Cybersecurity's Money Men

Size: px
Start display at page:

Download "Cybersecurity's Money Men"

Transcription

1 Amanda Jones About PR O F I L E S Cybersecurity's Money Men By Katie Benner Jan. 21, :01 AM PST 1/14

2 Mounting data and national security threats have transformed cybersecurity investing from a relative backwater into a robust field in which public offerings can provide a handsome return. Companies that predict when and where hackers will attack and ward them off including FireEye, Barracuda Networks, AVG, Proofpoint, Qualys and Palo Alto Networks went public within the last two years. There were 62 cybersecurity acquisitions or IPOs in 2013 and 99 in 2012, according to research firm CB Insights. But investing in cybersecurity companies, whose success can depend heavily on landing key government or corporate contracts, isn t for the uninitiated. The Information identified the grizzled veterans who have watched companies privacy and security needs grow over the last several years as attacks have become increasingly sophisticated and more publicized. A recent spate of data security breaches at retailers like Target and Neiman Marcus rattled consumers. The role of technology in national security is also being hotly debated publicly amid revelations of controversial National Security Agency data-collection programs. These investors have become go-to players for entrepreneurs on account of two traits. Many were operators of security companies themselves and have built ties with software giants like Cisco Systems, Intel and the financial services firms that need cutting-edge security. They have also forged relationships with the government agencies that are responsible for keeping the country safe, including the Department of Defense, the National Security Agency, the Department of Homeland Security and the Central Intelligence Agency. We interviewed entrepreneurs, software executives and sources with close ties to Washington to identify Silicon Valley s most influential cybersecurity investors. Most of them gave us their take on the industry and talked about investments and exits of note. A forthcoming second installment will look at prominent investors in Washington, angel investors and some up-and-comers. 2/14

3 Ted Schlein General partner, Kleiner Perkins Caufield & Byers Age: 49 Recent security investments: Shape Security, which makes software to defend against automated attacks; Ionic Security, a cloud and mobility security platform; Endgame, data analytics to anticipate attacks; Synack, crowdsourced security. Big exits: Mandiant, a cyber forensics firm, was sold to FireEye last December for more than $1 billion. 41st Parameter, a fraud detection company, was sold to Experian for $324 million last October. Percent of the fund currently in security, by value: Undisclosed Key Connections: Mr. Schlein serves on the board of In-Q-Tel, the venture capital arm of the Central Intelligence Agency. He s also on a board with Ex-National Security Agency director Lieutenant General Kenneth A. Minihan. Background: Mr. Schlein is regarded as one of Silicon Valley s most-influential cybersecurity investors. He began his career at Symantec in 1986, where he released the first commercial antivirus software. A decade later he joined Kleiner Perkins, where his first investment was Internet Security Systems, later acquired by IBM. He incubated a company called Fortify Software that was sold to Hewlett- Packard for $300 million in Boards: AlienVault, LifeLock, 41st Parameter, Synack and Mandiant. 3/14

4 Looking ahead: Mr. Schlein has watched companies get more proactive about cybersecurity. You re seeing the mental shift away from prevention to the idea that now everyone will be breached, he says. Breach monitoring and remediation software will be the new anti-virus. David Cowan Partner, Bessemer Venture Partners Age: 48 Recent security investments: IID, threat detection; ThreatTrack, targeted attack protection; Mojave Networks, cloud-based mobile security. Big exits: Qualys, a cloud security company that went public in 2012 and has a $919 million market capitalization, and LifeLock, an identity theft company that went public in 2012 and has a $1.7 billion market cap. Percent of the fund currently in security deals: 13% Key connections: Sits on boards with Tom Ridge, former secretary of Homeland Security, and Lt. General David Deptula, former deputy chief of staff for intelligence, surveillance and reconnaissance with the U.S. Air Force. Background: In 1995, Mr. Cowan co-founded Verisign, a spinout of security giant RSA. He tends to be an early investor and has put money to work in security play Tumbleweed, which went public in 1999 and later acquired two other Bessemer portfolio companies. 4/14

