Sponsorship Means Business!

Advocate: Our professional association and chapters are working every day to advance understanding, policies, standards and professional networking that will grow the industry to ensure that the voice of our members and sponsors are heard by our nation’s influential decision makers, industry leaders and the general public.

Connect: Tap into our member network and a Who’s Who of Information Security Professionals.

Grow: Sponsoring provides your company with the opportunity to engage with security professionals Meet qualified decision makers - attendees responsible for influencing, purchasing and implementing security technologies. Cultivate your ever-growing network through direct contact with industry peers, decision makers and certified professionals. Sell products and services. Promote company brand awareness.

Timeframe: Sponsorship program will last for 12 months from time of agreement.

The Central Florida (ISC)2 Chapter is excited that you are considering becoming a sponsor of our chapter. If agreed upon, a Co-marketing Agreement and Memorandum of Understanding will be signed by both parties.

Please email sponsorship@isc2chapter-centralflorida.org to sign up for sponsorship!

For more information download our sponsorship packet of information.

Thank you to our 2017 Sponsors!

GoldSky is a full service cyber security solutions firm. Our services are custom designed for each client depending on the specific needs they have. Our objective for all of the companies we partner with is to identify IT security vulnerabilities and provide the resources necessary to reduce the risk of cyber attacks.

GoldSky offers a wide range of security services to meet your security and compliance needs. All our services are delivered to exacting standards and industry best-practices to provide your organization with a world-class delivery experience. For our clients who are looking for a full-service CSO/CISO offering, we’re proud to offer our CSO-as-a-Service (CSOaaS™). Our CSO’s help your organization build lasting and robust security program in your small-midsized business.



Since its founding in 1999, the UCF Business Incubation Program has helped several hundred emerging companies (including more than 120 current clients and more than 90 graduates). 

From October 2011 to December 2012, the UCF network of current and graduated clients has helped create a regional output of over $400 million resulting in a $5.93 return for every $1.00 invested in the program. 

With nine facilities across the Greater Orlando community, the program is an example of a successful community partnership.  The UCF Business Incubation Program was named “Incubator Network of the Year” for 2013 by the National Business Incubation Association. 

For more information visit www.incubator.ucf.edu.  


Javelin Network's mission is to protect what the cyber security industry neglects: the Active Directory. Our all-in-one, A.I. driven-platform protects the Active Directory from illegitimate use, providing autonomous breach prevention and containment, incident response, and threat hunting capabilities. By combining A.I., obfuscation, and advanced forensic methodologies right at the point of breach, we respond automatically and in real-time to contain the attack. It is the only agentless solution that immediately contains attackers after they compromise a machine, preventing them from using Active Directory credentials and moving laterally into the network. Javelin greatly reduces the effort, time, and error when detecting and containing a breach. To learn more, please email us at hello@javelin-networks.com or call us directly at (888) 867-5179.


Purpose-built and ready to protect, Forcepoint is driven by an understanding of human behavior and intent. Our innovative technology, decades of experience and clear vision help solve critical security issues to protect employees, business data and IP.

We offer a systems-oriented approach to insider threat detection and analytics, cloud-based user and application protection, next-gen network protection, data security and systems visibility. It’s a new approach to cybersecurity never seen before. And as technology and users’ needs evolve, we are constantly looking to expand our offerings while staying true to our core in protecting the human point.

Through our 20 years of frontline experience, proactive and context-based technologies, and data-centric, integrated solutions, Forcepoint enables better decision-making and more efficient security at the human point for more than 20,000 government organizations and enterprises world-wide.



CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture. CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 50 billion events per day from millions of sensors deployed across more than 170 countries, uniquely providing crowdsourced protection for the entire customer community.

Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.



Windstream isn’t like other network providers. We’re built to serve businesseslike yours. We’re agile and forward looking. We believe in partnership that empowers your business and your network. Working together to create solutions that flex and scale with your needs. Adding capacity when growth accelerates; or pulling back when it slows. Leveraging technology to improve outcomes and drive growth.