Q3 All Hands
September 2020
Our mission is to visualize the world’s data and make it universally understandable
Go To Market
Crisis Management Incident Response
Breach Simulation
What do you do when you've been breached?
Your now on the Board of Big Corp
www.slido.com event code #22207
The Price Goes up every 24 hrs
100
Who do you Inform?
1. Nobody - This doesn't look real
2. Police - perhaps they can help
3. CEO - The boss needs to know
4. DPO - Tell the data privacy officer
5. IT TEAM - Were we Breached?
6. Procurement - 3rd Party Breach
7. Other - eg. Security, Insurance, etc.
www.slido.com event code #22207
www.slido.com event code #22207
A 2nd message comes in
www.slido.com event code #22207
When do you tell customers?
1. Immediately - They need to know now
2. In 24 hours
3. In 48 hours
4. In 72 hours
5. In 7 days
6. In 28 days
7. Don't Inform them
www.slido.com event code #22207
The Hackers are probably still in our system
One of our staff may have helped them
We can stop them if we disconnect for 3 days
What executive action to take?
1. Disconnect the systems from the internet
2. Forensics - What Happened?
3. Remediation - Close the breach
4. Ask the insurer to confirm coverage
5. Brief the Board and set Budget
6. Submit a report to Regulators
7. Implement Cyber Crisis Plan
www.slido.com event code #22207
Where is your Cyber Crisis Plan?
www.slido.com event code #22207
Rumors are circulating..
www.slido.com event code #22207
Big Corp doesn't care about my safety or their customers
Never doing business with them again.
What communications needed?
1. Stop all comms - such as marketing and ads
2. Create a website with Q&A about the breach
3. Customer advice eg how to prevent fraud
4. Provide script - Twitter and Call center
5. Pre-brief employees about the situation
6. Identify advocates to speak for the company
7. Customer compensation and apology
www.slido.com event code #22207
Finally, some good(ish) news
www.slido.com event code #22207
Crisis Management Incident Response Simulation End
Enterprises are engaging in Cyberwafare
There is an invisible war that is being battled everyday
There is a cyber attack every 39 seconds
In 2018 hackers stole half a billion personal records
Source : cybintsolutions.com
The average cost of a data breach in 2020 will exceed $150 million
Approximately $170 Billion is expected to be spent globally on cybersecurity by 2021
Source : cybintsolutions.com
By 2020 there will be roughly 200 billion connected devices
43% of cyber attacks target small businesses
Source : cybintsolutions.com
43% of cyber attacks target small businesses
Source : www.fundera.com
60% of those go out of business after a Cyberattack
Source : www.fundera.com.com
Cybersecurity Market Size
2019 = $124 billion
2022 = $170.4 billion
Growing 12-15% YoY
3.5 Million
Cybersecurity Job Openings by 2021
So why are the current Solutions Failing?
Security Operations Centers
A Security Operations Center is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended.
Security Operations Centers
1/1000 companies have a SOC
Average Cost of a SOC is $2.5M (CapEx)
Scaling depends on availble physical office space
(52% of Fortune 500 have a SOC)
Who works in the Security Operations Center?
Roles in SOC
Text
Security Analyst
(FrontLine Soldiers)
Security analysts are typically the first responders to incidents. They are the soldiers on the front lines fighting against cyber attacks and analyzing threats.
Text
Security Engineers
(Engineers & Architects)
Security engineers are responsible for maintaining tools, recommending new tools, and updating systems
Work with development operations teams to ensure that systems are up to date
Security Manager
(The Boss)
A security manager is responsible for overseeing operations as a whole. They are in charge of managing team members and coordinating with security engineers.
They serve as the direct boss to all members of the SOC team.
CISO
(The Executive)
The chief information security officer (CISO) is responsible for defining and outlining the organization’s security operations.
Typically, a CISO reports directly to the CEO and has direct contact with all of upper management.
Current Tools being used in a SOC
1)
2)
3)
Internet of things (IoT)
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Physical SOCs
Physical Operations Centers are too expensive
Lack of talent
Legacy tools cant handle the volume of data
Analysts need to be on-premise in physical SOC
We are going to provide a simplified solution for the IoT security & managment problems for SOCs
Using AI and Mixed Reality
Virtual Command 3D
3Data Operations Center
June 10th 2019
3Data Analytics
Virtual Command
How can we simplify the communication of our offering?
What if we could turn frontline analysts into Superheros?
Meet Apollo
Your AI Security Assistant
Virtual assistant which uses voice response technology to better manage network and cybersecurity events
Codename: Apollo
Prediction, Prevention, Detection, Response, Monitoring.
Machine learning for Network Protection
Machine learning for User Behavior
Machine learning for Object Detection
ML for Network Protection
Machine learning for User Behavior
Machine learning for Object Recognition
Run correlations across the physical and the Digital
Go to Market
Apollo Engine
3D Floor Plans
Network Topology
MV Cameras
Cisco Meraki Example
Integrate with Additional Vendors
Virtual Intelligence for Big Data & IoT
Wallon
Tyler
Aaron
Greg
Sean
CTO
VP of Sales
Zach
Alex
COMMUNICATIONS CHANNELS