HBGary Marketing Update

Slides:



Advertisements
Similar presentations
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Effective PR: the Power of Three Craig Coward Context Public Relations.
Advertisements

Company Overview Outsourcing marketing made easy.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Welcome! Chicago Seminar Anton Hristov Sitefinity Product Strategy & Learn more at sitefinity.com Content Management System.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Developing A Social Media Strategy Around LinkedIn by Chris Raulf.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Class 8 The State of Cybercrime Today- Threads & Solutions.
SOCIAL MARKETING FOR RETAIL BRANDS. CHICAGO LONDON NEW YORK EAST RUTHERFORD WASHINGTON, D.C. TRENTON DALLAS SAN FRANCISCO LOS ANGELES A TOP 5 INDEPENDENT.
The Changing World of Endpoint Protection
ISE Confidential - not for distribution THE EVOLVING THREAT LANDSCAPE: ADVANCING ENTERPRISE SECURITY 11 December 2013.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
The Marketing Playbook for API & SDK Adoption Kate Pietrelli.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
MCOM Live Leadership Jacqueline Williamson – London Gary Hughes – Leeds January
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Air Force Research Labs Dept Homeland Security (HSARPA)
“Enterprise Malware Detection”
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Your Partner for Superior Cybersecurity
DHS Phase II SBIR Contract Vice President Business Development
Company Overview.
Vice President of Products and Global Marketing, RiskSense, Inc.
Detect Malware No One Else Can… Rapidly Identify it’s capabilities, Mitigate the Threat with Actionable Risk Intelligence.
MDM Partner Summit Oracle MDM Product Marketing Update
Enterprise Botnet Detection and Mitigation System
DHS Phase II SBIR Contract Senior Security Engineer
Compliance with hardening standards
Defeat Tomorrow’s Threats Today
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Threat Monitoring Center

Information Security: Risk Management or Business Enablement?
بهترین راهکار را انتخاب کنید...
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Artificial Intelligence in BFSI Market to reach $25 bn by 2024: Global.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Defense Matrix Cyber Defense Matrix
How to Get Published in NASA Tech Briefs
Your gateway to cloud innovation
Securing the Threats of Tomorrow, Today.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Managing IT Risk in a digital Transformation AGE
Session 8: Innovative Uses of Captives: Cyber and Beyond
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
TSC Business Meeting V1 Launch & Other Marketing activities
Four Steps to Kick-Starting Buzz for your Mobile App
UDTSecure TM.
October is National Cybersecurity Awareness Month
Presentation transcript:

HBGary Marketing Update Go Big Or Stay Home HBGary Marketing Update

Building Momentum 2010 Operation Aurora Report 5 new products: Active Defense, Responder PRO w/REcon, FGet, Fingerprint, Inoculator New partnerships: Palantir, Verdasys, Guidance, Skout Forensics Company doubles staff to 36 Keynotes i.e SecTor, Stanford, SRO @BHUSA, First Webinar: HBGary-InfraGard More vertical market conferences: API, FST

Sample Media Coverage 2010

Analysts Take On HBGary 2010 HBGary Named Gartner 2010 Cool Vendor TSA presents at Gartner IT Security Summit “I think their approach based on behavior vs. signatures is interesting and innovative.” Barry Runyon, Gartner “HBGary has unique intellectual property around memory analysis to spot rootkits and other stealthy malware.” – 451Group HBGary to be included in several upcoming 2011 analyst reports by 451Group, Gartner New Approaches to Malware Prevention, Gartner Market Impact Report, 451 Group

Heard on the Street 2010 “I like Responder Pro because it has a really well-laid out interface and will acquire memory, analyze memory, disassemble binaries (executables), record an executable's behavior, and more.” – John Sawyer, U. of FL “When I read coverage of Greg Hoglund’s BlackHat talk on fingerprinting malware code, I instantly thought how cool it would be to integrate these fingerprints into reputation system.” – Mike Rothman, Securosis

Heard on the Street 2010 “So glad HBGary is on our side. Powerful fingerprinting is part of Accenture’s compliance automation reporting.” -- Ryan LaSalle, Accenture  ”I thought the presentation was very informative and confirmed just how vulnerable our critical infrastructure is to a cyber attack.” – Alexandra Snyder, Legislative Counsel, Congressman Dan Lungren, about HBGary-InfraGard Healthcare Webinar  

Key Messages Evolving Threat Continuous Protection Security Model Rise of Custom Malware, Customized Attacks Traditional security solutions i.e. AV can’t detect Focus on risks -> educate on costs, loss to companies Continuous Protection Security Model Breakthrough innovation Detect, analyze and remediate advanced threats Leverage, extend your current security solutions Unmatched Threat Intelligence HBGary R&D Malware Attribution

2011: HBGary GOES BIG Increased trade show presence Quarterly Webinars i.e. Jan. 14th PwC-HBGary sponsored “Changing Face of IR”, CISO series Expand coverage in key vertical publications i.e. Modern Healthcare, Dec. 13th story Fortune, Forbes, New York Times Big “Customer Love” activities/communication HBGary As You Like It – Content delivered via your favorite multimedia tool i.e. iTunes, Twitter, YouTube, Flickr

Upcoming Trade Shows 2011 BlackHatDC, Jan. 16th – 17th Crystal City DOD Cybercrime, Jan. 25th – 26th Atlanta RSA Conference, McAfee Partner Booth, San Francisco, Feb. 14-18 Greg Hoglund has 2 Speaking slots: Follow Digital Trail, Cyberwar Panel FST Summit, April 5-7th Miami CEIC, June 12th – 17th Orlando BlackHatUSA 2011, July 30th - August 4

New Tools You Can Use New holiday videocard coming soon New, updated product data sheets Vertical market solution sheets Quarterly White Papers, 2xmonth blog Identify and develop new user, partner case studies, third-party influential testimonials Company shirts for trade shows, services team Trade show giveaways i.e. video games like Call of Duty, T-shirts, beanies, bumper stickers

PR Goals More keynotes, expand presence in key business conferences Continue to develop company spokespeople, third-party influentials Media focus on Business/Verticals: Oil&Energy, American Banker, Modern Healthcare , Forbes, New York Times Expand strategic Thought Leadership campaign for contributed articles, blog Secure product reviews, awards i.e. Active Defense, Responder Pro Continue to create new content for Website Web analytics