Premier One Cyber Summit
Join us for the inaugural Premier One Cyber Summit, a one-day event packed with unique content, leading cybersecurity experts and networking opportunities. We’ll focus on how the industry’s best are using technology to effectively thwart cybercrime, protect their business, and thrive in the new era of the modern workplace. The event will sell out, so register now!
MDR (Managed Detection and Response)
Why MDR is a core business need. Jon will discuss how building a security posture that aligns with NIST makes you insurable and defensible.
Blackpoint hunts proactively for evolving threats 24/7, maintaining full visibility of your entire network. Our experienced team leverages leading-edge, proprietary technology to monitor for indicators of compromise, malicious behavior, and open risks.
Every second counts when it comes to detecting the first signs of breach. Blackpoint detects and isolates developing threats before they can spread laterally. We investigate suspicious activity on your behalf and eliminate alert fatigue and time spent on false positives.
In the fastest responses times seen by the industry, Blackpoint isolates and stops malicious processes. We take action to neutralize threats in real-time rather than sending you instructions to action yourself. Get alerted after the risk is eliminated and we’ve secured your environment.
Founder and CEO of Blackpoint Cyber
Jon started his career in network engineering and IT operations but quickly made the switch over to the covert world of the intelligence community. He has since spent more than 12 years planning, conducting, and executing high-priority national security missions. As a former NSA computer operations expert and IT professional, he brings a unique perspective to the mission of developing cyber defense software that effectively detects and detains purposeful cyber intrusions and insider threats. Jon has also helmed multiple cybersecurity assessments, including Fortune 500 enterprises and critical port infrastructures. Currently, Jon holds multiple patents in methods of network analysis, network defense, pattern analytics, and mobile platforms.