Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure
|
|
- Zoe Hopkins
- 5 years ago
- Views:
Transcription
1 Samu Konttinen, CEO, F-Secure WE ARE F-SECURE 1
2 F-SECURE A FRONT RUNNER IN CYBER SECURITY We are the largest European single source of cyber security services and detection and response solutions for companies, and the leading provider of consumer security software through telecoms operators. GUIDANCE 2018 B2B CAGR >+35% Key figures MEUR revenue MEUR Adjusted EBITDA 1600 employees 25 locations Cyber security experts Security technology MAN & MACHINE MEUR EBIT B2B CAGR +17% B2B Security revenue Consumer Security revenue *) * Implied guidance 2
3 ESCALATING CYBER THREATS CONTINUE TO INCREASE DEMAND FOR CYBER SECURITY Number of cyber attacks rising M M M M M 161,644 Incoming attacks per day On average it takes companies 100 DAYS to detect a breach 2 TRILLION Projected cost of cyber crime by 2019 Source:JuniperResearch, PWC Global State of Information Security Survey Gartner Information Security Market Forecast BN USD 180 CAGR +9% B2B products B2B Services Consumer security 3
4 THERE IS A RAPIDLY GROWING DEMAND FOR DETECTION & RESPONSE CAPABILITIES prevention detection and response 100% 100% 10% 35% 30% 60% Currently a fraction of companies have capabilities to detect and respond Today Year 2020 Companies are shifting spending from prevention to detection & response 4
5 WE OFFER ENTERPRISE-GRADE CYBER SECURITY TO BUSINESSES - AND CONSUMERS IT RESELLERS OPERATORS 200+ globally 100,000+ companies Tens of millions of consumers We are targeting the corporate mid-market and local enterprises We sell our solutions through a global network of channel partners 5
6 WE JUST ANNOUNCED A MAJOR ACQUISITION TO BOOST OUR GROWTH & CAPABILITIES MWR InfoSecurity MWR InfoSecurity is among the largest cyber security service providers serving global enterprises. Its wellknown in the cyber security industry for its technical expertise and research Close to 400 employees in offices in the UK, South Africa, Singapore, the US, Germany and Poland Serves hundreds of midmarket and large enterprises, especially in the financial sector and other industries with critical IT systems Countercept is one of the most advanced threat hunting platforms in the market, with extensive proactive attack detection phishd is a suite of managed phishing protection services Transaction Acquisition consideration: GBP 80 million, and a deferred payment of a maximum of GBP 25 million paid subject to the achievement of agreed business targets after 18 months F-Secure expects to close the transaction in early July 2018 MWR InfoSecurity CEO Ian Shaw will join F-Secure Leadership Team as of the closing date 6
7 F-SECURE S COMPETITIVE ADVANTAGE EVERY DAY OUR AI POWERED CONTEXTUAL DETECTION ENGINES ANALYZE REPUTATION QUERIES SUSPICIOUS S NEW MALWARE SAMPLES 6,000,000,000 1,000, ,000 OUR EXPERTS FIGHT ADVANCED ATTACKS AND LEARN FROM THE FRONT LINES FORENSICS WE COMBINE THE POWER OF MAN & MACHINE TARGETED ATTACK SIMULATIONS INCIDENT RESPONSE 7
8 UNMATCHED GLOBAL PRESENCE AT ALL FOUR CONTINENTS F-Secure s cyber security services operations UNITED STATES UNITED KINGDOM DENMARK SWEDEN FINLAND POLAND ITALY SINGAPORE F-Secure has been involved in more cyber criminal investigations in Europe than any other cyber security company. SOUTH AFRICA 8
9 WE HAVE A COMPEREHENSIVE OFFERING OF ENTERPRISE-GRADE PRODUCTS & SERVICES We reduce the likelihood of the attacker to succeed by minimizing vulnerabilities, prevent malicious applications from running, and detect & respond if an advanced persistent attacker gets in. Predict Prevent Detect Respond Cyber security services Vulnerability management Anti-phishing behavioral management Endpoint protection Breach detection Proactive Threat Hunting Remote forensics Remote incident response F-Secure Radar phishd Protection Service for Business Rapid Detection & Response (EDR) Rapid Detection & Response Service (MDR) Countercept 9
10 A UNIQUE OFFERING FOR THE CORPORATE MID-MARKET VULNERABILITY MANAGEMENT PHISHING MANAGEMENT ENDPOINT PROTECTION ENDPOINT DETECTION AND RESPONSE MANAGED DETECTION AND RESPONSE (24x7) PROACTIVE THREAT HUNTING REMOTE FORENSICS AND IR 10
