Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April
|
|
- Vivian Lang
- 5 years ago
- Views:
Transcription
1 Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April
2 WYNYARD GROUP SUMMARY Founded 2012, NZX IPO July 2013 and dual-listing on the ASX planned for 3Q15 Wynyard Group is a global market leader in serious crime fighting software Used by the world s leading intelligence, investigations and information security operations Prevent and solve serious financial crime, organised and trans-national crime, new generation extremism and high consequence cyber crime The scale, complexity and global impact of serious crime is fuelling a new $US8 billion software market Revenue from software licences, recurring software support and professional services Wynyard sell direct to approved customers and through the world s leading systems integrators 120,000+ licensed users in government, financial services and critical national infrastructure 250+ expert staff across our core markets of Australia, New Zealand, USA, Canada, UK and Middle East 2
3 WYNYARD GROUP IS A GLOBAL MARKET LEADER IN SERIOUS CRIME FIGHTING SOFTWARE AND SERVICES Wynyard is a global market leader in serious crime fighting software - Advanced crime analytics - Investigations case management Used by intelligence, investigations and information security operations - National security - Justice and law enforcement - Financial services - Critical national infrastructure To help prevent and solve serious and high consequence crime - Serious financial crime - Organised and trans-national crime - New generation extremism - High consequence cyber crime 3
4 THE ACCELERATING SCALE, COMPLEXITY AND IMPACT OF NEW AND CYBER CRIME HAS CREATED GLOBAL PROBLEMS 40 YEARS 20 YEARS 5 YEARS 4
5 WYNYARD S SERIOUS CRIME FIGHTING SOFTWARE PLATFORM Wynyard Advanced Crime Analytics Rapidly surface and explore entities, relationships and events of interest hidden in masses of structured and unstructured data. Rules and Alerts Search Pathfinder Queries Link Analysis Location Analysis Anomaly Detection Timeline Analysis Text Analytics Sensor data Machine Learning Stream Processing Serious Crime Serious financial crime Organised & trans-national crime New generation extremism High consequence cyber crime Wynyard Investigations Case Management Manage serious crime investigations and operations Prevent and solve serious crime. Case Management Entity Management Property Management Lines of Enquiry Incident Management Tasking Disclosure Brief of Evidence Dashboards 5
6 WYNYARD S SERIOUS CRIME FIGHTING SOFTWARE SOLUTIONS Gun Crime Analytics Persons of Interest Mobile Device Analytics Fraud and Anti- Money Laundering Counter Terrorism Cyber Espionage and Sabotage Open-Source Intelligence Serious Crime Investigations 6
7 7
8 THE SCALE, COMPLEXITY AND IMPACT OF NEW AND CYBER CRIME IS FUELLING A NEW $US8 BILLION SOFTWARE MARKET Total Addressable Market (TAM) for serious crime fighting software and services est. $US8 billion No other serious crime specialist, no dominant market player and high barriers for new entrants Company Core Business Wynyard Group Advanced Crime Analytics and Investigations Case Management Palantir Technologies Data Analysis Advanced Crime Analytics $7 Billion Investigations Case Management $1 Billion BAE Systems SAS Institute Financial Crime and Cyber Security Business Intelligence SAP Business Operations EMC Big Data Management IBM Systems Integrator HP Systems Integrator 8
9 WYNYARD BUSINESS MODEL Innovation Big data, advanced crime analytics, person of interest, crime science Products Wynyard Advanced Crime Analytics and Wynyard Investigations Case Management Services Solution design, implementation, training and managed service Revenue Software licence (30%), recurring software maintenance (55%) and professional services (15%) 1 Go-to-Market Strategy Land and expand Target Industries Government, Financial Services and Critical National Infrastructure Target Total Contract Value $1M to $10M over an initial 3 year contract term Channels Direct and leading systems integrators 1. Approximate mix of software licence, recurring software maintenance and services revenue as % of total revenue 9
10 WHY CUSTOMERS CHOOSE WYNYARD Serious crime specialists Proven crime resolution, crime prevention and operational results Purpose-built big data management, advanced crime analytics and investigations product platform Speed to market with powerful new crime fighting solutions Platform scalability and performance Affordable total cost of ownership Security Software and company provenance 10
11 WYNYARD GLOBAL GROWTH STRATEGY Revenue growth with a pathway to profitability Larger contracts with lifetime customers 20 Half Year Revenue Growth $M Largest Customer Contract excl. Services $M H14A 2H14A 0 FY13 FY14 Expand sales and services channel partners Channel Partner Revenue as % Total Revenue 12% 10% 10% 8% 6% 4% 2% 1% 0% FY13A FY14A Building the leading big data crime analytics platform Market leading Advanced Crime Analytics, Computational and Big Data Management Platform 11
12 WYNYARD INDUSTRY ADVISORY COMMITTEE HERB HUNT (USA) Former EVP Symphony Technology Group, CTO and SVP Siebel Systems and VP IBM. LOUIS QUIJAS (USA) Ret Assistant Secretary for The Office for State and Local Law Enforcement, US Department of Homeland Security BOB MURRILL (UK) Ret. Commander Covert Policing, London Metropolitan Police DAVE JOHNSTON (UK) Ret. Commander Homicide and Serious Crime, London Metropolitan Police ANDY FRANCE (UK) Ret Deputy Director Cyber Defence UK Government Communications Headquarters (GCHQ) 12
