SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Creating IT-Security Start-Ups
Benjamin RohĂŠ,
Founding Managing Director
Sorry for the Layout
•  It had to be that way !
Market, Predictions and Examples
Investors Perspective
Cyber Security Startups?
Cyber Security Startup!!
•  Generations of Cyber Security
1993: Mosaic and the rise of the commercial Internet (FUD* 1.0)
•  2000: dot-com bubble burst (double-digit security spend as %IT)
- 2002: inflection point (FUD* 1.5)
•  2005: consumer Internet distraction & 2008: economic crash
•  2011: media focus on all things cyber (FUD* 2.0)
•  2013: Snowden and the fragility of the Internet (anti-FUD*?)
•  2015: ?
•  2020: ???
•  * Acronym for fear, uncertainty and doubt. It is a marketing term that is often used to cast a shadow over a competitor's product when your own is unable to
compete. FUD is a technique used by larger companies who have a large market share. The FUD acronym was first freely defined by Gene Amdahl after he left
IBM to found his own company, Amdahl Corp, with this statement: "FUD is the fear, uncertainty, and doubt that IBM sales people instill in the minds of potential
customers who might be considering Amdahl products."
No crystal ball is required to predict
that high-profile security breaches
will continue to make
the news in 2015
Two Real Cyber Security Drivers
•  Governments and corporations are under attack
from cyber hacks (no longer simply a nuisance)
•  IT budgets are being freed up for products and
services to strengthen digital defenses (convergence
of risk)
Businesses Under Fire
•  Hackers are stealing around $250B/year in IP - NSA
Director, Gen. Keith Alexander, calls these attacks "the greatest wealth
transfer in history“
  "Significant YoY increases in cyber attacks
DHS reported a 68% increase in cyber attacks in 2012 at federal
agencies, government partners, and against critical infrastructure -
Symantec reported attacks on companies rose 42% in 2012
•  U.S. government is increasing spending in Cyber
Security (despite cuts elsewhere)
Business Under Fire
Money Follows Problems
•  Driving investment in innovative technologies
- $391M in just 16 companies between Jan 2012 and Sep 2013:
•  Cyber Security market is in a renaissance: -
–  $1B invested in Cyber Security startups in 2012
–  up 5% over 2011 (vs. overall venture funding down 10% YoY)
–  2011 Cyber Security funding was up 94% over 2010
Security Predictions For 2015
Security predictions
from: Blue Coat,
Damballa, FireEye,
Fortinet, Forrester,
Gartner, IDC,
ImmuniWeb, Kaspersky
Lab, Lancope, McAfee,
Neohapsis, Sophos,
Symantec, Trend Micro,
Varonis Systems,
Websense. Image:
Charles McLellan/
ZDNet
Exit Opportunities for Founders
and Investors
•  Mergers and Acquisitions (M&A)
–  Cisco <- Sourcefire ($2.7B or ~10x annual revenue)
–  IBM <- Trusteer ($800M or ~10x annual revenue)
•  Initial Public Offerings (IPOs)
•  Private Equity etc
Intelligence Services:
Key Investors1
•  106 Startups Who Received Investment from
the C.I.A* Since 1999 In-Q-Tel has been
strategically investing in startup companies
that are used by the intelligence community.
•  Today, these companies have amassed more
than $3.2 Billion in venture funding, and
employ more than 7,000 people.
Case-Study: One Of The Most Prominent
Intelligence Financed Startups
As of 2013, Palantir was used by at least 12 groups within the US
Government including the CIA, DHS, NSA, FBI, the CDC, the
Marine Corps, the Air Force, Special Operations Command, West
Point, the Joint IED-defeat organization and Allies, the Recovery
Accountability and Transparency Board and the National Center
for Missing and Exploited Children.
https://www.youtube.com/watch?v=VJFk8oGTEs4
Palantir Facts
•  Founded in 2004 by Peter Thiel, Joe Lonsdale, Alex Karp, Stephen Cohen,
Nathan Gettings; 1.500+ employees;
•  Palantir Gotham is used by counter-terrorism analysts at offices in the
United States Intelligence Community and United States Department of
Defense, fraud investigators at the Recovery Accountability and Transparency
Board, and cyber analysts at Information Warfare Monitor. Palantir Metropolis is
used by hedge funds, banks, and financial services firms.
•  CEO Alex Karp announced in 2013 that the company would not be pursuing
an IPO, as going public would make “running a company like ours very difficult.”
