NukuDo is a premier cybersecurity talent development and staffing company, delivering exceptional professionals to businesses across various industries. North America hasn’t seen a program like ours: dedicated to training and developing the next generation of cybersecurity experts with engaging, real-world scenarios, that provides individuals with the skillsets that employers actively seek for their teams.
Cyverse Capital
Altitude Cyber
National Cybersecurity Alliance
M&B IP Patent Firm
Description
M&B IP is a patent firm founded with the mission to maximize start-ups’ valuations through patent portfolio development. We protect innovation from seed-to-exit, while ensuring that an intellectual property (IP) strategy is always aligned with the client’s business objectives. Our SMETM method simplifies complicated legal concepts and produces patent applications that eliminate the burden of drafting legal documents for engineers. Our team includes skilled and committed patent practitioners with extensive backgrounds in advanced technologies, patent law, startups, and venture capital ecosystems. M&B IP has proudly represented acquired multi-million dollar and unicorn cyber-security start-ups.
Arnon, Tadmor-Levy
Description
With approximately 420 lawyers and interns, including 140 partners, the law firm of Arnon, Tadmor-Levy is a leader in its areas of practice. The firm offers diverse legal services and a proven track record of success to its clients, which include many of Israel’s largest companies, government and public entities, premier investment funds, and leading multinational corporations.
In Israel’s Start-Up Nation, where technology and intellectual property law are crucial, Arnon, Tadmor-Levy stands at the forefront of the legal landscape. Our practice has been ranked as a top-tier practice in all leading legal directories, including Chambers and Partners and The Legal 500. As market leaders, we provide an unparalleled suite of services tailored to the high-tech ecosystem. Our diverse clientele extends from innovative startups to top-tier Fortune 100 companies.
What sets us apart is our duality: we blend the meticulous expertise of boutique specialty practices with the extensive resources and versatility of a broad-based, multidisciplinary firm.
Entro
Cytactic
Description
Cytactic offers a SaaS platform that helps organizations of various industries prepare for cyber crises, aiming to minimize their impact. The product promotes a proactive methodology, aligns policies, maps risks, and conducts tailored simulations. The platform prepares organizations to handle crisis dilemmas and decisions with advanced tools and algorithms for rational, data-driven decision-making. Additionally, it supports dynamic management of cyber crises as they occur, ensuring organizations are well-equipped to respond effectively.
The platform orchestrates the coordination of various experts and stakeholders involved in the crisis by leveraging these tools to manage and streamline the entire process for a more organized and controlled response.
MikeWorldWide
EIS Council
Description
EIS Council is a US-based international NGO focused on developing plans and capabilities for societal resilience in disaster scenarios, including extreme black sky events. EIS Council leads high-level, multi-sector resilience policy and technology research, working with global infrastructure leaders, scientists, and government agencies.
Key EIS partners include Cambridge Infrastructure Resilience Group, RAND, FERC, NERC, TVA, and the UK National Preparedness Commission.
The council hosts leadership events attended by top officials, such as UK defense ministers, the US secretary of energy, and senior corporate executives. EIS also organizes webinars and annual summits, engaging a community of over 10,000 professionals.
TLV Partners
EDGE
AAPA
TECHDAY
Unscripted
Halcyon
Description
Halcyon is the leading anti-ransomware company. Global 2000 companies rely on the Halcyon platform to fill endpoint protection gaps and defeat ransomware with minimal business disruption through built-in bypass and evasion protection, key material capture and automated decryption, and exfiltration and extortion prevention. Based in Austin, TX, Halcyon was founded in 2021 by a team of cyber industry veterans after battling the scourge of ransomware and advanced threats for over a decade at some of the most innovative and disruptive security vendors of our day, including leaders from Cylance (now Blackberry), Accuvant (now Optiv), and ISS X-Force (now IBM). Halcyon is focused on building products and solutions for mid-market and enterprise customers that give organizations the edge against ransomware and other advanced threats.
