TEASER INVESTOR DECK 500k SEIS+EIS ROUND. In partnership with



Similar documents
The Cyber Threat Profiler

Smart cyber security for smart cities

the challenge our mission our advisors

SBL Integration, Capabilities, and Enablement in Defence

developing your potential Cyber Security Training

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

CYBER SECURITY TRAINING SAFE AND SECURE

GPG13 Protective Monitoring. Service Definition

DOBUS And SBL Cloud Services Brochure

For personal use only

BT Assure Threat Intelligence

Intelligent solutions developed for the healthcare sector

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Compliance Guide: ASD ISM OVERVIEW

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

REPORT. Next steps in cyber security

Secure by design: taking a strategic approach to cybersecurity

Cyber Risk Reduction: Why Automated Threat Verification is key

Managing Expectations

Australian Government Cyber Security Review

2011 Forrester Research, Inc. Reproduction Prohibited

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Assuria from ZeroDayLab

SANS Top 20 Critical Controls for Effective Cyber Defense

PSN Protective Monitoring. Service Definition

Securing and protecting the organization s most sensitive data

Italy. EY s Global Information Security Survey 2013

Northern Ireland Social Care Council. Job Description

Experience the Commitment IHP360 Insurer Hosted Pricing IHP 360 1

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

OPERA SOLUTIONS CAPABILITIES. ACH and Wire Fraud: advanced anomaly detection to find and stop costly attacks

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

GOOD PRACTICE GUIDE 13 (GPG13)

CONTINUOUS LOG MANAGEMENT & MONITORING

Nokia Networks. security you can rely on

DISRUPT REIMAGINE REINVENT YOUR BUSINESS

Cyber Security solutions

InfraStruxure TM Management Software

Digital Marketing Workshop

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

Full year results. Corero Network Security plc, the AIM network security company, announces its audited results for the year ended 31 December 2014.

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Ultracomms Cloud Solutions

HP Cyber Security Control Cyber Insight & Defence

CYBER SECURITY, A GROWING CIO PRIORITY

IBM QRadar as a Service

Corporate Security in 2016.

Service Definition Document

How To Help Your Business Succeed

Welcome to the Capital Markets Collaborative Network. PhD showcase and networking lunch. at the Great Hall, University of Ulster, Magee campus

SCADA Security Training

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

BlackStratus for Managed Service Providers

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Advanced Threat Protection with Dell SecureWorks Security Services

Key Steps Before Talking to Venture Capitalists

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Securing a Digital Economy

Job levelling solutions

IT Security Testing Services

ESKISP Conduct security testing, under supervision

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Securing the Nation: Creating cyber security, resilience and readiness

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

Deloitte Service Code: D-G6-L4-543 December 2014

Virtualized Security: The Next Generation of Consolidation

Vulnerability Management

Transcription:

TEASER INVESTOR DECK 500k SEIS+EIS ROUND In partnership with

Cyberlytic created Cyber Threat Profiler, a software solution that complements existing network security components to provide real-time risk assessment and prioritise security alerts.

STUART LAIDLAW, FOUNDER AND CEO Stuart has over 15 years experience in Government and Defence ICT. He has successfully managed bids and delivered projects with values in excess of 50M, across a range of IT services and technologies. He has also been part of the management team on several larger more complex bids, providing strategic direction and analysis, as well as input into technical and commercial propositions. Stuart has worked for a number of blue chip, global systems integrators as well as directly for the Ministry of Defence. ST. JOHN HAROLD, FOUNDER AND CTO As a CLAS (CESG Listed Advisor Scheme) Consultant, he provides Information Assurance (IA) advice to the public sector, specialising in Information Security (InfoSec) and Assurance. Codeveloper of HackEire, he is definitely one of the best Cyber Security Expert - Risk Assessments using Artificial Intelligence. STUART CHURCHILL, COO IT consultant, website designer, SEO service manager and project manager, he is able to effectively communicate and present to all levels including senior management and board level with experience managing a P&L business. Stuart is a specialist in Service delivery management, Customer services management, Project management and SEO & PPC Campaign management.

Recent activity proves existing traction thanks to influential partners.

Endorsement from the UK government Davis Cameron himself described Cyberlytic as one of the most promising company in the data security market. Several joint events with the UK government and the Ministry of Defense. Strong support from the Home Office The Home Office is thinking about using Cyberlytic to provide research and a proof of concept for automated cyber defense that, through advanced mathematical techniques, will determine an appropriate, context-driven automated response. Cyberlytic wins Global 2014 Tech trailblazer Award on the 30 th January 2015, and was also named runner up in the Security Trailblazer category, which was competed against more established security companies. Partner with Centre of Secure IT, Queen s University, Belfast CSIT's Information Security research and capability aims to innovate advances in cyber threat detection methods and algorithms and derive a new generation of real-time defensive technologies for the protection of infrastructures, users, services and e- businesses from financially, politically and socially incentivised cyber threats. Test Stage with Sopra-Steria Sopra-Steria will work with Cyberlytic to test and evaluate the product with the aim of further collaboration and partnership.

