CYNERGISTEK NYSE AMERICAN: CTEK
|
|
- Aubrey Strickland
- 5 years ago
- Views:
Transcription
1 CYNERGISTEK I N V E S T O R P R E S E N TAT I O N NYSE AMERICAN: CTEK
2 SAFE HARBOR STATEMENTS This presentation contains, and our officers and representatives may from time to time make, forward-looking statements within the meaning of the safe harbor provisions of the U.S. Private Securities Litigation Reform Act of Forward-looking statements can be identified by words such as: anticipate, intend, plan, goal, seek, believe, project, estimate, expect, strategy, future, likely, may, should, will and similar references to future periods. Examples of forward-looking statements include, among others, statements we make (herein or otherwise) regarding the size of the potential market for our services; the number of potential customers/clients for our services; plans and strategies of CynergisTek and its subsidiaries for future growth and performance; market acceptance of our business model; our ability to integrate acquisitions and merged companies; and timelines relating to growth, milestones, and strategic focus. Forward-looking statements are neither historical facts nor assurances of future performance. Instead, they are based only on management s current beliefs, expectations and assumptions regarding the future of our business, future plans and strategies, projections, anticipated events and trends, the economy and other future conditions. Because forward-looking statements relate to the future, they are subject to inherent uncertainties, risks and changes in circumstances that are difficult to predict and many of which are outside of our control. Our actual results and financial condition may differ materially from those indicated in the forward-looking statements. Therefore, you should not rely on any of these forward-looking statements. Important factors that could cause our actual results and financial condition to differ materially from those indicated in the forwardlooking statements include, among others, the risk factors discussed throughout Part II, Item 7. Management s Discussion and Analysis of Financial Condition and Results of Operations, and in Part I, Item 1A. Risk Factors of our Annual Report on Form 10-K for the year ended December 31, 2017; and throughout Part I, Item 2. Management s Discussion and Analysis of Financial Condition and Results of Operations of our Quarterly Reports on Form 10-Q for the quarters ending March and June 31. Any forward-looking statement made by us in this presentation is based only on information currently available to us and speaks only as of the date on which it is made. We expressly disclaim any obligation to publicly update any forwardlooking statement, whether written or oral, that may be made from time to time, whether as a result of new information, future developments, or otherwise. 2
3 INVESTMENT Pioneer and leader in healthcare cybersecurity Innovative service offerings filling the gap in the industry Loyal national customer base with large upsell opportunity Capitalizing on strong cybersecurity market growth 3
4 WHO WE ARE #1 CYBERSECURITY AND INFORMATION ASSURANCE COMPANY IN HEALTHCARE TOP KLAS PERFORMER 3RD STRAIGHT YEAR 2018 Most Comprehensive Cybersecurity Services STRONG RELATIONSHIPS & TRACK RECORD THOUGHT LEADERS WELL-KNOWN INDUSTRY PLAYER CynergisTek won the 2017 Best in KLAS Award for Cyber Security Advisory Services CynergisTek has been recognized by KLAS in the 2016 and 2018 Cybersecurity report as a top performing firm in healthcare cybersecurity. KLAS KLAS KLAS TRUSTED ADVISOR MARKET DRIVEN TAILORED SOLUTIONS Top Performer Cybersecurity 2018 Top Performer HIT Advisory Services 2018 Top Performer Technical Services
5 WHY CYNERGISTEK? RELATED COMPANIES HEALTHCARE SPECIALIZED KLAS OVERALL SCORE CYBERSECURITY SERVICES CLASSIFICATION CynergisTek 92.6 Comprehensive Deloitte X 79.8 Comprehensive FireEye X 89.5 Comprehensive Fortified Health Security 85.7 Comprehensive Optiv X 87.8 Comprehensive Coalfire X 85.0 Broad PWC X 89.2 Broad EY X 91.1 Broad Clearwater Compliance 95.0 Advisory Focused *All information from KLAS Cybersecurity Services 2018 Report June
6 CYNERGISTEK S MISSION To be that trusted partner that enables our healthcare clients to build the cybersecurity and information assurance programs they need to protect and support patient safety and care operations by delivering exceptional service, expertise and knowledge.