5 Boards: Postini, Cyota, Nominum, Endgame and Defense.net. Looking ahead: Mr. Cowan says he s worried that cybersecurity investing is getting more crowded and that there are talent shortages. I want to make investments in a brand new space at an early stage where there s less competition, he says. One idea he finds interesting is real-time intelligence sharing, where companies and governments pay to be part of an information exchange. Asheem Chandna Partner, Greylock Partners Age: 49 Recent security investments: SkyHigh Networks, cloud security and encryption. Big exits: Palo Alto Networks, a subscription security platform that includes advanced threat protection, went public in 2012 and now has a $4.6 billion market capitalization. Percent of the fund currently in security deals: 25% of enterprise deals Key connections: Shlomo Kramer, co-founder of Check Point Software and a prominent angel investor in security software; Alan Paller, founder of SANS Institute, a cybersecurity training school. Background: Mr. Chandna has a long operations résumé that includes stints at 5/14

6 Background: Mr. Chandna has a long operations résumé that includes stints at AT&T Bell Labs and Compuware. But it s his six-plus years at Check Point Software that have paid obvious career dividends. At Greylock he incubated Palo Alto Networks with his former colleague Nir Zuk, Check Point s co-founder and CTO. Boards: Palo Alto Networks Looking ahead: VCs aren t the only investors getting into the security space, according to Mr. Chandna. Lots of large corporations including General Electric, J.P. Morgan and Goldman Sachs are interested in investing in private companies, he says. Promod Haque Senior managing partner, Norwest Venture Partners Age: 65 Recent security investments: Apprity, cloud security Big exits: FireEye, which went public last September and has a $8.9 billion market capitalization, and 41st Parameter. Percent of the fund currently in security deals: 15% Key connections: He sits on boards with Robert Lentz, former chief information security officer at the Department of Defense, and Enrique Salem, ex-ceo of Symantec. Background: In 2005, Mr. Haque became one of the earliest investors in the anti- 6/14

7 Background: In 2005, Mr. Haque became one of the earliest investors in the antimalware company FireEye alongside Gaurav Garg, formerly of Sequoia Capital. That same year he made a first round investment in 41st Parameter. Norwest owns about 20 million shares of FireEye that are worth about $1.3 billion. Boards: Virtela, FireEye Looking ahead: Mr. Haque believes startups have an opportunity to displace the currently sprawled-out network of traditional security software vendors. Full platform security vendors are emerging, like FireEye and Palo Alto Networks, and platform will be the successful business models going forward. Michael Biggee and Alberto Yepez Managing directors, Trident Capital Ages: Mr. Biggee, 37; Mr. Yepez, 54 Recent investments: AlienVault, all-in-one security solutions; Mocana, mobile app security. Big exits: Solera, a security analytics and forensics company that was sold to Blue Coat Systems last May, and Qualys. Percent of the current fund in security deals: More than 25% Key connections: They serve on boards with General Peter Pace, former chairman of the Joint Chiefs of Staff, and Howard Schmidt, former White House cyber coordinator. 7/14

8 Background: Mr. Biggee, a former Merrill Lynch banker, joined in 2005 to help Trident expand in security investing. The firm has made nine security investments and had six exits since he joined. He s on the board of Voltage Security and was on the board of Arxan Technologies. Mr. Yepez spent 10 years at Apple, where his roles included manager of the Mac technology group and the enterprise systems division. He spent two and a half years building Oracle s security and identity business and was an angel investor in Securent, a data security company acquired by Cisco. He joined Trident in Boards: AlienVault, Mocana and Neohapsis. Looking ahead: The increased importance placed on IT security means that businesses are hunting for more board directors with security experience. Just as companies began to seek out CFOs that understood Sarbanes-Oxley, global corporations are going to add cybersecurity expertise at the board level to deal with threats and liability, Mr. Yepez says. Gaurav Garg Co-founder and managing director, Wing Venture Partners Age: 48 Recent security investments: Apprity, Shape Security and Synack. Big exits: FireEye. Percent of the fund currently in security deals: 35% 8/14

