Reveal Security: Enhancing Anomaly Detection in Cybersecurity
Christy Lynch, GTM Leader with Reveal Security, highlighted Reveal's capabilities in monitoring identity behavior across critical applications, addressing both human and non-human identities. This...
SentinelOne: Cybersecurity Innovations with Purple AI
SentinelOne recently announced that their award-winning security analyst, Purple AI, can now be used with data from several third-party security offerings from big players...
J-SAS: From Chaos to Confidence — Making Compliance a Strategic Advantage
Sase Janki, CEO of J-SAS, talked about the challenges organizations face regarding cybersecurity protection and compliance. He identified three major pain points: the fragmentation caused...
Come Meet Eldon Sprickerhoff at Cybersecurity Defense Ecosystem Summit 2025
Guest: Eldon Sprickerhoff, Strategic Advisor & Growth Architect
Eldon will be speaking about the cybersecurity industry and the importance of mentorship for startups and the...
Interview with AvePoint at Ingram Micro ONE 2024
Sam Valmé, Senior Director, NA Channel Sales at AvePoint, providing customizable solutions to optimize SaaS operations, enable secure collaboration, and accelerate digital transformation
At the Ingram...
Blackpoint’s CompassOne Cybersecurity Solution for MSPs
Manoj Srivastava, CTO & Chief Product Officer at Blackpoint, introduced the company's new CompassOne platform, which aims to unify cybersecurity solutions and address common...
Phosphorus Cybersecurity: Managing IoT and OT Devices
With economic pressure shrinking security budgets amidst a growing cyber-physical attack surface, organizations are struggling to find effective, affordable xIoT protection. Phosphorus Cybersecurity is...
Reasonable Risk: Legal Defensibility in Cybersecurity
Rosanna Pellegrino, CRO of Reasonable Risk, discussed her company's platform exclusively for channel partners to assist organizations in building risk management programs. She highlighted...
CardinalOps: Enhancing Cybersecurity Through Proactive Defense Strategies
SOCs are under constant fire with a barrage of cyber threats, and disparate tools leading to limited visibility make mitigating risk more difficult than...
Token Security: Machine Identities in Cybersecurity
Ido Shlomo, Co-Founder & CTO of Token Security shared insights from his transition from military cybersecurity to founding his company, emphasizing the growing challenge...















