Cyber security a major trend in digital technology
|
|
|
- Claud Davis
- 9 years ago
- Views:
Transcription
1 Vontobel Investment Banking Cyber security a major trend in digital technology Cyber Security Performance Index October/November 2015 Performance creates trust
2 Contents Overview A 3 Investment case Cyber security a major trend in digital technology B Index concept, composition & key product data Cyber Security Performance Index C Summary Slide 2
3 Contents A 3 A Investment case Cyber security a major trend in digital technology The worst hacker attacks of recent years have included Criminal intent will always exist. As digitalization progresses, incidents are likely to increase. Cyber attacks on the rise. Demand for prevention, detection and response solutions never higher. The Internet of Things: how erstwhile abstract risks have become real threats. Smaller companies a source of further potential vulnerability, contributing to the high number of undetected incidents. Cyber security: a cross-over segment with good growth prospects.
4 The worst hacker attacks of recent years have included A 4 USD 700,000: The cost for the US Department of Defense in dealing with the 2002 attack by hacker Gary McKinnon. Asperger s sufferer McKinnon was fixated with the idea of searching for government-owned alien technologies. AOL released 20 million data items in 2006 due to a technical error, with information on around 20 million search keywords. This included confidential data of 650,000 users. (Source: AOL) Data of 134 million clients were stolen by cybercriminals in 2009 using spyware, which allowed them to read the credit card data of 134 million clients of the US company Heartland Payment Systems. In 2011, 12,800 people were deliberately targeted in the News of the World phone hacking scandal in the UK, among them thousands of celebrities and politicians. (Source: public domain, Wikimedia.org) Sources: Faronics from computerwoche.de Slide 4
5 Criminal intent will always exist As digitalization progresses, the number of incidents will rise A 5 The potential threats of cybercrime are increasingly becoming established in the public consciousness, also heightening the focus on new technologies. The number of undetected cyber attacks is massive, and investments in security solutions pay off! According to PwC, stolen trade secrets may cost between USD 749 billion and USD 2.2 trillion annually (Sept. 2014). By comparison, the World Bank estimated global GDP at USD 74.9 trillion in Slide 5
6 Cyber attacks on the rise Demand for prevention, detection & response solutions never higher A 6 Number of cyber attacks worldwide annually between 2009 and 2014 (in millions) Against the backdrop of technological innovation and ongoing development, the demand for security solutions is rising. The effective protection of data and intellectual property is increasingly becoming fundamental for preserving/creating competitive advantages. Companies and governments regard the speed and the attendant security risks of technological change as being among their greatest challenges. To reduce the security risks, companies can invest in three areas relating to cyber attacks: prevention, detection and response. Slide 6
7 Smaller companies a source of further potential vulnerability Contributing to the high number of undetected incidents A 7 Larger companies detect more cyber attacks Paradoxically, larger companies have spent more on their IT security PwC ( ) suspects that small companies mostly do not notice that they have been the victims of theft. However, smaller firms in particular will have to protect themselves better in future if they are to survive. A further indicator of the accelerating trend and considerable potential. Slide 7
8 The Internet of Things How erstwhile abstract risks have become real threats A 8 Average time to resolve a cyber attack for US firms in 2014 Resolving the security breach caused by an attack can take years if not decades. The problem is the hardware, which often has to be replaced, but this is only done gradually. A lot of people are unaware that many objects have sensors, and the number is on the rise. Source: Ponemon Institute; Hewlett-Packard (HP Enterprise Security); June 2014 The Internet of Things has made threats that were once abstract a reality (self-driving cars, smart household appliances, Industry 4.0: self-aware production systems, etc.) Slide 8
