• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

  • Secure360 TC
  • Keynotes
  • FAQs
  • Secure360 Sponsors

2020 Exhibitors

Thank you to our 2020 Exhibitors!

Protiviti

Protiviti is a global consulting firm that delivers Security and Privacy solutions. We help organizations leverage technology, realize efficiency, grow securely, and keep assets safe. We provide consulting solutions through our network of 85 offices in over 25 countries and have served more than 60 percent of Fortune 1000 companies.

Protiviti Content
•COVID-19’s Workplace Disruption: A Test of Board Resiliency
•Keeping Remote Workforces Safe and Secure – Part 1
•Keeping Remote Workforces Safe and Secure – Part 2
•A CISO Agenda for Addressing COVID-19 Challenges
•Operational Resilience – Protecting Against Extreme and Adverse Events

Contact: 
Ron Kuriscak | Protiviti, Managing Director, Security & Privacy | (e) Ron.Kuriscak@protiviti.com (p) 651-846-0562

Adam Ghelf | Protiviti, Senior Manager, Security & Privacy | (e) adam.ghelf@protiviti.com (p) 651-846-0543

PlexTrac

PlexTrac is a purple teaming platform driven by a mission to improve the security posture of organizations through enhanced collaboration within security teams of all sizes. PlexTrac serves as the central communication hub to aggregate all components of an organization’s cybersecurity program including assessments, scans, pentests, and real-time metrics.

PlexTrac Content 
•Effective Purple Teaming White Paper 
•Informational Insert 
•CISO One Pager 

Contact:
Brian Neibaur – brian@plextrac.com

Expel

Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io. 

 

Expel Content
•Expel Overview
•Transparent Managed Security
•Five Ways to Keep Your Security Nerds Happy
•How to Get Started with NIST Cyber Security Framework
•Pharmaceutical Customer Story

Contact:
Phone: 844.397.3524
Email: sales@expel.io

Technological Leadership Institute, University of Minnesota

The Technological Leadership Institute is an interdisciplinary center at the University of Minnesota led by world-renowned faculty. Its mission is to develop local and global leaders for technology-intensive enterprises through its three Master of Science degree programs in Security Technologies (MSST), Management of Technology (MOT) and Medical Device Innovation (MDI).

TLI Content
•Masters of Science Security

Contact:
tli-info@umn.edu 612-624-4380

LogRhythm

The LogRhythm NextGen SIEM Platform: Defending your enterprise responsibility – that’s why we built our NextGen SIEM platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. 

LogRhythm Content
•The SOC Hiring Handbook
•Security Operations Maturity Model
•Cloud Monitoring Security
•5 Steps to Security Automation Success

Contact:
www.logrhythm.com/request-more-information

Remediant

Remediant delivers enterprise-class cybersecurity solutions that enable real-time monitoring, Zero Trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security/Cloud ecosystems. We protect organizations from stolen credentials being used against them. Our SecureONE product offers an agentless and vaultless approach to deliver continuous detection of new privileged access across on-premise and cloud environments.

Remediant Content
•Remediant Video Demo
•Who is Remediant Video
•Remediant SecureOne Solutions Brochure
•Five Reasons PAM Solutions Fail
•Lockheed Martin Case Study
•Standing Privilege is a Persistant Threat Factor

Contact:
www.remediant.com/contact

White Oak Security Inc.

White Oak Security provides deep-dive offensive security testing to help organizations strengthen their security posture. Our unique industry experience allows us to offer a wide range of services to help analyze and test their information security controls and provide guidance to prioritize and remediate vulnerabilities.

White Oak Content
Click to visit their Virtual Booth! 

Contact:
White Oak Security
612.404.0302 

Marco Technologies

Marco is one of the largest technology providers in the country with clients throughout the Midwest and nationwide. We specialize in business IT services, copier/printer solutions and managed and cloud services. Our technology experts break down complex solutions into simple terms to position your business for success. Website: marconet.com.

Marco Content
•Your IT Security Checklist
•Network Security Measures Protect Before, During and After An Attack
•Marco Technology Assessment
•Managed IT Services
Security Offerings

Contact:
Shelly Caldwell
Email: shelly.caldwell@marconet.com
Phone: 800.847.3098 x6918

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.
The YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers.

Yubico Content
•Yubico Enterprise Solutions Overview
•YubiKey 5 Series Product Brief
•YubiKey FIPS Series Product Brief
•YubiHSM 2 Product Brief
•Case Study: Google
•Infographic: 2020 State of Password and Authentication Security Behaviors Report
•White Paper: Going Passwordless with FIDO2 and WebAuthn

Contact:
sales@yubico.com
1-844-205-6787
www.yubico.com/support/contact

NCC Group

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape. With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face. We are passionate about making the Internet safer and revolutionizing the way in which organizations think about cyber security.

NCC Group Content
•Security Services

Contact
Joe Soukup Joe.Soukup@nccgroup.com
(847) 613-9283

Recorded Future, Inc.

Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams by informing decisions in real-time with contextual, actionable intelligence. By analyzing data from open, dark, and proprietary sources, Recorded Future offers a singular, integration-ready view of threat information, risks to digital brand, vulnerabilities, third-party risk, geopolitical risk, and more. Learn more at recordedfuture.com.

Recorded Future Content
•Supercharging Security Intelligence
•Security Intelligence for Healthcare
•Supercharging SOAR Solutions With Threat Intelligence
•The Business Value of Recorded Future
•The Threat Intelligence Handbook

Contact:
www.recordedfuture.com/contact

One Identity

One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end.

One Identity Content
•Maintaining Business Momentum in the Face of Forced Change
•ROI Calculator for Automated AD Account Lifecycle Management
•Securing Privileged Remote Access with Safeguard

To enable organizations like yours implement maximum security on your remote administrators with minimal disruption, we are offering a free six-month license of Safeguard for Privileged Sessions!

Contact: John Butorac, Account Representative, john.butorac@oneidentity.com 

Sonatype

Sonatype is laser focused on helping organizations continuously harness all of the good that open source offers, without any of the risk.  To do this, we’ve invested in knowing more about the quality of open source than anyone else in the world. This investment takes the form of machine learning, AI, and human expertise, which in aggregate, produces highly curated intelligence that is infused into every Nexus product. Over 1,000 organizations and 10 million developers use Sonatype to make better decisions, innovate faster at scale, and rest comfortably knowing their applications consist of the highest quality open source components.

Sonatype Content
•DevSecOps Reference Architecture
•Demo Book 
•DevSecOps Community Survey
•Software Composition Analysis Report

Cyber Security Summit

10th Annual Cyber Security Summit | Oct. 26-28, 2020 | Minneapolis, MN

The Minneapolis Cyber Security Summit draws thought leaders from across industry, government and academia with an expansive agenda offering actionable takeaways for all experience levels. This year’s theme, ‘Ripple Effect,’ explores the cascading impacts we must constantly manage in our field to stay ahead of threats.

CSS Content
•Summit Guide
•Registration flyer
•Sponsorship prospectus
•Discount Pricing Infographic flyer

Contact:
Sponsorships: 
Eileen.manning@eventshows.com

Registration / General Inquiries: 
https://cybersecuritysummit.org/contact/

Social:
Facebook
Twitter 
LinkedIn
#cybersummitmn

Midpoint
Midpoint Technology provides products, services, and training for the Check Point Security Product suite, as well as the products of specific Check Point Certified Partners. Within this arena, Midpoint’s main emphasis is on Check Point’s Provider-1/Multidomain Management product.
Virtual Sponsor Page

Primary Sidebar

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email
© 2021 Secure360. All rights reserved.