SlideShare ist ein Scribd-Unternehmen logo
1 von 24
An Offering from Transformationplus
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Our Why That Drives Our What
We are a company which
harnesses the digital disruption
to
develop products &
services that make life
simple.
Our Vision
iSecureCyber is innovated by Transformationplus,
which is a product innovation company.
iSecureCyber realises small and medium organisations
face several challenges when identifying, classifying,
monitoring and mitigating cyber risk.
iSecureCyber enables easy management of cyber risks
using end to end automation, built-in intelligence and
integration with other cyber security products.
Company Overview
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
The Problem
70% of SMBs would experience increased
cyber attacks owing to lack of knowledge
on how to protect their organization from
these attacks
55% of SMBs lack in budget planning on
cybersecurity.
80% of Australian SMBs are estimated to
go bankrupt within 12 months owing to
cyber attacks
Source: NSW Business Chamber
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
A one stop cloud platform that automates
the work of a cyber officer
1. Developed to be easily operated by the
nontechnical novice user.
2. End to End (E2E) automation provides
‘implement and forget’ functionality.
3. Integrates with different cyber and non
cyber products to provide holistic and
meaningful insights to defend against
cyber attacks.
4. Designed specifically to address Small
& Medium Business’s Cyber Risk
Our Solution
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Catered towards SMBs that lack cybersecurity
expertise and budget, iSecureCyber has the
built-in intelligence to automatically implement
complex decisions thereby negating the needs
of expert professionals
Modelled on the basis of the industry backed
data, iSecureCyber has a robust Cyber Early
Warning System (CEWS) as an alert mechanism
to indicate the probable cyber attacks
Easy to use Cyber Handbook (CHB) providing
step - by - step info to improve on the maturity
level of cyber resilience with an 80% reduction in
efforts
Provides 100% of the value at 30% of the cost.
Source: NSW Business Chamber
How iSecureCyber
solves the problem
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Base
Supply chain
security
Interim
Cyber certification
management
Advanced
Centralised cyber
platform
Futuristic
Travel cyber
security
Giant leap
Cyber automation
hub
Our Roadmap
August
2020
launched
March
2021
July
2021
December
2021
December
2022
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Arvinth Kumar
Cyber Associate Consultant
Qualified CCNA professional
with compliance and standards
skilled such as ISO27001 and
CPS234
Gokul Srinivasan
PRABIR SAHA
Founder & Executive
Director
A successful entrepreneur
with more than 25 years of
experience in leading large
profitable cohort for disruptive
technologies, automation and
innovation, who then are
creating the next generation
solutions for his customers.
Prakash
Balasubramanian
William McClure
Head of Threat Intelligence
Experienced IT professional with
extensive experience in
infrastructure/support and
security
Chief Product Owner &
Co-founder
Cybersecurity expert certified in
CISSP,CISM,CISA,
CEH,CRISC and having 15
years of industrial experience
Chief Technical Officer
Founder of a software company
(Axel IT) and over 15 years of
experience in developing and
enhancing technology for
businesses
Our Team
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Our Business Model
Five Minutes Onboarding
Choose Subscription Type
Complete Trial
Click for Trial
5
Payment
We have a very simple
Software as a Service
business model with instant
onboarding through our
website and leveraging on our
partner networks. Its simplicity
and scalability help us to built
good customer relationships.
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Delighters
Basic
Satisfiers
Basic
This is a sample
text.
Insert your desired
text here.
Delighters
One platform that SMB’s need
to use. No Extras and No BIG
$$$. Your Cyber Defense in
your hand!
Mandatory Characteristics
iSecureCyber can be
customized & implemented
across SMB's
Basic
Expected characteristics of a
Cybersecurity management
is available within
iSecureCyber
Satisfaction
Functionality
Kano Model Analysis
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
iSecureCyber enables effective and
automated identification of cyber risk
1. Dashboard catering to the senior management
3. Separate instances for Australia, Europe, US
and India
4. PHP and Angular JS stack providing stability,
functionality and simplistic UI design
2. Hosted on AWS
Our Product
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Maintain compliance with
regulations and standards
1
2
3
4
Centralized, simplified and effective
management of cybersecurity
Ability to showcase
cybersecurity maturity as a
selling point to clients
Achieve and maintain cyber
security certifications (ISO27001,
SOC2-type 2) etc.
Value To Customers
REDUCE Cost &
Effort By 90%
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
“Simplicity of the product and
support from the Tplus team
have stood out.”
“iSecurecyber is at the leading
edge of how multiple parties will
share compliance information
going forward.”
“Team managed to
demonstrate their flexibility,
work ethics and the icing on
the cake is the ease of use of
their iSecureCyber.”
“We have used iSecurecyber
to attract other valuable
customers.”
“
”
“
”
Nick Gatland
COO & CRO at
Locii
Rakesh Routhu
Co-Founder & COO at
Aerologix
Testimonials from Early
Adopters
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Market Validation
(Impact of third-party risks)
37%
Damage to Reputation
30%
Poor customer
experiences
29%
Cost incurred for
remediation
43%
Loss of customer trust
42%
Loss of revenue
38%
Failure to Innovate/execute
strategy
Third-Party
breaches
Increased by
35% from
year 2017 to
2019
Source: A commissioned study conducted by Forrester Consulting on behalf of RSA, December 2019
https://www.darkreading.com/attacks-breaches/third-party-breaches---and-the-number-of-records-exposed---increased-sharply-in-2019/d/d-id/1337037
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
400 Million +
TAM
400 Million+
Total SMB’s worldwide
Total SMB’s in N America, Middle-east,
Europe and Asia Pacific
200M + SMB’s /$1 Trillion
Total target SMB’s
(20% of available market)
40M+ SMB’s/$240B
SAM
SOM
400M+ SMB’s + & $ 2 Trillion
Source: Australian small business and family enterprise
Connected small business US: Deloitte
Europe: No. of SMEs, Statista
Asia Pacific Economic Corporation
SME’s in Asia: Wonder Research
The Middle east Investment Initiative
National Action Plans on Business and Human Rights
Average per SMB= 6000$
Market Size
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Factors Responsible Are:
• Increase in stringent compliance
mandates.
• Lack of in-house competencies in the
organization.
• The rising instances of cyberattacks.
• Faster adoption by SMEs for TPRM
solutions. 2019 2022
3.2
Billion
USD
6.5
Billion
USD
3.2
Billion
USD
6.5
Billion
USD
Attractive Market Opportunities in TPRM
Source: https://www.marketsandmarkets.com/Market-Reports/third-party-risk-management-market-
222423768.html
* CAGR=Compound Annual Growth Rate
*TPRM=Third-Party Risk Management
Global Growth Estimation in
Market Size
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Role
Industries
C-level executive
Vice president
Director
All industries
Size of Business
Small
Medium
Large
* The bar graph denotes the number of targets for iSecureCyber in different size and roles in the businesses
Customer
Demographics
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Initial
Stage
• Content Marketing (Video)
• Digital Marketing
• POC
• SEO
• Referral Strategy
Growth
Stage
• Events and experiences
• Local sponsorships
• High-level partnerships
(ISACA, AISA)
• Outbound advertising
• Word-of-mouth referrals
Customers
Advocates
Visitors
Leads
Seekers
Customer Acquisition
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Third- party
Networks20%
Referrals
20%
Distribution
Channels
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
CompetitorsNicheLeaders
ExpensiveAffordable
Offers affordable and
easy to use third-party
vendor management
software
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Investment
Opportunity
We’re looking for (series A)- $5M in
funding, 40% of which will be spent on
operations, 40% on human resources,
and 20% on marketing. This will allow us
to generate $7.5M in revenue in the
next 48 months.
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Why Invest Now
Big Opportunity
Compelling Market Validation
Uncomplicated Business Model
Strong Scalability
Solid Team
1
2
3
4
5
Single product at 10% cost
Attractive market opportunities of 6.5 Billion USD
With five minutes onboarding
A diverse team with longstanding relations
Gross margin of 100% and virtually no COGS generated
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Contact Us
info@transformationplus.com
info@isecurecyber.com
0421 010 510
10 Penrose Street,
Marsden Park, NSW 2765,
Australia
Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus
Thank You
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. Marketing Team
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwayCisco Case Studies
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profileIrfan Ullah
 
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISORising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISOSamsung Business USA
 
Managing Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered EnterpriseManaging Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered EnterpriseDevOps.com
 
Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)Koushik Ramani
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityFlexera
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins FlexeraFlexera
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent BranchePlus
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Flexera
 
Nirnaya System & Solutions Pvt Ltd Company Profile
Nirnaya System & Solutions Pvt Ltd Company ProfileNirnaya System & Solutions Pvt Ltd Company Profile
Nirnaya System & Solutions Pvt Ltd Company ProfileArvind Kumar
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Ivanti
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged InfrastructureePlus
 

Was ist angesagt? (20)

HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen.
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISORising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
 
Managing Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered EnterpriseManaging Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered Enterprise
 
Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent Branch
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Nirnaya System & Solutions Pvt Ltd Company Profile
Nirnaya System & Solutions Pvt Ltd Company ProfileNirnaya System & Solutions Pvt Ltd Company Profile
Nirnaya System & Solutions Pvt Ltd Company Profile
 
Upgrade kit
Upgrade kitUpgrade kit
Upgrade kit
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme!
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged Infrastructure
 
Bauer
Bauer Bauer
Bauer
 

Ähnlich wie iSecureCyber (Long Pitch Deck)

Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterpriseaccenture
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Andreas M. Oswald
 
Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Josh Dathe
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimiLtd
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudGoogle
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summits
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Amer Zia
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Keynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayKeynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayPandu W Sastrowardoyo
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
CyberSecTeam Business Services
CyberSecTeam Business Services CyberSecTeam Business Services
CyberSecTeam Business Services Ettore Galluccio
 
Contemi Solutions - InsurTech Innovation Award 2022
Contemi Solutions - InsurTech Innovation Award 2022Contemi Solutions - InsurTech Innovation Award 2022
Contemi Solutions - InsurTech Innovation Award 2022The Digital Insurer
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersMerry D'souza
 

Ähnlich wie iSecureCyber (Long Pitch Deck) (20)

Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019
 
Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast Briefing
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Keynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayKeynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP Day
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
CyberSecTeam Business Services
CyberSecTeam Business Services CyberSecTeam Business Services
CyberSecTeam Business Services
 
Contemi Solutions - InsurTech Innovation Award 2022
Contemi Solutions - InsurTech Innovation Award 2022Contemi Solutions - InsurTech Innovation Award 2022
Contemi Solutions - InsurTech Innovation Award 2022
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

iSecureCyber (Long Pitch Deck)

  • 1. An Offering from Transformationplus
  • 2. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Our Why That Drives Our What We are a company which harnesses the digital disruption to develop products & services that make life simple. Our Vision
  • 3. iSecureCyber is innovated by Transformationplus, which is a product innovation company. iSecureCyber realises small and medium organisations face several challenges when identifying, classifying, monitoring and mitigating cyber risk. iSecureCyber enables easy management of cyber risks using end to end automation, built-in intelligence and integration with other cyber security products. Company Overview
  • 4. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus The Problem 70% of SMBs would experience increased cyber attacks owing to lack of knowledge on how to protect their organization from these attacks 55% of SMBs lack in budget planning on cybersecurity. 80% of Australian SMBs are estimated to go bankrupt within 12 months owing to cyber attacks Source: NSW Business Chamber
  • 5. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus A one stop cloud platform that automates the work of a cyber officer 1. Developed to be easily operated by the nontechnical novice user. 2. End to End (E2E) automation provides ‘implement and forget’ functionality. 3. Integrates with different cyber and non cyber products to provide holistic and meaningful insights to defend against cyber attacks. 4. Designed specifically to address Small & Medium Business’s Cyber Risk Our Solution
  • 6. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Catered towards SMBs that lack cybersecurity expertise and budget, iSecureCyber has the built-in intelligence to automatically implement complex decisions thereby negating the needs of expert professionals Modelled on the basis of the industry backed data, iSecureCyber has a robust Cyber Early Warning System (CEWS) as an alert mechanism to indicate the probable cyber attacks Easy to use Cyber Handbook (CHB) providing step - by - step info to improve on the maturity level of cyber resilience with an 80% reduction in efforts Provides 100% of the value at 30% of the cost. Source: NSW Business Chamber How iSecureCyber solves the problem
  • 7. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Base Supply chain security Interim Cyber certification management Advanced Centralised cyber platform Futuristic Travel cyber security Giant leap Cyber automation hub Our Roadmap August 2020 launched March 2021 July 2021 December 2021 December 2022
  • 8. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Arvinth Kumar Cyber Associate Consultant Qualified CCNA professional with compliance and standards skilled such as ISO27001 and CPS234 Gokul Srinivasan PRABIR SAHA Founder & Executive Director A successful entrepreneur with more than 25 years of experience in leading large profitable cohort for disruptive technologies, automation and innovation, who then are creating the next generation solutions for his customers. Prakash Balasubramanian William McClure Head of Threat Intelligence Experienced IT professional with extensive experience in infrastructure/support and security Chief Product Owner & Co-founder Cybersecurity expert certified in CISSP,CISM,CISA, CEH,CRISC and having 15 years of industrial experience Chief Technical Officer Founder of a software company (Axel IT) and over 15 years of experience in developing and enhancing technology for businesses Our Team
  • 9. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Our Business Model Five Minutes Onboarding Choose Subscription Type Complete Trial Click for Trial 5 Payment We have a very simple Software as a Service business model with instant onboarding through our website and leveraging on our partner networks. Its simplicity and scalability help us to built good customer relationships.
  • 10. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Delighters Basic Satisfiers Basic This is a sample text. Insert your desired text here. Delighters One platform that SMB’s need to use. No Extras and No BIG $$$. Your Cyber Defense in your hand! Mandatory Characteristics iSecureCyber can be customized & implemented across SMB's Basic Expected characteristics of a Cybersecurity management is available within iSecureCyber Satisfaction Functionality Kano Model Analysis
  • 11. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus iSecureCyber enables effective and automated identification of cyber risk 1. Dashboard catering to the senior management 3. Separate instances for Australia, Europe, US and India 4. PHP and Angular JS stack providing stability, functionality and simplistic UI design 2. Hosted on AWS Our Product
  • 12. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Maintain compliance with regulations and standards 1 2 3 4 Centralized, simplified and effective management of cybersecurity Ability to showcase cybersecurity maturity as a selling point to clients Achieve and maintain cyber security certifications (ISO27001, SOC2-type 2) etc. Value To Customers REDUCE Cost & Effort By 90%
  • 13. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus “Simplicity of the product and support from the Tplus team have stood out.” “iSecurecyber is at the leading edge of how multiple parties will share compliance information going forward.” “Team managed to demonstrate their flexibility, work ethics and the icing on the cake is the ease of use of their iSecureCyber.” “We have used iSecurecyber to attract other valuable customers.” “ ” “ ” Nick Gatland COO & CRO at Locii Rakesh Routhu Co-Founder & COO at Aerologix Testimonials from Early Adopters
  • 14. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Market Validation (Impact of third-party risks) 37% Damage to Reputation 30% Poor customer experiences 29% Cost incurred for remediation 43% Loss of customer trust 42% Loss of revenue 38% Failure to Innovate/execute strategy Third-Party breaches Increased by 35% from year 2017 to 2019 Source: A commissioned study conducted by Forrester Consulting on behalf of RSA, December 2019 https://www.darkreading.com/attacks-breaches/third-party-breaches---and-the-number-of-records-exposed---increased-sharply-in-2019/d/d-id/1337037
  • 15. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus 400 Million + TAM 400 Million+ Total SMB’s worldwide Total SMB’s in N America, Middle-east, Europe and Asia Pacific 200M + SMB’s /$1 Trillion Total target SMB’s (20% of available market) 40M+ SMB’s/$240B SAM SOM 400M+ SMB’s + & $ 2 Trillion Source: Australian small business and family enterprise Connected small business US: Deloitte Europe: No. of SMEs, Statista Asia Pacific Economic Corporation SME’s in Asia: Wonder Research The Middle east Investment Initiative National Action Plans on Business and Human Rights Average per SMB= 6000$ Market Size
  • 16. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Factors Responsible Are: • Increase in stringent compliance mandates. • Lack of in-house competencies in the organization. • The rising instances of cyberattacks. • Faster adoption by SMEs for TPRM solutions. 2019 2022 3.2 Billion USD 6.5 Billion USD 3.2 Billion USD 6.5 Billion USD Attractive Market Opportunities in TPRM Source: https://www.marketsandmarkets.com/Market-Reports/third-party-risk-management-market- 222423768.html * CAGR=Compound Annual Growth Rate *TPRM=Third-Party Risk Management Global Growth Estimation in Market Size
  • 17. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Role Industries C-level executive Vice president Director All industries Size of Business Small Medium Large * The bar graph denotes the number of targets for iSecureCyber in different size and roles in the businesses Customer Demographics
  • 18. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Initial Stage • Content Marketing (Video) • Digital Marketing • POC • SEO • Referral Strategy Growth Stage • Events and experiences • Local sponsorships • High-level partnerships (ISACA, AISA) • Outbound advertising • Word-of-mouth referrals Customers Advocates Visitors Leads Seekers Customer Acquisition
  • 19. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Third- party Networks20% Referrals 20% Distribution Channels
  • 20. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus CompetitorsNicheLeaders ExpensiveAffordable Offers affordable and easy to use third-party vendor management software
  • 21. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Investment Opportunity We’re looking for (series A)- $5M in funding, 40% of which will be spent on operations, 40% on human resources, and 20% on marketing. This will allow us to generate $7.5M in revenue in the next 48 months.
  • 22. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Why Invest Now Big Opportunity Compelling Market Validation Uncomplicated Business Model Strong Scalability Solid Team 1 2 3 4 5 Single product at 10% cost Attractive market opportunities of 6.5 Billion USD With five minutes onboarding A diverse team with longstanding relations Gross margin of 100% and virtually no COGS generated
  • 23. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Contact Us info@transformationplus.com info@isecurecyber.com 0421 010 510 10 Penrose Street, Marsden Park, NSW 2765, Australia
  • 24. Copyright © 2009 Transformationplus. All rights reserved.Innovated by Transformationplus Thank You Questions?

Hinweis der Redaktion

  1. TAM: 400M* 6000$= 2T 400B SMB‘s/$ SAM: 200.68M*6000$= 1T20 4B SMB‘s/$ SOM: 40.136M*6000$=240B 816M SMB‘s/$ Canada:1.1 Million US:28.8 Million Middle east:23 Million Europe:25.1 Million Malaysia:20.6 Million Singapore:25.7 Million India:44 Million Hong Kong:29.3 million Australia:2.6 Million NZ: 0.48 Million Total: 200.68 Million Worldwide: 400 million Small SMB‘s= 2000$ per SMB Medium SMB‘s= 10,000$ per SMB