7 INDUSTRY SNAPSHOT 7
8 ATTACK SURFACES CONTINUE TO GROW GLOBAL HEALTHCARE CYBERSECURITY SPENDING EXPECTED TO EXCEED ~$65B OVER NEXT 5 YEARS 8
9 NAVIGATE & PREVENT BREACHES Ransomware Privacy Threats Internal and External Threats IoT Threats Social Engineering Phishing Attempts 9
10 THE SERVICES WE PROVIDE COMPLIANCE ASSIST PARTNER PROGRAM (CAPP) ANNUAL ASSESSMENT An annual extensive review to identify security gaps through the combination of the following: Information Security Program Assessment Technical Security Assessment Risk Analysis Architecture Assessment Wireless LAN Security Assessment MU EHR Security Controls Assessment INTERNAL & EXTERNAL TESTING CynergisTek will conduct regular internal and external testing to uncover potential threats. External: Quarterly Internal: Bi-Annually PERIODIC EXECUTIVE REVIEWS CynergisTek s executive team leads workshops that are designed to: Review remediation progress Provide guidance on regulatory changes and security threats Promote knowledge transference CAPP COMMUNITY CynergisTek Advisory Service addresses questions, concerns, and advice covering technology, program development and maintenance, and regulatory compliance matters. OPTIONAL SERVICES CynergisTek also offers optional services that can be customized to meet a compliance program s unique needs. CAPP 81% OF REVENUE COMES FROM MANAGED SERVICES WHICH INCLUDE CAPP PROGRAMS 10
11 THE SERVICES WE PROVIDE MAKE THE MOST OF YOUR PRIVACY MONITORING PROGRAM PATIENT PRIVACY MONITORING AS A SERVICE (PPMS) CynergisTek collaborates with your organization to support functionality of your patient privacy monitoring tool. DESCRIPTION PPMS SELECT PPMS ELITE Audit Program Development ü ü Current & Future State Analysis ü ü Optimization Plan & End User Training ü ü Validation and Testing of Audit Tool ü ü PPMS Proactive Audit Reporting Analysis ü ü Incident Documentation and Escalation of Findings ü ü Audit Tool Optimization ü ü Standard Program Reports ü ü Reactive Audit Reports, Advanced Analysis, Advanced Program Reports and Advisory Services ü 11
12 THE SERVICES WE PROVIDE TAKE THE LEGWORK OUT OF MONITORING VENDOR SECURITY MANAGEMENT Collaborates with your organization to support functionality of your patient privacy monitoring tool. VSM ASSESSMENT APPROACH Initiation: Analyst gets notified of ticket and initiates assessment in RiskSonar Monitoring: Questionnaire/documentation request sent, and assessment progress updated/monitored. Analysis: Analysis of vendor s input conducted, and gaps identified upon assessment submittal Reporting: Single Assessment Vendor Report created, client notified it is ready for review within RiskSonar Next Steps: Vendors notified of remediation requirements/re-assessments High Risk Vendors: Client is notified of high-risk vendors client uses Risk Acceptance or Risk Exception process Risk Exception: If client approves risk exception, vendor is tagged and tracked for annual renewal VSM VSM DELIVERABLES Single assessment vendor with report outlining security gaps and risk rating Status Updates on vendor participation and escalation of issues Quarterly Program Report covering high-level of the vendor program including recommendations 12
13 THE SERVICES WE PROVIDE SECURE AND PROTECT YOUR BIOMEDICAL DEVICES BIOMEDICAL DEVICE SECURITY TECHNICAL ASSESSMENT A comprehensive inventory of networked biomedical devices and the associated vulnerabilities. BIOMEDICAL DEVICE SECURITY PROGRAM ASSESSMENT An evaluation of security controls and an identification of gaps or vulnerabilities in the management practices for biomedical device security. BIOMEDICAL DEVICE SECURITY MANAGEMENT STRATEGY A strategy articulating different risk categories and a remediation roadmap to address the different categories and the unique issues/vulnerabilities. Biomedical BIOMEDICAL DEVICE SECURITY PROGRAM MANAGEMENT Our service is built to address the security aspects, as it relates to each component of the biomedical device lifecycle including policy development, pre-acquisition procedures, implementation and security control setup, identifying and reporting vulnerabilities, and coordinating remediation in conjunction with the device maintenance schedule. 13
14 THE SERVICES WE PROVIDE RESOURCE & TALENT TO BRIDGE THE RESOURCE GAP STRATEGIC SECURITY STAFFING Alleviate the efforts to source and employ skilled talent for projects that are high priority. Virtual CISO and Privacy Officers Sourcing difficult roles to cost-effective solution Identified to align with your needs for short-term, project specific, long-term, or temp-to-hire cybersecurity and privacy engagements Advisory services from resources recognized as subject matter experts in the healthcare industry CYBERSECURITY REMEDIATION Next steps after a security assessment On-demand seasoned security experts prioritize, implement and execute unique remediation plan Short- and long-term remediation plan Professional Services CYBERSECURITY PROGRAM DEVELOPMENT Utilize best practice standards and guidelines to review, build, and implement components of your security program Improve the effectiveness of a complex strategy Well-versed in many industry frameworks, ensuring the alignment of policy charters, program playbooks, and process and procedure documents are a solid foundation 14
