Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April

Size: px
Start display at page:

Download "Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April"

Transcription

1 Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April

2 WYNYARD GROUP SUMMARY Founded 2012, NZX IPO July 2013 and dual-listing on the ASX planned for 3Q15 Wynyard Group is a global market leader in serious crime fighting software Used by the world s leading intelligence, investigations and information security operations Prevent and solve serious financial crime, organised and trans-national crime, new generation extremism and high consequence cyber crime The scale, complexity and global impact of serious crime is fuelling a new $US8 billion software market Revenue from software licences, recurring software support and professional services Wynyard sell direct to approved customers and through the world s leading systems integrators 120,000+ licensed users in government, financial services and critical national infrastructure 250+ expert staff across our core markets of Australia, New Zealand, USA, Canada, UK and Middle East 2

3 WYNYARD GROUP IS A GLOBAL MARKET LEADER IN SERIOUS CRIME FIGHTING SOFTWARE AND SERVICES Wynyard is a global market leader in serious crime fighting software - Advanced crime analytics - Investigations case management Used by intelligence, investigations and information security operations - National security - Justice and law enforcement - Financial services - Critical national infrastructure To help prevent and solve serious and high consequence crime - Serious financial crime - Organised and trans-national crime - New generation extremism - High consequence cyber crime 3

4 THE ACCELERATING SCALE, COMPLEXITY AND IMPACT OF NEW AND CYBER CRIME HAS CREATED GLOBAL PROBLEMS 40 YEARS 20 YEARS 5 YEARS 4

5 WYNYARD S SERIOUS CRIME FIGHTING SOFTWARE PLATFORM Wynyard Advanced Crime Analytics Rapidly surface and explore entities, relationships and events of interest hidden in masses of structured and unstructured data. Rules and Alerts Search Pathfinder Queries Link Analysis Location Analysis Anomaly Detection Timeline Analysis Text Analytics Sensor data Machine Learning Stream Processing Serious Crime Serious financial crime Organised & trans-national crime New generation extremism High consequence cyber crime Wynyard Investigations Case Management Manage serious crime investigations and operations Prevent and solve serious crime. Case Management Entity Management Property Management Lines of Enquiry Incident Management Tasking Disclosure Brief of Evidence Dashboards 5

6 WYNYARD S SERIOUS CRIME FIGHTING SOFTWARE SOLUTIONS Gun Crime Analytics Persons of Interest Mobile Device Analytics Fraud and Anti- Money Laundering Counter Terrorism Cyber Espionage and Sabotage Open-Source Intelligence Serious Crime Investigations 6

7 7

8 THE SCALE, COMPLEXITY AND IMPACT OF NEW AND CYBER CRIME IS FUELLING A NEW $US8 BILLION SOFTWARE MARKET Total Addressable Market (TAM) for serious crime fighting software and services est. $US8 billion No other serious crime specialist, no dominant market player and high barriers for new entrants Company Core Business Wynyard Group Advanced Crime Analytics and Investigations Case Management Palantir Technologies Data Analysis Advanced Crime Analytics $7 Billion Investigations Case Management $1 Billion BAE Systems SAS Institute Financial Crime and Cyber Security Business Intelligence SAP Business Operations EMC Big Data Management IBM Systems Integrator HP Systems Integrator 8

9 WYNYARD BUSINESS MODEL Innovation Big data, advanced crime analytics, person of interest, crime science Products Wynyard Advanced Crime Analytics and Wynyard Investigations Case Management Services Solution design, implementation, training and managed service Revenue Software licence (30%), recurring software maintenance (55%) and professional services (15%) 1 Go-to-Market Strategy Land and expand Target Industries Government, Financial Services and Critical National Infrastructure Target Total Contract Value $1M to $10M over an initial 3 year contract term Channels Direct and leading systems integrators 1. Approximate mix of software licence, recurring software maintenance and services revenue as % of total revenue 9

10 WHY CUSTOMERS CHOOSE WYNYARD Serious crime specialists Proven crime resolution, crime prevention and operational results Purpose-built big data management, advanced crime analytics and investigations product platform Speed to market with powerful new crime fighting solutions Platform scalability and performance Affordable total cost of ownership Security Software and company provenance 10