9 Cyber security A cross-over segment with good growth prospects A 9 How challenges open up attractive market potential Technology trend with sustainable growth prospects Annualized costs of cyber crime US, 2014, by sector Innovation forms the basis for a potential competitive advantage and for survival. However, seizing this advantage hinges on being able to protect intellectual property, patents and strategies Financial institutions remain among the most prized targets, but serious damage can also be inflicted on other sectors and affected parties (individuals, organizations, governments). A current study by consultancy firm Markets and Markets estimates that the global cyber-security market will reach a volume of USD 170 billion by 2020, with annual growth rates of 10%. Source: Ponemon Institute; Hewlett-Packard (HP Enterprise Security); October 2014 Cross-over technology segment: the key driving factors at present are the Internet of Things, cloud computing, and the increasing use of mobile communications Slide 9
10 Contents B 10 B Index concept & key product data Cyber Security Performance Index Investment Advisor Thomas Rappold applies value investing to the tech sector New index concept the Cyber Security Performance Index Pool and selection of index members: qualitative and quantitative criteria Thematic scope of the Cyber Security Performance Index Value investing in the tech sector: explaining the four qualitative selection criteria Initial composition of the Cyber Security Performance Index Initial country and sector weightings focus currently on the US Profiles of the current members Key product data for the Cyber Security Performance Index Important information for investors Slide 10
11 Investment Advisor Thomas Rappold Applying value investing to the tech sector B 11 Thomas Rappold - investment advisor, entrepreneur and author Self-taught in programming language at the age of 14, completed first media IT course in Europe Developed ground-breaking new financial portals for private and corporate clients as an employee of the Strategy Group Internet at Allianz SE Successful track record stretching back more than ten years as an entrepreneur with an Internet, consulting and investment company, and as a founder of numerous Internet start-ups The book Silicon Valley Investing Unlike the dotcom bubble, innovations such as big data, cloud computing and mobile apps are key components in the real economy As an expert on Silicon Valley, Thomas Rappold explains the key valuation metrics and news sources for investments in start-ups, long before going public Slide 11
12 New index concept Cyber Security Performance Index B 12 Index composition concept and selection criteria Index concept The Cyber Security Performance Index tracks the performance of companies that generate their primary revenues in the cyber security technology business. Individual sub-segments have been defined for selection purposes. The index is adjusted twice a year and its members equally weighted Dividends and other distributions are reinvested in the index The index is calculated and published by Solactive AG Key data ISIN WKN Reuters (RIC) Index calculator Index type Index currency DE000SLA1C18 SLA1C1.VHACK Solactive AG Performance index USD Index components 12 Selection pool Dividends Calculation Included (performance index) 09:00 to 22:30 (CET), every 60 seconds 4 qualitative selection criteria Index members Index guidelines: Cyber Security Performance Index Cyber security is the key revenue driver for growth in the software, cloud, e-commerce and e-finance segments. To avoid a 'dilution' of the index, the selection list centres on pure play cyber-security firms, which may also be regarded as interesting M&A candidates for established IT companies, banks, and traditional industrial firms on account of their lucrative core focus. Slide 12
13 Pool and selection of index members Qualitative and quantitative selection criteria B 13 Cyber Security Performance Index Selection criteria Selection pool Criteria Significant revenues in the following cyber-security segments: Firewall solutions Anti-virus / anti-malware Disaster recovery Digital trust services Content security Cloud security Encryption Secure communication Web filtering Anti-spamware Threat management security solutions Listed on a recognized and regulated exchange Market capitalization of at least USD 750 million Average daily share trading volume of at least USD 1 million (in the past three months) No trading restrictions for foreign investors Selection of index members Rules From the selection pool, the index advisor picks the 12 most promising companies on the selection day based on the following four criteria: High entry barriers in terms of: strong brand awareness comprehensive patent protection networks and alliances creating high added value uniqueness of business model Product appeal and market growth: the companies products and solutions must serve a market that is as large as possible and promises to deliver sustained, long-term growth. Quality of management Internationality of business Layout: Vontobel. Sources: Solactive, Thomas Rappold (Investment Advisor of the Cyber Security Performance Index) Slide 13