15 THE SERVICES WE PROVIDE MANAGED PRINT SERVICE PROGRAM WITH SECURITY AND COMPLIANCE IN MIND ONE-STOP SOLUTION For all service, supplies, and acquisition requests Strategic approach to identify cost savings opportunities Healthcare exclusive and manufacturer agnostic Assess risks associated with print devices and create remediation plan OPTIMIZATION & WORKFLOW SERVICES Toner: direct delivery to the device Helpdesk services: support and service for your fleet Control print: processes and technology to impact print utilization Device integration: test equipment against application and technology Print shop management: staff to support and oversee timely production of print jobs PERFORMANCE-BASED REPORTING SERVICES User-level utilization reporting: further reduce unnecessary print volume STANDARD ENGAGEMENT Service & support Asset management Installation & removal services Training Utilization review and reporting Device security assessment FINANCIAL MANAGEMENT SERVICES Invoice support: validate invoices against client contracts to ensure validity of charges Vendor contracts: we provide a comprehensive review of third- party contracts and provide opportunities for improvement Recurring Revenue model with 3-5-year contracts MPS 15
16 MULTIPLE DRIVERS FOR LONG-TERM GROWTH Expand into New Markets Non- Organic Growth Increase Sales Reach, Accelerate Land and Expand 16
17 TRUSTED BY HEALTHCARE NATIONWIDE Covered Entities* - over 1,000 healthcare provider locations and business associates Partnered with 4 of the top 10 largest health systems in the US *Covered entities are defined in the Health Insurance Portability and Accountability Act (HIPAA) rules as (1) health plans, (2) health care clearinghouses, and (3) health care providers who electronically transmit any health information in connection with transactions for which the department of Health and Human Services (HHS) has adopted standards. 17
18 CTEK ALLIANCE 18
19 FINANCIAL SNAPSHOT COMPANY TICKER NYSE: CTEK UNITS: USD Price (as of 11/06/18) $4.15 FD Shares Outstanding** 9.8M Market Cap $41M LTM Revenue $71.2M Cash** $6.4 Long- and Short-Term Debt** Total Enterprise Value $22.8M $63.4M ** Data as of Q3 ending September 30 th,
20 FINANCIAL HIGHLIGHTS REVENUE & GROSS MARGIN Financial Highlights ($Millions) Expanding New Revenue Lines to Increase Gross Margins $61 $60 $72 $53 $53 17% 20% 29% 28% 27% M M 2018 Managed Services Professional & Consulting Services Equipment & Software 20
21 FINANCIAL HIGHLIGHTS ADJUSTED EBITDA Financial Highlights ($Millions) Profitable While Investing in Growth $7.8 $3.4 $3.3 $6.1 $5.3 $4.0 $4.9 $3.6 $1.8 $ M M 2018 Adjusted EBITDA Adjusted Earnings 1 Adjusted EBITDA: adjusting EBITDA for stock-based compensation and non-recurring charges related to our recent debt refinancing and the departure of a senior executive. 2 Adjusted Earnings: adjusting net income for estimated cash tax adjustment, adjustment in contingent consideration from acquisition, amortization and impairment of intangibles, non-recurring charges related to our recent debt refinancing and the departure of a senior executive, stock-based compensation and depreciation. 21
22 THANK YOU! cynergistek.com NYSE AMERICA: CTEK 22
Investor Presentation. March 2018 NYSE AMERICAN: CTEK
Investor Presentation March 2018 NYSE AMERICAN: CTEK Safe Harbor Statements This presentation contains, and our officers and representatives may from time to time make, forwardlooking statements within
More informationInvestor Presentation
Investor Presentation October 2017 NYSE MKT: CTEK CynergisTek won the 2017 Best in KLAS Award for Cyber Security Advisory Services CynergisTek was recognized in the 2016 KLAS Security Advisory Services
More information2017 Q4 Earnings Conference Call
2017 Q4 Earnings Conference Call Forward Looking Statements This presentation includes certain forward-looking statements that are made as of the date hereof and are based upon current expectations, which
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationCincinnati Bell Inc. March 4, 2013
Cincinnati Bell Inc. March 4, 2013 Safe Harbor This presentation and the documents incorporated by reference herein contain forwardlooking statements regarding future events and our future results that
More informationThis presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future
This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future results that are subject to the safe harbor provisions of
More informationCFO Commentary on Second Quarter 2016 Financial Results
CFO Commentary on Second Quarter 2016 Financial Results August 2, 2016 Related Information The commentary in this document can be referenced in the financial information found in the earnings release issued
More informationUBS 42 nd Annual Global Media and Communications Conference December 8, Leigh Fox, CFO