Sygnia
Description
Sygnia works with companies to proactively build their cyber resilience and to respond to and defeat attacks within their networks. We are the trusted advisor and service provider of technology and security teams, executive leaders and boards of leading organizations worldwide. With decades of digital combat experience, from a team who brings extensive cyber warfare and enterprise security backgrounds, we support the entire cybersecurity journey so our clients can stay secure in the face of any and all cyber threats
Seraphic Security
Cywareness
IAC | EDGE
FGIT
Onyxia Cyber
Description
Onyxia's AI-powered cybersecurity management platform enables CISOs and security leaders to strengthen their high-level security strategy and day-to-day program management. With Onyxia, CISOs can automate program assessments, ensure organizational compliance, and optimize security stack efficiency.
CertnKey.com
Description
CertnKey.com is a new US carve-out, created in Q4/2024 from Data-Warehouse, a German company with 40 years of history, which specializes in deep tech areas such as cryptographic assets, data management, cybersecurity, low-code platforms, and GDPR (datawh.info). CertnKey.com focuses on cybersecurity and cryptographic inventory, post-quantum migration, and fully automated AI-supported next-generation PKI management.
Ray Research
Description
A data security platform that provides Data Attack Surface Reduction, allowing prevention, detection, and resilience at the data layer.
Cequence AI
Brinker
Description
Protecting your assets from social media attacks, Brinker is an end-to-end social threat mitigation platform that serves corporations, organizations, and high-profile individuals. It combats online harassment, from phishing to weaponized misinformation, using advanced technology and new TI methodologies. Brinker utilizes AI-enabled detection, automated OSINT investigations, and a press-of-a-button suite of mitigation tools—including pre-legal action, media publication, and user or content removal—to ensure comprehensive protection.
ARMO
Description
ARMO offers a Cloud Security Platform powered by runtime insights and Kubernetes. It uniquely minimizes the cloud attack surface based on real-time data and actively detects and responds to cyberattacks with context-specific risk assessments.
Security and DevOps/Engineering teams face a cycle of excessive ticketing and alerts, most of which are ignored, leading to ineffective security. ARMO breaks this cycle by using runtime insights and Kubernetes context for cloud security.
The platform utilizes an eBPF-based runtime sensor to record application behavior and activities, which are then enriched with Kubernetes events, CI/CD data, cloud information, and container data. This forms an Application Profile DNA (APDTM), a comprehensive baseline for normal application behavior, configuration, and policies.
ARMO’s Platform enables automatic and continuous cloud security posture management to secure cloud-native infrastructure and workloads, addressing security risks without disrupting applications. It detects and responds to anomalies and malware in real time, reducing alert overload for teams.
By filtering out irrelevant alerts, ARMO allows DevOps, security, and platform teams to focus on significant threats, shifting from managing hypothetical issues to addressing actual risks. ARMO supports all types of cloud and Kubernetes deployments, including managed, on-premises, and air-gapped environments.
ARMO is the creator of Kubescape, a leading open-source Kubernetes security project and official CNCF project, used in over 100K clusters, from small setups to large-scale enterprises.
Runbooks
Description
Runbooks turbocharges your existing cybersecurity tech stack, automating complex IT and cybersecurity processes to streamline operations and enhance your resilience, making your investments work smarter, not harder.
Sola Security
Albarius
Description
Albarius Simplifies Network Security – it is where Architect Precision meet AI efficiency.
On premise or in the cloud, Albarius empowers enterprises and network security professionals to automate and optimize their network security policies in a more precisely and efficiently than ever before.
Corporates and enterprises worldwide trust Albarius to enhance their network security and compliance, whilst minimizing the required efforts and resources.