14 Thematic scope Cyber Security Performance Index B 14 Focusing on security selection criteria for tech firms Increasing demand for cyber-security solutions could become a revenue and growth driver. The focus on pure plays in the cyber-security segment is important in avoiding the dilution of growth and return potential. The index guidelines state that a company qualifies as a cyber-security pure play if it focuses on one of the following segments: Firewall solutions Anti-virus / anti-malware Disaster recovery Digital trust services Content security Cloud security Encryption Secure communication Web filtering Anti-spamware Threat management security solutions Winner takes all investing now possible in a promising cross-over segment. Innovations also make successful cyber-security firms lucrative M&A candidates. Tendency to monopolization: high market potential means there are often high profit margins. This can have a positive impact on share performance. Slide 14
15 Value investing in the tech sector Explaining the four qualitative selection criteria B 15 Buy a euro for 50 cents (Thomas Rappold, Investment Advisor) Winner takes all : technology segments have an affinity for forming monopolies and are thus typically associated with high margins. The Investment Advisor uses these four qualitative selection criteria on the semi-annual adjustment dates: 1 2 The Protective Moat Criteria that define the security and invulnerability of the business model and competitive edge: strong brand awareness comprehensive patent protection networks and alliances creating high added value uniqueness of business model 4 3 Quality of management Track record of company s management Is the founder of the company still active in its management? Source: Thomas Rappold (Investment Advisor of the Cyber Security Performance Index) Product appeal and market growth The products serve a large market (minimum market volume USD 10 billion) The market promises sustained, long-term growth at rates of at least 10% p.a. Internationality of business Significant business activity in international markets, with the focus on the global economic areas of the US, Europe and Asia Density of branch and distribution network satisfies a minimum level Slide 15
16 The initial composition Cyber Security Performance Index B 16 Initial composition of the Cyber Security Performance Index stocks Company Supersector Country (by head office) Currency Weighting Palo Alto Networks Inc Networking Products US USD 8.33% FireEye Inc Internet Security US USD 8.33% Cyberark Software LTD/Israel Computer Graphics Israel USD 8.33% Check Point Software Tech Applications Software Israel USD 8.33% Symantec Corp Internet Security US USD 8.33% Fortinet Inc Computer Data Security US USD 8.33% Proofpoint Inc Enterprise Software/Serv US USD 8.33% Imperva Inc Applications Software US USD 8.33% Qualys Inc Computer Data Security US USD 8.33% Infoblox Inc Networking Products US USD 8.33% Gemalto Computer Data Security Netherlands EUR 8.33% Trend Micro Inc Internet Security Japan JPY 8.33% Sources: Solactive, Thomas Rappold (Investment Advisor of the Cyber Security Performance Index) Slide 16
17 Initial country and sector weightings Focus currently on the US B 17 Initial composition Country weighting (by head office) Initial composition Currencies 8% 8% 8% 8% 17% 67% 83% USA Israel Niederlande Japan USD JPY EUR Sources: Solactive, Thomas Rappold (Investment Advisor of the Cyber Security Performance Index) Slide 17
18 Profiles of the current members B 18 Index composition 3 details Palo Alto Networks Inc FireEye Inc Cyberark Software LTD/Israel Check Point Software Tech Sector 2 : Currency: Market cap 1 : Description: Networking Products US (USD) USD 1,610 mn Market entry barriers: Leader in firewall solutions for corporate clients for four years Market growth: Above average, with more than 1,000 new clients per quarter and rates above 50% Management: CEO appointed by Obama as Chair of the National Security Telecommunications Advisory Committee Internationality: Just under half of the Global 2000 companies rank among its clients Sector 2 : Internet Security Currency: US (USD) Market cap 1 : USD 14,495 mn Description: Market entry barriers: Global market leader in threat detection and protection Market growth: 50-70% revenue growth, gross margin above 70%, visible and rising earnings thanks to services Management: CEO with stock market experience, founder as CFO Internationality: >2,500 clients in 65 countries, including governments and 150 of the Fortune 500 companies Sector 2 : Computer Graphics Currency: Israel (USD) Market cap 1 : USD 14,286 mn Description: Market entry barriers: Sole provider in field of