Predictive-Healthcare » Mega-PoC presentation

Slides:



Advertisements
Similar presentations
3SKey 3SKey.
Advertisements

WTS and PCI Nelson Lah Chief Technology Officer Workplace Technology Services May 27, 2009.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Gordon Shevlin Founder, Chief Executive Officer Allgress, Inc.
FPPA 11 th Annual Convention February 25 th, 2008.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
111 © 2005 EMC Corporation. All rights reserved. Achieving Business Resilience 2005 Business Continuity and Corporate Security Show & Conference Stephen.
Building a Fully Trusted Authentication Environment
PRESENTATION TITLE Presented by: Name Surname Directorate Date Briefing Session: W 1074 WTE SUPPLY, DEPLOYMENT AND MAINTENANCE OF E- MAIL MARKETING AND.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Safe’n’Sec IT security solutions for enterprises of any size.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
IP4INNO Module 4B: Business Planning with IP The 7Ps Assessment Tool Timing recommendation: 1.5 hours Name of speakerVenue & date.
“Every human will have a secure access to the Blockchain.”
Scales Technology FZCO
When BPM meets Blockchain
The Revolutionary Benefits Of Blockchain
Managed Services.
UIC Digital developments On behalf of the Worldwide Railway Community
BLOCKCHAIN APPLICATION IN CORE BANKING
MGMT 452 Corporate Social Responsibility
Do you know who your employees are sharing their credentials with
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Microsoft Azure: The only consistent Hybrid Cloud
Industrial IoT Derive business value from the Internet of Things, People and Services Ronald Binkofski General Manager Microsoft MC CIS.
The Challenge The Problem AIR QUALITY IN THE CITIES
Threat Management Gateway
Making Blockchain Real for Business
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
KEYNOTE STAGE SPONSOR.
5 Benefits of Blockchain for Startups - IQVIS
How to Increase HCM Cloud User Adoption with Guided Learning
Deanna MacDonald Blockchain Labs for Open Collaboration
Building A Community of Trust to Transform Medicines Development
Microsoft Azure Improves Efficiency and Customer Satisfaction for BT Signaal's New Sesam Sesam App that Provides Ticketless, Free-Flow Parking MICROSOFT.
All data occupies physical space, even if we don't think of it as such.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Team member 1, school Team member 2, school Team member 3, school
Cyber Security 2017 Trends and Start Ups.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
XAHIVE International LLC Ottawa • New York
GlobAL Public Procurement Conference September 2018
Introduction, Adoption And challenges
Securing the Threats of Tomorrow, Today.
The influence of Blockchain in different Industries Blockchain Technology.
Distributed Ledger Technology (DLT) and Blockchain
Session Title 6th Annual Global Supply Chain Excellence Summit.
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Security for Safety: Enabling Digitalization of Railway Systems
Important information for Denplan practices
How to build your Integrated
We secure the communication
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
“Every human will have a secure access to the Blockchain.”
Sachiko A. Kuwabara, PhD, MA
Accelerating Technology for the Securities Token Revolution
IT Management Services Infrastructure Services
In the attack index…what number is your Company?
Securing web applications Externally
Outline Preface Characteristics of MATIC G
Blockchain: What Board Directors Need to Know
Block Chain Technology in Agriculture
IDC Market Glance: Manufacturing Business Ecosystems
Presentation transcript:

Predictive-Healthcare » Mega-PoC presentation Vincent MARIONNET Business Coach and Digital Product Owner © Patrick Tourneboeuf

The movie

Infrastructure security Application security Positioning the selected startups on the Cybersecurity value chain Endpoint security Network security Infrastructure security Application security Supervision & Administration App protection Identity & access management VPN/Crypto Edge infra. (gateway) Detect & block threats Core infra. key mgmt; storage... Data protection Vulnerability testing User Admin

Place trust and security inside data Laurent HENOCQUE Chief Executive Officer

KeeeX : the Universal Embedded Data Protection INTEGRITY ORIGIN ELECTRONIC SIGNATURE SEMANTICS LINKS DATE BLOCKCHAIN

What we do with Automation & traceability in Supply-Chain Predictive Healthcare / Maintenance Connected Car Certification of Corporate & Financial Communication Electronic Signature / Proof of Consent

What we do with our other customers Process certification for compliance audit Certification of corporate & financial communication Probative pictures Dematerialization & traceability in supply-chain Electronic signature of contracts Compliance of electrical processes

Main KPIs

Cybersecurity Program 7 Proof of concept 3 Mega Proof of concept 1 Patent pending Events & customer contacts organized 30+ 5+ Concrete follow up to date

Cybersecurity Program 4,6/5 Startups satisfaction 100% NPS from Startups Funds being raised by 4/9 startups since the launch of the program 30M€

Cybersecurity Program « This is a very disruptive solution, I have seen nothing like that on the market » Guavus founder « I am astonished by the fact that you have been able to cross fertilize 3 startups in a such short time and achieve such level of marketing & techno demonstration » A Startups incubator program leader « This stands out from the crowd, it would solve many of our problems to share classified data. Quand est ce que vous sortez du bois? » DGA

Thank you for your attention Any questions ?