•  As of early 2014 the company was valued at $9 billion, according to Forbes,
with the magazine further explaining that the valuation made Palantir "among
Silicon Valley’s most valuable private technology companies.
Global Cyber Security Spending to
Reach $76.9 Billion in 2015: Gartner
•  According to the IT research and advisory firm, global
IT security spending reached $71.1 billion in 2014
year, an increase of 7.9% compared to 2013. 2015,
spending will grow even more, reaching $76.9 billion
(+8,2%)
•  By 2015, approximately 10% of the security controls
deployed by organizations will be cloud-based,
particularly when it comes to small and midsize
businesses.
J.P. Morgan CEO: Cyber-Security
Spending To Double!
•  J.P. Morgan Chase & Co. Chairman and Chief
Executive James Dimon said the bank would double
spending on cyber security over the next five years.
3 Solid Tips From Founders
Of a Security Startup2
•  To scale a startup too early or grow too quickly is not necessarily a good thing,
especially for enterprise startups. Things will go wrong, bugs will be revealed, and the
unexpected will always surprise you at the most inconvenient of times. Being slow and
steady at first allows time to optimise the advertising funnel and learn how to push
customers down the funnel effectively with a small budget. Don’t ramp up the model until
the conversion is consistently great.
•  When attending business meetups and events, seek to build business relationships,
and genuinely help people to ‘pay it forward’. Many startup founders meet to sell their
idea, or to pitch. No one will be interested in buying from you or use your product if you
directly sell to them when meeting the first time.
•  At the end of the day, a startup is a business, so think of revenue early and have a
solid business model, not just to build something cool or change the world. Don’t run out
of cash, because the longer the business can survive, the greater its chance of succeeding
and ultimately changing the world.
Reaching Out to the Growing
Community (Examples)
https://angel.co/cyber-security
2014 surveys and annual reports
Publisher Title
Appriver Global Security Report: End-of-year report 2014
Cisco 2015 Annual Security Report
CyberEdge Group 2014 Cyberthreat Defense Report
Damballa/Ponemon The Cost of Malware Containment
EY Global Information Security Survey 2014: Get Ahead of
Cybercrime
Forrester Understand the State of Network Security: 2014 to 2015
HP/Ponemon 2014 Global Report on the Cost of Cyber Crime
Lumension/Ponemon State of the Endpoint Report 2015
Radware Global Application and Security Report 2014
SafeNet/Ponemon The Challenges of Cloud Information Governance: A Global
Data Security Study
Symantec 2014 Internet Security Report
Tripwire/Atomic Enterprise of Things
http://www.zdnet.com/article/cybersecurity-in-2015-what-to-expect/
Case Study: Steganos
4 Key Products …
.. For a Post-Snowden World
Growing a Cyber Security Company
with Success
•  B2C:
–  PR: own the subject
(steganos: snowden/
data privacy)
–  Affiliate Marketing
(blogs, (software)publisher,
software review magazines)
•  B2B: Partner
distribution &
bundles; bottom-up
approach (used at the
bottom of the organization,
becomes “standard” within the
entire organization)
Affiliate Marketing (B2C)
http://www.startupnation.com/articles/affiliate-marketing-101-understanding-the-basics/
Closing the Loop
•  Expertise Counts
–  Domain expertise is key (for investors and buyers)
–  Does the team really know its vertical market?
Closing the Loop
•  Government Cyberwarfare & CIP
–  More than 80 companies work with the NSA on
cyberwarfare and surveillance (Der Spiegel)
–  Claims that U.S. National Security Agency is
funding “digital Blackwater” and “cyber Raytheon”
Final Remarks
•  Security still a reflex reaction to an attack
•  IT infrastructure security still a one-time, ad hoc effort
•  Security as a broad collection of technologies
•  Cyber Security never gets solved
Like an antibiotic-resistant bacteria: attackers
adapt to defenses and render them obsolete
(David Cowen, Partner at Bessemer Ventures)
Contact Information
Benjamin RohĂŠ
br@gtec.berlin
+491739751021
www.gtec.berlin
References
1.  https://mattermark.com/106-startups-who-received-investment-from-the-c-i-a-most-
frequent-in-q-tel-co-investors/
2.  http://fromlittlethings.co/2013/10/09/three-solid-tips-from-founders-of-security-startup-
authopay/