securing business-critical applications on already infected computers Market growth: 40% revenue growth, with strong focus on high-margin licensing business Management: CEO with 16-year track record in IPOs Internationality: >1,900 clients worldwide, including 40% of the Fortune 500 companies, 17 big banks, 8 of the 16 leading pharma firms Sector 2 : Applications Software Currency: Israel (USD) Market cap 1 : USD 14,495 mn Description: Market entry barriers: One of the oldest cyber-security firms and global market leader in firewalls and VPN solutions Market growth: Even as a 'mature' company, still posts revenue/earnings growth of 8-10% p.a. Management: Founder/CEO owns several patents and is regarded as the inventor of modern firewall solutions Internationality: >100,000 companies and millions of users as clients Sources: price data Bloomberg, as at Company outlooks Thomas Rappold, as at Historical data do not provide any indication of future developments. 1: Market capitalization on (Bloomberg) 2: Bloomberg Industry Classification Benchmark 3: At initial fixing (indicative) Slide 18
19 Profiles of the current members B 19 Index composition 3 details Symantec Corp Fortinet Inc Proofpoint Inc Imperva Inc Sector 2 : Internet Security Currency: US (USD) Market cap 1 : USD 14,286 mn Description: Market entry barriers: 30 years success in IT security, storage and backup business Market growth: Since foundation as a start-up in 1982 has grown into a Fortune 500 company Management: New CEO with extensive expertise and successful track record Internationality: Based in Silicon Valley, production locations in Ireland, large branch network Sector 2 : Currency: Market cap 1 : Description: Computer Data Security US (USD) USD 7,325 mn Market entry barriers: Market leader in time-critical network security solutions Market growth: Strong distribution network with 20,000 partners, high scalability, and sustained growth of 30% year-on-year Management: Led by the two brothers who founded it Internationality: 250,000 clients worldwide, including the majority of the Fortune Global 100 companies Sector 2 : Currency: Market cap 1 : Description: Enterprise Software/Serv US (USD) USD 2,401 mn Market entry barriers: Leading provider of on-demand data protection and encryption for s/files Market growth: Profiting from strong growth in cloud/big data platforms, as well as regulatory requirements Management: Management duo successfully took the company public in 2012 Internationality: >3,000 corporate clients, and >10 million users worldwide Sector 2 : Applications Software Currency: US (USD) Market cap 1 : USD 2,083 mn Description: Market entry barriers: Market leader and pioneer in data centre security software Market growth: Profiting from strong growth in cloud computing. Sustainable and visible rise in revenues of 40% p.a. thanks to service model Management: CEO sits on Proofpoint Board of Directors Internationality: Based in Silicon Valley, global branch network Sources: price data Bloomberg, as at Company outlooks Thomas Rappold, as at Historical data do not provide any indication of future developments. 1: Market capitalization on (Bloomberg) 2: Bloomberg Industry Classification Benchmark 3: At initial fixing (indicative) Slide 19
20 Profiles of the current members B 20 Index composition 3 details Qualys Inc InfoBlox Inc Gemalto Trend Micro Inc Sector 2 : Country: Market cap 1 : Description: Computer Data Security US (USD) USD 1,124 mn Market entry barriers: Leading provider of cloud security, first provider of security solutions for vulnerability management Market growth: Growth rates of above 20% thanks to very high and rising margins (80%) Sector 2 : Networking Products Country: US (USD) Market cap 1 : USD 930 mn Description: Market entry barriers: Leading provider of security technology for network management Market growth: Network management is becoming ever more important as the interlinking of individual devices increases. Current revenue growth > 20% p.a. Management: Manager active in Silicon Valley with great success since 1987 Management: Successful management Internationality: > 7,700 clients in 100 countries, majority of the Forbes duo with technology founder and software manager Global 100, and strategic partnerships with service providers Internationality: Client contracts with more than 7,900 companies Sector 2 : Country: Computer Data Security Netherlands (EUR) Market cap 1 : EUR 5,360 mn Description: Market entry barriers: Global market leader in security solutions for mobile phones, debit & credit cards, passports, chip cards Market growth: Profiting from comprehensive security solution throughout the value chain, with 20-30% growth in H Payment transactions as the segment enjoying strongest growth. Management: Management with experience in acquisitions and stock market Internationality: 14,000 employees, active in 46 countries Sector 2 : Internet Security Currency: Japan (JPY) Market cap 1 : JPY 618,692 mn Description: Market entry barriers: Global market leader in server, cloud and content security for SMEs Market growth: Growth rates of 10% p.a. should be bolstered by cloud computing, as well as cooperation with corporate consultants Booz Allen Management: Successfully managed by founding duo for 25 years Internationality: Based in Tokyo, global branch network Sources: price data Bloomberg, as at Company outlooks Thomas Rappold, as at Historical data do not provide any indication of future developments. 