• The Conference
    • Overview
    • Venue & Accommodations
    • FAQs
    • Host City & Quick Facts
    • Travel & Visa Info
    • Conference Archives
  • Registration
    • Fees & Reg FAQs
    • Register Now
    • Terms & Conditions
  • Program
    • Main Program Agenda
    • Sunday Training Agenda
    • BoF, SIG, Side Meeting Schedule
    • NatCSIRT Meeting
    • CTF Challenge
    • Speaker Resources
    • Program Committee
    • Call for Speakers
  • Sponsorship
    • Sponsorship Overview
    • Sponsorship Packages
    • Sponsorship Team
    • Exhibitor Resources Kit
  • Attendee Comms

2025 Sponsorship Team

FIRST gratefully acknowledges its conference sponsors & supporters for their contributions to the security community:

Local Host

  • Centre for Cyber Security

    Centre for Cyber Security

    The Centre for Cyber Security (CFCS) is the national IT security authority, Network Security Service and National Centre of Excellence within cyber security.

    The Centre’s mission is to advise Danish public authorities and private companies that support functions vital to society on how to prevent, counter and protect against cyberattacks.
    www.cert.dk/en

Platinum

  • Amazon

    Amazon

    At Amazon, security is job zero. The Amazon Security organization is central to maintaining customer trust and delivering delightful customer experiences. Our mission is to maintain a high bar for security across all of Amazon’s products and services. Our teams lead in protecting company and customer data by continuously assessing our systems, identifying and evaluating risks, and driving mitigations. www.amazon.com/

Gold

  • VMRay

    VMRay

    VMRay provides industry-leading sandboxing technology for the automated analysis and identification of sophisticated malware and phishing threats. Headquartered in Bochum, Germany, with a subsidiary in Boston, USA, VMRay is trusted by government and defense organisations, global enterprises, financial institutions, and top consulting and accounting firms worldwide.
    www.vmray.com/

Silver

  • Intigriti

    Intigriti

    Intigriti is a rapidly growing cybersecurity company that specializes in crowdsourced security services to help organizations protect themselves from cybercrime. Our industry-leading bug bounty platform connects our customers with 125,000+ ethical hackers worldwide, ensuring proactive cybersecurity protection in a pay-for-impact model, meaning you only pay for valid vulnerability submissions. For more information, follow us on LinkedIn.
    www.intigriti.com/

  • Stairwell

    Stairwell

    Stairwell gives you the confidence to know if, when, and where malware has ever been on your systems. We take a data search approach to security: collecting, storing, and continuously reassessing every executable file and indicator of compromise — across all time, at planet scale. For more information, visit stairwell.com.

Bronze

  • Apura Cyber Corp

    Apura Cyber Corp

    Apura Cyber Corp is a company with technical qualification and extensive experience in threat intel, digital forensics, incident response, and anti-fraud. Our main product is BTTng, an OSINT and CTI tool that provides broad and dynamic visibility of potential threats across the most comprehensive list of sources in the market. BTTng is also the only platform that allows users to create their own robots, offering unparalleled flexibility and customization.
    apura.com.br

  • Censys

    Censys

    The Censys Platform is the leading internet intelligence platform for threat hunting and exposure management. Censys empowers governments, enterprises, and researchers with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats. censys.com

  • CTM360

    CTM360

    Enabling organizations to protect themselves and their supply chain against external risks and threats.
    CTM360 provides a consolidated platform that includes External Attack Surface Management, Digital Risk Protection (Brand Protection & Anti-Phishing, Data Leakage Protection, and Unlimited Managed Takedowns), Security Ratings, Third Party Risk Management, and Cyber Threat Intelligence.
    ctm360.com

  • Group-IB

    Group-IB

    Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses and citizens and support law enforcement operations.
    Group-IB’s Unified Risk Platform (URP) underpins its conviction to build a secure and trusted cyber environment by utilizing intelligence-driven technologies and expertise that detects and defends against all nuances of digital crime. The platform includes the world’s most trusted Threat Intelligence, the most complete Fraud Protection, AI-powered Digital Risk Protection, multi-layered protection with Managed Extended Detection and Response (XDR), all-infrastructure Business Email Protection, and External Attack Surface Management. Furthermore, Group-IB’s full-cycle incident response and investigation capabilities have consistently elevated industry standards. This includes the 70,000+ hours of cybersecurity incident response completed by our sector-leading DFIR Laboratory, more than 1,400 successful investigations completed by the High-Tech Crime Investigations Department, and round-the-clock efforts of CERT-GIB. www.group-ib.com

  • LimaCharlie

    LimaCharlie

    LimaCharlie's SecOps Cloud Platform is a force multiplier that enables instant deployment, real-time investigation, and seamless integration of forensic tools like Velociraptor and Hayabusa. Pre-deploy "sleeper" agents for rapid incident response, scale your operations effortlessly, and automate evidence collection and analysis. With pay-per-use pricing, LimaCharlie empowers DFIR teams to focus on insights, not infrastructure.
    limacharlie.io

