CYNERGISTEK NYSE AMERICAN: CTEK

Size: px
Start display at page:

Download "CYNERGISTEK NYSE AMERICAN: CTEK"

Transcription

1 CYNERGISTEK I N V E S T O R P R E S E N TAT I O N NYSE AMERICAN: CTEK

2 SAFE HARBOR STATEMENTS This presentation contains, and our officers and representatives may from time to time make, forward-looking statements within the meaning of the safe harbor provisions of the U.S. Private Securities Litigation Reform Act of Forward-looking statements can be identified by words such as: anticipate, intend, plan, goal, seek, believe, project, estimate, expect, strategy, future, likely, may, should, will and similar references to future periods. Examples of forward-looking statements include, among others, statements we make (herein or otherwise) regarding the size of the potential market for our services; the number of potential customers/clients for our services; plans and strategies of CynergisTek and its subsidiaries for future growth and performance; market acceptance of our business model; our ability to integrate acquisitions and merged companies; and timelines relating to growth, milestones, and strategic focus. Forward-looking statements are neither historical facts nor assurances of future performance. Instead, they are based only on management s current beliefs, expectations and assumptions regarding the future of our business, future plans and strategies, projections, anticipated events and trends, the economy and other future conditions. Because forward-looking statements relate to the future, they are subject to inherent uncertainties, risks and changes in circumstances that are difficult to predict and many of which are outside of our control. Our actual results and financial condition may differ materially from those indicated in the forward-looking statements. Therefore, you should not rely on any of these forward-looking statements. Important factors that could cause our actual results and financial condition to differ materially from those indicated in the forwardlooking statements include, among others, the risk factors discussed throughout Part II, Item 7. Management s Discussion and Analysis of Financial Condition and Results of Operations, and in Part I, Item 1A. Risk Factors of our Annual Report on Form 10-K for the year ended December 31, 2017; and throughout Part I, Item 2. Management s Discussion and Analysis of Financial Condition and Results of Operations of our Quarterly Reports on Form 10-Q for the quarters ending March and June 31. Any forward-looking statement made by us in this presentation is based only on information currently available to us and speaks only as of the date on which it is made. We expressly disclaim any obligation to publicly update any forwardlooking statement, whether written or oral, that may be made from time to time, whether as a result of new information, future developments, or otherwise. 2

3 INVESTMENT Pioneer and leader in healthcare cybersecurity Innovative service offerings filling the gap in the industry Loyal national customer base with large upsell opportunity Capitalizing on strong cybersecurity market growth 3

4 WHO WE ARE #1 CYBERSECURITY AND INFORMATION ASSURANCE COMPANY IN HEALTHCARE TOP KLAS PERFORMER 3RD STRAIGHT YEAR 2018 Most Comprehensive Cybersecurity Services STRONG RELATIONSHIPS & TRACK RECORD THOUGHT LEADERS WELL-KNOWN INDUSTRY PLAYER CynergisTek won the 2017 Best in KLAS Award for Cyber Security Advisory Services CynergisTek has been recognized by KLAS in the 2016 and 2018 Cybersecurity report as a top performing firm in healthcare cybersecurity. KLAS KLAS KLAS TRUSTED ADVISOR MARKET DRIVEN TAILORED SOLUTIONS Top Performer Cybersecurity 2018 Top Performer HIT Advisory Services 2018 Top Performer Technical Services

5 WHY CYNERGISTEK? RELATED COMPANIES HEALTHCARE SPECIALIZED KLAS OVERALL SCORE CYBERSECURITY SERVICES CLASSIFICATION CynergisTek 92.6 Comprehensive Deloitte X 79.8 Comprehensive FireEye X 89.5 Comprehensive Fortified Health Security 85.7 Comprehensive Optiv X 87.8 Comprehensive Coalfire X 85.0 Broad PWC X 89.2 Broad EY X 91.1 Broad Clearwater Compliance 95.0 Advisory Focused *All information from KLAS Cybersecurity Services 2018 Report June

6 CYNERGISTEK S MISSION To be that trusted partner that enables our healthcare clients to build the cybersecurity and information assurance programs they need to protect and support patient safety and care operations by delivering exceptional service, expertise and knowledge.