1: Market capitalization on (Bloomberg) 2: Bloomberg Industry Classification Benchmark 3: At initial fixing (indicative) Slide 20
21 Key product data Cyber Security Performance Index B 21 Key product data VONCERT Open End VONCERT Open End SSPA product type Tracker certificate (1300) Underlying Solactive Cyber Security Performance Index Initial fixing / payment date 13 November 2015 / 20 November 2015 Maturity Open end Management fee 1.20% p.a. Issuer Vontobel Financial Products Ltd., DIFC Dubai (is not subject to any prudential supervision and has no rating) Guarantor Vontobel Holding AG, Zurich (Moody's A3) Currencies CHF USD Valor / symbol / ZSLAAV / ZSLACV Issue price CHF (CHF 1.50 front-load fee included) USD (USD 1.50 front-load fee included) VONCERT reference price CHF USD Termsheet Termsheet Termsheets with the legally binding information and other details can be downloaded at any time from All information is indicative and subject to change. Slide 21
22 Important information for investors Cyber Security Performance Index B 22 Significant risks for investors Economic crises and changes could have a detrimental impact on the shares underlying the participation certificate New technologies offer the potential of promising business models, but also entail risks. This can lead to corresponding share price volatility. New competitors could engage the established firms in the index in a fight for market share Issuer risk Currency risk No capital protection Termsheets with the legally binding information and other details can be downloaded at any time from All information is indicative and subject to change. Slide 22
23 Contents C 23 D Summary 23 Investment case & index concept Slide 23
24 Summary C 24 Investment case & index concept Investment case Cyber Security - a major trend in digital technology Massive rise in cyber attacks Mounting number of regulatory rules and requirements regarding data protection and security Increasing security awareness leading to rise in capital spending on cyber security Cyber security is even becoming fundamental for long-term success or survival. Affinity for forming monopolies allows companies to enjoy high profit margins The global cyber-security market is set to reach a volume of USD 170 billion by 2020 with annual growth rates of 10% Index concept Cyber Security Performance Index The index tracks the performance of 12 companies with significant business activity in one of the cyber-security sub-segments. The companies have strong brand awareness, comprehensive patent protection and networks that add value. Their business models are unique and the services they offer are particularly attractive and boast corresponding market growth. Rules-based and transparent index Slide 24
25 Legal Notice This publication is for information purposes only and does not represent an investment recommendation or advice and contains neither an offer nor an invitation to make an offer. It does not replace the qualified advice necessary before any purchase decision, in particular as regards all associated risks. This publication was drawn up by our Financial Products & Distribution organizational unit, and is not the result of financial analysis. The Directives on the Independence of Financial Research issued by the Swiss Bankers Association do not apply to this publication. Any content in this publication originating from other organizational units at Vontobel or third parties are marked as such with reference to the source. The legally applicable product documentation (listing prospectus) consists of the definitive term sheet with the final terms and the issue programme registered with SIX Swiss Exchange. These documents and the brochure Special Risks in Securities Trading may be obtained free of charge at or from Bank Vontobel AG, Financial Products, CH-8022 Zurich (Tel. +41 (0) ). Past performance must not be taken as an indication or guarantee of future performance. Structured products are not regarded as collective investment schemes within the meaning of the Federal Act on Collective Investment Schemes (CISA), and are therefore not subject to the approval or supervision of the Swiss Financial Market Supervisory Authority FINMA. The value of structured products may depend not only on the performance of the underlying, but also on the creditworthiness of the issuer. The investor is exposed to the risk of the issuer / guarantor defaulting. This publication and the financial products outlined therein are not intended for persons subject to a jurisdiction which limits or prohibits the sale of financial products or the dissemination of this publication and/or the information contained therein. All information is provided without a guarantee. October 2015 Bank Vontobel AG. All rights reserved. Page 26
