Sponsorship – 2026 to 2027

Our Mission of Shared Stewardship

The ISC2 East Bay Chapter is incorporated as a nonprofit public benefit corporation within the meaning of the Internal Revenue Code section 501(c)(3). We are registered with the Secretary of State of California and are not organized for the private gain of any person.

Employer Identification Number (EIN): 47-1242819

Our purpose and mission are rooted in the sustained success of our community. We believe that a resilient cyber-ecosystem requires productive, transparent, and trusted business relationships. As such, we view our sponsors not as external vendors, but as essential partners in our collective defense.

How We Measure Value

In our community, the return on investment is not a simple metric; it is a legacy. We measure the value of any donation or sponsorship through the tangible accomplishment of career milestones for our members, the sustainable growth of our partner companies, and the successful pairing of innovative cybersecurity platforms with the needs of local and national infrastructure.

When your technology improves the cyberposture of our local organizations, we have succeeded. When your contribution funds a student scholarship, we have secured the future. We invite you to join us in this shared stewardship, where your technical excellence supports the professional sanctuary our members have built over the last decade.

The Ecosystem Map (Illustrative, not comprehensive)

  • Critical Infrastructure & Public Sector: PG&E, City of Stockton, Contra Costa Water District, San Jose Water, BART, Cal State Universities, and the City and County of San Francisco.
  • Aviation & Transportation: Collins Aerospace, Rivian Automotive, Tesla, Lucid Motors, and Uber.
  • Retail & Consumer Giants: Albertsons, Safeway, Gap Inc., Ross Stores, Walmart, and The Clorox Company (Oakland).
  • Health & Life Sciences: Kaiser Permanente (Oakland/Pleasanton), Sutter Health (Walnut Creek), and Roche Molecular Systems (Pleasanton).
  • Financial & Enterprise Technology: Workday (Pleasanton HQ), Oracle (Pleasanton), ICE Mortgage Technology (Pleasanton), Chevron (San Ramon), and Blue Shield of California (Oakland).

Academic/Innovation Pipeline:

  • Featured Partnerships: * Las Positas College: Our primary community college partner for workforce development.
  • Stanford University: Advanced Cybersecurity Program (via the outreach of Dr. Neil Daswani).
  • Universities: UC Berkeley, UC Merced, CSU East Bay, San Jose State, Cal Poly SLO, Dominican University of California, University of Maryland Global Campus, Arrupe Jesuit University.
  • Community Colleges: Ohlone College, Chabot College, Las Positas College, Los Medanos College, Diablo Valley College.
  • High Schools & Organizations: * Oakland Unified: Oakland Unified School District (OUSD).
  • Fremont Unified: Mission San Jose, Irvington, and Kennedy High.
  • Pleasanton Unified: Amador Valley and Foothill High.
  • Dublin Unified: Dublin High School.
  • Livermore Valley Joint Unified: Livermore High and Granada High.
  • New Haven Unified: James Logan High (Union City).
  • Hayward Unified: Hayward High.
  • Additional: Branham High, Bella Vista Christian Academy, Veritas Classical Christian Academy, and one titled International Earth Science Olympiad.

Sector Innovation Leaders (Illustrative):

  • AI/Autonomous: Astrix, HiddenLayer, Intezer, Netskope, Mavs AI, Veria Labs.
  • Identity & Access: BalkanID, One Identity, P0 Security, Redblock, StrongDM, Horizon3.ai.
  • Infrastructure/Zero Trust: Illumio, Stellar Cyber, Corelight, NetAlly.
  • GRC/Culture/Supply Chain: Exiger, Snyk, Sepio, RevolutionCyber, Threatcop, Happiest Minds.

Meet our Sponsors

PLATINUM SPONSORS

Platinum Tier

Amount: $5,000 (Lifetime, for the duration of the maintained relationship*)

  • Tier Profile: Maximum Financial Commitment; secures immediate industry leadership and community impact.
  • Marketing & Branding: Designated Marketing and Promotion team, Up-front positioning (at the door), First billing on all flyers, Banner placement on stage, and dedicated, high-frequency social media campaign on LinkedIn and proactive boosting over the full sponsorship year.
  • Access: Access to All Events (two annual conferences and two distinguished dinners), including two representatives to staff your table at each conference.
  • Speaking: Priority invitation to submit a high-quality proposal for at least one in-person presenter slot(s) and up to two webinar or co-sponsored events, first right of refusal on all panels. (All partnerships depend upon a timely and full response.)
  • Governance: Includes a request for a company member to join our Board or Planning Committee.
  • *Status Maintenance: Requires at least one paid member in the ISC2 East Bay Community, and that this member is opted-in to review chapter communications, and participates in planning
  • Distinguished Dinner: Two invitations to each Distinguished Dinner Event, for at least two consecutive years (total of 8 guests in two years)
  • Distinguished Dinner Book: Prominent placement of attending company leader bios and headshots in the Distinguished Dinner Guest Book handed out at our dinner events.
  • Purchase conference 6 passes or distinguished dinner guests* in blocks of $500 (up to a 50% savings). *Guests must register with the chapter to join us at any on-site events.
  • Pre-assigned student volunteer staff who will learn about your platform and service, meet at the conference to assist in setup and breakdown, get the booth participants their lunch, and cover for periods to allow booth members to attend or speak at sessions during the day.