9 Key connections: He sits on boards with Sumit Agarwal, a former deputy assistant secretary at the Department of Defense, and former NSA official Robert Lentz. Background: Among his earliest cybersecurity investments was NetScaler in 2003 while he worked for Sequoia Capital. Citrix Systems bought the company for $325 million in Mr. Garg championed Sequoia s investment in FireEye in In 2008, he led Sequoia s investment in MobileIron, which provides mobile management and security solutions. Boards: MobileIron, Shape Security. Looking ahead: Mr. Garg says that the evolution in security systems will drive large amounts of corporate spending. "This decade, we'll continue to witness the breakneck movement of security infrastructure from behind the walls of the enterprise, he says. In lockstep, massive budgets will shift." Bob Ackerman Managing director and founder, Allegis Capital Age: 57 Recent security investments: Bracket Computing, cloud security; Shape Security and Synack. Big exit: IronPort Systems, which protects organizations against spam, viruses and malware. Cisco acquired it in 2007 for $830 million. Percent of the fund currently in security deals: 25% 9/14

10 Key connections: Was an advisor with the Defense Department s Defense Venture Catalyst Initiative. Venture capitalists serve two-year stints with the program and identify companies and technology that could be useful to the agency. Background: Mr. Ackerman has long put money to work in privacy and security. His first foray into the space was in 1999 with a seed investment in the privacy software company Privada. In 2006 he worked with Advanced Technology Ventures to fund Apprion, a provider of secure wireless communications infrastructure. He was also an early investor in and director of Solera Networks, which was sold to Blue Coat Systems last May. Boards: Apprion Looking ahead: CPU speeds, network speeds and storage availability have long placed limits on what we can and can t do in technology, Mr. Ackerman says. Cybersecurity is now the fourth determinant. Venky Ganesan Managing director, Menlo Ventures Age: 40 Recent security investments: BitSight, data analysis to identify and quantify security risk. Big exits: Palo Alto Networks. Percent of the fund currently in security deals: 15% 10/14

11 Key connections: As a member of the National Venture Capital Association s board, he works with venture industry lobbyists and regulators. Background: Before joining Menlo Ventures last year, Mr. Ganesan invested in security-related companies during a 14-year stint at Globespan Capital Partners. There he invested in Palo Alto Networks and he worked on a 2004 investment in Q1 Labs, which was acquired by International Business Machines. Before he was an investor, Mr. Ganesan co-founded and sold Trigo, a software company for manufacturers and distributors, and forged deep ties with strategic acquirers. IBM, Oracle, NetApp, Google and Cisco have all bought or invested in his portfolio companies. Looking ahead: He thinks companies will face pressure to beef up on cybersecurity because consumers and corporations won t want to do business with them if they are vulnerable to attacks. Jim Goetz General partner, Sequoia Capital Age: 48 Recent security investments: SkyHigh Networks. Big exits: Barracuda Networks, a cloud security company that went public last November and has a $1.8 billion market cap, and Palo Alto Networks. Percent of the fund currently in security, by value: 10% 11/14

12 Key Connections: Mr. Goetz is a board member alongside William Jenkins, an ex- EMC executive, and Mark McLaughlin, the former CEO of Verisign who served on President Barack Obama s National Security Telecommunications Advisory Committee. Background: Sequoia has been active in the cybersecurity space for decades, making investments in hot names like Bit9 and Blue Coat. Since joining in 2004, Mr. Goetz was involved in important deals including Palo Alto Networks and Barracuda Networks. Boards: Palo Alto Networks and Barracuda Networks. Looking ahead: The threat that Mr. Goetz finds most alarming is the proliferation of government-sponsored cyber attacks, and he s looking at next-generation firewalls that can defend against increasingly sophisticated offensives. Venky Ganesan works at Menlo Ventures. An earlier version of this story incorrectly said that he works at Menlo Venture Capital. RECENT ARTICLES 12/14

13 PR O F I L E S Cybersecurity's Money Men By Katie Benner Jan. 21, 2014 In Washington, Anarchist Bitcoin Puts on a Tie By Eric P. Newcomer Jan. 20, 2014 B Y T H E N UMB E R S Software Engineers: The Scorecard By Eric P. Newcomer Jan. 17, /14

14 The Information is a subscription publication for professionals who need the inside scoop on technology news and trends. We focus on the stories that drive conversations and help our subscribers get ahead. Terms, Privacy, Payment Policy 14/14

OurCrowd Startup Investing Guide: Cybersecurity

OurCrowd Startup Investing Guide: Cybersecurity OurCrowd Startup Investing Guide: Cybersecurity About OurCrowd: OurCrowd is the leading online venture capital platform for accredited investors who wish to invest in Israeli and global startup companies.