11 WYNYARD GLOBAL GROWTH STRATEGY Revenue growth with a pathway to profitability Larger contracts with lifetime customers 20 Half Year Revenue Growth $M Largest Customer Contract excl. Services $M H14A 2H14A 0 FY13 FY14 Expand sales and services channel partners Channel Partner Revenue as % Total Revenue 12% 10% 10% 8% 6% 4% 2% 1% 0% FY13A FY14A Building the leading big data crime analytics platform Market leading Advanced Crime Analytics, Computational and Big Data Management Platform 11

12 WYNYARD INDUSTRY ADVISORY COMMITTEE HERB HUNT (USA) Former EVP Symphony Technology Group, CTO and SVP Siebel Systems and VP IBM. LOUIS QUIJAS (USA) Ret Assistant Secretary for The Office for State and Local Law Enforcement, US Department of Homeland Security BOB MURRILL (UK) Ret. Commander Covert Policing, London Metropolitan Police DAVE JOHNSTON (UK) Ret. Commander Homicide and Serious Crime, London Metropolitan Police ANDY FRANCE (UK) Ret Deputy Director Cyber Defence UK Government Communications Headquarters (GCHQ) 12

13 WYNYARD GROUP SENIOR MANAGEMENT TEAM CRAIG RICHARDSON (NZL) Chief Executive Officer and Managing Director PAUL STOKES (UK) Chief Operating Officer MURRAY PAGE (NZL) Chief Financial Officer GARETH CRONIN (NZL) Vice President Engineering IAN SCHERGER (NZL) Chief Marketing Officer DEAN COOPER (UK) Vice President Product Management 13

14 WYNYARD GROUP SENIOR MANAGEMENT TEAM ROGER JARQUIN (NZL) Chief Technology Officer SARA MOTTUS (UK) Director Human Resources ARUN RAJ (UK) Vice President Global Services NEVIN GRIEVE (UK) Vice President Europe, Middle East and Africa JON PIERCEY (AUS) Vice President Asia Pacific DEREK BROWN (USA) Vice President Americas 14

15 WYNYARD GROUP BOARD OF DIRECTORS* DR MURRAY HORN (NZL) Board Chairman, Audit and Risk Committee and Chair of Nominations and Remuneration Committee SUSAN PETERSON (NZL) Chair of Audit and Risk Committee GUY HADDLETON (NZL) Technology Committee LOUIS GREVER (USA) Technology Committee *Craig Richardson is also a Wynyard Director RICHARD TWIGG (UK) Audit and Risk Committee DR RAJ BHOLE (USA) Nominations and Remuneration Committee 15

16 16

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2018 NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate

More information

January Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved Empowering a Fearless Internet

January Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved  Empowering a Fearless Internet January 2018 Disrupting the B2B 2018 WHITEHAWK, Inc. All Rights Reserved www.whitehawk.com Cyber Security Market Empowering a Fearless Internet DISRUPTING THE B2B CYBER SECURITY MARKET Overview Cyber Security

More information

Megaport Limited ASX:MP1

Megaport Limited ASX:MP1 Megaport Limited ASX:MP1 1HFY16 Market Update February 29 2016 megaport.com Megaport ACN 607 301 959 What is Megaport? Megaport is the leading, global, independent and neutral provider of Elastic Interconnection

More information

Redflex Holdings Limited was listed on the Australian Securities Exchange in January 1997.

Redflex Holdings Limited was listed on the Australian Securities Exchange in January 1997. ASX ANNOUNCEMENT 25 October 2017 Redflex Holdings Limited ABN 96 069 306 216 2017 AGM Presentations Attached is the Chairman s Address and the Group Chief Executive Officer s Presentation that will be

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

Digital Forensics - Global Market Outlook ( )

Digital Forensics - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /

More information

Department of Homeland Security Science & Technology

Department of Homeland Security Science & Technology Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T

More information

Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime

Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime Serious Organised Crime Agency Background Established under the Serious Organised Crime and Police Act 2005 NDPB

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC

SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC CivSec 2018 CIVIL SECURITY CONGRESS AND EXPOSITION 1-3 MAY 2018 MELBOURNE AUSTRALIA MELBOURNE CONVENTION AND EXHIBITION CENTRE www.civsec.com.au

More information

Cyber Intel within European Cybercrime Center Ops

Cyber Intel within European Cybercrime Center Ops @EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3

More information

The APEC Model. Global Partnership through Regional Initiatives

The APEC Model. Global Partnership through Regional Initiatives The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security

More information

Uncovering the Risk of SAP Cyber Breaches

Uncovering the Risk of SAP Cyber Breaches Uncovering the Risk of SAP Cyber Breaches Research sponsored by Onapsis Independently Conducted by Ponemon Institute LLC February 2016 1 Part 1. Introduction Uncovering the Risks of SAP Cyber Breaches

More information

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of

More information

Meeting of the BBC Audit and Risk Committee SUMMARY MINUTES. Thursday 22 June, 2017 New Broadcasting House, London

Meeting of the BBC Audit and Risk Committee SUMMARY MINUTES. Thursday 22 June, 2017 New Broadcasting House, London Meeting of the BBC Audit and Risk Committee SUMMARY MINUTES Thursday 22 June, 2017 New Broadcasting House, London ITEMS OF BUSINESS 1. Internal Audit quarterly reporting: a) Internal Audit quarterly update

More information

ASX Announcement. 13 November Annual General Meeting Chairman s Address

ASX Announcement. 13 November Annual General Meeting Chairman s Address ASX Announcement 13 November 2018 2018 Annual General Meeting Chairman s Address At last year s Annual General Meeting, we discussed how NEXTDC was expanding the capacity of its existing facilities and

More information

Introduction. January 1, 2015

Introduction. January 1, 2015 Introduction January 1, 2015 Radio Frequency IDentification Technologies that enable the capture of data about objects remotely using radio energy Our Mission To promote the public good by promoting high

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08

More information

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand

More information

Detect Fraud & Financial Crime

Detect Fraud & Financial Crime IBM i2 Intelligence Analysis Detect Fraud & Financial Crime Acquire Discover Action! Urs Christen Security Sales Government urs.christen@ch.ibm.com 1 IBM Security 2014 IBM Corporation Build an integrated

More information

NERC Staff Organization Chart

NERC Staff Organization Chart NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability

More information

Protecting information across government

Protecting information across government Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

NERC Staff Organization Chart 2015 Budget

NERC Staff Organization Chart 2015 Budget NERC Staff Organization Chart President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Associate Director, Member Relations and MRC Secretary (Dept. 2100) Senior Vice President and Chief Reliability

More information

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity. Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,

More information

For personal use only

For personal use only 2016 BluGlass Investor Presentation GILES BOURNE MANAGING DIRECTOR CORPORATE OVERVIEW BOARD George Venardos Chairman Giles Bourne Managing Director CORPORATE Established 2006 TOP SHAREHOLDERS as at 1 Aug.

More information

Cyber Security is it a boardroom issue?

Cyber Security is it a boardroom issue? Brisbane, 23 September 2014 Alistair Blake Director Cyber Security & Risk Services Today s session will cover Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness

More information

Social Engineering: We are the target Sponsor Guide

Social Engineering: We are the target Sponsor Guide Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the

More information

Office of the Minister of Broadcasting, Communications and Digital Media Chair, Cabinet Appointments and Honours Committee

Office of the Minister of Broadcasting, Communications and Digital Media Chair, Cabinet Appointments and Honours Committee Office of the Minister of Broadcasting, Communications and Digital Media Chair, Cabinet Appointments and Honours Committee CERT NZ Establishment Advisory Board Extension and Appointments Proposal 1. This

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Threat-Agnostic Defense tm is the New Security Paradigm

Threat-Agnostic Defense tm is the New Security Paradigm Company Overview Nyotron Overview Threat-Agnostic Defense tm is the New Security Paradigm Nyotron is bringing innovation to cybersecurity with a Threat-Agnostic Defense approach to endpoint security products

More information

EXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake

EXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake EXECUTIVE BRIEF : How Hybrid IT Outsourcing Shifts IT Focus to Innovation Challenge IT leaders are tasked to do more with less and increase technology innovation. At Stake As IT increasingly becomes the

More information

Data Loss Prevention - Global Market Outlook ( )

Data Loss Prevention - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report

More information

Cisco Gains Real-time Visibility in the Business with SAP HANA

Cisco Gains Real-time Visibility in the Business with SAP HANA Cisco Gains Real-time Visibility in the Business with SAP HANA What You Will Learn When an organization attempts to run itself without real-time visibility into the right data, the results can be lost

More information

Step 1: Open browser to navigate to the data science challenge home page

Step 1: Open browser to navigate to the data science challenge home page Step 1: Open browser to navigate to the data science challenge home page https://datascience.ey.com/ Step 2: Logging in You will need to create an account if you are a new user. Click the sign up button

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

DATACENTER SERVICES DATACENTER

DATACENTER SERVICES DATACENTER SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new

More information

Cyber Security Development. Ghana in Perspective

Cyber Security Development. Ghana in Perspective Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review

More information

Vademecum of Speakers

Vademecum of Speakers Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre

More information

SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure

SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure platforms to cloud systems. Promotions will occur less often

More information

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore 6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc. RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value

More information

DAY 1 - Monday 30th September 2013

DAY 1 - Monday 30th September 2013 DAY 1 - Monday 30th September 2013 Opening Ceremony 8.30am 10.00 am Remarks Oral Reid, Chairman Crime Stoppers Barbados Remarks Darwin Dottin, Commissioner of Police of Barbados Remarks Alex MacDonald,

More information

Software Systems Engineering Initiative. Improving defence software systems acquisition and support

Software Systems Engineering Initiative. Improving defence software systems acquisition and support Software Systems Engineering Initiative Improving defence software systems acquisition and support Where we are: Dependency % functions performed by software 90 80 70 60 50 40 30 20 10 0 F-22 B-2 F-16

More information

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure Samu Konttinen, CEO, F-Secure WE ARE F-SECURE 1 F-SECURE A FRONT RUNNER IN CYBER SECURITY We are the largest European single source of cyber security services and detection and response solutions for companies,

More information

The ACFE Law Enforcement and Government Alliance

The ACFE Law Enforcement and Government Alliance What is the ACFE? The Association of Certified Fraud Examiners (ACFE) is the world s largest anti-fraud organization and premier provider of anti-fraud training and education with more than 80,000 members

More information

Jason Clark CHIEF SECURITY AND STRATEGY OFFICER, OPTIV. Renee Guttmann CHIEF INFORMATION SECURITY OFFICER, ROYAL CARIBBEAN CRUISE LINES

Jason Clark CHIEF SECURITY AND STRATEGY OFFICER, OPTIV. Renee Guttmann CHIEF INFORMATION SECURITY OFFICER, ROYAL CARIBBEAN CRUISE LINES corporate overview the challenge Organizations are spending billions of dollars a year on security products, however recent security breaches have proven that the traditional security solutions are not

More information

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0 P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information

More information

Moving Your Business Forward

Moving Your Business Forward Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER

More information

2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors

2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors 2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors November 3, 2015 Board of Directors Daniel H. Schulman Chairman of the Board, Symantec President and Chief Executive Officer,

More information

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime

More information

Certificate Certificate number:

Certificate Certificate number: Certificate Certificate number: 2017-009 Based on certification examination in conformity with defined requirements in ISO/IEC 17021:2015 and ISO/IEC 27006:2015, the Information Security Management System

More information

A PRE-WORKSHOP TUTORIAL ON THE APEC CROSS-BORDER PRIVACY RULES AND THE APEC PRIVACY RECOGNITION FOR PROCESSORS

A PRE-WORKSHOP TUTORIAL ON THE APEC CROSS-BORDER PRIVACY RULES AND THE APEC PRIVACY RECOGNITION FOR PROCESSORS A PRE-WORKSHOP TUTORIAL ON THE APEC CROSS-BORDER PRIVACY RULES AND THE APEC PRIVACY RECOGNITION FOR PROCESSORS Markus Heyder, CIPL Anick Fortin-Cousens, IBM Joshua Harris, TRUSTe APEC Workshop: Building

More information

UNODC tackling cybercrime in support of a safe and secure AP-IS

UNODC tackling cybercrime in support of a safe and secure AP-IS UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway

More information

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions.