11 EDR Customer need MDR WE HAVE AN INDUSTRY-LEADING DETECTION & RESPONSE OFFERING DETECT RESPONSE Managed Threat Hunting 24x7 monitoring Remote Incident Response Real-time detection Broad Context Detection Tooling, automation, guidance, visualization Remote Forensics Guided Response CUSTOMER EXAMPLE: Two rapidly detected attacks convinced us "With F-Secure Business Suite Premium and Rapid Detection & Response Service, our systems are now fully protected against all forms of malware and cyberattacks. The two attacks that F-Secure has detected in such a short time (6 and 9 minutes) have more than convinced us to have chosen the right solution. In addition, we see F-Secure and its experts from the Rapid Detection & Response Center as full members of our security team. Michael Jany System Administrator Alfred Ritter GmbH & Co. 11
12 F-SECURE S KEY FOCUS AREAS FOR Enterprise-grade cyber security for the midmarket THANK YOU! Aim is to become the leader in detection and response solutions Continued growth of cyber security services Accelerate corporate security growth with successful integration of MWR InfoSecurity Increase share of wallet by cross-selling and upselling Sales expansion of the new corporate security products (RDS & EDR, F-Secure Radar, phishd) Best-in-class renewal rates Adding new customers in focus geographies Growth in consumer security Active M&A 12
STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO
STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO MEGATRENDS CONTINUE TO SUPPORT OUR STRATEGY REGULATION GEOPOLITICS CLOUDIFICATION CYBER ATTACKS Increasing demand for cyber security products and
More informationACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018
ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM
More informationF-SECURE FOR 30 YEARS FRONTRUNNER IN CYBER SECURITY. Samu Konttinen, CEO, F-Secure
F-SECURE FRONTRUNNER IN CYBER SECURITY FOR 30 YEARS Samu Konttinen, CEO, F-Secure 1 F-SECURE IN A NUTSHELL Award-winning cyber security products & worldclass cyber security services Revenue by region 12
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationA STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017
A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security
More informationSamu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%
Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ
More informationJens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY
Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY IMPROVED SECURITY FOR THE MID-MARKET 1 SYNERGIES ACROSS SEGMENTS Privacy Family Connected home
More informationInterim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR
Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN
More informationWELCOME TO F-SECURE S ANNUAL GENERAL MEETING
WELCOME TO F-SECURE S ANNUAL GENERAL MEETING 1 MATTERS ON THE AGENDA 1. Opening of the meeting 2. Calling the meeting to order 3. Election of persons to scrutinize the minutes and to supervise the counting
More informationSTAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response
STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone
More informationBREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response
BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone of cyber security,
More informationINVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO
INVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO 21.12.2017 CONTENTS 1 2 3 4 SSH Background and Business SSH Strategic Direction renewed Marketing Update Questions and Answers 22 December
More informationEFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave
EFFECTIVELY TARGETING ADVANCED THREATS Terry Sangha Sales Engineer at Trustwave THE CHALLENGE PROTECTING YOUR ENVIRONMENT IS NOT GETTING EASIER ENDPOINT POINT OF SALE MOBILE VULNERABILITY MANAGEMENT CYBER
More informationF-SECURE ACQUIRED MWR INFOSECURITY TO ACCELERATE CORPORATE SECURITY GROWTH
F-SECURE HALF YEAR REPORT 1 JANUARY 30 JUNE 2018 F-SECURE ACQUIRED MWR INFOSECURITY TO ACCELERATE CORPORATE SECURITY GROWTH CORPORATE SECURITY REVENUE INCREASED BY 8% IN Q2 02 HIGHLIGHTS OF APRIL JUNE
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationTechnical Brochure F-SECURE THREAT SHIELD
Technical Brochure F-SECURE THREAT SHIELD F-SECURE THREATSHIELD F-Secure ThreatShield is a gateway-level security solution for protecting email and web traffic, with built-in network sandboxing technology.