More information

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History 1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat

More information

Why Are Investors Excited About Cyber Security Startups, Again?

Why Are Investors Excited About Cyber Security Startups, Again? Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial

More information

Q3 2013 Security & Risk Market Snapshot

Q3 2013 Security & Risk Market Snapshot Q3 2013 Security & Risk Market Snapshot Don More Managing Director [email protected] Eric Wagner Managing Director [email protected] Peter Gant Managing Director [email protected] Matt Fiore

More information

Discover Security That s Highly Intelligent.

Discover Security That s Highly Intelligent. Discover Security That s Highly Intelligent. AlienVault delivers everything you need to detect, defend against, & respond to today s threats in minutes. About AlienVault Founded in 2007 and headquartered

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities

More information

Global Cyber Security Market Forecast and Opportunities, 2020

Global Cyber Security Market Forecast and Opportunities, 2020 Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast

More information

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with

More information

Predictive Cyber Defense A Strategic Thought Paper

Predictive Cyber Defense A Strategic Thought Paper Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data

More information

RETHINKING CYBER SECURITY

RETHINKING CYBER SECURITY RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

Government + Enterprise + Innovation + Strategy

Government + Enterprise + Innovation + Strategy Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything

More information

Seed Funding and Venture Capital Course Certificate Program. Greg Horowitt, Managing Director, T2 Venture Capital Kauffman Fellow, Class XV

Seed Funding and Venture Capital Course Certificate Program. Greg Horowitt, Managing Director, T2 Venture Capital Kauffman Fellow, Class XV Seed Funding and Venture Capital Course Certificate Program Greg Horowitt, Managing Director, T2 Venture Capital Kauffman Fellow, Class XV Overview Introduction to Venture Capital Instruction provided

More information

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. MAJOR FINANCIAL SERVICES LEADER Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. Automation and remote endpoint remediation reduce incident response (IR) times from 10 days to 5 hours.

More information

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary

Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary 2 Security Technology Vision 2016 Empowering Your Cyber Defenders to Enable Digital Trust Fighter

More information

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE ANALYST DAY STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE TRAVIS REESE, PRESIDENT, MANDIANT CONSULTING AND ISIGHT INTELLIGENCE COPYRIGHT 2016, FIREEYE, INC. ALL RIGHTS RESERVED. INTELLIGENCE- LED

More information

!!!Edge!Analytics!!!!!Selling!to!VCs!

!!!Edge!Analytics!!!!!Selling!to!VCs! EdgeAnalytics SellingtoVCs LouShipley In the fall of 2005, Larry Sharp has several decisions to make. After three months of intensive fund raising for his company Edge Analytics, Larry finally had a term

More information

MoneyTree Report Q1 2016. PricewaterhouseCoopers National Venture Capital Association. Data provided by Thomson Reuters

MoneyTree Report Q1 2016. PricewaterhouseCoopers National Venture Capital Association. Data provided by Thomson Reuters www.pwcmoneytree.com PricewaterhouseCoopers National Venture Capital Association MoneyTree Report Data provided by Thomson Reuters ata provided by Thomson uters Technology Institute April 216 The MoneyTree

More information

How Do Venture Capital Investors Add Value To Portfolio Companies?

How Do Venture Capital Investors Add Value To Portfolio Companies? This article first appeared in slightly modified form in Top Capital October 2007 Capital Investors Add by Joseph Chan Corporate & Securities Joseph Chan +86.21.63351128 [email protected] Joseph

More information

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

2014 Montana Government IT Conference. Securing Data Networks and People

2014 Montana Government IT Conference. Securing Data Networks and People Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

How To Understand And Manage Cybersecurity Risk

How To Understand And Manage Cybersecurity Risk White Paper A Framework to Gauge Cyber Defenses NIST s Cybersecurity Framework Helps Critical Infrastructure Owners to Cost-Effectively Defend National & Economic Security of the U.S. Executive Summary

More information

Brochure More information from http://www.researchandmarkets.com/reports/3301109/

Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

CGI Cyber Risk Advisory and Management Services for Insurers

CGI Cyber Risk Advisory and Management Services for Insurers CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their

More information

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity

More information

Unified Security Management and Open Threat Exchange

Unified Security Management and Open Threat Exchange 13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

