Identity Checkpoint is

Slides:



Advertisements
Similar presentations
Fraud and Internal Control Presented by Andy Harper Pugh & Company, P.C. April 28, 2011.
Advertisements

Credit Derivatives.
1. Introduction 2. Funding Instruments 3. Public Funding 4. Support from Banks 5. Private Equity Investment 6. Venture Capital 2.
Overview of the Global Fund: Guiding Principles Grant Cycle / Processes & Role of Public Private Partnerships Johannesburg, South Africa Tatjana Peterson,
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
TAKE YOUR BUSINESS GLOBAL International Trade. Why Should You Export?
Putting the Constitution into Effect. The Constitution was put into effect with the beginning of George Washington’s presidency in 1789 This first administration.
Goal of This Presentation What is an Investment Bank? What are the opportunities? Learning more about the business What is an Investment Bank? What are.
Cloud Computing: Putting the Cloud to Work Today 2013 California Accounting & Business Show & CPE Conference June 3, 2013.
Business Plan. What is a business plan: A business plan is a statement issued by the promoters, owners or managers of a business outlining how they expect.
Structured Transaction Overview. FDIC serves as an equity partner in its Receivership capacity for a single or multiple institution transaction. Joint.
OTC Securities The IPO and Financing Platform dedicated to high growth companies.
Money and Banking Lecture 02.
University of Palestine International Business And Finance Management Accounting For Financial Firms Part (3) Ibrahim Sammour.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Public Financial Services, LLC Investor Briefing Reaching Liquidity.
The U.S. Secret Service Shhhhhh!
WEEK 1 INTRODUCTION Interpret Financial Information.
Company Confidential. Identity Checkpoint is “The End to Identity Theft”
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Finance & Finance Law. What is finance? Finance describes the act of providing money, capital or other financial resources to assist in facilitating a.
Policy on the Management of Intellectual Property in Technology Transfer Activities at CERN CERN/FC/5434/RA Technology Transfer Network Meeting – 10 th.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Traversing New Waters: Eight Years Post-Crisis A Panel on the Impact of the Regulatory Tsunami on Securities.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Corporate Finance Team. Companies raise money Fixed Assets/Working Capital Two types of money – debt and equity Venture Capitalists Private Equity and.
Driving Entrepreneurial Activity
ERP vendor perspective
Mortgage 101 Training for The ________ Team
The One For Three Solution Making Retained Earnings Work For You Trying on the Solution [Trying on the solution is a tool for use with a client during.
Owner’s Equity Account and Liabilities
What Services Do Banks Provide?
65 Questions Venture Capitalists Will Ask of Startups
How Crooks use Good Markets to do Bad Things
Chapter Sixteen Securities Firms and Investment Banks
Chapter 16: The Federal Reserve & Monetary Policy Section 2: Functions of the Federal Reserve pgs
Team Name Your logo here One line business description:
Company Name Mission statement Stage of development
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Not Banking on Banks The $684-billion commercial banking industry is an essential component of everyday life; however, its role in the financial crisis.
Inter operability of e-GP System
Funding a Rapidly Growing Venture
Own Your Identity.
The One For Three Solution Making Retained Earnings Work For You Trying on the Solution [Trying on the solution is a tool for use with a client during.
Create Your Own Cryptocurrency Exchange – Know These Benefits.
The City National Difference
JP Morgan spends $500 million per year on cyber security
Connor Griesemer and Kevin Wu
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Red Flags Rule An Introduction County College of Morris
BizNOW Selling Together
Cyber Trends and Market Update
Chapter Sixteen Securities Firms and Investment Banks
Strategies for preventing and detecting fraud
Own Your Identity.
Streetsmart Financial Basics for Nonprofit Managers
Federal Reserve Retail Payments Risk Forum
Chapter Sixteen Securities Firms and Investment Banks Learning Goals
ELECTRONIC PAYMENT SYSTEM.
Governance and Audit Oversight for Capital Market
CHECKS, THE BANKING SYSTEM, AND E-MONEY
Chapter 17 The Financial System.
Chapter 2 Financial Intermediation and Financial Markets
Charlene Liu Mohammed Aman Negar Mokhtarnia Ahmed Nasir
Identity Checkpoint is
Money and Banking Lecture 29.
Adroit Market Research +1 (214) Single Use License: US$ 4800 Request Sample Global.
Getting the Green Light on the Red Flags Rule
Company Name Mission statement Stage of development
Business Finance for Everyone Manufacturing
Presentation transcript:

Identity Checkpoint is “The End to Identity Fraud”

The Big Picture Crisis 2014 (per Gartner) $225 Billion Global Losses $26.3 Billion USA Losses 17.6 Million Americans Impacted

The Big Picture Crisis Identity Fraud has become the largest criminal activity in the world. According to Gartner, it costs individuals and institutions globally nearly $500 billion each year today. It devastates personal well being as well as business profits while leaving a sense of in security and impacts the quality of life almost indefinitely. Until now, there was is no foreseeable, universal solution on the horizon.

The Crisis & the Solution The cause of the crisis is our non-participation in authorizing the use of our personal identifiers and financial instruments. Identity Checkpoint puts the individual back in control of their identity and proves “they are who they say they are” and verifies “they have authorized the use of their accounts and assets.” Our active participation in every transaction is the solution.

Product / Technology Identity Checkpoint will provide a open SaaS platform for business, financial networks and governments to implement a new “multi-factor identity and financial instrument use authorization” factor. By providing a simple, open platform to all organizations, there will be no reason for them to not apply the solution to their processes and operations. Identity Checkpoint will provide a free application to everyone for managing their personal identity and financial instruments use. Being free in the app stores, there will be no financial reason to not download and use it, accelerating adoption.

Market Opportunities Targets In discussions US Departments & Agencies State & County Departments & Agencies Financial Institutions Credit Card Gateways Business Entities In discussions US Treasury & IRS DoIT & Comptroller of Maryland The targets of our marketing are simply everyone leveraging social networking and traditional media outlets to drive adoption.

The Basis of the Business Model The heart of all business is the authorization of processes and the transfer of funds / ownership from one entity to another entity Each non-cash transfer of funds / ownership has a composite transactional cost which is paid to third parties Each business action event has an internal operational cost Becoming part of those transactional / event processes as the 3rd party providing authorization services is the principal business goal

Management Team and Advisors Name Role Bio Marc George CEO/CTO Software Architect, Thought, Systems Consulting & Engineering Jon Tholen CSO VP, BCBS California Global Head Operations, VISA Amber Schmidlin COO SVP, Bank of America Thomas Erisman CFO CFO, 180s CFO, Reborn Beauty Peter Engstrom Advisor VP, Federal Knowledge Business, SAIC

Unique in the Market Models that scan activity and look for anomalies do hinder malicious activity. But, they are cost intensive and can create friction for identity and financial instrument owners. Systematic indicators and ‘red flags’ are often triggered at the end of the transaction processes. What’s worse, they often draw attention to an issue only after activity has happened. Sentry is not fraud monitoring. Sentry is fraud prevention.

The Competitive Landscape

The Sentry Difference Integrates within Current Systems Compatible with Existing Data/Algorithm Monitoring Stops Fraudulent Information Before released into processing systems Creates a two-way dialogue with the identity/financial instrument owner. Only the actions they approve will be implemented. Those they decline can be immediately queued for review by law enforcement personnel & internal security. Free to the identity/financial instrument owner, allowing them to take an active role in protecting their identity rather than abdicating responsibility.

Milestones 4/3/13 Conception 5/6/13 Incorporated 5/24/13 Patent Application 1/8/14 Prototype Completed 8/20/15 Trademarks Granted 8/24/15 US SAM Activated 9/30/15 Patent Acceleration Petition 3/1/16 IRS Unsolicited Proposal Submitted 12/13/16 Patent Examination Begins 2/27/17 Designated MD Master Contractor

Funding Sought The funding sought is over three rounds, seed and venture, to underwrite the expected initial costs for development and initial production deployment in 6 months.   Pre-Money Valuation Debt / Raise Post-Money Valuation Issued Stock Founders Late Seed Investors Round 1 Investors Round 2 Investors Seed $2,000,000 $517,000 $0 57.61% 56.71% Late Seed $3,000,000 $5,000,000 66.71% 10% Round 1 $8,000,000 74.21% 7.5% Round 2 $11,000,000 81.71%

The significance of this solution is Sentry has the potential to impact every activity in World.