7 INDUSTRY SNAPSHOT 7

8 ATTACK SURFACES CONTINUE TO GROW GLOBAL HEALTHCARE CYBERSECURITY SPENDING EXPECTED TO EXCEED ~$65B OVER NEXT 5 YEARS 8

9 NAVIGATE & PREVENT BREACHES Ransomware Privacy Threats Internal and External Threats IoT Threats Social Engineering Phishing Attempts 9

10 THE SERVICES WE PROVIDE COMPLIANCE ASSIST PARTNER PROGRAM (CAPP) ANNUAL ASSESSMENT An annual extensive review to identify security gaps through the combination of the following: Information Security Program Assessment Technical Security Assessment Risk Analysis Architecture Assessment Wireless LAN Security Assessment MU EHR Security Controls Assessment INTERNAL & EXTERNAL TESTING CynergisTek will conduct regular internal and external testing to uncover potential threats. External: Quarterly Internal: Bi-Annually PERIODIC EXECUTIVE REVIEWS CynergisTek s executive team leads workshops that are designed to: Review remediation progress Provide guidance on regulatory changes and security threats Promote knowledge transference CAPP COMMUNITY CynergisTek Advisory Service addresses questions, concerns, and advice covering technology, program development and maintenance, and regulatory compliance matters. OPTIONAL SERVICES CynergisTek also offers optional services that can be customized to meet a compliance program s unique needs. CAPP 81% OF REVENUE COMES FROM MANAGED SERVICES WHICH INCLUDE CAPP PROGRAMS 10

11 THE SERVICES WE PROVIDE MAKE THE MOST OF YOUR PRIVACY MONITORING PROGRAM PATIENT PRIVACY MONITORING AS A SERVICE (PPMS) CynergisTek collaborates with your organization to support functionality of your patient privacy monitoring tool. DESCRIPTION PPMS SELECT PPMS ELITE Audit Program Development ü ü Current & Future State Analysis ü ü Optimization Plan & End User Training ü ü Validation and Testing of Audit Tool ü ü PPMS Proactive Audit Reporting Analysis ü ü Incident Documentation and Escalation of Findings ü ü Audit Tool Optimization ü ü Standard Program Reports ü ü Reactive Audit Reports, Advanced Analysis, Advanced Program Reports and Advisory Services ü 11

12 THE SERVICES WE PROVIDE TAKE THE LEGWORK OUT OF MONITORING VENDOR SECURITY MANAGEMENT Collaborates with your organization to support functionality of your patient privacy monitoring tool. VSM ASSESSMENT APPROACH Initiation: Analyst gets notified of ticket and initiates assessment in RiskSonar Monitoring: Questionnaire/documentation request sent, and assessment progress updated/monitored. Analysis: Analysis of vendor s input conducted, and gaps identified upon assessment submittal Reporting: Single Assessment Vendor Report created, client notified it is ready for review within RiskSonar Next Steps: Vendors notified of remediation requirements/re-assessments High Risk Vendors: Client is notified of high-risk vendors client uses Risk Acceptance or Risk Exception process Risk Exception: If client approves risk exception, vendor is tagged and tracked for annual renewal VSM VSM DELIVERABLES Single assessment vendor with report outlining security gaps and risk rating Status Updates on vendor participation and escalation of issues Quarterly Program Report covering high-level of the vendor program including recommendations 12

13 THE SERVICES WE PROVIDE SECURE AND PROTECT YOUR BIOMEDICAL DEVICES BIOMEDICAL DEVICE SECURITY TECHNICAL ASSESSMENT A comprehensive inventory of networked biomedical devices and the associated vulnerabilities. BIOMEDICAL DEVICE SECURITY PROGRAM ASSESSMENT An evaluation of security controls and an identification of gaps or vulnerabilities in the management practices for biomedical device security. BIOMEDICAL DEVICE SECURITY MANAGEMENT STRATEGY A strategy articulating different risk categories and a remediation roadmap to address the different categories and the unique issues/vulnerabilities. Biomedical BIOMEDICAL DEVICE SECURITY PROGRAM MANAGEMENT Our service is built to address the security aspects, as it relates to each component of the biomedical device lifecycle including policy development, pre-acquisition procedures, implementation and security control setup, identifying and reporting vulnerabilities, and coordinating remediation in conjunction with the device maintenance schedule. 13

