Q3 All Hands
September 2020

Our mission is to visualize the world’s data and make it universally understandable
Go To Market
Crisis Management Incident Response
Breach Simulation

What do you do when you've been breached?
Your now on the Board of Big Corp
www.slido.com event code #22207

The Price Goes up every 24 hrs
100

Who do you Inform?
1. Nobody - This doesn't look real
2. Police - perhaps they can help
3. CEO - The boss needs to know
4. DPO - Tell the data privacy officer
5. IT TEAM - Were we Breached?
6. Procurement - 3rd Party Breach
7. Other - eg. Security, Insurance, etc.
www.slido.com event code #22207
www.slido.com event code #22207



A 2nd message comes in
www.slido.com event code #22207
When do you tell customers?
1. Immediately - They need to know now
2. In 24 hours
3. In 48 hours
4. In 72 hours
5. In 7 days
6. In 28 days
7. Don't Inform them
www.slido.com event code #22207

The Hackers are probably still in our system
One of our staff may have helped them
We can stop them if we disconnect for 3 days
What executive action to take?
1. Disconnect the systems from the internet
2. Forensics - What Happened?
3. Remediation - Close the breach
4. Ask the insurer to confirm coverage
5. Brief the Board and set Budget
6. Submit a report to Regulators
7. Implement Cyber Crisis Plan
www.slido.com event code #22207

Where is your Cyber Crisis Plan?
www.slido.com event code #22207
Rumors are circulating..
www.slido.com event code #22207



Big Corp doesn't care about my safety or their customers
Never doing business with them again.
What communications needed?
1. Stop all comms - such as marketing and ads
2. Create a website with Q&A about the breach
3. Customer advice eg how to prevent fraud
4. Provide script - Twitter and Call center
5. Pre-brief employees about the situation
6. Identify advocates to speak for the company
7. Customer compensation and apology
www.slido.com event code #22207

Finally, some good(ish) news
www.slido.com event code #22207
Crisis Management Incident Response Simulation End
Enterprises are engaging in Cyberwafare
There is an invisible war that is being battled everyday

There is a cyber attack every 39 seconds
In 2018 hackers stole half a billion personal records

Source : cybintsolutions.com
The average cost of a data breach in 2020 will exceed $150 million
Approximately $170 Billion is expected to be spent globally on cybersecurity by 2021

Source : cybintsolutions.com
By 2020 there will be roughly 200 billion connected devices
43% of cyber attacks target small businesses
Source : cybintsolutions.com

43% of cyber attacks target small businesses
Source : www.fundera.com
60% of those go out of business after a Cyberattack

Source : www.fundera.com.com
Cybersecurity Market Size
2019 = $124 billion
2022 = $170.4 billion
Growing 12-15% YoY
3.5 Million
Cybersecurity Job Openings by 2021

So why are the current Solutions Failing?
Security Operations Centers
A Security Operations Center is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended.
Security Operations Centers
1/1000 companies have a SOC
Average Cost of a SOC is $2.5M (CapEx)
Scaling depends on availble physical office space
(52% of Fortune 500 have a SOC)
Who works in the Security Operations Center?
- 1. Security Analyst
- 2. Security Engineer
- 3. Security Manager
- 4. Chief Information Security Officer
Roles in SOC
Text
Security Analyst
(FrontLine Soldiers)

Security analysts are typically the first responders to incidents. They are the soldiers on the front lines fighting against cyber attacks and analyzing threats.
Text
Security Engineers
(Engineers & Architects)
Security engineers are responsible for maintaining tools, recommending new tools, and updating systems
Work with development operations teams to ensure that systems are up to date

Security Manager
(The Boss)
A security manager is responsible for overseeing operations as a whole. They are in charge of managing team members and coordinating with security engineers.
They serve as the direct boss to all members of the SOC team.

CISO
(The Executive)
The chief information security officer (CISO) is responsible for defining and outlining the organization’s security operations.
Typically, a CISO reports directly to the CEO and has direct contact with all of upper management.

Current Tools being used in a SOC



1)
2)
3)


Internet of things (IoT)
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Physical SOCs



Physical Operations Centers are too expensive
Lack of talent
Legacy tools cant handle the volume of data
Analysts need to be on-premise in physical SOC
We are going to provide a simplified solution for the IoT security & managment problems for SOCs
Using AI and Mixed Reality
Virtual Command 3D


- Building schematics
- Weather conditions
- Live video feeds
- Data analytics
- Maps
- Fast Communication
- Multiplatform support


3Data Operations Center
June 10th 2019
3Data Analytics
Virtual Command
-
3D Graph showing real-time network traffic flow
- Machine Learning that scores potential threats based on Anomaly
- Drill down to further inspect
- Easy and Fast to communicate remotely

How can we simplify the communication of our offering?
What if we could turn frontline analysts into Superheros?


Meet Apollo
Your AI Security Assistant


Virtual assistant which uses voice response technology to better manage network and cybersecurity events
Codename: Apollo










Prediction, Prevention, Detection, Response, Monitoring.

Machine learning for Network Protection
Machine learning for User Behavior
Machine learning for Object Detection
- Regression to predict the network packet parameters and compare them with the normal ones; (Historical data Analysis)
- Classification to identify different classes of network attacks such as scanning and spoofing;
- Clustering for forensic analysis.
ML for Network Protection






- Regression to detect anomalies in User actions (e.g., login in unusual time);
- Classification to group different users for peer-group analysis;
- Clustering to separate groups of users and detect outliers.
Machine learning for User Behavior


- Object detection is the process of finding instances of objects in images
- Object detection is a subset of object recognition, where the object is not only identified but also located in an image
Machine learning for Object Recognition


Run correlations across the physical and the Digital



























Go to Market



Apollo Engine


3D Floor Plans

Network Topology
MV Cameras


Cisco Meraki Example


Integrate with Additional Vendors




Virtual Intelligence for Big Data & IoT

Wallon
Tyler
Aaron
Greg
Sean
CTO
VP of Sales
Zach
Alex
COMMUNICATIONS CHANNELS
Q3 All Hands - Incident Response and Brand
By Wallon Walusayi
Q3 All Hands - Incident Response and Brand
- 12