Nonuse of any proposed activity does not constitute credit, and the chapter is not legally obligated to supply any service, as all donations are charitable and not paid in exchange for any service

Thank you to our Platinum Sponsors:

Legacy Platinum Sponsors:


Gold Tier

Amount: $2,500 (Renewed Annually)

  • Tier Profile: Targeted Annual Impact; Focus on achieving significant visibility and concrete results over a single year
  • Marketing & Branding: Sponsor link and logo listed as Gold, Designated posting on LinkedIn during the month leading up to the speaking event, and boosting and inclusion of significant corporate announcements during the quarter preceding events.
  • Access: Access for up to two staff/attendees to manage your table and attend up to two events/conferences per year.
  • Speaking: Invitation to submit a presentation proposal for the conference, in-person presenter slot(s), and up to two webinar events.
  • Distinguished Dinner: Two invitations to each Distinguished Dinner Event (total of 4).
  • Distinguished Dinner Book: Prominent placement of the attending company leader’s bio and headshot in the Distinguished Dinner Guest Book handed out at our dinner events.
  • Purchase conference 6 passes or distinguished dinner guests* in blocks of $500 (up to 50% savings). *Guests must register with the chapter to join us at any on-site events.
  • Pre-assigned student volunteer staff who will learn about your platform and service, meet at the conference to assist in setup and breakdown, get the booth participants their lunch, and cover for periods to allow booth members to attend or speak at sessions during the day.

Nonuse of any proposed activity does not constitute credit, and the chapter is not legally obligated to supply any service, as all donations are charitable and not paid in exchange for any service.

Thank you to our Gold Sponsors:


Silver Tier

Amount: $1,500 (Renewed Annually)

  • Tier Profile: Foundational Partnership; focus on building a long-term, continuous relationship
  • Marketing & Branding: Sponsor logo posted prominently on the Conference Event webpage/flyers, and make best efforts to raise prominence on the sponsor’s posts and draw attention to them.
  • Access: Access for up to two staff/attendees to manage your table and attend up to two events/conferences per year.
  • Speaking: Invitation to submit a presentation proposal, which may be selected based on its suitability, first right of refusal for panel slots, and one webinar event.
  • Distinguished Dinner: Two invitations to one of two Distinguished Dinner Events (total of 2).
  • Distinguished Dinner Book: Prominent placement of the attending company leader’s bio and headshot in the Distinguished Dinner Guest Book handed out at our dinner events.
  • Purchase conference 6 passes or distinguished dinner guests* in blocks of $500 (up to a 50% savings). *Guests must register with the chapter to join us at any on-site events.
  • One student volunteer staff member who will learn about your platform and service, meet at the conference to assist in setup and breakdown, get the booth participants their lunch, and cover two hours to allow booth members to attend or speak at sessions during the day.

Nonuse of any proposed activity does not constitute credit, and the chapter is not legally obligated to supply any service, as all donations are charitable and not paid in exchange for any service.

Thank you to our Silver Sponsors:

We wish to acknowledge with great gratitude our departing sponsors from 2025.

Summit 7, Semperis, BigID, Symmetry Systems, BreachRX. Please let us know if your leadership can attend the March Distinguished Dinner. They are most certainly invited.


$150 – Member Meeting Sponsors contribute toward operational costs to present webinars and manage membership. If you present to our community, we require that you be a registered member of the chapter, and we ask for a donation to maintain monthly digital subscriptions.

If you present to our membership, you should donate to support the cost of that event. We are a non-profit. No one is paid, and the services we use require donations in order for us to operate. If you have presented in the past but did not contribute, please consider using our “Pay It Forward” option.


Pay-It-Forward Sponsorship

$100 – Pay-It-Forward helps the chapter maintain a diverse and accessible pipeline of talent by offsetting costs for students and those transitioning into the field. By choosing this option, you ensure that high-quality networking and education remain available to the entire local workforce. It is a direct investment in a stronger, better-connected professional community.

