Cyber Security 2017 Trends and Start Ups.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Formulating a Security Policy for the Modern IT Landscape.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Chapter 3 Ethics, Privacy & Security
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Dell Connected Security Solutions Simplify & unify.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Database Security and Data Protection Suseel Pachalla, CISSP.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Artificial Intelligence. Real Threat Prevention.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Defining your requirements for a successful security (and compliance
Your Partner for Superior Cybersecurity
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Hybrid Management and Security
Barracuda Web Security Flex
Common Methods Used to Commit Computer Crimes
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Hybrid Management and Security
Capabilities Matrix Access and Authentication
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Securing Information Systems
Prevent Costly Data Leaks from Microsoft Office 365
McAfee Security Connected – Next Generation Security
Today’s Risk. Today’s Solutions. Cyber security and
5G Security Training
Risks & Reality Cyber Security Risks & Reality
Cybersecurity Strategy
EU GDPR a Cyber Security Perspective
Cyber Defense Matrix Cyber Defense Matrix
Software-Defined Secure Networks in Action
Securing the Threats of Tomorrow, Today.
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
NSX Data Center for Security
Cybercrime and Canadian Businesses
How to address security, cost, IT and migration concerns
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Technology Convergence
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Cloud Computing for Wireless Networks
Presentation transcript:

Cyber Security 2017 Trends and Start Ups

Ron Gula 1996 NSA PEN TESTER 1998 COMMERCIAL HONEYPOTS 1999 CLOUD SECURITY - USi 2000 DRAGON INTRUSION DETECTION SYSTEM 2002 TENABLE NETWORK SECURITY (NESSUS!) 2017 GULA TECH ADVENTURES Married, 2 boys, into sci-fi, cigars, scuba, progressive music, travel and most forms of alcohol

Cyber Market, How to Pitch and the Future! Agenda Cyber Market, How to Pitch and the Future!

Find Bad, Find Good & Build New Good Cyber Market Find Bad, Find Good & Build New Good

EDR, Threat, Forensics, ML/AI, UBA, Cloud, Insider, Honeypots Finding Cyber Bad EDR, Threat, Forensics, ML/AI, UBA, Cloud, Insider, Honeypots

RISK = THREAT X VULNERABILITY

VM, Audit, Frameworks, Risk, Insurance, Third Party, Employee Testing Finding Cyber Good VM, Audit, Frameworks, Risk, Insurance, Third Party, Employee Testing

Building Cyber Good Cloud Migration, Hard Endpoints, Secure Web, Migrating Off Legacy & Employee Training

New Ideas, RSA & How to Pitch Cyber Start Ups New Ideas, RSA & How to Pitch

1. What PROBLEM Are You SOLVING?

2. How do you SOLVE it?

3. Show some PROOF

4. What FUNDS do you need to do what?

5. What is your VISION?

What isn’t in the 5-slide deck? BACKUP SLIDES Team Bios Company Advisors Customer Success Stories Funding to Date Media Coverage Market Size and Growth with huge numbers

Predicting The Future 10+ years from now !!!

How long will legacy stuff hang around?

How bad will the next 5 billion IOT devices be?

Will the move to the cloud ever be reversed?

What will the social response be to government back-dooring everything?

What will the terms “network”, “vulnerability” and “privacy” even mean in 2028?

@RonGula ron@gula.tech RonGula Questions? @RonGula ron@gula.tech RonGula

Automated white listing web application firewall Container orchestration to increase utilization of virtual resources Cloud based patch management for Win, OSX and Linux Secure voice and text communications, even on hostile phone network Blocks 100% of your threat intel and undesirable countries on premise and in cloud Privileged account management for cloud and on-prem Like Slack but encrypted and secure Uses computer vision to connect all of your security technologies Leading RASP solution to secure web sites from the inside out. Malware sandbox focused on evasive malware Insider threat prevention and visibility through hardware base application enforcement Tests network and host based security tools with attack simulations Online cyber certification and training for your team Threat intelligence platform and orchestrator Produces cyber threat intelligence related to fraud and terror. Removes bots from your web leads