Reveal Security
Description
Reveal Security quickly and accurately detects insider threats and identity-based attacks in and across SaaS, cloud, and on-premises applications. The Reveal Security platform is the only solution in the market based on patented Identity Journey Analytics™ technology that uses unsupervised machine learning to learn the usage patterns or typical “journeys” of human and machine identities in applications and uses it to detect anomalies. This approach delivers a superior level of accuracy and context, reduces alert volumes by orders of magnitude, and enables the business to respond quickly before a material breach can occur. For more information, visit www.reveal.security
Anonybit
Description
Anonybit’s patent-pending decentralized biometric identity platform offers seamless and accurate user verification to validate who is behind a transaction and prevent account takeover fraud. The platform, known as the Anonybit Genie, unifies the user lifecycle from account origination to passwordless login, transaction verification, and account recovery. With support for multiple biometric modalities as well as 1:1 matching, one-to-many lookups, and a data vault, Anonybit can establish a single source of truth on a person’s identity at the enterprise level, closing the gaps that attackers exploit while reducing costs, elevating the user experience and enhancing the privacy and compliance posture of the organization. For more information, visit www.anonybit.io
Resec
Description
Resec is redefining gateway security by providing organizations with unparalleled protection from file-based malware threats without hindering business flows and usability. Resec’s Zero Trust Prevention platform combines advanced detection and prevention technologies to provide IT security complete control of what enters their organization, while eliminating all known and unknown ("zero day") malware threats from all common gateway threat vectors. Resec's innovative technology also prevents threats coming from AI-generated files and provides coverage for encrypted content, extra-large files, and unique file formats. Resec is trusted by some of the world’s most sensitive organizations, including major financial institutions, critical infrastructure, telcos, retail, government, insurance, and military and defense organizations.
Cyngular Security
Unixi
Description
UNIXi is building the best-of-breed next generation of identity and access management for web apps, with unparalleled security, the widest app coverage, and seamless integration.
ThreatLight
Description
ThreatLight, founded in 2024 by industry veterans Lisa Landau and Tim Shipp, specializes in critical asset protection and next-generation incident response. Serving customers globally, ThreatLight combines AI-driven technology with deep expertise in its cloud-native, secure targeted detection and response (TDR) platform. Our mission is to address the gaps in proactive cyber defense, transforming clients' worst days into stories of resilience. By offering proactive, effective solutions, ThreatLight aims to ensure continuous protection, swift recovery, and enhanced business continuity. At ThreatLight, we are dedicated to delivering measurable benefits that strengthen security postures and reduce attack surfaces annually.
ReasonLabs
Description
ReasonLabs is revolutionizing cybersecurity for consumers with its cutting-edge distributed EDR platform, providing millions of home users the same level of protection trusted by Fortune 500 companies. Powered by artificial intelligence, the ReasonLabs security suite leverages billions of real-time data points, threat intelligence, and behavioral analysis to provide best-in-class security, privacy protection, and identity theft defense. Its products are cloud-native and built with a lightweight architecture for both mobile and desktop. ReasonLabs is certified by the Microsoft Virus Initiative (MVI), VirusBulletin's VB100, and OPSWAT, and is a member of AMTSO and AVAR. The company is based in New York and Tel Aviv
Myrror Security
Description
Myrror takes the pain away from DevSecOps. Myrror's platform reduces the number of vulnerabilities by up to 80% using our Reachability Engine. Then, using our Contextual Remediation engine, developers easily remediate these threats, without pushing security back.
CYE
Description
CYE’s optimized cyber risk quantification platform and expert guidance transform the way organizations manage cybersecurity. Using AI, machine learning, and extensive data, CYE visualizes attack routes, quantifies cyber risk, provides evidence-based mitigation plans, improves communication between CISOs and executives, and matures organizational cybersecurity posture. In doing so, CYE provides clear and relevant insights that empower companies to make effective cybersecurity decisions. The company serves organizations in multiple industries globally. Founded in 2012, with headquarters in Israel and operations around the world, CYE is funded by EQT and 83North. Visit us at cyesec.com.