26 Page 27
Tracker Certificate on Solactive Cloud Computing Performance-Index
BRANDSCHENKESTRASSE 90, CH-8002 ZÜRICH +41 58 800 1111 [email protected] WWW.EFGFP.COM Final Termsheet Participation-Products SSPA Product Type: 1300 Tracker Certificate on Solactive Cloud Computing
Product information Issuer Bank Vontobel AG, Zurich (Standard & Poor's A+; Moody's A1)
Termsheet (Final Terms) SPRINTER OPEN END +41 (0)58 283 78 88 or www.derinet.ch SSPA-DESIGNATION: KNOCK-OUT WARRANT OPEN END (2299) Put - Sprinter Open End Credit Suisse Group AG PRODUCT DESCRIPTION Sprinter
Methodology Overview
BRC Best Picks Methodology Overview May 2016 This structured products referenced do not constitute a participation in a collective investment scheme within the meaning of the Swiss Federal Act on Collective
A Closer Look At The Second Largest Cybersecurity M&A Transaction In History
1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat
JB Call Warrants with cash settlement on CHF 3M LIBOR / SFCPD
15 October 2013 Structured Products Tel: +41 (0) 58 888 8181 E-Mail: [email protected] Internet: derivatives.juliusbaer.com Term Sheet and Final Terms { JB Call Warrants with cash settlement on
Cyber security. ETFS ISE Cyber Security GO UCITS ETF. Investing in a safer digital future
Cyber security Investing in a safer digital future About the index The ISE Cyber Security UCITS Index Net Total Return utilises a rules-based investment methodology to select a diverse group of companies
Credit Suisse Structured Products
16 June 2016 All terms and conditions are indicative and will be confirmed until the Issue Date, if and when issued. Indicative Selected Key Parameters Telephone Contact: +41 (0)44 335 76 00 Conversations
Tracker Certificate on Amazon, Apple, Google and Twitter Composite CHF Bullish
Final Termsheet Public Offering: CH Participation Products SSPA Product Type: 1300 Tracker Certificate on Amazon, Apple, Google and Twitter Composite CHF Bullish Final Fixing Date 10/03/2017; issued in
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
«Structured products with reference bonds» Active management of debtor risk in portfolios. Vontobel Investment Banking
«Structured products with reference bonds» Active management of debtor risk in portfolios Vontobel Investment Banking Table of contents 04 A new dimension in structured products with reference bonds What
JB Tracker Certificate on the Cybersecurity Basket
Header First Page Key Information 9 June 2015 SSPA Swiss Derivative Map / EUSIPA Derivative Map Tracker Certificate (1300) JB Tracker Certificate on the Cybersecurity Basket (the "Products") Participation
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
The First Decade: 1999-2009. Dow Jones Sustainability Indexes
The First Decade: 1999-2009 Dow Jones Sustainability Indexes The first decade Since 1999, a growing number of investors have started identifying sustainability issues as key factors for financial success.
Product information Bank Vontobel AG, Zürich (Moody's Counterparty Risk Assessment A2 (cr))
Termsheet (Final Terms) SPRINTER OPEN END +41 (0)58 283 78 88 or www.derinet.ch SSPA DESIGNATION: WARRANT WITH KNOCK-OUT (2200) Put - Sprinter Open End Dow Jones Industrial Average PRODUCT DESCRIPTION
Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
8.50% p.a. Barrier Reverse Convertible on Twitter
Indicative Termsheet as of 27/11/2015 Product in Subscription until 04/12/2015 14.00 CET Public Offering: CH Yield-Enhancement Products SSPA Product Type: 1230 Swiss Withholding Tax 8.50% p.a. Barrier
Tracker Certificate on the Best of Volatility Index
Final Termsheet Public Offering: CH Participation-Products SSPA Product Type: 1300 Tracker Certificate on the Best of Volatility Index Bullish Open-end; issued in CHF; not listed Investors should read
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
Credit Suisse Structured Products
24 August 2015 Fixed Terms Selected Key Parameters Telephone Contact: +41 (0)44 335 76 00 Conversations on this line are recorded. We will assume your consent. Credit Suisse Structured Products 4.00% p.a.
Collateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
Floating Rate Reverse Convertible on CHF 30Y Swap CHF Libor 3m + 2.20% p.a. Coupon 50.00% Strike
Final Termsheet Public Offering: CH Yield-Enhancement Products SSPA Product Type: 1220 Floating Rate Reverse Convertible on CHF 30Y Swap CHF Libor 3m + 2.20% p.a. Coupon 50.00% Strike Final Fixing Date
The Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
How To Get A Germany Gold Mine Certificate On A Gilmore Mine Certificate
Indicative Termsheet as of 02/09/2015 Public Offering: CH Participation Products SSPA Product Type: 1340 Swiss Withholding Tax Twin-Win Certificate on Glencore Continuous Barrier Observation Autocallable
3 Year Note Linked To WTI Crude Oil Simplified Prospectus, 15 August 2013
1 PRODUCT DESCRIPTION This 3 Year Note / is a USD denominated Note linked to WTI Crude Oil (the Underlying ) (the Note ). The Note offers the investor quarterly Coupons linked to the 3M USD Libor rate
JB 90% Capital Protection Certificate with Participation on EOG Resources, Wells Fargo, Gilead Sciences
Header First Page Key Information 6 May 2015 SSPA Swiss Derivative Map / EUSIPA Derivative Map Capital Protection Certificate with Participation (1100) JB 90% Capital Protection Certificate with Participation
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
ADDENDUM I REASONS FOR THIS ADDENDUM:
ADDENDUM I to the Programme of Leonteq Securities AG dated 5 October 2013 (the "Programme") regarding Triparty Collateral Management Secured Structured Products (TCM) REASONS FOR THIS ADDENDUM: Under the
6.00% p.a. Multi Barrier Reverse Convertible on Geberit, Swatch, Zurich Insurance Continuous Multi Barrier Observation Callable
Indicative Termsheet as of 30/10/2015 Public Offering: CH Yield-Enhancement Products SSPA Product Type: 1230 Swiss Withholding Tax 6.00% p.a. Multi Barrier Reverse Convertible on Geberit, Swatch, Zurich
Common Data Breach Threats Facing Financial Institutions
Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported
Global Cyber Security Market Forecast and Opportunities, 2020
Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast
Floored Floater with a Reference Bond (VALE) 100.00% Contingent Capital Protection - Credit Risk of Reference Bond Issuer - 3.30% p.a.
Indicative Termsheet as of 05/01/2015 Floored Floater with a Reference Bond (VALE) 100.00% Contingent Capital Protection - Credit Risk of Reference Bond Issuer - 3.30% p.a. Minimum Coupon Final Fixing
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
PureFunds ISE Cyber Security ETF (the Fund ) June 18, 2015. Supplement to the Summary Prospectus dated November 7, 2014
PureFunds ISE Cyber Security ETF (the Fund ) June 18, 2015 Supplement to the Summary Prospectus dated November 7, 2014 Effective immediately, Ernesto Tong, CFA, Managing Director of Penserra Capital Management,
VMware Cloud Adoption Study
VMware Cloud Adoption Study Executive Summary May 2012 Contents About the research 3 Objectives 4 Overview 4 Key Findings 5 European enterprises to spend a third of IT budgets this year on cloud computing,
10.00% p.a. JB Multi Barrier Reverse Convertible (59%) on Julius Baer, Credit Suisse, UBS (the "Products")
Key Information 19 May 2016 SSPA Swiss Derivative Map / EUSIPA Derivative Map Barrier Reverse Convertible (1230) 10.00% p.a. JB Multi Barrier Reverse Convertible (59%) on Julius Baer, Credit Suisse, UBS
7.00% p.a. Multi Barrier Reverse Convertible on Nestlé, Novartis, Roche Continuous Multi Barrier Observation
Indicative Termsheet as of 04/01/2016 Public Offering: CH Yield-Enhancement Products SSPA Product Type: 1230 Swiss Withholding Tax 7.00% p.a. Multi Barrier Reverse Convertible on Nestlé, Novartis, Roche
5.40% p.a. Multi Barrier Reverse Convertible on ABB, Novartis, Roche, Zurich Insurance Continuous Multi Barrier Observation Callable
Termsheet as of 05/01/2016 Public Offering: CH Yield-Enhancement Products SSPA Product Type: 1230 Swiss Withholding Tax 5.40% p.a. Multi Barrier Reverse Convertible on ABB, Novartis, Roche, Zurich Insurance
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing
Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn
Simplify Your Network Security with All-In-One Unified Threat Management
Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,
ZKB Silver ETF Exchange Traded Fund
ZKB Silver ETF Exchange Traded Fund Termsheet Non-hedged in CHF, EUR and USD and Currency hedged (against USD) in CHF and EUR With the option of payment in kind in silver Product features Unlike existing
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
JB Certificates and Warrants on Interest Rates in EUR, USD and CHF
JB Certificates and Warrants on Interest Rates in EUR, USD and CHF Efficient instruments to hedge bonds, mortgages and lombard loans against rising interest rates Zurich, 2013 Content Table Embedded risks
China Cloud Computing Industry Investment Report 2013
Contents 1 1.1 Definition of Cloud Computing 1 1.1.1 Definition 1 1.1.2 History 3 1.2 Research on Development Status of Cloud Computing Industry in China s Market 3 1.2.1 Policy Environment 5 1.2.2 Industrial
Julius Baer Actively Managed Certificate on JB Markets Equity Trading Ideas Basket
30 January 2008 Structured Products Phone: +41 (0) 58 888 8181 E-Mail: [email protected] Internet: derivatives.juliusbaer.com Term Sheet and Simplified Prospectus { Bank Julius Baer & Co. Ltd.