Please fill out the Member Meetings and Conference Preparation form (button below) that notifies us of your desire to participate with and sponsor our chapter. Using the Member Meeting Preparation form, we are better able to serve your interests and facilitate your offering to our East Bay community. This form requires a Google account to allow for the uploading of presentation materials. We also need you to provide your business email in the form in order to plan with you. If you experience any difficulties with the form, contact our conferencedirector@isc2-eastbay-chapter.org.


Platinum Sponsors

  • Abnormal AI (abnormal.ai) is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability.
  • Astrix Security (astrix.security) is the industry’s first non-human identity (NHI) security platform, purpose-built to help enterprises secure the vast and often invisible web of service accounts, API keys, and OAuth tokens that power the modern automated enterprise. As organizations shift toward agentic AI and autonomous workflows, Astrix provides the only holistic solution for the entire NHI lifecycle—from automated discovery and risk assessment to real-time remediation. By securing SaaS-to-SaaS connectivity and managing the “Action Layer” where AI agents interact with corporate data, Astrix prevents unauthorized access and ensures operational continuity in an increasingly connected world.
  • Casco (casco.com) provides autonomous security testing for web applications, APIs, infrastructure, and AI systems. Moving beyond traditional, intermittent penetration testing, Casco offers “always-on” security that integrates directly into the development lifecycle. The platform utilizes advanced intelligence to identify critical vulnerabilities, such as broken object-level authorization and prompt injection. Every finding is safely exploited to prove its business impact. Casco also allows users to one-click retest and generate code fixes for every finding. Casco is trusted by over 250 companies, from high-growth startups like CrewAI to large enterprises like Gusto. As a Gold Sponsor of OWASP AI Exchange, Casco is committed to advancing AI-driven security standards for the global developer community.
  • HiddenLayer (hiddenlayer.com) HiddenLayer’s AI Security Platform secures agentic, generative, and predictive AI applications across the entire lifecycle, including AI discovery, AI supply chain security, AI attack simulation, and AI runtime security. Backed by patented technology and industry-leading adversarial AI research, HiddenLayer protects IP, ensures compliance, and enables safe adoption of AI at enterprise scale.
  • Intezer (intezer.com) is the leading Autonomous SOC platform designed to emulate the decision-making process of a human security analyst at machine scale. By leveraging proprietary Genetic Malware Analysis, Intezer automatically triages, investigates, and responds to every alert originating from an organization’s existing security stack (EDR, SIEM, and Phishing reports). Unlike traditional automation that relies on rigid playbooks, Intezer’s AI-driven platform identifies the “DNA” of code to distinguish between trusted software, known threats, and sophisticated new mutations. This allows security teams to automate over 90% of their Tier 1 and Tier 2 monitoring tasks, effectively eliminating alert fatigue while ensuring that critical incidents are triaged and remediated in seconds rather than hours.
  • Netskope (netskope.com) is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.
  • Stellar Cyber (stellarcyber.ai) is the innovator of Open XDR, the only intelligent, next-generation security operations platform that provides high-fidelity detection and response across the entire attack surface. By unifying EDR, SIEM, and NDR into a single, AI-driven interface, Stellar Cyber eliminates the data silos that traditional security tools create, providing a comprehensive, correlated view of the entire threat landscape. The platform uses advanced machine learning and behavioral analytics to automatically detect sophisticated attacks, reduce alert fatigue for security analysts, and significantly accelerate incident response workflows through a single, integrated “pane of glass.”