13 WYNYARD GROUP SENIOR MANAGEMENT TEAM CRAIG RICHARDSON (NZL) Chief Executive Officer and Managing Director PAUL STOKES (UK) Chief Operating Officer MURRAY PAGE (NZL) Chief Financial Officer GARETH CRONIN (NZL) Vice President Engineering IAN SCHERGER (NZL) Chief Marketing Officer DEAN COOPER (UK) Vice President Product Management 13
14 WYNYARD GROUP SENIOR MANAGEMENT TEAM ROGER JARQUIN (NZL) Chief Technology Officer SARA MOTTUS (UK) Director Human Resources ARUN RAJ (UK) Vice President Global Services NEVIN GRIEVE (UK) Vice President Europe, Middle East and Africa JON PIERCEY (AUS) Vice President Asia Pacific DEREK BROWN (USA) Vice President Americas 14
15 WYNYARD GROUP BOARD OF DIRECTORS* DR MURRAY HORN (NZL) Board Chairman, Audit and Risk Committee and Chair of Nominations and Remuneration Committee SUSAN PETERSON (NZL) Chair of Audit and Risk Committee GUY HADDLETON (NZL) Technology Committee LOUIS GREVER (USA) Technology Committee *Craig Richardson is also a Wynyard Director RICHARD TWIGG (UK) Audit and Risk Committee DR RAJ BHOLE (USA) Nominations and Remuneration Committee 15
16 16
NERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationJanuary Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved Empowering a Fearless Internet
January 2018 Disrupting the B2B 2018 WHITEHAWK, Inc. All Rights Reserved www.whitehawk.com Cyber Security Market Empowering a Fearless Internet DISRUPTING THE B2B CYBER SECURITY MARKET Overview Cyber Security
More informationMegaport Limited ASX:MP1
Megaport Limited ASX:MP1 1HFY16 Market Update February 29 2016 megaport.com Megaport ACN 607 301 959 What is Megaport? Megaport is the leading, global, independent and neutral provider of Elastic Interconnection
More informationRedflex Holdings Limited was listed on the Australian Securities Exchange in January 1997.
ASX ANNOUNCEMENT 25 October 2017 Redflex Holdings Limited ABN 96 069 306 216 2017 AGM Presentations Attached is the Chairman s Address and the Group Chief Executive Officer s Presentation that will be
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationDigital Forensics - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationSerious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime
Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime Serious Organised Crime Agency Background Established under the Serious Organised Crime and Police Act 2005 NDPB
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationCFE Exam Review Course
CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our
More informationSECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC
SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC CivSec 2018 CIVIL SECURITY CONGRESS AND EXPOSITION 1-3 MAY 2018 MELBOURNE AUSTRALIA MELBOURNE CONVENTION AND EXHIBITION CENTRE www.civsec.com.au
More informationCyber Intel within European Cybercrime Center Ops
@EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3
More informationThe APEC Model. Global Partnership through Regional Initiatives
The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security
More informationUncovering the Risk of SAP Cyber Breaches
Uncovering the Risk of SAP Cyber Breaches Research sponsored by Onapsis Independently Conducted by Ponemon Institute LLC February 2016 1 Part 1. Introduction Uncovering the Risks of SAP Cyber Breaches
More informationICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia
ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of
More informationMeeting of the BBC Audit and Risk Committee SUMMARY MINUTES. Thursday 22 June, 2017 New Broadcasting House, London
Meeting of the BBC Audit and Risk Committee SUMMARY MINUTES Thursday 22 June, 2017 New Broadcasting House, London ITEMS OF BUSINESS 1. Internal Audit quarterly reporting: a) Internal Audit quarterly update
More informationASX Announcement. 13 November Annual General Meeting Chairman s Address
ASX Announcement 13 November 2018 2018 Annual General Meeting Chairman s Address At last year s Annual General Meeting, we discussed how NEXTDC was expanding the capacity of its existing facilities and
More informationIntroduction. January 1, 2015
Introduction January 1, 2015 Radio Frequency IDentification Technologies that enable the capture of data about objects remotely using radio energy Our Mission To promote the public good by promoting high
More informationLIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150
COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08
More informationCustomer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach
Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand
More informationDetect Fraud & Financial Crime
IBM i2 Intelligence Analysis Detect Fraud & Financial Crime Acquire Discover Action! Urs Christen Security Sales Government urs.christen@ch.ibm.com 1 IBM Security 2014 IBM Corporation Build an integrated
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationNERC Staff Organization Chart 2015 Budget
NERC Staff Organization Chart President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Associate Director, Member Relations and MRC Secretary (Dept. 2100) Senior Vice President and Chief Reliability
More informationJane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.
Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,
More informationFor personal use only
2016 BluGlass Investor Presentation GILES BOURNE MANAGING DIRECTOR CORPORATE OVERVIEW BOARD George Venardos Chairman Giles Bourne Managing Director CORPORATE Established 2006 TOP SHAREHOLDERS as at 1 Aug.
More informationCyber Security is it a boardroom issue?
Brisbane, 23 September 2014 Alistair Blake Director Cyber Security & Risk Services Today s session will cover Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness
More informationSocial Engineering: We are the target Sponsor Guide
Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the
More informationOffice of the Minister of Broadcasting, Communications and Digital Media Chair, Cabinet Appointments and Honours Committee
Office of the Minister of Broadcasting, Communications and Digital Media Chair, Cabinet Appointments and Honours Committee CERT NZ Establishment Advisory Board Extension and Appointments Proposal 1. This
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationThreat-Agnostic Defense tm is the New Security Paradigm
Company Overview Nyotron Overview Threat-Agnostic Defense tm is the New Security Paradigm Nyotron is bringing innovation to cybersecurity with a Threat-Agnostic Defense approach to endpoint security products
More informationEXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake
EXECUTIVE BRIEF : How Hybrid IT Outsourcing Shifts IT Focus to Innovation Challenge IT leaders are tasked to do more with less and increase technology innovation. At Stake As IT increasingly becomes the
More informationData Loss Prevention - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report
More informationCisco Gains Real-time Visibility in the Business with SAP HANA
Cisco Gains Real-time Visibility in the Business with SAP HANA What You Will Learn When an organization attempts to run itself without real-time visibility into the right data, the results can be lost
More informationStep 1: Open browser to navigate to the data science challenge home page
Step 1: Open browser to navigate to the data science challenge home page https://datascience.ey.com/ Step 2: Logging in You will need to create an account if you are a new user. Click the sign up button
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationMid-Market Data Center Purchasing Drivers, Priorities and Barriers
Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More informationCyber Security Development. Ghana in Perspective
Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review
More informationVademecum of Speakers
Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre
More informationSHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure
SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure platforms to cloud systems. Promotions will occur less often
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationChina and International Governance of Cybercrime
China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationRICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.
RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value
More informationDAY 1 - Monday 30th September 2013
DAY 1 - Monday 30th September 2013 Opening Ceremony 8.30am 10.00 am Remarks Oral Reid, Chairman Crime Stoppers Barbados Remarks Darwin Dottin, Commissioner of Police of Barbados Remarks Alex MacDonald,
More informationSoftware Systems Engineering Initiative. Improving defence software systems acquisition and support
Software Systems Engineering Initiative Improving defence software systems acquisition and support Where we are: Dependency % functions performed by software 90 80 70 60 50 40 30 20 10 0 F-22 B-2 F-16
More informationSamu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure
Samu Konttinen, CEO, F-Secure WE ARE F-SECURE 1 F-SECURE A FRONT RUNNER IN CYBER SECURITY We are the largest European single source of cyber security services and detection and response solutions for companies,
More informationThe ACFE Law Enforcement and Government Alliance
What is the ACFE? The Association of Certified Fraud Examiners (ACFE) is the world s largest anti-fraud organization and premier provider of anti-fraud training and education with more than 80,000 members
More informationJason Clark CHIEF SECURITY AND STRATEGY OFFICER, OPTIV. Renee Guttmann CHIEF INFORMATION SECURITY OFFICER, ROYAL CARIBBEAN CRUISE LINES
corporate overview the challenge Organizations are spending billions of dollars a year on security products, however recent security breaches have proven that the traditional security solutions are not
More information300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0
P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information
More informationMoving Your Business Forward
Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER
More information2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors
2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors November 3, 2015 Board of Directors Daniel H. Schulman Chairman of the Board, Symantec President and Chief Executive Officer,
More informationThe UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC
The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime
More informationCertificate Certificate number:
Certificate Certificate number: 2017-009 Based on certification examination in conformity with defined requirements in ISO/IEC 17021:2015 and ISO/IEC 27006:2015, the Information Security Management System
More informationA PRE-WORKSHOP TUTORIAL ON THE APEC CROSS-BORDER PRIVACY RULES AND THE APEC PRIVACY RECOGNITION FOR PROCESSORS
A PRE-WORKSHOP TUTORIAL ON THE APEC CROSS-BORDER PRIVACY RULES AND THE APEC PRIVACY RECOGNITION FOR PROCESSORS Markus Heyder, CIPL Anick Fortin-Cousens, IBM Joshua Harris, TRUSTe APEC Workshop: Building
More informationUNODC tackling cybercrime in support of a safe and secure AP-IS
UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway
More informationJane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions.