UBS 42 nd Annual Global Media and Communications Conference December 8, 2014 Leigh Fox, CFO Safe Harbor This presentation and the documents incorporated by reference herein contain forward-looking statements
More informationInvestor Presentation. February 2016
Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationFirst Quarter 2018 Earnings Presentation. May 8, 2018
First Quarter 2018 Earnings Presentation May 8, 2018 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions,
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationTech Data s Acquisition of Avnet Technology Solutions
Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe
More informationSierra Wireless. Corporate Overview. May 2017
Sierra Wireless Corporate Overview May 2017 Sierra Wireless Leader, Innovator, Trusted Partner in the IoT IoT Leader in device-to-cloud solutions Innovator essential IP in Cat M1 edge intelligence open
More informationCincinnati Bell Third Quarter 2011 Results. November 3, 2011
Cincinnati Bell Third Quarter 2011 Results November 3, 2011 Today s Agenda Performance Highlights Jack Cassidy, President & Chief Executive Officer Review of Wireline, Wireless, IT Services & Hardware
More informationHPE to Acquire Nimble Storage
HPE to Acquire Nimble Storage March 7, 2017 http://www.hpe.com/investor/home Forward Looking Statements This document contains forward-looking statements within the meaning of the safe harbor provisions
More informationVerizon closes 2017 with strong wireless customer growth and retention, well-positioned in new markets
News Release FOR IMMEDIATE RELEASE January 23, 2018 Media contact: Bob Varettoni 908.559.6388 robert.a.varettoni@verizon.com Verizon closes 2017 with strong wireless customer growth and retention, well-positioned
More informationACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018
ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationInvestor Overview 2018
Investor Overview 2018 1 SAFE HARBOR This presentation contains forward-looking statements that involve risks, uncertainties and assumptions. If the risks or uncertainties ever materialize or the assumptions
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationSOLUTION BRIEF Virtual CISO
SOLUTION BRIEF Virtual CISO programs that prepare you for tomorrow s threats today Organizations often find themselves in a vise between ever-evolving cyber threats and regulatory requirements that tighten
More informationRed Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008
Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities September 4, 2008 Safe Harbor Forward-Looking Statements Certain statements contained or discussed in this presentation
More informationMarketing with Northland Capital Markets
Marketing with Northland Capital Markets At EXFO, we make networks smarter Philippe Morin Chief Executive Officer October 19-20, 2017 Forwardlooking statements Certain statements in this presentation,
More informationREINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS
REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS HP Inc. Sustainability Briefing January 22, 2018 1 Copyright 2018 HP Development Company, L.P. The information contained herein is subject to change without
More informationOPPORTUNITY TO ACCELERATE MOMENTUM
OPPORTUNITY TO ACCELERATE MOMENTUM Pierre-Paul Allard Chief Customer Officer Juniper Networks CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within
More informationCincinnati Bell Second Quarter 2012 Results. August 8, 2012
Cincinnati Bell Second Quarter 2012 Results August 8, 2012 Today s Agenda Performance Highlights Jack Cassidy, President & Chief Executive Officer Review of Cincinnati Bell Communications Ted Torbeck,
More informationWINNING IN A MULTICLOUD WORLD
WINNING IN A MULTICLOUD WORLD Rami Rahim CEO, Juniper Networks 2 CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within the meaning of Section 27A
More informationGrow Your Services Business
Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business
More informationMarketing with National Bank Financial
Marketing with National Bank Financial At EXFO, we make networks smarter Philippe Morin Chief Executive Officer November 1, 2017 Forwardlooking statements Certain statements in this presentation, or given
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More information2nd Quarter 2017 Earnings Results
2nd Quarter 2017 Earnings Results August 2, 2017 Forward-Looking Statements Except for historical and factual information, the matters set forth in this presentation and other of our oral or written statements
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationProtecting your data. EY s approach to data privacy and information security
Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationCYBERSECURITY AND THE MIDDLE MARKET
CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE
More informationTeraGo Reports Fourth Quarter and Year End 2018 Results
