In a new digital world, driven by data, businesses of all sizes are working tirelessly to secure their networks, devices, and of course, their data. CISOs need to plan for worst-case scenarios, stay ahead of latest IT Security transformation technology, and maintain their company’s information assets without losing sight of the corporate culture.
Unlike other events, The Millennium Alliance offer a different kind of experience, making this a unique opportunity to meet and do business with senior level decision-makers.
Due to the exclusivity of these assemblies, The Millennium Alliance qualify every delegate and every sponsor company who comes to The Millennium Alliance event. Thanks to this, The Millennium Alliance ensure that they have ONLY senior-level attendees.
Thanks to the success of our National Transformational CISO Assembly, in 2019 The Millennium Alliance in partnership with their Advisory Board, is launching Transformational CISO West Coast.More About the Event
Founded in 2013 by a well-versed team hailing from both the public and private sectors. Our platform is purpose-built by SOC analysts for SOC analysts and network defenders. With capabilities in attack prevention, breach detection, threat hunting, data leakage discovery, and more. We've automated much of the typically mundane tasks of the SOC analyst. Resulting in analyst level scrutiny at multi-gigabit speeds, all the while reducing frustration, and in-turn, allowing precious human time to be spent where it matters.
Since our inception, we have exclusively catered to the federal sector and we're currently recognized by the Department of Defense (DoD) as well as the Intelligence Community (IC) as a leading security services and solutions provider. 2018 marks the first year we've made our offering available to the private sector, available as both a virtual solution or proprietary hardware appliance.
InQuest appliances are tailored for throughput rates ranging through 100Mbit, 1Gbit, 10Gbit, and 20Gbit. The entire fleet is contained within a 1U chassis and priced competitively, in no small part thanks to the ingenuity in design. We excel as equally with content-analysis as we do with data-capture. Our patented Deep File Inspection (DFI) engine, picks up where other solutions leave off, diving deep into the recursive nature of the threats typically seen today. Capable of decompressing, decoding, deobfuscating, and decompiling. Our DFI engine unravels any nested malware, at wire speed rates of ingestion.
The product is updated weekly with intel feeds from InQuest labs. Our team works with real-world, high profile networks on a daily basis and draws influences from actual attacks to publish threat hunting signatures and intelligence. Our intel is 80% self-sourced and our platform is 100% open. Write YARA compatible signatures that benefit from 50 additional contextual variables. Metadata, executable logic, semantics… meticulously curated and normalized to ease the burdens of prevention, detection, and hunting.
It's among our mantra that "there is no silver bullet". A blend of solutions is required to remain effective at detection and prevention. InQuest integrates with a number of complementary solutions, like our friends at OPSWAT and VMRay. InQuest captures and inspects file artifacts from both data-it-motion and data-at-rest. Files can be then be fed in parallel to a multitude of integration points:
InQuest integrations are active. Active in the sense that just as an analyst would, we both send data-to and digest results-from these complementary vendors. An additional layer of logic interprets these results in conjunction with InQuest heuristics, alerts, reputation information, and machine learning predictions. The final result is a single digestible threat score with a detailed threat receipt highlighting the indicators responsible for reaching that conclusion... and we've barely scratched the surface. If you're curious to hear more, schedule time to connect with the founders directly.
Founder and CEO of InQuest, Mike hails from the public sector, serving nearly 15 years as the director of the Pentagon’s Computer Incident Response Team (PENTCIRT). Among the top five largest offices in the world and certainly among the most targeted. Mike’s operational experience is unparalleled. He has hands-on experience with nearly every security product under the Sun. Mike has held numerous positions within the US Department of Defense (DoD) and the Intelligence Community (IC) where he is recognized as a Subject Matter Expert in the fields of intrusion detection and analysis. Author of several DOD standards for intrusion detection, in 2007 he was recognized by the Army as the Information Assurance Professional of the Year. A rare opportunity to interact with a truly battle hardened and exposure averse veteran of the field.
Pedram serves as the CTO. He was formerly a director at Avast, after the acquisition of his startup Jumpshot, a fully automated solution for the removal of deeply entrenched Windows malware. Previously, he founded the Zero Day Initiative at TippingPoint, the worlds first Intrusion Prevention System. Where he built and managed the worlds largest group of independent researchers. To date the predominant source of all Microsoft vulnerability discoveries..
He has historically spent much of his time in the shoes of a reverse engineer, developing automation tools and processes. Pedram has formerly presented and given training courses at Blackhat and numerous other infosec conferences globally. Pedram holds a CS degree from Tulane University and is an author of the book "Fuzzing: Brute Force Vulnerability Discovery".
If you're curious to hear more, schedule some time to chat, face to face, with company founders Mike Arcamone and Pedram Amini. Fill out the form and we'll get in touch as soon as possible to carve out some time.