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions. Jane s Military & Security Assessments Intelligence Centre Understand Threats. Assess Capabilities. Challenge Assumptions. OVERVIEW Comprehensive open-source data and independent expert analysis Jane s

More information

VARONIS PARTNER PROGRAM

VARONIS PARTNER PROGRAM ABOUT VARONIS FOUNDED 2005 HEADQUARTERS 1250 Broadway, 29th Floor New York, NY, USA 10001 For a full list of offices, go to www.varonis.com/company/contact OWNERSHIP Publicly-held, VRNS CUSTOMERS 6,250

More information

i2 Limited Company Profile Publication Date: 15 Mar 2011

i2 Limited  Company Profile Publication Date: 15 Mar 2011 Company Profile Publication Date: 15 Mar 2011 www.datamonitor.com Europe, Middle East & Africa 119 Farringdon Road London EC1R 3DA United Kingdom t: +44 20 7551 9000 f: +44 20 7551 9090 e: euroinfo@datamonitor.com

More information

Project III Public/private cooperation

Project III Public/private cooperation Project Cybercrime@EAP III Public/private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental

More information

TEL AVIV

TEL AVIV 28-30.1.2019 Conference Chairman // DR. YOSSI VARDI CYBERTECH 2018 FIGURES: 15,000 attendees at the Cybertech 2018 conference and exhibition 170 local and international speakers discussed the latest innovations

More information

Honorable Members of the Public Safety and Criminal Justice Committee

Honorable Members of the Public Safety and Criminal Justice Committee Memorandum DATE August 10, 2018 TO Honorable Members of the Committee SUBJECT DPD Camera Surveillance Program On Monday, August 13, 2018, you will be briefed on the Police Department s Surveillance Cameras

More information

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become

More information

Netwrix Virtual. Customer Summit 2016

Netwrix Virtual. Customer Summit 2016 Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Guelph Police Service

Guelph Police Service Guelph Police Service The Guelph Police Service provides policing services to the City of Guelph and has an authorized complement of 196.5 police officers and 89.42 civilians. We serve our community by

More information

Cyber Espionage A proactive approach to cyber security

Cyber Espionage A proactive approach to cyber security Cyber Espionage A proactive approach to cyber security #DeloitteRA To mitigate the risks of advanced cyber threats, organisations should enhance their capabilities to proactively gather intelligence and

More information

Cyber Security. It s not just about technology. May 2017

Cyber Security. It s not just about technology. May 2017 Cyber Security It s not just about technology May 2017 Introduction The Internet has opened a new frontier in warfare: everything is networked and anything networked can be hacked. - World Economic Forum

More information

CYBERTECH 2019 FIGURES:

CYBERTECH 2019 FIGURES: 2019 Supporters: Conference Chairman // DR. YOSSI VARDI CYBERTECH 2019 FIGURES: 18,000 attendees at the Cybertech 2019 conference and exhibition 180+ local and international speakers discussed the latest

More information

Shareholder Luncheon and Webcast

Shareholder Luncheon and Webcast OCTOBER 12, 2017 Shareholder Luncheon and Webcast HOWARD L. LANCE President & Chief Executive Officer Radiant Forward Looking Statement This presentation contains forward-looking statements and information,

More information

Effective Partnerships: Security and Privacy in Smart Cities

Effective Partnerships: Security and Privacy in Smart Cities SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation

More information

Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions. Cyber Attack: A Global Phenomenon

Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions. Cyber Attack: A Global Phenomenon Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions Cyber Attack: A Global Phenomenon CAT, INC Summary: Cyber Advanced Technology, Inc. R & D Lab Offering 7-10 Year Next Generation

More information

Investor Presentation Bulletproof Overview

Investor Presentation Bulletproof Overview Investor Presentation Bulletproof Overview Anthony Woodward - CEO Agenda Company Overview Cloud Market in Australia Bulletproof Services Client Case Studies Financial Results & Outlook The Future 1 Company

More information

TRAINING PROGRAMS AND EVENTS 2016 CATALOGUE

TRAINING PROGRAMS AND EVENTS 2016 CATALOGUE TRAINING PROGRAMS AND EVENTS 2016 CATALOGUE 2016 Training Programs and Events Meeting the Challenge of Amalgamation Leadership Forum Location: Sydney metro area Date: 22 February 2016 COMPLIMENTARY This

More information

EY Norwegian Cloud Maturity Survey 2018

EY Norwegian Cloud Maturity Survey 2018 EY Norwegian Cloud Maturity Survey 2018 Current and planned adoption of cloud services EY Norwegian Cloud Maturity Survey 2018 1 It is still early days for cloud adoption in Norway, and the complexity

More information

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012 Version 1.3.0 of 1 July 2012 Contents 1 Introduction... 3 1.1 Authority... 3 1.2 Objective... 3 1.3 Target audience... 3 1.4 Version... 3 1.5 Enquiries... 3 2 Certification... 4 2.1 Framework for certification...