More informationISO in the world today
ISO 27001 in the world today 1 Agenda ISO 27001 worldwide Why ISO 27001 Framework to implement ISO 27001 2 ISO 27001 worldwide Source: ISO Annual Survey 3 ISO 27001 worldwide Number of Certificates Year
More informationANNUAL REPORT 2017 A FRONT RUNNER IN CYBER SECURITY FOR 30 YEARS
ANNUAL REPORT 2017 A FRONT RUNNER IN CYBER SECURITY FOR 30 YEARS Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands
More informationCYBER SECURITY OPERATION CENTER
CYBER OPERATION CENTER Reply s new Cyber Security Operation Centre is a structure specialised in the provision of Premium-level security services, tailored to the customer's needs, processes, and the specific
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationRansomware piercing the anti-virus bubble
CONNECT Ransomware piercing the anti-virus bubble Better prevention is needed to protect organizations from the growing threat landscape 2 The WannaCry ransomware attack that had such a widespread and
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationFINANCIAL STATEMENT RELEASE 1 JANUARY 31 DECEMBER 2018 BUSINESS IN STRATEGIC GROWTH AREAS PERFORMED WELL CORPORATE SECURITY UP BY 48% IN Q4
FINANCIAL STATEMENT RELEASE 1 JANUARY 31 DECEMBER BUSINESS IN STRATEGIC GROWTH AREAS PERFORMED WELL CORPORATE SECURITY UP BY 48% IN Q4 02 F-SECURE FINANCIAL STATEMENT RELEASE 1 JAN 31 DEC HIGHLIGHTS OF
More informationMastering The Endpoint
Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More
More informationDesigning an Adaptive Defense Security Architecture. George Chiorescu FireEye
Designing an Adaptive Defense Security Architecture George Chiorescu FireEye Designing an Adaptive Security Architecture Key Challanges Existing blocking and prevention capabilities are insufficient to
More informationFrom Managed Security Services to the next evolution of CyberSoc Services
From Managed Security Services to the next evolution of CyberSoc Services Gianluca Busco Arré Country Manager pandasecurity.com MSSP / MDR Where the Industry is going leaders and laggers MSSP industry
More informationMay the (IBM) X-Force Be With You
Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security
More informationCYBERBIT P r o t e c t i n g a n e w D i m e n s i o n
CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the
More informationSponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary
Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary Sponsored by Raytheon Independently conducted by Ponemon Institute LLC Publication Date: June 2016 Connect with us: #DontWaitHunt
More informationMATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services
MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services THE NEED FOR MATURE CYBER DEFENSE CAPABILITIES The average annual cost of cyber crime reached $11.7 million per organization
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationBTS Group AB (publ) Carnegie Stockholm, Sep 27, Michael Wallin Head of Investor Relations. Copyright 2015 BTS
BTS Group AB (publ) Carnegie Stockholm, Sep 27, 2016 Michael Wallin Head of Investor Relations Copyright 2015 BTS Our Vision The global leader in turning strategy into action. BTS focuses on the people
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationBETTER Mobile Threat Defense (BMTD)
BETTER Mobile Threat Defense (BMTD) Powered by BETTER Mobile Security, Inc. Enterprise Challenges Today s enterprise IT managers are looking for better and more efficient ways to empower workforces utilizing
More informationCybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY
Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationaccelerate your ambition Chris Jenkins
accelerate your ambition Chris Jenkins Changing landscape of the Security Industry Chris Jenkins European GM Security Dimension Data Business relationships Geographic footprint Revenue USD 700+m 1 NTT
More informationPRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources
PRODUCT OVERVIEW On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources What is a Threat Hunting service? ESET Threat Hunting service
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationPonemon Institute s 2018 Cost of a Data Breach Study
Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell
More informationMoving from Prevention to Detection March 2017
www.pwc.com Moving from Prevention to Detection Le Tran Hai Minh Manager Cyber Security 29 Agenda Slide Cyber Security Statistics 3 How to Stay Confidence 8 Contact 19 2 Cyber Security Statistics 3 Cyber
More informationTHE ACCENTURE CYBER DEFENSE SOLUTION
THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationService Provider VPN Market Disruption in the Central and Eastern European Market
Service Provider VPN Market Disruption in the Central and Eastern European Market Delivering Winning Customer Experiences With SDN/NFV Easier Is Better Delivering a compelling user experience has become
More informationWHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
WHITE PAPER Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale One key number that is generally
More informationManaged Endpoint Defense
DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts
More informationDetecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017
Feeling lucky? Detecting breach There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017 Industry average is 100 days to detect a breach,
More informationManutan, a major player. in Europe s multichannel B to B retail sector
Manutan, a major player in Europe s multichannel B to B retail sector 2017 The history of a people-focused company Today, over 2,200 employees championing and united by strong values make up our large
More informationCognitive Security in the Era of Always Online. Yiannis Giokas VP R&D
Cognitive Security in the Era of Always Online Yiannis Giokas VP R&D Our Parent Company: HKT PCCW Global is an international operating division of HKT, Hong Kong s premier telecommunications service provider,
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationFinancial Statements for 2000 & Business and Strategy Overview
Financial Statements for 2000 & Business and Strategy Overview February 12, 2001 Q4 Report February 12, 2001 / 1 Contents Financial Overview Kim Ignatius Business and Strategy Overview Kaj-Erik Relander
More informationCONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President
CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMERS SECURITY NEEDS ARE GETTING BROADER GROWING NUMBER OF INCIDENTS NUMBER OF CONNECTED DEVICES >1M IoT devices and routers
More informationCYBER SECURITY TAILORED FOR BUSINESS SUCCESS
CYBER SECURITY TAILORED FOR BUSINESS SUCCESS KNOW THE ASIAN CYBER SECURITY LANDSCAPE As your organisation adopts digital transformation initiatives to accelerate your business ahead, understand the cyber
More informationPower of the Threat Detection Trinity
White Paper Security Power of the Threat Detection Trinity How to Best Combine Real-time Correlation, Insider Threat Analysis and Hunting to protect against cyber threats. Combine real-time correlation,
More informationThe State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business
More informationOne Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software
Solution Brochure High-Performance Networking for the Enterprise with JUNOS Software Using the Network to Achieve Higher Availability, Lower OPEX and Improved Productivity for Your Business Core Branch
More informationDigital Forensics - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /
More informationNew Threats, New Mindset: Being Risk Ready in a World of Complex Attacks. How to Address Incident Response Challenges