Weitere ähnliche Inhalte

Was ist angesagt?

The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity TrainingWindstoneHealth
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNowSecure
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 

Was ist angesagt? (20)

The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 

Andere mochten auch

2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...Ethan S. Burger
 
Rogers Russ Hacking A Terror Network
Rogers Russ   Hacking A Terror NetworkRogers Russ   Hacking A Terror Network
Rogers Russ Hacking A Terror Networkmacambo
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policybarbeejl
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityBoston Global Forum
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber SecurityJohn Gilligan
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
On Cyber
On Cyber  On Cyber
On Cyber grugq
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Go-to-market strategy for tech startups
Go-to-market strategy for tech startupsGo-to-market strategy for tech startups
Go-to-market strategy for tech startupsSovita Chander
 
Developing your go to market strategy by Kris Konrath, Convergent
Developing your go to market strategy by Kris Konrath, Convergent Developing your go to market strategy by Kris Konrath, Convergent
Developing your go to market strategy by Kris Konrath, Convergent Digital Ignition
 
Segmentation, Value proposition & Go-to-market approach
Segmentation, Value proposition & Go-to-market approachSegmentation, Value proposition & Go-to-market approach
Segmentation, Value proposition & Go-to-market approachImplement Consulting Group
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market StrategyRajiv Netra
 

Andere mochten auch (20)

2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
 
Rogers Russ Hacking A Terror Network
Rogers Russ   Hacking A Terror NetworkRogers Russ   Hacking A Terror Network
Rogers Russ Hacking A Terror Network
 
Ht f42
Ht f42Ht f42
Ht f42
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
On Cyber
On Cyber  On Cyber
On Cyber
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Go-to-market strategy for tech startups
Go-to-market strategy for tech startupsGo-to-market strategy for tech startups
Go-to-market strategy for tech startups
 
Developing your go to market strategy by Kris Konrath, Convergent
Developing your go to market strategy by Kris Konrath, Convergent Developing your go to market strategy by Kris Konrath, Convergent
Developing your go to market strategy by Kris Konrath, Convergent
 
Segmentation, Value proposition & Go-to-market approach
Segmentation, Value proposition & Go-to-market approachSegmentation, Value proposition & Go-to-market approach
Segmentation, Value proposition & Go-to-market approach
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market Strategy
 

Ähnlich wie NATO Cyber Security Conference: Creating IT-Security Start-Ups

IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframePrecisely
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon BradyStarttech Ventures
 
Cyber security money men
Cyber security money menCyber security money men
Cyber security money mengiorgiogarrido6
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012Charmaine Servado
 
Publish and be damned
Publish and be damned Publish and be damned
Publish and be damned Martin Jordan
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 

Ähnlich wie NATO Cyber Security Conference: Creating IT-Security Start-Ups (20)

IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Cyber security money men
Cyber security money menCyber security money men
Cyber security money men
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
Publish and be damned
Publish and be damned Publish and be damned
Publish and be damned
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 

Mehr von Benjamin RohĂŠ

From school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable techFrom school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable techBenjamin RohĂŠ
 
weXelerate: corporate innovation and other disasters - benjaminrohe.com
weXelerate: corporate innovation and other disasters -  benjaminrohe.comweXelerate: corporate innovation and other disasters -  benjaminrohe.com
weXelerate: corporate innovation and other disasters - benjaminrohe.comBenjamin RohĂŠ
 
