Infocyte to Speak at American Growth Capital 2016 Information Security & Broader Technology Growth Conference

 

Founder and CEO Chris Gerritz to Address Company Growth and Malware Hunt Technology

 

San Antonio, TX / Boston, MA – February 25, 2016 – Infocyte, a provider of cybersecurity malware hunt technology, today announced that it will be presenting at the upcoming American Growth Capital (AGC) 2016 Information Security and Broader Technology Growth Conference Monday and Tuesday, February 29th and March 1st in San Francisco.

Russ Workman, AGC Partner – Investment Banking, stated, “We invited Infocyte to address the conference as they are a leader in facilitating Cyber Hunting, which we believe is a segment poised for rapid growth in the near future.”

Infocyte founder and CEO Chris Gerritz will be addressing the recent growth and success of the company and in particular, the meteoric rise of malware hunt as a security must in today’s breach-infested environment. Gerritz will be presenting on Monday – February 29, 2016, at 11:45 (PST) in the Yorkshire Room.

“Hacks and breaches have never been more prolific in today’s IT infrastructure. Malware is often resident inside the organization’s networks and endpoints for months, sometimes years, before being detected,” stated Chris Gerritz. “I look forward to presenting how Infocyte Hunt™ enables organizations to discover security breaches and deny attackers the ability to persist on their networks undetected – without the burden of complicated equipment or endpoint software (agent) installations.”

The 12th Annual West Coast conference will feature 250 presentations by CEOs from the hottest public and private technology companies and 17 panel discussions on timely tech and investing trends moderated by industry leaders. The cornerstone of the event, which is unlike any other tech conference, is the expected 4,000 one-on-one meetings held among companies, investors, and strategic acquirers, within an atmosphere where participants are able to interact on a more personal level.

 

ABOUT INFOCYTE

Infocyte provides malware hunt technology developed by former US Air Force cybersecurity officers. The company closes the Breach Detection Gap – the time that exists between infection and discovery – denying attackers the ability to exploit resources and restoring network health. For more information on Infocyte, please visit www.infocyte.com.

Media Contact

Kurt A. Mueffelmann, President & COO
Email: press(at)infocyte(dot)com

 

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »