BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION



Similar documents
Middle Class Economics: Cybersecurity Updated August 7, 2015

An Overview of Large US Military Cybersecurity Organizations

NICE and Framework Overview

Cybersecurity: Mission integration to protect your assets

How To Write A National Cybersecurity Act

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Cybersecurity Delivering Confidence in the Cyber Domain

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

Lessons from Defending Cyberspace

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Into the cybersecurity breach

Strategic Plan September 2012

Protecting against cyber threats and security breaches

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

GEARS Cyber-Security Services

Preventing and Defending Against Cyber Attacks June 2011

Developing a Mature Security Operations Center

Data Analytics & Information Security

The Comprehensive National Cybersecurity Initiative

PUBLIC SAFETY CYBER SECURITY

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

National Initiative for Cyber Security Education

Cybersecurity Strategic Talent Management. March, 2012

DoD Strategy for Defending Networks, Systems, and Data

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

TUSKEGEE CYBER SECURITY PATH FORWARD

CYBER SECURITY GUIDANCE


Homeland Open Security Technology HOST Program

Cyber R &D Research Roundtable

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Persistence Mechanisms as Indicators of Compromise

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Some Thoughts on the Future of Cyber-security

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Cybersecurity y Managing g the Risks

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through trust

September 24, Mr. Hogan and Ms. Newton:

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Manned Information Security

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Preventing and Defending Against Cyber Attacks November 2010

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Cyber-Security. FAS Annual Conference September 12, 2014

Cyber Watch. Written by Peter Buxbaum

WRITTEN TESTIMONY OF

National Initiative for Cybersecurity Education

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Data Breach Response Planning: Laying the Right Foundation

Northrop Grumman Cybersecurity Research Consortium

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

Cybersecurity. Are you prepared?

Working with the FBI

Fast Facts About The Cyber Security Job Market

Practical Threat Intelligence. with Bromium LAVA

The Next Generation Security Operations Center

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Using SIEM for Real- Time Threat Detection

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cybersecurity Enhancement Account. FY 2017 President s Budget

20+ At risk and unready in an interconnected world

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

How To Protect Your Data From Being Hacked

How To Create An Insight Analysis For Cyber Security

Transcription:

BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION

The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and defend against emerging cybersecurity threats. 2

OUR LIST OF CYBERSECURITY SERVICES MITIGATE YOUR RISK Training and Certification Threat Consulting Innovative Learning Platform Risk Management Assessment Cyber Curriculum Development Cyber War Games 3

FOUR IMPORTANT FACTS ABOUT US MITIGATE YOUR RISK FOUNDED IN 2014 EXPERTS BRAIN SCIENCE GLOBAL REACH Employee owned-senior Corporate and Military leaders The best cybersecurity experts and top executive talent from the training and certification industry. The most innovative learning platform available today to ensure skill learning AND retention Significant global business acumen and network 4

OFFICE LOCATIONS WE VE GOT YOU COVERED! With offices in California, Colorado, Texas and Virginia, we can deploy quickly to provide a top quality solution for your organization. 5

KNOW THE THREAT MITIGATE YOUR RISK Evolving Technologies Big Data Challenges New Vulnerabilities New Threats and Threat Detection Capabilities New Attacker Tactics Nation-State Cyberwar Escalation Forecasting Cyberthreats 6

CYBER THREATS TO BUSINESS THREAT ONE THREAT THREE FINANCIAL VALUE Companies must be willing to spend to eradicate the threat. It is more costly to do nothing! FINANCIAL VALUE Value continues to migrate online. Data is increasingly becoming more pervasive. THREAT TWO THREAT FOUR SUPPLY CHAIN SUPPLY CHAIN BAD ACTORS BAD ACTORS Supply chains today are increasingly interconnected. Bad actors are becoming more sophisticated. 7

OUR LEARNING METHODOLOGY AMPLIFIRE - A REVOLUTIONARY NEW PRODUCT The amplifire learning engine combines brain science research and big- data analytics within a powerful technology platform designed to help users of all types quickly learn the information they need to know, remember it long term and accurately recall it when it counts on tests, in class and on the job. CLICK THE PICTURE TO PLAY A SHORT VIDEO 8