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
20. EURO FINANCE WEEK - Real Estate Forum - Opening KeynoteBenjamin RohĂŠ
 
Data - the new oil #data #oil #technology #future
Data - the new oil #data #oil #technology #futureData - the new oil #data #oil #technology #future
Data - the new oil #data #oil #technology #futureBenjamin RohĂŠ
 
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...Benjamin RohĂŠ
 
International entrepreneurship culture in berlin
International entrepreneurship culture in berlinInternational entrepreneurship culture in berlin
International entrepreneurship culture in berlinBenjamin RohĂŠ
 
Entrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
Entrepreneurship 3.0 - The 3rd Wave of Industrial RevolutionEntrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
Entrepreneurship 3.0 - The 3rd Wave of Industrial RevolutionBenjamin RohĂŠ
 
Start-Ups + Mittelstand = Success!
Start-Ups + Mittelstand = Success!Start-Ups + Mittelstand = Success!
Start-Ups + Mittelstand = Success!Benjamin RohĂŠ
 
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...Benjamin Rohé
 
SCHEITERN und aufstehen #WEBINALE 2011 Berlin
SCHEITERN und aufstehen #WEBINALE 2011 BerlinSCHEITERN und aufstehen #WEBINALE 2011 Berlin
SCHEITERN und aufstehen #WEBINALE 2011 BerlinBenjamin RohĂŠ
 
Failure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friendFailure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friendBenjamin RohĂŠ
 
Why worry? Life as an Entrepreneur.
Why worry? Life as an Entrepreneur. Why worry? Life as an Entrepreneur.
Why worry? Life as an Entrepreneur. Benjamin RohĂŠ
 
How to value your tech startup
How to value your tech startupHow to value your tech startup
How to value your tech startupBenjamin RohĂŠ
 

Mehr von Benjamin RohĂŠ (14)

From school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable techFrom school drop-out to a Foundation for sustainable tech
From school drop-out to a Foundation for sustainable tech
 
weXelerate: corporate innovation and other disasters - benjaminrohe.com
weXelerate: corporate innovation and other disasters -  benjaminrohe.comweXelerate: corporate innovation and other disasters -  benjaminrohe.com
weXelerate: corporate innovation and other disasters - benjaminrohe.com
 
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
20. EURO FINANCE WEEK - Real Estate Forum - Opening Keynote
 
Data - the new oil #data #oil #technology #future
Data - the new oil #data #oil #technology #futureData - the new oil #data #oil #technology #future
Data - the new oil #data #oil #technology #future
 
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
Berlin State Of Mind - Transatlantic Entrepreneur Conference at New York Inte...
 
International entrepreneurship culture in berlin
International entrepreneurship culture in berlinInternational entrepreneurship culture in berlin
International entrepreneurship culture in berlin
 
Entrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
Entrepreneurship 3.0 - The 3rd Wave of Industrial RevolutionEntrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
Entrepreneurship 3.0 - The 3rd Wave of Industrial Revolution
 
Start-Ups + Mittelstand = Success!
Start-Ups + Mittelstand = Success!Start-Ups + Mittelstand = Success!
Start-Ups + Mittelstand = Success!
 
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
American Council on Germany (ACG) Warburg Chapter: “Venture Capital in Europe...
 
SCHEITERN und aufstehen #WEBINALE 2011 Berlin
SCHEITERN und aufstehen #WEBINALE 2011 BerlinSCHEITERN und aufstehen #WEBINALE 2011 Berlin
SCHEITERN und aufstehen #WEBINALE 2011 Berlin
 
Failure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friendFailure: meet the Entrepreneurs best friend
Failure: meet the Entrepreneurs best friend
 
Why worry? Life as an Entrepreneur.
Why worry? Life as an Entrepreneur. Why worry? Life as an Entrepreneur.
Why worry? Life as an Entrepreneur.
 