Jane s Military & Security Assessments Intelligence Centre Understand Threats. Assess Capabilities. Challenge Assumptions. OVERVIEW Comprehensive open-source data and independent expert analysis Jane s
More informationVARONIS PARTNER PROGRAM
ABOUT VARONIS FOUNDED 2005 HEADQUARTERS 1250 Broadway, 29th Floor New York, NY, USA 10001 For a full list of offices, go to www.varonis.com/company/contact OWNERSHIP Publicly-held, VRNS CUSTOMERS 6,250
More informationi2 Limited Company Profile Publication Date: 15 Mar 2011
Company Profile Publication Date: 15 Mar 2011 www.datamonitor.com Europe, Middle East & Africa 119 Farringdon Road London EC1R 3DA United Kingdom t: +44 20 7551 9000 f: +44 20 7551 9090 e: euroinfo@datamonitor.com
More informationProject III Public/private cooperation
Project Cybercrime@EAP III Public/private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental
More informationTEL AVIV
28-30.1.2019 Conference Chairman // DR. YOSSI VARDI CYBERTECH 2018 FIGURES: 15,000 attendees at the Cybertech 2018 conference and exhibition 170 local and international speakers discussed the latest innovations
More informationHonorable Members of the Public Safety and Criminal Justice Committee
Memorandum DATE August 10, 2018 TO Honorable Members of the Committee SUBJECT DPD Camera Surveillance Program On Monday, August 13, 2018, you will be briefed on the Police Department s Surveillance Cameras
More informationACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response
ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become
More informationNetwrix Virtual. Customer Summit 2016
Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationGuelph Police Service
Guelph Police Service The Guelph Police Service provides policing services to the City of Guelph and has an authorized complement of 196.5 police officers and 89.42 civilians. We serve our community by
More informationCyber Espionage A proactive approach to cyber security
Cyber Espionage A proactive approach to cyber security #DeloitteRA To mitigate the risks of advanced cyber threats, organisations should enhance their capabilities to proactively gather intelligence and
More informationCyber Security. It s not just about technology. May 2017
Cyber Security It s not just about technology May 2017 Introduction The Internet has opened a new frontier in warfare: everything is networked and anything networked can be hacked. - World Economic Forum
More informationCYBERTECH 2019 FIGURES:
2019 Supporters: Conference Chairman // DR. YOSSI VARDI CYBERTECH 2019 FIGURES: 18,000 attendees at the Cybertech 2019 conference and exhibition 180+ local and international speakers discussed the latest
More informationShareholder Luncheon and Webcast
OCTOBER 12, 2017 Shareholder Luncheon and Webcast HOWARD L. LANCE President & Chief Executive Officer Radiant Forward Looking Statement This presentation contains forward-looking statements and information,
More informationEffective Partnerships: Security and Privacy in Smart Cities
SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation
More informationInvestor Presentation CAT, INC. Ground Breaking Cyber Security Solutions. Cyber Attack: A Global Phenomenon
Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions Cyber Attack: A Global Phenomenon CAT, INC Summary: Cyber Advanced Technology, Inc. R & D Lab Offering 7-10 Year Next Generation
More informationInvestor Presentation Bulletproof Overview
Investor Presentation Bulletproof Overview Anthony Woodward - CEO Agenda Company Overview Cloud Market in Australia Bulletproof Services Client Case Studies Financial Results & Outlook The Future 1 Company
More informationTRAINING PROGRAMS AND EVENTS 2016 CATALOGUE
TRAINING PROGRAMS AND EVENTS 2016 CATALOGUE 2016 Training Programs and Events Meeting the Challenge of Amalgamation Leadership Forum Location: Sydney metro area Date: 22 February 2016 COMPLIMENTARY This
More informationEY Norwegian Cloud Maturity Survey 2018
EY Norwegian Cloud Maturity Survey 2018 Current and planned adoption of cloud services EY Norwegian Cloud Maturity Survey 2018 1 It is still early days for cloud adoption in Norway, and the complexity
More informationSpillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012
Version 1.3.0 of 1 July 2012 Contents 1 Introduction... 3 1.1 Authority... 3 1.2 Objective... 3 1.3 Target audience... 3 1.4 Version... 3 1.5 Enquiries... 3 2 Certification... 4 2.1 Framework for certification...
