Rockville, MD (PRWEB) May 06, 2014
Triumfant, creator of patented software that automatically discovers, analyses and remediates advanced malware attacks on computers, servers and soon mobile devices, today announced its participation at leading information security events including the FS-ISAC & BITS Annual Summit taking place this week at the Omni Amelia Island Plantation Resort, May 4-7 in Florida.
As a prominent security professional and CEO of a leading metro Washington, D.C.-based security software company, Triumfant's CEO John Prisco will participate as a featured panelist at several upcoming events to take place in the region including CyberMontgomery, May 22 at the Universities of Shady Grove (USG) Conference Center in Rockville, Md.; the Websense Breakfast Discussion on Continuous Monitoring, June 4 at the Ronald Reagan Center; and the DC Metro Cyber Security Summit, sponsored by The Wall Street Journal, taking place June 5 at the Sheraton in Tyson's Corner; and
"Security is no longer about protecting the perimeter and the network -- it's about recognizing that breaches happen and that organizations should expect to be hacked and be prepared to lose data. The new prevention strategy is how quickly you can respond to the breach," said John Prisco, CEO of Triumfant. "At Triumfant, we're helping enterprises stop a breach before it become a full-fledged attack. I'm pleased to share with attendees at these prestigious events how to close the breach detection gap with rapid detection and response at the endpoint."
Triumfant is recognized for its product innovation and contribution to the defense of the nation's most trusted assets. The company was named a Security Innovation Network (SINET) 16 Innovator in 2011 and again in 2013 for its ability to detect the most advanced malware threats and nation-state actors targeting large enterprises and government organizations globally. As cyber-security experts and industry thought leaders, Triumfant executives are routinely asked to present at industry tradeshows and events.
The FS-ISAC Annual Summit the only such industry event that is created by members for members to present the latest information on cyber security related threats, trends, and technology. Mr. Prisco will demonstrate how to stop memory-based attacks before they become persistent during the event's Solutions Showcases to the nearly 500 industry executives and practitioners anticipated to be in attendance.
CyberMontgomery Forum events examine cyber security as a major growth engine for Montgomery County and how to bring together federal government, industry and academic assets so that they can coalesce and elevate the cyber ecosystem to a level of national prominence. Mr. Prisco will participate in the Innovative Cyber Solutions from Montgomery County portion of the event.
At the invitation-only Breakfast Discussion on Continuous Monitoring, Mr. Prisco will join executives from IDC, Websense and SMS to discuss the Office of Management and Budget (OMB) security mandate 14-3 requiring compliance by 2017. The panel will address challenges and confusion around the implementation and discuss the technologies, best practices and services that can support a successful deployment.
During the DC Metro Security Summit, Mr. Prisco will lend his experience and expert commentary to the panel on cyber policy. Establishing a cohesive national cyber-security initiative has become one of the major emerging security challenges of the new century. This panel will analyze the ongoing debate surrounding the implementation and enforcement of strategies, policies and emerging areas of enterprise security architecture that will govern people and information in the years ahead.
Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Volatile Threat, Advanced Persistent Threat, zero-day attacks, targeted attacksand rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image. No signatures or prior knowledge of any kind are required to stop the adversary.Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready. To learn more about the company go to: http://www.triumfant.com/default.asp or follow Triumfant on Twitter and YouTube.