TeraGo Reports Fourth Quarter and Year End Results Toronto February 21, 2019 TeraGo Inc. ( TeraGo or the Company ) (TSX: TGO, www.terago.ca), today announced financial and operating results for the fourth
More informationNasdaq: DAIO. Anthony Ambrose. President and CEO. Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation
Nasdaq: DAIO Anthony Ambrose President and CEO Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation Safe Harbor The matters that we discuss today will include forward-looking
More informationEvaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium
Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,
More informationSafe Harbor Statement
May 2017 1 Safe Harbor Statement Matters discussed in this presentation may contain forward-looking statements that are subject to risks and uncertainties. These risks and uncertainties could cause the
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More informationAnticipating the wider business impact of a cyber breach in the health care industry
Anticipating the wider business impact of a cyber breach in the health care industry John Gelinne, Director Cyber Risk Services Deloitte & Touche LLP jgelinne@deloitte.com commodore_22 Hector Calzada,
More informationEngaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,
Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev
More informationState of South Carolina Interim Security Assessment
State of South Carolina Interim Security Assessment Deloitte & Touche LLP Date: October 28, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is
More informationColumbus delivers 52% growth in revenue
Release no. 20, 2018 Interim Management Statement for Q3 YTD 2018 November 7th, 2018 Release no. 20/2018 Interim Management Statement Q3 YTD 2018 Columbus delivers 52% growth in revenue In the first three
More informationBig data privacy in Australia
Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that
More informationFourth Quarter and Full Year 2018 Earnings Presentation. February 21, 2019
Fourth Quarter and Full Year 2018 Earnings Presentation February 21, 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements
More informationMedical Devices and Cyber Issues JANUARY 23, American Hospital Association and BDO USA, LLP. All rights reserved.
Medical Devices and Cyber Issues JANUARY 23, 2018 AHA and Cybersecurity Policy Approaches Role of the FDA FDA Guidance and Roles Pre-market Post-market Assistance during attack Recent AHA Recommendations
More informationManagement Presentation SEP 2017
Management Presentation SEP 2017 Safe Harbor Statement This presentation contains forward-looking statements, which express the current beliefs and expectations of management. Such statements are based
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationIDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment Chad Huston Ali Zaidi THIS IDC MARKETSCAPE EXCERPT FEATURES: WIPRO IDC
More informationHow icims Supports. Your Readiness for the European Union General Data Protection Regulation
How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationCincinnati Bell. Morgan Stanley Technology, Media, and Telecommunications Conference February 28, 2012
Cincinnati Bell Morgan Stanley Technology, Media, and Telecommunications Conference February 28, 2012 Safe Harbor This presentation and the documents incorporated by reference herein contain forwardlooking
More informationAllot Corporate Presentation
Allot Corporate Presentation (NASDAQ, TASE: ALLT) November 2018 Forward Looking Statements This presentation contains forward-looking statements, which express the current beliefs and expectations of Company
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationThe HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance
The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San
More informationFederal Market & Strategy Overview for Investors
Federal Market & Strategy Overview for Investors Presented by Venkatapathi Puvvada (PV) Senior Vice President/President, Unisys Federal September 18, 2017 Disclaimer Statements made by Unisys during today
More informationSamu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%
Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationCyber Risk and Networked Medical Devices
Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with
More informationReinvention and Transformation in Personal Systems March 22,
Reinvention and Transformation in Personal Systems March 22, 2017 http://www.hp.com/investor/home 1 Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without
More informationCYRUSONE TO ACQUIRE ZENIUM DATA CENTERS
CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS THIRD QUARTER 2017 EARNINGS October 31, 2017 DECEMBER 21, 2017 SAFE HARBOR S A F E H A R B O R This presentation contains forward-looking statements regarding future
More informationSOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)
SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) Adaptive Cybersecurity at the Speed of Your Business Attackers Evolve. Risk is in Constant Fluctuation. Security is a Never-ending Cycle.
