AGC's 13th Annual West Coast Conference Book

Participating Company Profiles - Day One

Panaseer is a UK HQ'd company with clients and offices in London and New York. Internal and external stakeholders are asking security teams challenging questions about risk, priori- ties, metrics and effectiveness. The Panaseer Security Data Lake is an extensible data analytics platform that gives you the tools to unlock meaningful, timely insights from data simplify and automate risk management processes gain continuous visibility into risk expo- sure and security performance optimise available resources to achieve greatest risk reduc- tion at best cost Find out how you can increase security effectiveness at prioritising, com- municating and monitoring risk at www.panaseer.com

Unit 508, 164-180 Union Street London , UK SE10LH

Company Representative: Nik Whitfield, Chief Executive Officer

Nik Whitfield serves as Chief Executive Officer at Panaseer. Nik is a computer scientist and security technology entrepreneur. He has enjoyed a career building advanced technologies for the banking sector including algorithmic trading, pricing, operational risk management and most recently cyber security analytics platforms. In 2014 he founded Panaseer, a company which applies data science to cyber security in order to identify, measure and mitigate cyber risk.

Our founders created Soltra Edge and spawned the Threat Intelligence Platform market for large organizations. Now we are changing cyber intelligence for everyone.Perch is the world’s first cyber community defense platform. With Perch, your industry, your customers, and even your vendors can participate in your cyber defense community, automatically with- out additional staff. Organizations are no longer alone when responding to threats. Together they see what risks each other detect, what they understand, and how they mitigate. As the community grows, the stronger the community becomes. We are flipping the industry on its head. Perch is for the masses - it's low cost and scalable. Perch is for large organizations with vendor risk – allowing real-time monitoring across thousands of 3rd parties.

9644 Linebaugh Ave Tampa , FL 33626

Company Representative: Dave Eilken, Chief Revenue Officer

Dave helps chart the strategic course of Perch, create an unassailable value proposition, and drive revenue. He draws from a unique background of deep technical knowledge and broad strategic vision across multiple disciplines and cultures. For the past several years, he has been focused on unlocking the value of cyber intelligence sharing communities. As a former CTI professional, FS- ISAC member, OASIS standards evangelist, and co-founder of Soltra, he’s understands we are just on the cusp of an intelligence explosion. - Chicago Booth MBA, CISSP-ISSMP and startup-junkie.

Percipient Networks automates both the process of preventing malware from doing damage and the tasks involved in incident response and remediation.Strongarm is a cloud-based service designed specifically for businesses without dedicated security personnel. It requires no on-site appliances, SW, or agents to protect customers and protects all IP-based devices that are connected to the network including IoT, phones, tablets, and PCs.Strongarm takes a unique inside-out approach to security. Traditional security solutions try to keep malware out. Strongarm assumes malware will get in, and instead stops the malware from doing damage such as stealing IP, sensitive data, or launching a ransomware attack.Rather than block and drop suspicious activity, Strongarm’s blackhole technology maintains connection with the infected device.

50 Audobon Rd., Suite-T Wakefield , MA 01880

Company Representative: Todd O'Boyle, Chief Technology Officer

Todd O'Boyle (@oboyle) is a co-founder and CTO at Percipient Networks, an Allied Minds company. Prior to Percipient, Todd spent 15 years at The MITRE Corporation, providing technical support to the combatant commands, NATO, DISA, and the intelligence community. He also served as principal investigator for a project developing methods to improve how operators respond to adver- saries. Todd also researched software protections used by adversaries, approaches to discover malicious insiders, profiling network flow data to identify adversary activity, and computer forensics. Todd has a Bachelor of Science, Computer Science from Purdue University.

Made with FlippingBook - Online catalogs