New Threats, New Mindset: Being Risk Ready in a World of Complex Attacks How to Address Incident Response Challenges 01 Introduction This year, Kaspersky Lab s quarterly threat reports highlighted significant
More informationCOST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE
2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average
More informationHow the world pays, now and in the future: The Global Payments Report. Ieuan Owen, SVP Strategy Worldpay ecom
How the world pays, now and in the future: The Global Payments Report Ieuan Owen, SVP Strategy Worldpay ecom What are our key findings? Improving what we call insight QBRs Case studies worldpay.com/global/insights
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationA STRONG FOURTH QUARTER CONCLUDED A SOLID YEAR Accelerating investments in corporate security in 2017
FINANCIAL STATEMENT RELEASE 1 JANUARY 31 DECEMBER A STRONG FOURTH QUARTER CONCLUDED A SOLID YEAR Accelerating investments in corporate security in 2017 F-SECURE FINANCIAL STATEMENT RELEASE 1 JAN 31 DEC
More informationesendpoint Next-gen endpoint threat detection and response
DATA SHEET esendpoint Next-gen endpoint threat detection and response esendpoint powered by Carbon Black eliminates endpoint blind-spots that traditional technologies miss. Operating on a philosophy that
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationPowering Resilience. Keep your business on 24/7. Proposition series September 2017
Powering Resilience Keep your business on 24/7 Proposition series September 2017 Centrica Business Solutions Powering Resilience Reliable power is mission-critical As more businesses become digital, the
More informationTraditional Security Solutions Have Reached Their Limit
Traditional Security Solutions Have Reached Their Limit CHALLENGE #1 They are reactive They force you to deal only with symptoms, rather than root causes. CHALLENGE #2 256 DAYS TO IDENTIFY A BREACH TRADITIONAL
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationSecurity. Made Smarter.
Security. Made Smarter. Your job is to keep your organization safe from cyberattacks. To do so, your team has to review a monumental amount of data that is growing exponentially by the minute. Your team
More informationBTS Group AB (publ) Q Stockholm, Aug 18, Henrik Ekelund President and CEO. Copyright 2015 BTS
BTS Group AB (publ) Q2 2016 Stockholm, Aug 18, 2016 Henrik Ekelund President and CEO Copyright 2015 BTS Our Vision The global leader in turning strategy into action. BTS Global Footprint Copyright 2015
More informationWick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP
2009, 2014 & 2015- Winner Finalist 2010, 2011, 2013 & 2016 2007, 2008, 2009, 2010 & 2015 WINNER 2007, 2008, 2009, 2010 2011, 2013, 2014, 2015 & 2016 2010, 2011, 2012, 2013, 2014 & 2015 Wick Hill Group,
More informationIncident Response. Tony Drewitt Head of Consultancy IT Governance Ltd
Incident Response Tony Drewitt Head of Consultancy IT Governance Ltd www.itgovernance.co.uk IT Governance Ltd: GRC One-Stop-Shop Thought Leaders Specialist publisher Implementation toolkits ATO Consultants
More informationArtificial Intelligence Drives the next Generation of Internet Security
Artificial Intelligence Drives the next Generation of Internet Security Sam Lee Regional Director sam.lee@cujo.com Copyright 2017 CUJO LLC, All rights reserved. Artificial Intelligence Leads the Way Copyright
More informationin collaboration with
in collaboration with Table of Contents 01 Turn Silos of Data into Operational Intelligence page 04 02 Gain a Competitive Advantage with Cisco and Splunk page 06 03 Improve Insight with IT Operations Analytics
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationData Loss Prevention - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report
More informationINTEGRATION BRIEF DFLabs and Jira: Streamline Incident Management and Issue Tracking.
