Reveal Security: Enhancing Anomaly Detection in Cybersecurity

Christy Lynch, GTM Leader with Reveal Security, highlighted Reveal's capabilities in monitoring identity behavior across critical applications, addressing both human and non-human identities. This...

SentinelOne: Cybersecurity Innovations with Purple AI

SentinelOne recently announced that their award-winning security analyst, Purple AI, can now be used with data from several third-party security offerings from big players...

J-SAS: From Chaos to Confidence — Making Compliance a Strategic Advantage

Sase Janki, CEO of J-SAS, talked about the challenges organizations face regarding cybersecurity protection and compliance. He identified three major pain points: the fragmentation caused...

Come Meet Eldon Sprickerhoff at Cybersecurity Defense Ecosystem Summit 2025

Guest: Eldon Sprickerhoff, Strategic Advisor & Growth Architect Eldon will be speaking about the cybersecurity industry and the importance of mentorship for startups and the...

Interview with AvePoint at Ingram Micro ONE 2024

Sam Valmé, Senior Director, NA Channel Sales at AvePoint, providing customizable solutions to optimize SaaS operations, enable secure collaboration, and accelerate digital transformation At the Ingram...

Blackpoint’s CompassOne Cybersecurity Solution for MSPs

Manoj Srivastava, CTO & Chief Product Officer at Blackpoint, introduced the company's new CompassOne platform, which aims to unify cybersecurity solutions and address common...

Phosphorus Cybersecurity: Managing IoT and OT Devices

With economic pressure shrinking security budgets amidst a growing cyber-physical attack surface, organizations are struggling to find effective, affordable xIoT protection. Phosphorus Cybersecurity is...

Reasonable Risk: Legal Defensibility in Cybersecurity

Rosanna Pellegrino, CRO of Reasonable Risk, discussed her company's platform exclusively for channel partners to assist organizations in building risk management programs. She highlighted...

CardinalOps: Enhancing Cybersecurity Through Proactive Defense Strategies

SOCs are under constant fire with a barrage of cyber threats, and disparate tools leading to limited visibility make mitigating risk more difficult than...

Token Security: Machine Identities in Cybersecurity

Ido Shlomo, Co-Founder & CTO of Token Security shared insights from his transition from military cybersecurity to founding his company, emphasizing the growing challenge...