14 THE SERVICES WE PROVIDE RESOURCE & TALENT TO BRIDGE THE RESOURCE GAP STRATEGIC SECURITY STAFFING Alleviate the efforts to source and employ skilled talent for projects that are high priority. Virtual CISO and Privacy Officers Sourcing difficult roles to cost-effective solution Identified to align with your needs for short-term, project specific, long-term, or temp-to-hire cybersecurity and privacy engagements Advisory services from resources recognized as subject matter experts in the healthcare industry CYBERSECURITY REMEDIATION Next steps after a security assessment On-demand seasoned security experts prioritize, implement and execute unique remediation plan Short- and long-term remediation plan Professional Services CYBERSECURITY PROGRAM DEVELOPMENT Utilize best practice standards and guidelines to review, build, and implement components of your security program Improve the effectiveness of a complex strategy Well-versed in many industry frameworks, ensuring the alignment of policy charters, program playbooks, and process and procedure documents are a solid foundation 14

15 THE SERVICES WE PROVIDE MANAGED PRINT SERVICE PROGRAM WITH SECURITY AND COMPLIANCE IN MIND ONE-STOP SOLUTION For all service, supplies, and acquisition requests Strategic approach to identify cost savings opportunities Healthcare exclusive and manufacturer agnostic Assess risks associated with print devices and create remediation plan OPTIMIZATION & WORKFLOW SERVICES Toner: direct delivery to the device Helpdesk services: support and service for your fleet Control print: processes and technology to impact print utilization Device integration: test equipment against application and technology Print shop management: staff to support and oversee timely production of print jobs PERFORMANCE-BASED REPORTING SERVICES User-level utilization reporting: further reduce unnecessary print volume STANDARD ENGAGEMENT Service & support Asset management Installation & removal services Training Utilization review and reporting Device security assessment FINANCIAL MANAGEMENT SERVICES Invoice support: validate invoices against client contracts to ensure validity of charges Vendor contracts: we provide a comprehensive review of third- party contracts and provide opportunities for improvement Recurring Revenue model with 3-5-year contracts MPS 15

16 MULTIPLE DRIVERS FOR LONG-TERM GROWTH Expand into New Markets Non- Organic Growth Increase Sales Reach, Accelerate Land and Expand 16

17 TRUSTED BY HEALTHCARE NATIONWIDE Covered Entities* - over 1,000 healthcare provider locations and business associates Partnered with 4 of the top 10 largest health systems in the US *Covered entities are defined in the Health Insurance Portability and Accountability Act (HIPAA) rules as (1) health plans, (2) health care clearinghouses, and (3) health care providers who electronically transmit any health information in connection with transactions for which the department of Health and Human Services (HHS) has adopted standards. 17

18 CTEK ALLIANCE 18

19 FINANCIAL SNAPSHOT COMPANY TICKER NYSE: CTEK UNITS: USD Price (as of 11/06/18) $4.15 FD Shares Outstanding** 9.8M Market Cap $41M LTM Revenue $71.2M Cash** $6.4 Long- and Short-Term Debt** Total Enterprise Value $22.8M $63.4M ** Data as of Q3 ending September 30 th,

20 FINANCIAL HIGHLIGHTS REVENUE & GROSS MARGIN Financial Highlights ($Millions) Expanding New Revenue Lines to Increase Gross Margins $61 $60 $72 $53 $53 17% 20% 29% 28% 27% M M 2018 Managed Services Professional & Consulting Services Equipment & Software 20

21 FINANCIAL HIGHLIGHTS ADJUSTED EBITDA Financial Highlights ($Millions) Profitable While Investing in Growth $7.8 $3.4 $3.3 $6.1 $5.3 $4.0 $4.9 $3.6 $1.8 $ M M 2018 Adjusted EBITDA Adjusted Earnings 1 Adjusted EBITDA: adjusting EBITDA for stock-based compensation and non-recurring charges related to our recent debt refinancing and the departure of a senior executive. 2 Adjusted Earnings: adjusting net income for estimated cash tax adjustment, adjustment in contingent consideration from acquisition, amortization and impairment of intangibles, non-recurring charges related to our recent debt refinancing and the departure of a senior executive, stock-based compensation and depreciation. 21

22 THANK YOU! cynergistek.com NYSE AMERICA: CTEK 22

Investor Presentation. March 2018 NYSE AMERICAN: CTEK

Investor Presentation. March 2018 NYSE AMERICAN: CTEK Investor Presentation March 2018 NYSE AMERICAN: CTEK Safe Harbor Statements This presentation contains, and our officers and representatives may from time to time make, forwardlooking statements within

More information

Investor Presentation

Investor Presentation Investor Presentation October 2017 NYSE MKT: CTEK CynergisTek won the 2017 Best in KLAS Award for Cyber Security Advisory Services CynergisTek was recognized in the 2016 KLAS Security Advisory Services

