Hour
The world's largest enterprises rely on Shape Security as their primary line of defense against imitation attacks on their web and mobile applications. Shape's customers include three of the Top 5 US banks, five of the Top 10 global airlines, two of the Top 5 US insurers, and two of the Top 5 global hotels. The Shape platform, covered by 50 issued patents and 100+ additional patent applications, was designed to stop the most dangerous application attacks, including credential stuffing (account takeover), unauthorized aggregation, and MitB attacks. Today, the Shape Network defends 1.4 billion user accounts from account takeover and protects over 50% of all US banking online transactions. Shape is headed by industry leaders from Google, Cisco, IBM, Raytheon, Palo Alto Networks, and the Department of Defense.
CA | Veracode, now part of CA Technologies, enables the secure development and deployment of the software that powers the application economy.
With its combination of automation, process and speed, CA | Veracode becomes a seamless part of the software lifecycle, eliminating the friction that arises when security is detached from the development and deployment process. As a result, enterprises are able to eliminate vulnerabilities during the lowest cost-point in the development/deployment chain so they can fully realize the advantages of DevOps environments while ensuring secure code is synonymous with high-quality code.
CA | Veracode’s SaaS platform assesses and improves the security of applications from inception through production so that businesses can fully realize the benefits of the applications they build, buy and deploy as well as the components they integrate into their environments.
Without the need for additional staff or equipment, CA | Veracode customers ramp up quickly, see results and prove value on day one, and consistently see improvement over time.