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Global Web Application Firewall Market 2015-2019
Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from
1.20% Credit Linked Note on LAFARGEHOLCIM LTD
Indicative Termsheet as of 26/01/2016 Product in Subscription until 12/02/2016 14.00 CET 1.20% Credit Linked Note on LAFARGEHOLCIM LTD 100.00% Conditional Capital Protection - Credit risk of Reference
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle
Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not
DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES
Diversify your wealth internationally
ab UBS Swiss Financial Advisers Diversify your wealth internationally UBS Swiss Financial Advisers offers US investors a safe, easy and tax-compliant way to diversify their assets abroad. Contents 3 Why
DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER
Financial Repression: A Driving Force for Mergers and Acquisitions?
Strategy / Investment Financial Repression: A Driving Force for Mergers and Acquisitions? International capital markets have seen a growing number of corporate mergers and acquisitions (M&A) over the past
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
Opportunities in Indian IT Security Market
Opportunities in Indian IT Security Market Disclaimer: All information contained in this report has been obtained from sources believed to be accurate by Gyan Research and Analytics (Gyan). While reasonable
Strategy Certificates Linked to Agriculture Strategy Basket Issued by UBS AG
Strategy Certificates Linked to Agriculture Strategy Basket Issued by UBS AG Cash settled SVSP Product Type: Tracker Certificates (1300) ; ISIN: CH0125701885 Increased by 200 000 Units to 500 000 Units
SMALL BUSINESS REPUTATION & THE CYBER RISK
SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to
COSI Collateral Secured Instruments
Swiss Exchange COSI Collateral Secured Instruments Investing with Minimum Issuer Risk Unique Collateral In principle, structured products are only available in the legal form of a bearer debenture. The
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
Turbo Call Warrant Linked to Goldman Sachs Issued by UBS AG, London Branch
Turbo Call Warrant Linked to Goldman Sachs Issued by UBS AG, London Branch Cash settled SVSP/EUSIPA Product Type: Knock-Out Warrants (2200) This Product does not represent a participation in any of the
Open End Turbo Put Warrant Linked to DAX Issued by UBS AG, London Branch
Open End Turbo Put Warrant Linked to DAX Issued by UBS AG, London Branch Cash settled SVSP/EUSIPA Product Type: Knock-Out Warrants (2200) This Product does not represent a participation in any of the collective
In addition, the Product can be early redeemed if the relevant conditions are met on any of the Autocall Observation Dates. Barrier Level (59.
Indicative Termsheet as of 06/12/2013 Public Offering: CH Yield-Enhancement Products SSPA Product Type: 1230 10.00% p.a. Multi Barrier Reverse Convertible on Baidu, China Life Insurance, China Railway
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Is your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
Diversify your wealth internationally
ab UBS Swiss Financial Advisers Diversify your wealth internationally UBS Swiss Financial Advisers offers US investors a safe, easy and tax-compliant way to diversify their assets abroad. Contents 3 Why
How To Protect Your Data From Theft
Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Capital Protection Certificate with Coupon on S&P 500 INDEX
Indicative Termsheet as of 11/11/2015 Public Offering: CH Capital Protection Products SSPA Product Type: 1199 Issuer Risk Swiss Withholding Tax Capital Protection Certificate with Coupon on S&P 500 INDEX
Monthly European ETF Market Trends SEPTEMBER 2015 in brief
LYXOR ETF BAROMETER OCTOBER 215 1 THIS DOCUMENT IS FOR THE E XCLUSIVE USE OF INVESTORS ACTING ON THEIR OWN ACCOUNT AND CATEGORIZED EITHER AS ELIGIBLE COUNTERPARTIES OR PROFESSIONAL CLIENTS WITHIN THE ME
SIZE DOESN T MATTER IN CYBERSECURITY
SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE TABLE OF CONTENTS SIZE DOESN T MATTER IN CYBERSPACE 03 SUMMARY 05 TOP REASONS WHY SMBS