How to value your tech startup
How to value your tech startupHow to value your tech startup
How to value your tech startup
 
Seed funding
Seed fundingSeed funding
Seed funding
 

KĂźrzlich hochgeladen

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 

KĂźrzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

NATO Cyber Security Conference: Creating IT-Security Start-Ups

  • 1. Creating IT-Security Start-Ups Benjamin RohĂŠ, Founding Managing Director
  • 2.
  • 3. Sorry for the Layout •  It had to be that way !
  • 6. Cyber Security Startups? Cyber Security Startup!! •  Generations of Cyber Security 1993: Mosaic and the rise of the commercial Internet (FUD* 1.0) •  2000: dot-com bubble burst (double-digit security spend as %IT) - 2002: inflection point (FUD* 1.5) •  2005: consumer Internet distraction & 2008: economic crash •  2011: media focus on all things cyber (FUD* 2.0) •  2013: Snowden and the fragility of the Internet (anti-FUD*?) •  2015: ? •  2020: ??? •  * Acronym for fear, uncertainty and doubt. It is a marketing term that is often used to cast a shadow over a competitor's product when your own is unable to compete. FUD is a technique used by larger companies who have a large market share. The FUD acronym was first freely defined by Gene Amdahl after he left IBM to found his own company, Amdahl Corp, with this statement: "FUD is the fear, uncertainty, and doubt that IBM sales people instill in the minds of potential customers who might be considering Amdahl products."
  • 7. No crystal ball is required to predict that high-profile security breaches will continue to make the news in 2015
  • 8. Two Real Cyber Security Drivers •  Governments and corporations are under attack from cyber hacks (no longer simply a nuisance) •  IT budgets are being freed up for products and services to strengthen digital defenses (convergence of risk)
  • 9. Businesses Under Fire •  Hackers are stealing around $250B/year in IP - NSA Director, Gen. Keith Alexander, calls these attacks "the greatest wealth transfer in history“   "Significant YoY increases in cyber attacks DHS reported a 68% increase in cyber attacks in 2012 at federal agencies, government partners, and against critical infrastructure - Symantec reported attacks on companies rose 42% in 2012 •  U.S. government is increasing spending in Cyber Security (despite cuts elsewhere)
  • 11. Money Follows Problems •  Driving investment in innovative technologies - $391M in just 16 companies between Jan 2012 and Sep 2013: •  Cyber Security market is in a renaissance: - –  $1B invested in Cyber Security startups in 2012 –  up 5% over 2011 (vs. overall venture funding down 10% YoY) –  2011 Cyber Security funding was up 94% over 2010
  • 12. Security Predictions For 2015 Security predictions from: Blue Coat, Damballa, FireEye, Fortinet, Forrester, Gartner, IDC, ImmuniWeb, Kaspersky Lab, Lancope, McAfee, Neohapsis, Sophos, Symantec, Trend Micro, Varonis Systems, Websense. Image: Charles McLellan/ ZDNet
  • 13. Exit Opportunities for Founders and Investors •  Mergers and Acquisitions (M&A) –  Cisco <- Sourcefire ($2.7B or ~10x annual revenue) –  IBM <- Trusteer ($800M or ~10x annual revenue) •  Initial Public Offerings (IPOs) •  Private Equity etc
  • 14. Intelligence Services: Key Investors1 •  106 Startups Who Received Investment from the C.I.A* Since 1999 In-Q-Tel has been strategically investing in startup companies that are used by the intelligence community. •  Today, these companies have amassed more than $3.2 Billion in venture funding, and employ more than 7,000 people.
  • 15. Case-Study: One Of The Most Prominent Intelligence Financed Startups As of 2013, Palantir was used by at least 12 groups within the US Government including the CIA, DHS, NSA, FBI, the CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint IED-defeat organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children.