Cyberlytic benefits from a strong active political support.

Cyber Companies Roundtable in Downing Street 12 th January 2015 Stuart Laidlaw, Cyberlytic CEO, was invited to a roundtable discussion at No.10 Downing Street to discuss the issues facing early stage cyber security companies and how government can support them further. UK Government endorses Cyberlytic 16 th January 2015 The UK is already leading the way in cyber security and this government is committed to ensuring it continues to be a leader in this multi-billion dollar industry. That s why on this trip I m showcasing some of the leading UK cyber security companies including Cyberlytic from London who will have the chance to meet investors and build their business in the US, David Cameron. Cyberlytic part of UK trade delegation to Washington DC 27th January 2015 Cyberlytic was invited by the Prime Minister s office to join a business delegation to Washington DC on the 14th and 15th January 2015. Cyberlytic Wins Competition to Exhibit at Security and Policing 2015 3 rd February 2015 Cyberlytic will be exhibiting at this year s Security and Policing event. Cyber Connect UK has awarded Cyberlytic exhibition stand space in the newly created Cyber Zone, after winning a competition open to all UK startup cyber security companies.

A real challenge: the growth of cyber attacks and an increasing need to protect critical infrastructures.

The solution: Cyber Threat Profiler, an adaptive, expert learning and decision support tool.

FEATURES OF Cyber Threat Profiler SECURITY INTELLIGENCE Cyber Threat Profiler complements existing network security monitoring to provide real-time risk assessment. MACHINE LEARNING Cyber Threat Profiler applies a unique approach to analysing large volumes of pure attack data to determine and continually adapt to new threat profiles. EFFECTIVE DEFENCE Cyber Threat Profiler identifies and prioritises high-risk web-based cyber attacks. It also includes a module that effectively defends systems against the most common cyber attack. CYBERLYTIC ADAPTIVE RULESET TM Attacks on the live network are correlated against normalised attack data to determine the relative sophistication of the attack, as well as the likely capability and effectiveness of the attacker. RISK CONTEXT The Risk Context Module uniquely adds operational context specific to the organisation ensuring the most accurate InfoSec risk assessment is delivered in real-time.

A SCALABLE & CUSTOM SOLUTION

The benefits: 89% accuracy in detecting cyber attacks, significantly higher that other products.

BENEFITS OF Cyber Threat Profiler HIGHEST ACCURACY o Patented classification approach provides the most accurate attack detection available. o Machine learning continues to improve the accuracy of the toolset, meaning the risk of compromise will continue to be reduced over time. ATTACKS ARE PRIORITISED o Security alerts are immediately prioritised based on the risk of the attack. o Increased effectiveness of the security response team. BUSINESS RISK CONTEXT o Protect the most important assets of the company. o Proportional cyber defence through true recognition of InfoSec risk. EXPERT DECISION SUPPORT o Integrates with and enhances existing security management systems. o Proactive, intelligence led, adaptive ruleset eliminates false positive results. o Vendor agnostic. o Complements other security systems.

The market: the Global 47 Billion Cyber Security Market is rapidly moving toward the high growth proactive, automated security intelligence market.

A business model based on subscription pricing.

DESCRIPTION OF THE MODEL o Virtualised onsite software or hardware appliance combined with either onsite or offsite Cyberlytic Intelligence Platform. o Fees of 6k per month for Cyber Threat Profiler, including SQLIA threat module - 2k per per month for each additional module. o Multiple installations per customer. o Approximately 10k Cyber Threat Profiler install and initial setup. o Cost of Sale: estimated 10%. o Additional revenue: Customisation, Training.

CYBERLYTIC IS DEMONSTRATING GREAT PROGRESS

The investment: a 500k SEIS+EIS round for xx% of equity, which corresponds to a xx post-money valuation.

INVESTMENT ROADMAP Phase 3 Develop scalable platform, build additional threat modules, expand through partnerships 2016/2017 Phase 2 Go to Market - 2015 Phase 1 Build Product (Complete) Business Development - Match fund Invest Northern Ireland Grant Proven technology - Integrated solutions - Mature partnerships with global integrators

ALLOCATIONS OF THE FUNDS Other: 9% Support staff hires Property IT Product: 26% +4 Engineers Retain & grow development team Commercial product enhancements Support product trials Deliver technology roadmap Professional Services: 9% Legal Patent protection Finance/accounting Invest NI grant: 17% Research team (Queen s Uni) Threat module development Productise MOD research Business Development: 20% +2 hires Travel, subsistence, entertainment Marketing: 14% +1 Hire FS trade associations & subscriptions Events and Exhibitions

BENEFITS FOR INVESTORS - EXIT EXIT STRATEGY + INVESTORS INCENTIVES

CONTACT DETAILS Cyberlytic - Stuart Laidlaw e: stuart.laidlaw@cyberlytic.com p: +44 (0)7912 527139 Crowd2Fund e: info@crowd2fund.com p: +44 (0)203 7355 669