California Gold: Cybersecurity's Emerging Epicenter

California Gold: Cybersecurity's Emerging Epicenter California Gold: Cybersecurity's Emerging Epicenter Amanda Fortner Editor 0 A Truth Universally Acknowledged That cybersecurity is a necessity for individuals, organizations, and governments across all

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan

More information

Business Intelligence and Analytics Platforms Market Map. Shea & Company

Business Intelligence and Analytics Platforms Market Map. Shea & Company Business Intelligence and Analytics Platforms Market Map Shea & Company Overview The BI analytics market is quickly moving to the 2.0 phase of its lifecycle which we believe will usher in a wave of investment

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

1-800-Flowers.com: Configuration Management, Security & Cloud Operations with Puppet Enterprise

1-800-Flowers.com: Configuration Management, Security & Cloud Operations with Puppet Enterprise 1-800-Flowers.com: Configuration Management, Security & Cloud Operations with Puppet Enterprise Industry Retail Challenge Achieve elasticity in the cloud to respond to peak seasonal demand. Achieve stability

More information

Cyber Security Risks for Banking Institutions.

Cyber Security Risks for Banking Institutions. Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions

More information

MoneyTree Report Q1 2015. PricewaterhouseCoopers National Venture Capital Association. Data provided by Thomson Reuters

MoneyTree Report Q1 2015. PricewaterhouseCoopers National Venture Capital Association. Data provided by Thomson Reuters www.pwcmoneytree.com PricewaterhouseCoopers National Venture Capital Association MoneyTree Report Data provided by Thomson Reuters Technology Institute May 215 The MoneyTree results are in! This special

More information

Making the Internet Business-Ready

Making the Internet Business-Ready Making the Internet Business-Ready If you ve ever shopped online, downloaded music, watched a web video or connected to work remotely, you ve probably used Akamai. Our solutions help to deliver the best

More information

Cyber Security Solutions:

Cyber Security Solutions: ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial

More information

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and

More information

Google & Facebook: Alliances with intelligence to make privacy obsolete. Matthaus Litteken CS 305

Google & Facebook: Alliances with intelligence to make privacy obsolete. Matthaus Litteken CS 305 Google & Facebook: Alliances with intelligence to make privacy obsolete Matthaus Litteken CS 305 Google Ties To CIA Robert David Steele - Google took money from the CIA when it was poor and it was starting

More information

Protection Against Advanced Persistent Threats

Protection Against Advanced Persistent Threats Protection Against Advanced Persistent Threats Peter Mesjar Systems Engineer, CCIE 17428 October 2014 Agenda Modern Threats Advanced Malware Protection Solution Why Cisco? Cisco Public 2 The Problem are

More information

IBM. RiskIQ. Symantec. Bastille. Sponsor Level. Vendor and Sponsor Descriptions (Listed by Level by Alpha) Platinum. Platinum. Platinum.

IBM. RiskIQ. Symantec. Bastille. Sponsor Level. Vendor and Sponsor Descriptions (Listed by Level by Alpha) Platinum. Platinum. Platinum. IBM Platinum IBM is one of the world's largest information technology companies with over 100 years of leadership in helping institutions innovate. As a recognized security leader, we help protect clients

More information

CASE STUDY. Expansion-Stage Intel-ligence:

CASE STUDY. Expansion-Stage Intel-ligence: CASE STUDY Expansion-Stage Intel-ligence: Exploring the two-year partnership between API management provider Mashery and OpenView Venture Partners that ultimately led to its acquisition by an industry

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

the challenge our mission our advisors

the challenge our mission our advisors corporate overview the challenge Organizations are spending billions of dollars a year on security products, however recent security breaches have proven that the traditional security solutions are not

More information

Security and Privacy

Security and Privacy Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices

More information

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It

More information

Securing Cloud-Based Email

Securing Cloud-Based Email White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures

More information

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly

More information

Attribution: The Holy Grail or Waste of Time? Billy Leonard Google Should this be the end, our Holy Grail? How s that picture going to help you now? But, the pictures make me safer! We can do better. Our

More information

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3 GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

12 Security Camera System Best Practices - Cyber Safe

12 Security Camera System Best Practices - Cyber Safe 12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Splunk: Using Big Data for Cybersecurity

Splunk: Using Big Data for Cybersecurity Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals

More information