| Name | Title | Contact Details | 
|---|---|---|
| Victoria Elman | General Counsel | Profile | 
| Amy Sennett | Deputy General Counsel | Profile | 
Mesh Systems is a Carmel, IN-based company in the Software and Internet sector.
PAVR SOFTWARE SOLUTIONS is a Fairfax, VA-based company in the Software and Internet sector.
Split Rock Consulting is a Sun Prairie, WI-based company in the Software and Internet sector.
H2O.ai brings AI to business through software. H2O is the leading open source machine learning platform for smarter applications and data products. H2O is operationalizing data science by developing and deploying algorithms, models and code for R, Python and Sparkling Water for Apache Spark communities. Some of H2O`s mission critical applications include predictive maintenance, operational intelligence, security, fraud, auditing, churn, credit scoring, user based insurance, sepsis, ICU transfers and others in over 5,000 organizations. Some of H2O.ai`s customers include Capital One, Progressive, Zurich, TransAmerica, PWC, Comcast, Nielsen, Neustar, Macy`s, Walgreens, Kaiser, United Healthcare and Aetna. H2O is brewing a grassroots culture of data transformation in its customer communities. ML is the new SQL and all software will use AI.
Meet the Industry`s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. - API Risk Posture Management: Tackle API Sprawl, head on. Instantly know where you are exposed. Enjoy automatic and continuous API discovery that gives you comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes. - Stop Data Exfiltration: Detect and block all known and unknown API attacks, including internal and external API attacks, the OWASP web and API top 10, business logic abuse attacks, API abuse, API fraud, and sensitive data exfiltration. - Threat Hunting: Ensure you are ahead of attackers by searching through the transaction data lake for potential threats. Immediately discover the signs of reconnaissance and take action before the full attack.