More information

2017 Q4 Earnings Conference Call

2017 Q4 Earnings Conference Call 2017 Q4 Earnings Conference Call Forward Looking Statements This presentation includes certain forward-looking statements that are made as of the date hereof and are based upon current expectations, which

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Cincinnati Bell Inc. March 4, 2013

Cincinnati Bell Inc. March 4, 2013 Cincinnati Bell Inc. March 4, 2013 Safe Harbor This presentation and the documents incorporated by reference herein contain forwardlooking statements regarding future events and our future results that

More information

This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future

This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future results that are subject to the safe harbor provisions of

More information

CFO Commentary on Second Quarter 2016 Financial Results

CFO Commentary on Second Quarter 2016 Financial Results CFO Commentary on Second Quarter 2016 Financial Results August 2, 2016 Related Information The commentary in this document can be referenced in the financial information found in the earnings release issued

More information

UBS 42 nd Annual Global Media and Communications Conference December 8, Leigh Fox, CFO

UBS 42 nd Annual Global Media and Communications Conference December 8, Leigh Fox, CFO UBS 42 nd Annual Global Media and Communications Conference December 8, 2014 Leigh Fox, CFO Safe Harbor This presentation and the documents incorporated by reference herein contain forward-looking statements

More information

Investor Presentation. February 2016

Investor Presentation. February 2016 Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

First Quarter 2018 Earnings Presentation. May 8, 2018

First Quarter 2018 Earnings Presentation. May 8, 2018 First Quarter 2018 Earnings Presentation May 8, 2018 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions,

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Tech Data s Acquisition of Avnet Technology Solutions

Tech Data s Acquisition of Avnet Technology Solutions Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe

More information

Sierra Wireless. Corporate Overview. May 2017

Sierra Wireless. Corporate Overview. May 2017 Sierra Wireless Corporate Overview May 2017 Sierra Wireless Leader, Innovator, Trusted Partner in the IoT IoT Leader in device-to-cloud solutions Innovator essential IP in Cat M1 edge intelligence open

More information

Cincinnati Bell Third Quarter 2011 Results. November 3, 2011

Cincinnati Bell Third Quarter 2011 Results. November 3, 2011 Cincinnati Bell Third Quarter 2011 Results November 3, 2011 Today s Agenda Performance Highlights Jack Cassidy, President & Chief Executive Officer Review of Wireline, Wireless, IT Services & Hardware

More information

HPE to Acquire Nimble Storage

HPE to Acquire Nimble Storage HPE to Acquire Nimble Storage March 7, 2017 http://www.hpe.com/investor/home Forward Looking Statements This document contains forward-looking statements within the meaning of the safe harbor provisions

More information

Verizon closes 2017 with strong wireless customer growth and retention, well-positioned in new markets

Verizon closes 2017 with strong wireless customer growth and retention, well-positioned in new markets News Release FOR IMMEDIATE RELEASE January 23, 2018 Media contact: Bob Varettoni 908.559.6388 robert.a.varettoni@verizon.com Verizon closes 2017 with strong wireless customer growth and retention, well-positioned

More information

ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018

ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Investor Overview 2018

Investor Overview 2018 Investor Overview 2018 1 SAFE HARBOR This presentation contains forward-looking statements that involve risks, uncertainties and assumptions. If the risks or uncertainties ever materialize or the assumptions

More information

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing

More information

SOLUTION BRIEF Virtual CISO

SOLUTION BRIEF Virtual CISO SOLUTION BRIEF Virtual CISO programs that prepare you for tomorrow s threats today Organizations often find themselves in a vise between ever-evolving cyber threats and regulatory requirements that tighten

More information

Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008

Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008 Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities September 4, 2008 Safe Harbor Forward-Looking Statements Certain statements contained or discussed in this presentation

More information

Marketing with Northland Capital Markets

Marketing with Northland Capital Markets Marketing with Northland Capital Markets At EXFO, we make networks smarter Philippe Morin Chief Executive Officer October 19-20, 2017 Forwardlooking statements Certain statements in this presentation,

More information

REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS

REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS HP Inc. Sustainability Briefing January 22, 2018 1 Copyright 2018 HP Development Company, L.P. The information contained herein is subject to change without