  • 17. Palantir Facts •  Founded in 2004 by Peter Thiel, Joe Lonsdale, Alex Karp, Stephen Cohen, Nathan Gettings; 1.500+ employees; •  Palantir Gotham is used by counter-terrorism analysts at offices in the United States Intelligence Community and United States Department of Defense, fraud investigators at the Recovery Accountability and Transparency Board, and cyber analysts at Information Warfare Monitor. Palantir Metropolis is used by hedge funds, banks, and financial services firms. •  CEO Alex Karp announced in 2013 that the company would not be pursuing an IPO, as going public would make “running a company like ours very difficult.” •  As of early 2014 the company was valued at $9 billion, according to Forbes, with the magazine further explaining that the valuation made Palantir "among Silicon Valley’s most valuable private technology companies.
  • 18. Global Cyber Security Spending to Reach $76.9 Billion in 2015: Gartner •  According to the IT research and advisory firm, global IT security spending reached $71.1 billion in 2014 year, an increase of 7.9% compared to 2013. 2015, spending will grow even more, reaching $76.9 billion (+8,2%) •  By 2015, approximately 10% of the security controls deployed by organizations will be cloud-based, particularly when it comes to small and midsize businesses.
  • 19. J.P. Morgan CEO: Cyber-Security Spending To Double! •  J.P. Morgan Chase & Co. Chairman and Chief Executive James Dimon said the bank would double spending on cyber security over the next five years.
  • 20. 3 Solid Tips From Founders Of a Security Startup2 •  To scale a startup too early or grow too quickly is not necessarily a good thing, especially for enterprise startups. Things will go wrong, bugs will be revealed, and the unexpected will always surprise you at the most inconvenient of times. Being slow and steady at first allows time to optimise the advertising funnel and learn how to push customers down the funnel effectively with a small budget. Don’t ramp up the model until the conversion is consistently great. •  When attending business meetups and events, seek to build business relationships, and genuinely help people to ‘pay it forward’. Many startup founders meet to sell their idea, or to pitch. No one will be interested in buying from you or use your product if you directly sell to them when meeting the first time. •  At the end of the day, a startup is a business, so think of revenue early and have a solid business model, not just to build something cool or change the world. Don’t run out of cash, because the longer the business can survive, the greater its chance of succeeding and ultimately changing the world.
  • 21. Reaching Out to the Growing Community (Examples) https://angel.co/cyber-security
  • 22. 2014 surveys and annual reports Publisher Title Appriver Global Security Report: End-of-year report 2014 Cisco 2015 Annual Security Report CyberEdge Group 2014 Cyberthreat Defense Report Damballa/Ponemon The Cost of Malware Containment EY Global Information Security Survey 2014: Get Ahead of Cybercrime Forrester Understand the State of Network Security: 2014 to 2015 HP/Ponemon 2014 Global Report on the Cost of Cyber Crime Lumension/Ponemon State of the Endpoint Report 2015 Radware Global Application and Security Report 2014 SafeNet/Ponemon The Challenges of Cloud Information Governance: A Global Data Security Study Symantec 2014 Internet Security Report Tripwire/Atomic Enterprise of Things http://www.zdnet.com/article/cybersecurity-in-2015-what-to-expect/
  • 24. 4 Key Products …
  • 25. .. For a Post-Snowden World
  • 26.
  • 27. Growing a Cyber Security Company with Success •  B2C: –  PR: own the subject (steganos: snowden/ data privacy) –  Affiliate Marketing (blogs, (software)publisher, software review magazines) •  B2B: Partner distribution & bundles; bottom-up approach (used at the bottom of the organization, becomes “standard” within the entire organization)
  • 29. Closing the Loop •  Expertise Counts –  Domain expertise is key (for investors and buyers) –  Does the team really know its vertical market?
  • 30. Closing the Loop •  Government Cyberwarfare & CIP –  More than 80 companies work with the NSA on cyberwarfare and surveillance (Der Spiegel) –  Claims that U.S. National Security Agency is funding “digital Blackwater” and “cyber Raytheon”
  • 31. Final Remarks •  Security still a reflex reaction to an attack •  IT infrastructure security still a one-time, ad hoc effort •  Security as a broad collection of technologies •  Cyber Security never gets solved Like an antibiotic-resistant bacteria: attackers adapt to defenses and render them obsolete (David Cowen, Partner at Bessemer Ventures)