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Pictured is HMS Argyll with an idyllic scene of English countryside behind her.

Pictured is HMS Argyll with an idyllic scene of English countryside behind her. Pictured is HMS Argyll with an idyllic scene of English countryside behind her. Department for International Trade Defence & Security Organisation Helping UK Companies to export www.gov.uk/dit-dso Our

More information

Digital Health Cyber Security Centre

Digital Health Cyber Security Centre Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting

More information

Infosec Europe 2009 Business Strategy Theatre. Giving Executives the Security Management Information that they Really Need

Infosec Europe 2009 Business Strategy Theatre. Giving Executives the Security Management Information that they Really Need Infosec Europe 2009 Business Strategy Theatre Giving Executives the Security Management Information that they Really Need Simon Marvell Managing Director simon.marvell@acuityrm.com Agenda 1. What financial

More information

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK IN THE FRAME Computacenter Public Sector Frameworks FRAMEWORK SOLUTION PUBLIC SECTOR FRAMEWORK ACCELERATE TRANSFORMATION Put digitalisation in the fast lane with cost-effective, compliant and centralised

More information

Formation of NTT Security, a Specialized Security Company

Formation of NTT Security, a Specialized Security Company June 6th, 2016 Nippon Telegraph and Telephone Corporation Formation of NTT Security, a Specialized Security Company Nippon Telegraph and Telephone Corporation (abbreviated to NTT; Head Office: Chiyoda-Ku,

More information

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37

More information

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the

More information

HP Heritage 6/17/2003. Digital Equipment Corp Ken Olsen Harlan Anderson. Hewlett-Packard Bill Hewlett Dave Packard

HP Heritage 6/17/2003. Digital Equipment Corp Ken Olsen Harlan Anderson. Hewlett-Packard Bill Hewlett Dave Packard page 1 HP Heritage 1939 1957 Hewlett-Packard Bill Hewlett Dave Packard 1982 Compaq Rod Canion Jim Harris Bill Murto 1974 1997 Tandem Jim Treybig Digital Equipment Corp Ken Olsen Harlan Anderson 1979 Apollo

More information

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities. BUSINESS LECTURE TWO Dr Henry Pearson Cyber Security and Privacy - Threats and Opportunities. Introduction Henry started his talk by confessing that he was definitely not a marketer, as he had been occupied

More information

Hitachi Announces Director Candidates

Hitachi Announces Director Candidates FOR IMMEDIATE RELEASE Contacts: Japan: Kazuko Amamoto U.K.: Yuki Maeda Hitachi, Ltd. Hitachi Europe Ltd. +81-3-5208-9324 +44-1628-585714 kazuko.amamoto.oo@hitachi.com yuki.maeda@hitachi-eu.com Hitachi

More information

Software Defined Storage Market Research Report - Global Forecast 2022

Software Defined Storage Market Research Report - Global Forecast 2022 Report Information More information from: https://www.marketresearchfuture.com/reports/1958 Software Defined Storage Market Research Report - Global Forecast 2022 Report / Search Code: MRFR/SEM/1426-HCRR

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge 2018 Ernst & Young Advisory. All rights reserved. Graphics studio France 1802SG1267. ED 04082018 EY Consulting Is your strategy planning for the future or creating it? #TransformativeAge The better the

More information

PHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS

PHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS Information Analytics Expertise IHS TECHNOLOGY CONSULTING & ADVISORY SERVICES PHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS Oliver Philippou Senior Analyst Oliver.philippou@ihs.com

More information

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN

More information

September 2017 Quarter Update

September 2017 Quarter Update September 2017 Quarter Update Highlights: BrainChip Studio Software Introduced as Commercially Available on 17 July 2017. BrainChip Accelerator Introduced as the First Neuromorphic Hardware Solution for

More information

SAP Security Remediation: Three Steps for Success Using SAP GRC

SAP Security Remediation: Three Steps for Success Using SAP GRC SAP Security Remediation: Three Steps for Success Using SAP GRC All companies need strong application security environments as part of a successful overall risk management strategy. Strong risk-oriented

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information