  • mnemonic

    mnemonic

    mnemonic is a leader in 24x7 Managed Detection and Response (MDR) services, incident response, threat intelligence and risk management. Powered by the Argus security platform, mnemonic's team of experts monitor, detect and respond to cyberthreats globally. Gartner acknowledges mnemonic for delivering MDR services, threat intelligence and advanced targeted attack detection mnemonic.io

  • NRD Cyber Security

    NRD Cyber Security

    NRD Cyber Security offers cybersecurity solutions, consulting, and other services. The company specialises in the establishment and modernisation of CSIRTs and SOCs as well as centralised threat monitoring. https://www.nrdcs.eu/

  • OTRS

    OTRS

    OTRS Group is the manufacturer and the world’s largest provider of the enterprise service management suite OTRS. Now part of EasyVista, OTRS Group offers companies industry-independent software solutions for structured communication in customer service, IT service management and security management. In addition to the core product OTRS, the security solution STORM ensures efficient cybersecurity incident management and transparent documentation in accordance with standards such as ISO 27001. For more information, see www.otrs.com.

  • Siemens

    Siemens

    Siemens is a technology company focused on industry, infrastructure, transport, and healthcare. From more resource-efficient factories, resilient supply chains, and smarter buildings and grids, to sustainable transportation as well as advanced healthcare, Siemens creates technology with purpose adding real value for customers.
    www.siemens.com/

  • Silent Push

    Silent Push

    Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Proactive Threat Intelligence dataset. Defenders can focus on stopping threats before they cause a problem and significantly improving their security operations across the entire attack chain whilst simultaneously reducing operational complexity. silentpush.com

  • SOCRadar

    SOCRadar

    SOCRadar, a cutting-edge cybersecurity company, offers an Extended Threat Intelligence (XTI) platform that empowers organizations to proactively defend against cyber threats. This comprehensive suite of customizable products includes Cyber Threat Intelligence, External Attack Surface Management, Brand Protection, Dark Web Monitoring, and Supply Chain Threat Intelligence. By leveraging the power of artificial intelligence and machine learning, SOCRadar enhances threat detection capabilities and promptly provides proactive and actionable intelligence, ensuring businesses remain ahead of cyber risks. With a global presence, SOCRadar’s mission is to fortify organizational defenses, mitigate external risks, and create a safer digital ecosystem worldwide. Start your free trial or learn more at socradar.io

  • TeamT5

    TeamT5

    TeamT5 is a leading brand of Asia Pacific intelligence based in Taiwan. We harness our unique geographical and cultural strengths to assist organizations in fortifying their cybersecurity defenses through utilizing our intelligence-focused offerings. Our intelligence enables analysts to foresee potential threats, cope with incidents, and deliver actionable insights to facilitate informed decisions and mitigate risks. https://teamt5.org/

Monday Sponsor Showcase

  • Cisco

    Cisco

    Cisco joined FIRST in 1991, recognizing early on that computer security is essential to business. As the worldwide leader in technology that powers the internet, Cisco is focused on security as a strategic enabler now more than ever.
    Cisco's solutions provide unmatched protection; from Secure Endpoint to Secure Network Analytics, from Duo to Umbrella, Cisco has you covered. As a Cisco customer, you also get SecureX, an unparalleled XDR solution, connecting your entire security portfolio visibility in one place, with automated workflows that maximize operational efficiency.
    The Cisco Secure Advantage encompasses: 6,500+ endpoint security customers | 15M+ protected endpoints | 70K AMP ecosystem customers | 100M DNS security customers | 200B DNS requests inspected daily | 500K+ authentications per month 6.8B threats blocked daily | 2.2 trillion artifacts analyzed daily – more than any vendor. cisco.com

Welcome Reception Sponsor

  • Adobe

    Adobe

    Adobe is changing the world through digital experiences. Great experiences have the power to inspire, transform, and move the world forward. And every great experience starts with creativity. Creativity is in our DNA. Our game-changing innovations are redefining the possibilities of digital experiences. We connect content and data and introduce new technologies that democratize creativity, shape the next generation of storytelling, and inspire entirely new categories of business. www.adobe.com/

Champions, Partners & Supporting Sponsors

  • Hitachi

    Challenge
    Coin

    Hitachi

    Hitachi proceeds with the development of new technologies and products that respond to the increasing demand for safety and security in the Social Innovation Business. www.hitachi.com.

