Sponsors

Sponsorship Means Business!

Advocate: Our professional association and chapters are working every day to advance understanding, policies, standards and professional networking that will grow the industry to ensure that the voice of our members and sponsors are heard by our nation’s influential decision makers, industry leaders and the general public.

Connect: Tap into our member network and a Who’s Who of Information Security Professionals.

Grow: Sponsoring provides your company with the opportunity to engage with security professionals Meet qualified decision makers - attendees responsible for influencing, purchasing and implementing security technologies. Cultivate your ever-growing network through direct contact with industry peers, decision makers and certified professionals. Sell products and services. Promote company brand awareness.

Timeframe: Sponsorship program will last for 12 months from time of agreement.

The Central Florida (ISC)2 Chapter is excited that you are considering becoming a sponsor of our chapter. If agreed upon, a Co-marketing Agreement and Memorandum of Understanding will be signed by both parties.

Please email sponsorship@isc2chapter-centralflorida.org to sign up for sponsorship!

For more information download our sponsorship packet of information.


Thank you to our 2017 Sponsors!

GoldSky is a full service cyber security solutions firm. Our services are custom designed for each client depending on the specific needs they have. Our objective for all of the companies we partner with is to identify IT security vulnerabilities and provide the resources necessary to reduce the risk of cyber attacks.

GoldSky offers a wide range of security services to meet your security and compliance needs. All our services are delivered to exacting standards and industry best-practices to provide your organization with a world-class delivery experience. For our clients who are looking for a full-service CSO/CISO offering, we’re proud to offer our CSO-as-a-Service (CSOaaS™). Our CSO’s help your organization build lasting and robust security program in your small-midsized business.


 

 

Since its founding in 1999, the UCF Business Incubation Program has helped several hundred emerging companies (including more than 120 current clients and more than 90 graduates). 

From October 2011 to December 2012, the UCF network of current and graduated clients has helped create a regional output of over $400 million resulting in a $5.93 return for every $1.00 invested in the program. 

With nine facilities across the Greater Orlando community, the program is an example of a successful community partnership.  The UCF Business Incubation Program was named “Incubator Network of the Year” for 2013 by the National Business Incubation Association. 

For more information visit www.incubator.ucf.edu.  

 

Javelin Network's mission is to protect what the cyber security industry neglects: the Active Directory. Our all-in-one, A.I. driven-platform protects the Active Directory from illegitimate use, providing autonomous breach prevention and containment, incident response, and threat hunting capabilities. By combining A.I., obfuscation, and advanced forensic methodologies right at the point of breach, we respond automatically and in real-time to contain the attack. It is the only agentless solution that immediately contains attackers after they compromise a machine, preventing them from using Active Directory credentials and moving laterally into the network. Javelin greatly reduces the effort, time, and error when detecting and containing a breach. To learn more, please email us at hello@javelin-networks.com or call us directly at (888) 867-5179.

 

Purpose-built and ready to protect, Forcepoint is driven by an understanding of human behavior and intent. Our innovative technology, decades of experience and clear vision help solve critical security issues to protect employees, business data and IP.

We offer a systems-oriented approach to insider threat detection and analytics, cloud-based user and application protection, next-gen network protection, data security and systems visibility. It’s a new approach to cybersecurity never seen before. And as technology and users’ needs evolve, we are constantly looking to expand our offerings while staying true to our core in protecting the human point.

Through our 20 years of frontline experience, proactive and context-based technologies, and data-centric, integrated solutions, Forcepoint enables better decision-making and more efficient security at the human point for more than 20,000 government organizations and enterprises world-wide.