More informationInvestor Presentation February 2019
Investor Presentation February 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions, acquisition
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationConference call April 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q1 2018
Conference call April 26, 2018 15:00 / Helsinki 08:00 / New York 1 Nokia 2016 Q1 2018 Disclaimer It should be noted that Nokia and its business are exposed to various risks and uncertainties, and certain
More informationCYRUSONE / GDS STRATEGIC PARTNERSHIP. October 18, 2017
CYRUSONE / GDS STRATEGIC PARTNERSHIP October 18, 2017 Safe Harbor This presentation contains forward-looking statements regarding future events and our future results that are subject to the "safe harbor"
More informationEB, Elektrobit Corporation Interim Report 2Q CEO Jukka Harju August 8, 2012
EB, Elektrobit Corporation Interim Report 2Q 2012 CEO Jukka Harju August 8, 2012 Forward-looking Statements Some statements made in this material relating to future circumstances or status, including,
More informationSOC for cybersecurity
April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory
More informationNOKIA FINANCIAL RESULTS Q3 / 2012
Nokia Internal Use Only NOKIA FINANCIAL RESULTS Q3 / 2012 Conference Call October 18, 2012 15.00 / Helsinki 08.00 / New York Stephen Elop / President & CEO Timo Ihamuotila / CFO Matt Shimao / Head of Investor
More informationCincinnati Bell 2007 Deutsche Bank Media & Telecom Conference Brian Ross, CFO
Cincinnati Bell 2007 Deutsche Bank Media & Telecom Conference Brian Ross, CFO June 4, 2007 1 Safe Harbor Certain of the statements and predictions contained in this presentation constitute forward-looking
More informationNokia Conference Call 1Q 2012 Financial Results
Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationWindstream acquisition of Broadview Networks Transaction overview April 13, 2017
Windstream acquisition of Broadview Networks Transaction overview April 13, 2017 Safe Harbor Statement Windstream Holdings, Inc. claim the protection of the safe-harbor for forward-looking statements contained
More informationVerizon builds on 2Q momentum with strong 3Q results
News Release FOR IMMEDIATE RELEASE October 19, 2017 Media contact: Bob Varettoni 908.559.6388 robert.a.varettoni@verizon.com Verizon builds on 2Q momentum with strong 3Q results 3Q 2017 highlights 89 cents
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationAvanade s Approach to Client Data Protection
White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success
More informationINVESTOR RELATIONS 28 January Zayo Reporting Update Call
INVESTOR RELATIONS 28 January 2016 Zayo Reporting Update Call ZAYO GROUP SAFE HARBOR Information contained in this presentation that is not historical by nature constitutes forward-looking statements which
More informationConference call July 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q2 2018
Conference call July 26, 2018 15:00 / Helsinki 08:00 / New York 1 Nokia 2016 Q2 2018 Disclaimer It should be noted that Nokia and its business are exposed to various risks and uncertainties, and certain
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationThe HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information
The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,
More information3Q Investor Presentation
3Q 2017 Investor Presentation 1 SAFE HARBOR STATEMENT This presentation contains statements of a forward-looking nature. These statements are made under the safe harbor provisions of the U.S. Private Securities
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationCreate a planet run by the sun.
Create a planet run by the sun. Sunrun & Comcast Agreement August 24, 2017 Safe Harbor & Forward Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A
More informationAdaptive & Unified Approach to Risk Management and Compliance via CCF
SESSION ID: SOP-W08 Adaptive & Unified Approach to Risk Management and Compliance via CCF Vishal Kalro Manager, Risk Advisory & Assurance Services (RAAS) Adobe @awish11 Disclaimer All the views presented
More informationIncident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles
Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of
More informationHIPAA Compliance is not a Cybersecurity Strategy
HIPAA Compliance is not a Cybersecurity Strategy Presented by: Hector Rodriguez, WW Health CISO, Microsoft Jay Trinckes, Director, Coalfire Speaker Introductions Hector Rodriguez, WW Health CISO, Microsoft
More informationTeraGo Reports 2018 Third Quarter Financial Results
TeraGo Reports Third Quarter Financial Results Toronto November 7, TeraGo Inc. ( TeraGo or the Company ) (TSX: TGO, www.terago.ca), today announced financial and operating results for the quarter ended,.
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationICF Investor Presentation. November 2017
ICF Investor Presentation November 2017 Cautionary Statement 2 Introducing ICF ICF conquers complexity for its clients across a range of markets Health and Social Programs Energy, Environment and Infrastructure
More informationThird Quarter 2014 Earnings November 5, 2014
Third Quarter 2014 Earnings November 5, 2014 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes about future expectations, plans and prospects, including concerning
More information