Gold Sponsors

  • Corelight (corelight.com) is the pioneer and fastest-growing provider of Open Network Detection and Response (NDR), delivering a unique approach to cybersecurity risk centered on comprehensive network evidence. As the only solution powered by the dual open-source foundations of Zeek® and Suricata—now enhanced by GenAI—Corelight provides deep visibility into network traffic by transforming raw data into high-fidelity logs, metadata, and actionable insights. By equipping elite defenders at the world’s most mission-critical enterprises and government agencies with this rich evidence, the platform enables rapid threat hunting, forensic analysis, and complete situational awareness across complex, distributed environments. Ultimately, Corelight helps security teams level up their defenses, accelerating investigations and dramatically reducing the time required to detect and neutralize sophisticated attacks and model theft.
  • Exiger (exiger.com) is a global leader in AI-powered supply chain risk management, helping organizations illuminate and protect their extended enterprise and third-party ecosystems. Through its proprietary 1Exiger platform, the company provides real insights into financial health, geopolitical exposure, and ESG risks, enabling proactive management of the complex dependencies that define modern global commerce.
  • RevolutionCyber (revolutioncyber.com) is a boutique cybersecurity and resilience consulting firm that blends strategic advisory, cultural transformation, and technology enablement to redefine how organizations approach security. They focus on aligning security with core business outcomes, such as resilience, trust, and revenue generation, rather than treating it as a standalone technical function, offering services that enhance security culture and prepare for rapid incident response.
  • Sepio (sepiocyber.com) provides a Hardware Access Control (HAC) platform that offers visibility and control over all hardware assets utilizing physical layer fingerprinting. By using machine learning to analyze device behavior at the physical layer, Sepio identifies rogue devices and malicious hardware implants that bypass traditional security controls, ensuring the integrity of IT, OT, and IoT environments.
  • Snyk (snyk.io) is the leader in developer security, providing an enterprise-grade, multi-layered platform powered by the DeepCode AI orchestration engine to secure every component of the modern software supply chain. By combining symbolic AI with machine learning, Snyk delivers real-time vulnerability scanning and automated fix suggestions across source code (SAST), open-source dependencies (SCA), container images, and infrastructure as code (IaC). Snyk’s technical edge lies in its curated vulnerability database and its ability to integrate directly into the developer workflow, enabling security leaders to implement global risk policies while empowering engineering teams to remediate security debt without sacrificing deployment velocity. By bridging the gap between security and development, Snyk provides the scalability, visibility, and auditability required for large-scale digital transformations and secure AI adoption.

Silver Sponsors

  • BalkanID (balkanid.com) provides modular, AI-assisted identity security and access governance (IGA) solutions designed to work with both connected and disconnected applications. Its platform streamlines critical tasks such as user access reviews, lifecycle automation with purpose-based just-in-time access, and identity security posture management (ISPM)—including IAM risk and RBAC analysis and an AI Copilot feature. By empowering organizations to enforce least privilege principles, BalkanID enables enterprises to efficiently manage complex identity risks at scale.
  • Happiest Minds Technologies (happiestminds.com) is an AI-led, digital engineering and “Mindful IT” company that delivers secure, scalable solutions spanning from chip to cloud. By integrating deep expertise in Gen AI with core capabilities in product engineering, cybersecurity, and automation, Happiest Minds helps enterprises across BFSI, Healthcare, and Hi-Tech fast-track their digital evolution. Their innovation-led strategy is supported by strategic partnerships with AWS and Microsoft, as well as a growing portfolio of proprietary platforms like Arttha and FuzionX.
  • Horizon3.ai (horizon3.ai) provides NodeZero, an autonomous penetration testing platform. It continuously assesses an organization’s internal and external attack surface, automatically discovers exploitable weaknesses, and verifies vulnerabilities without human intervention. By rigorously emulating real-world attacker behaviors and techniques, NodeZero identifies critical attack pathways and provides clear, actionable remediation steps to proactively strengthen security posture and continuously validate an organization’s defenses against evolving cyber threats, supporting a continuous security validation program.
  • Illumio [illumio.com]: Provides Zero Trust Segmentation to prevent the lateral movement of breaches across complex hybrid environments, including data centers, multi-cloud infrastructures, and endpoints. It meticulously visualizes application dependencies and communication flows, micro-segments networks down to individual workloads, and enforces granular, adaptive policies to contain attacks. This approach dramatically minimizes breach impact by reducing the attack surface and significantly enhancing an organization’s overall cyber resilience and security posture.
  • Mavs AI (mavsai.com) delivers smart guardrails, intelligent policy control, and real-time visibility for every GenAI interaction. They address specific risks like PII and sensitive data shared in prompts, prompt injections compromising systems, and misuse by business users or rogue application users. Mavs AI closes the gap where innovation outpaces safety guardrails, enabling enterprises to innovate fearlessly and scale AI responsibly.
  • NetAlly (netally.com) offers portable network testing and analysis solutions essential for IT and cybersecurity professionals managing complex infrastructures. Its suite of tools provides deep visibility into both wired and wireless networks, enabling efficient troubleshooting of connectivity issues, precise validation of network performance, and verification of security configurations. This comprehensive approach helps ensure reliable network infrastructure, reduces downtime, and facilitates rapid issue resolution for enhanced operational stability and secure network operations.
  • One Identity (oneidentity.com) delivers a unified identity security platform that provides comprehensive identity and access management (IAM) solutions across an organization’s entire digital landscape. By bridging the gap between Identity Governance and Administration (IGA) for user lifecycle management, Privileged Access Management (PAM) for securing elevated accounts, and Access Management for secure authentication, One Identity provides a holistic, identity-centric approach to security. This unified platform helps organizations manage identities, govern access, and secure privileged accounts while streamlining identity lifecycles and enforcing least privilege principles. Ultimately, One Identity enables enterprises to improve their compliance posture and strengthen overall security across complex, hybrid IT environments.
  • P0 Security (p0.dev) is helping companies modernize PAM for multi-cloud and hybrid environments with the most agile way to ensure least-privileged, short-lived, and auditable production access for users, NHIs, and agents. Centralized governance, just-enough-privilege, and just-in-time controls deliver secure access to production, as simply and scalably as possible. P0’s Access Graph and Identity DNA data layer make up the foundational architecture that powers privilege insights and access control across all identities and production resources, including the new class of AI-driven agentic workloads emerging in modern environments.
  • Redblock’s Agentic AI (redblock.ai) automates identity and security workflows across disconnected apps — extending SailPoint and other identity systems for full coverage. It connects what Identity systems can’t, eliminates CSVs and IT tickets, and automates actions safely with policy guardrails. The result: a smaller identity attack surface in days, not months. Manual workflows become autonomous, auditable actions.
  • StrongDM (strongdm.com), founded in 2015, offers a unified Zero Trust Access platform for managing and auditing access to all critical infrastructure, including databases, servers, Kubernetes clusters, and web applications. By connecting users securely without the need for traditional VPNs, StrongDM centralizes control over technical access and meticulously logs every session with precision for comprehensive auditing and compliance. The platform enforces granular, least-privilege access policies in real-time, significantly enhancing security posture while streamlining compliance workflows. Secure-by-design and boasting a 98% customer retention rate year-over-year, StrongDM is focused on making life easier and more operationally effective for technical experts by improving efficiency across complex, distributed environments.
  • Threatcop (threatcop.com) Threatcop AI Inc. is a People Security Management (PSM) company and a sister concern of Kratikal. Threatcop helps organizations reduce cyber risk by strengthening employee security posture—turning people from the weakest link into the strongest line of defense. With a focus on social engineering and email-led attacks, Threatcop drives measurable improvements in security behavior and readiness. Serving 250+ large enterprises and 600+ SMEs across 30+ countries, Threatcop supports organizations across E-commerce, Finance, BFSI, Healthcare, Manufacturing, and Telecom. Threatcop follows the A-A-P-E framework (Assess, Aware, Protect, Empower) and delivers products such as TSAT, TLMS, TDMARC, and TPIR to address evolving threats. By reducing human error and improving day-to-day security decisions, Threatcop enables a lasting culture of cybersecurity awareness.
  • Veria Labs (verialabs.com) provides an AI-native offensive security platform designed for autonomous vulnerability discovery and exploitation. Founded by members of the #1 US competitive hacking team, Veria Labs builds specialized AI agents that integrate directly into Git repositories and CI/CD pipelines to analyze codebases continuously. These agents operate faster than human researchers, finding deep, complex vulnerabilities that traditional tools miss and generating real-world exploit PoCs to verify risk and eliminate false positives. By adapting to business logic and providing automated remediation, Veria Labs shifts offensive security left, enabling organizations to validate their security posture and secure critical vulnerabilities with high confidence and at machine speed.