AMPLIFIRE LEARNER STATISTICS A PRODUCT BY KNOWLEDGEFACTOR Average of 20% high- risk liability misinformation identified More than 95% subject matter mastery Up to 79% knowledge retention after 12 months 50-75% reduction in time to proficiency ANALYTICS: BCSI learning software is the only solution on the market that leverages profound brain science to systematically deliver dramatically enhanced learning outcomes. With amplifire, learners will acquire more information faster, remember it longer and recall it far more effectively than with traditional learning methods. 9

CERTIFICATION TRAINING TRAINING AND ORGANIZATIONAL CONSULTING IN CONCERT WITH THE NICE STANDARD DEPLOYED BY DHS, NIST AND DOD. OVERSIGHT AND DEVELOPMENT SECURELY PROVISION INVESTIGATE OPERATE AND MAINTAIN COLLECT AND OPERATE PROTECT AND DEFEND ANALYZE 10

CYBER WAR GAMES USING A REAL-WORLD CYBER SCENARIO EXPLORE ANALYZE SENIOR LEADER DECISION MAKING CORPORATE CYBERSECURITY STRATEGY VALIDATE CREATE EXTRACT CURRENT THREAT STRATEGIES SENIOR LEADER LESSONS LEARNED DECISION MAKING TO GUIDE TRAINING PROCESSES 11

TRAINING NEEDS ASSESSMENT WE WILL START YOU IN THE RIGHT PLACE CYBERSECURITY ASSESSMENT PERFORMANCE ANALYSIS START CYBER DEFENSE ASSESSMENT DATA ANALYTICS END 12

RISK MANAGEMENT ASSESSMENT Information Asset Risk Risk Mitigation Program Development Annual Vulnerability Assessments Risk Assessment and Evaluation Cyberthreat Vulnerabilities 13

INCIDENT RESPONSE ASSESSMENT INCIDENT RESPONSE TRAINING SCENARIO AND EXERCISE DEVELOPMENT PLANNING AND PREPARATION FORENSIC ANALYSIS INCIDENT RESPONSE PROGRAMS POST-INCIDENT RESPONSE 14

CYBER MISSION ANALYSIS EMERGING THREAT ANALYSIS THREATS ATTACKS ATTACKS AND RESPONSES NEW THREAT PARADIGMS PARADIGMS VULNERABILITIES VULNERABILITIES AND ASSESSMENTS TECHNICAL, POLITICAL AND SOCIAL TRIGGERS TRIGGERS VICTIMS VICTIMS AND PERPETRATORS 15

THE BCSi DIFFERENCE Proven Performance Financial Stability Expert Infrastructure Optimized HR Process Successful prime performance on multiple projects. Extensive network of large and small business partners to assemble successful teams for sustaining the life of any effort. Financially sound and stable company. Committed to serving government, industry, and academia clients. Effective at administering complex government contracts. Extensive experience with cost type contracts Maintain excellent customer relationships. Proven ability to put the right staff in the right locations and keep them satisfying customer requirements without compromising quality and excellence. 16

FEATURED CLIENTS USCYBERCOM UNITED STATES AIRFORCE ACADEMY NATIONAL SECURITY AGENCY OFFICE OF THE UNDERSECRETARY FOR INTELLIGENCE (O/USDI) AMERICAN AIRLINES JMARK SERVICES IRON NET DEPARTMENT OF HOMELAND SECURITY USSTRATCOM VALDEZ INTERNATIONAL VISION PURPLE KNOWLEDGEFACTOR PARACENTRIC SECURITY AND CONSULTING 17

BlacKnight Cyber Security international Main Location 1490 Garden of the Gods Rd. Suite A Colorado Springs, CO 80907 Our Phone 719.599.1370 719.599.1340 (fax) Email / Website info@blacknightcyber.com www.blacknightcyber.com