INTEGRATION BRIEF DFLabs and Jira: Streamline Incident Management and Issue Tracking. Integrate IncMan SOAR s Orchestration, Automation and Response capabilities with your existing Jira solution. Solution
More informationAnnual General Meeting. A pioneer in technologies for Digital Radio and Smart Audio devices 9 th May 2017
Annual General Meeting A pioneer in technologies for Digital Radio and Smart Audio devices 9 th May 2017 Overview DAB & Smart Radio Established as world s #1 provider of DAB Digital Radio technology -
More informationGaps in Resources, Risk and Visibility Weaken Cybersecurity Posture
February 2019 Challenging State of Vulnerability Management Today: Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture In the last two years, businesses and governments have seen data breaches
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationDen Store Aksjekvelden
Den Store Aksjekvelden LINK Mobility Group ASA Presended by Siw Ødegaard, Executive Vice President M&A, Investor & Public Relations Trondheim, 19 September 2016 Agenda 1. Company information 2. Q2 2016
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationMANAGED DETECTION AND RESPONSE
MANAGED DETECTION AND RESPONSE Cybersecurity Starts Here No matter the size, every organization is a target for cybercriminals. But smaller organizations that lack the cybersecurity muscle of the largest
More informationLarry Clinton President & CEO Internet Security Alliance
Larry Clinton President & CEO Internet Security Alliance lclinton@isalliance.org 703-907-7028 202-236-0001 Sr. Management & Cyber Security Good News!!! Pricewaterhouse Coopers survey of 9,000 executives
More informationWhat can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco
What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco Increasing Digital Traffic Creates a Greater Attack Surface Global IP Traffic
More informationDoes someone else own your company s reputation? EY Global Information Security Survey 2018
Does someone else own your company s reputation? EY Global Information Security Survey 2018 Perspectives for technology, media and entertainment, and telco companies Risking cyber reputations Are TMT companies
More informationNera Telecommunications Ltd. Co. Reg. No R 109 Defu Lane 10, Singapore Tel: (65) Fax: (65) Website:
Nera Telecommunications Ltd Co. Reg. No.197802690R 109 Defu Lane 10, Singapore 539225 Tel: (65) 6281 3388 Fax: (65) 6383 9566 Website: www.nera.net NEWS RELEASE NERATEL REPORTS 15.8% GROWTH IN 1H 2017
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Ad va n c e d P e r s i s tent Threats: Movi n g f r o m D e t e c t i o n t o Preve n t i o n a n d R e s p o n s e October 2015 Adapted from Worldwide Specialized
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationService Provider VPN Market Disruption in the LATAM Market
Service Provider VPN Market Disruption in the LATAM Market Delivering Winning Customer Experiences With SDN/NFV Easier Is Better Delivering a compelling user experience has become increasingly critical
More informationCyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services
Cyber Diligence EY Deals Forum 2018 Ian McCaw EY Transaction Advisory Services Finance & Commercial Diligence 2 B COMPANY: Power Life INDUSTRY: ENERGY REVENUE: 192m EBITDA: 875k (35% growth in 5 years)
More informationHow to Catch a Thief. Trends & Technologies in the Fight Against Fraud. Rohan Langley SAS
How to Catch a Thief Trends & Technologies in the Fight Against Fraud Rohan Langley SAS Global Drivers & Challenges: The Changing Fraud Landscape Fixing Fraud: A Fraud Solution A Real World Example: Online
More informationINTELLIGENT CYBER THREAT DEFENSE. Fight tomorrow s cyber threats in real time with cutting edge machine learning
INTELLIGENT CYBER THREAT DEFENSE Fight tomorrow s cyber threats in real time with cutting edge machine learning ARE YOU PREPARED? Businesses are being targeted by cyber criminals at an ever-increasing
More informationTechValidate Survey Report: SaaS Application Trends and Challenges
TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.
More informationInterim Report on the First Half of /01/ 2017
Interim Report on the First Half of 2017 01/01/ 2017 30/06/ 06/30/ 2 ITELLIGENCE KEY FIGURES MEUR Jan 1 June 30, 2017 Jan 1 June 30, 2016 Apr 1 June 30, 2017 Apr 1 June 30, 2016 Total revenues 416.2 357.7
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationCYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION
SELF-AUDIT GUIDE CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION A Primer for Moving Beyond AV and Firewalls 1 The Problem As software systems become more distributed and interactive
More informationISE Cyber Security UCITS Index (HUR)
ISE Cyber Security UCITS Index (HUR) Why Cybersecurity is important Data breaches have become almost commonplace in the last few years Cybersecurity focuses on protecting computers, networks, programs,
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More information