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationPictured is HMS Argyll with an idyllic scene of English countryside behind her.
Pictured is HMS Argyll with an idyllic scene of English countryside behind her. Department for International Trade Defence & Security Organisation Helping UK Companies to export www.gov.uk/dit-dso Our
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationInfosec Europe 2009 Business Strategy Theatre. Giving Executives the Security Management Information that they Really Need
Infosec Europe 2009 Business Strategy Theatre Giving Executives the Security Management Information that they Really Need Simon Marvell Managing Director simon.marvell@acuityrm.com Agenda 1. What financial
More informationIN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK
IN THE FRAME Computacenter Public Sector Frameworks FRAMEWORK SOLUTION PUBLIC SECTOR FRAMEWORK ACCELERATE TRANSFORMATION Put digitalisation in the fast lane with cost-effective, compliant and centralised
More informationFormation of NTT Security, a Specialized Security Company
June 6th, 2016 Nippon Telegraph and Telephone Corporation Formation of NTT Security, a Specialized Security Company Nippon Telegraph and Telephone Corporation (abbreviated to NTT; Head Office: Chiyoda-Ku,
More informationPERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established
PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37
More informationCYBERBIT P r o t e c t i n g a n e w D i m e n s i o n
CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the
More informationHP Heritage 6/17/2003. Digital Equipment Corp Ken Olsen Harlan Anderson. Hewlett-Packard Bill Hewlett Dave Packard
page 1 HP Heritage 1939 1957 Hewlett-Packard Bill Hewlett Dave Packard 1982 Compaq Rod Canion Jim Harris Bill Murto 1974 1997 Tandem Jim Treybig Digital Equipment Corp Ken Olsen Harlan Anderson 1979 Apollo
More informationBUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.
BUSINESS LECTURE TWO Dr Henry Pearson Cyber Security and Privacy - Threats and Opportunities. Introduction Henry started his talk by confessing that he was definitely not a marketer, as he had been occupied
More informationHitachi Announces Director Candidates
FOR IMMEDIATE RELEASE Contacts: Japan: Kazuko Amamoto U.K.: Yuki Maeda Hitachi, Ltd. Hitachi Europe Ltd. +81-3-5208-9324 +44-1628-585714 kazuko.amamoto.oo@hitachi.com yuki.maeda@hitachi-eu.com Hitachi
More informationSoftware Defined Storage Market Research Report - Global Forecast 2022
Report Information More information from: https://www.marketresearchfuture.com/reports/1958 Software Defined Storage Market Research Report - Global Forecast 2022 Report / Search Code: MRFR/SEM/1426-HCRR
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationEY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge
2018 Ernst & Young Advisory. All rights reserved. Graphics studio France 1802SG1267. ED 04082018 EY Consulting Is your strategy planning for the future or creating it? #TransformativeAge The better the
More informationPHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS
Information Analytics Expertise IHS TECHNOLOGY CONSULTING & ADVISORY SERVICES PHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS Oliver Philippou Senior Analyst Oliver.philippou@ihs.com
More informationInterim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR
Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN
More informationSeptember 2017 Quarter Update
September 2017 Quarter Update Highlights: BrainChip Studio Software Introduced as Commercially Available on 17 July 2017. BrainChip Accelerator Introduced as the First Neuromorphic Hardware Solution for
More informationSAP Security Remediation: Three Steps for Success Using SAP GRC
SAP Security Remediation: Three Steps for Success Using SAP GRC All companies need strong application security environments as part of a successful overall risk management strategy. Strong risk-oriented
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More information