  • CIRCL

    Lanyard

    CIRCL

    The Computer Incident Response Center Luxembourg (CIRCL) is a government-led initiative aimed at collecting, analyzing, reporting, and addressing computer security threats and incidents. CIRCL serves as the host for several open-source software projects, including MISP and AIL, which play critical roles in facilitating information sharing and enhancing threat intelligence capabilities. circl.lu

  • Vulners

    Champion

    Vulners

    Vulners is an all-in-one vulnerability intelligence database that aggregates over 200 data sources, providing a unified platform for accessing a vast array of security-related information. With more than 4 million constantly updated entries, it includes Common Vulnerabilities and Exposures (CVEs), vendor security advisories, exploits, and Indicators of Compromise (IoC), making it essential for staying updated on cybersecurity threats. Vulners platform offers a robust scalable API for complex search queries allowing users to find vulnerabilities by various parameters such as software name and version, or CPE. Vulners also offers enriched context for vulnerabilities, including proprietary AI Score and common metrics like CVSS, EPSS, SSVC, enabling users to prioritize remediation efforts effectively. vulners.com

Our Exhibitors

  • Arctic Security

    Arctic Security

    Cyber attacks are not victimless crimes. Arctic Security helps CERT’s and National Cyber Security Centers automate victim notification at scale to their constituents. Automated victim notification is now easy to set up and to operate. Please contact us to learn how you can start helping organizations in your country. www.arcticsecurity.com/

  • Bitdefender

    Bitdefender

    Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, enterprise, and government environments, Bitdefender is one of the industry’s most trusted experts for eliminating threats, protecting privacy, digital identity and data, and enabling cyber resilience. With deep investments in research and development, Bitdefender Labs discovers hundreds of new threats each minute and validates billions of threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 180 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170+ countries with offices around the world. For more information, visit www.bitdefender.com.

  • CVE

    CVE

    The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program. Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities. www.cve.org/

  • EclecticIQ

    EclecticIQ

    EclecticIQ is a global provider of threat intelligence technology and services that empower organizations to neutralize critical cyber threats to their business. We help security teams make smarter, faster decisions with dynamic solutions that reduce complexity and streamline threat detection and response. eclecticiq.com

  • EclecticIQ

    Flare

    Flare is the leader in Threat Exposure Management, helping organizations of all sizes detect high-risk exposures found on the clear and dark web. Combining the industry's best cybercrime database with a ridiculously intuitive user experience, Flare enables customers to reclaim the information advantage and get ahead of threat actors. For more information, visit flare.io

  • Joe Security

    Joe Security

    Joe Security develops Joe Sandbox, one of the most advanced automated, deep and interactive malware analysis engine on the market. With a unique multi-technology approach, Joe Sandbox enables security specialists to detect and analyze threats on Windows, macOS, Linux, Android and iOS operating systems. It provides excellent detection rate, unmatched in-depth analysis and evasion resistance. www.joesecurity.org/

  • KnowBe4

    KnowBe4

    KnowBe4, trusted by 70,000+ organizations globally, empowers workforces to make smarter security decisions. Our AI-driven Human Risk Management platform strengthens security culture through comprehensive training, cloud email security, real-time coaching, and AI-powered defenses. We transform your workforce from a vulnerability into your strongest asset, actively fortifying your organization against evolving cyber threats. knowbe4.com

  • SentinelOne

    SentinelOne

    SentinelOne (NYSE:S) is the world’s most advanced, autonomous AI-powered cybersecurity platform. Built on the first unified Data Lake, SentinelOne empowers the world to run securely by creating intelligent, data-driven systems that think for themselves, stay ahead of complexity and risk, and evolve on their own. Leading enterprises around the world trust SentinelOne to Secure Tomorrow™. www.sentinelone.com/

  • Silobreaker

    Silobreaker

    Silobreaker is a leading security and threat intelligence technology company, that provides powerful insights on emerging risks and opportunities in real-time. It automates the collection, aggregation, accurate analysis and dissemination of data from open and dark web sources in a single platform, so intelligence teams can produce high-quality, actionable reports in line with priority intelligence requirements (PIRs). This enables global enterprises to make intelligence-led decisions to safeguard their business from cyber, physical and geopolitical threats, mitigate risks and maximise business value. silobreaker.com

  • Tines

    Tines

    Built by security practitioners, Tines is a powerful automation platform that enables security teams to focus on high-impact work. Tines bypasses the need for technical skills and delivers powerful automation straight into the hands of security teams. Tines connects every tool in your workflow in one place. Tines provides deeper incident investigation and response and only involves an analyst when a real threat is identified, allowing them to refocus on more impactful company-specific risk-reduction. Tines is designed from the ground-up to integrate with any external system without having to build an ‘integration’ and is 100% vendor-agnostic. https://www.tines.com/

  • Tracebit

    Tracebit

    Tracebit deploys and maintains tailored security canaries, proactively detecting intrusions across your organisation - from cloud infrastructure, to identity and endpoints. With a read-only connection to your environment, Tracebit recommends canaries based on your unique configuration; deploys them via infrastructure-as-code; and continuously evolves and refreshes them to keep threat actors guessing. tracebit.com

FIRST.Org
Contact | Copyright © 2015—2025 by Forum of Incident Response and Security Teams, Inc. All Rights Reserved.