Tax-deductible donationPlatinumGoldSilverBronze (individual)Member Meeting
LocationIn PersonIn PersonIn PersonIn PersonWebinar
Billing cycleOne time onlyAnnuallyAnnuallyAnnuallyPer event
Sponsor logo listed on the ISC2 East Bay Sponsorship Page and related event pagesYesYesYesYesYes
Opportunity to promote offers and events via site events page and monthly chapter communicationsYesYesYesNoNo
# of Events / Conferences accessAll2211 virtual
Vendor Banner visible in presenter area for live eventsYesYesCase by CaseNoN/A
Sponsor Table at live eventsYesYesYesNoN/A
Sponsor may use ISC2 East Bay logo in communications about ISC2 East Bay eventsYesYesYesYesYes
# of ($145) Event Passes for the sponsorship Year**4 per yr
2 years
4 per year2 per year1N/A
# of Speakers at conferences and webinar events2+1 webinar 1 keynote1 webinar 1 panel1 live booth
1 panel
N/A
Invitation to speaker luncheon & dinnersAll2×21×2N/AN/A
Support to draw industry guestsYesYesN/AN/AN/A
Involvement in chapter planningYesYesN/AN/AN/A
Tax deductible donation$5,000$2,500$1,500$500$150

** Legacy Platinum vendors are 3 or more years past their initial contribution, and it is customary for the chapter to accept additional donations to cover the cost of some events.

*** As of 2025, our costs to support events have increased to a level that makes Bronze sponsorship no longer feasible.

*** Sponsorship prices have increased and are in effect for 2026.