More information

OPPORTUNITY TO ACCELERATE MOMENTUM

OPPORTUNITY TO ACCELERATE MOMENTUM OPPORTUNITY TO ACCELERATE MOMENTUM Pierre-Paul Allard Chief Customer Officer Juniper Networks CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within

More information

Cincinnati Bell Second Quarter 2012 Results. August 8, 2012

Cincinnati Bell Second Quarter 2012 Results. August 8, 2012 Cincinnati Bell Second Quarter 2012 Results August 8, 2012 Today s Agenda Performance Highlights Jack Cassidy, President & Chief Executive Officer Review of Cincinnati Bell Communications Ted Torbeck,

More information

WINNING IN A MULTICLOUD WORLD

WINNING IN A MULTICLOUD WORLD WINNING IN A MULTICLOUD WORLD Rami Rahim CEO, Juniper Networks 2 CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within the meaning of Section 27A

More information

Grow Your Services Business

Grow Your Services Business Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business

More information

Marketing with National Bank Financial

Marketing with National Bank Financial Marketing with National Bank Financial At EXFO, we make networks smarter Philippe Morin Chief Executive Officer November 1, 2017 Forwardlooking statements Certain statements in this presentation, or given

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

OpenText Buys Guidance Software

OpenText Buys Guidance Software OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

2nd Quarter 2017 Earnings Results

2nd Quarter 2017 Earnings Results 2nd Quarter 2017 Earnings Results August 2, 2017 Forward-Looking Statements Except for historical and factual information, the matters set forth in this presentation and other of our oral or written statements

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Protecting your data. EY s approach to data privacy and information security

Protecting your data. EY s approach to data privacy and information security Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

TeraGo Reports Fourth Quarter and Year End 2018 Results

TeraGo Reports Fourth Quarter and Year End 2018 Results TeraGo Reports Fourth Quarter and Year End Results Toronto February 21, 2019 TeraGo Inc. ( TeraGo or the Company ) (TSX: TGO, www.terago.ca), today announced financial and operating results for the fourth

More information

Nasdaq: DAIO. Anthony Ambrose. President and CEO. Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation

Nasdaq: DAIO. Anthony Ambrose. President and CEO. Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation Nasdaq: DAIO Anthony Ambrose President and CEO Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation Safe Harbor The matters that we discuss today will include forward-looking

More information

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,

More information

Safe Harbor Statement

Safe Harbor Statement May 2017 1 Safe Harbor Statement Matters discussed in this presentation may contain forward-looking statements that are subject to risks and uncertainties. These risks and uncertainties could cause the

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

Anticipating the wider business impact of a cyber breach in the health care industry

Anticipating the wider business impact of a cyber breach in the health care industry Anticipating the wider business impact of a cyber breach in the health care industry John Gelinne, Director Cyber Risk Services Deloitte & Touche LLP jgelinne@deloitte.com commodore_22 Hector Calzada,

More information

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev

More information

State of South Carolina Interim Security Assessment

State of South Carolina Interim Security Assessment State of South Carolina Interim Security Assessment Deloitte & Touche LLP Date: October 28, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is

More information

Columbus delivers 52% growth in revenue

Columbus delivers 52% growth in revenue Release no. 20, 2018 Interim Management Statement for Q3 YTD 2018 November 7th, 2018 Release no. 20/2018 Interim Management Statement Q3 YTD 2018 Columbus delivers 52% growth in revenue In the first three

More information

Big data privacy in Australia

Big data privacy in Australia Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that

More information

Fourth Quarter and Full Year 2018 Earnings Presentation. February 21, 2019

Fourth Quarter and Full Year 2018 Earnings Presentation. February 21, 2019 Fourth Quarter and Full Year 2018 Earnings Presentation February 21, 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements

More information

Medical Devices and Cyber Issues JANUARY 23, American Hospital Association and BDO USA, LLP. All rights reserved.

Medical Devices and Cyber Issues JANUARY 23, American Hospital Association and BDO USA, LLP. All rights reserved. Medical Devices and Cyber Issues JANUARY 23, 2018 AHA and Cybersecurity Policy Approaches Role of the FDA FDA Guidance and Roles Pre-market Post-market Assistance during attack Recent AHA Recommendations

More information

Management Presentation SEP 2017

Management Presentation SEP 2017 Management Presentation SEP 2017 Safe Harbor Statement This presentation contains forward-looking statements, which express the current beliefs and expectations of management. Such statements are based

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment Chad Huston Ali Zaidi THIS IDC MARKETSCAPE EXCERPT FEATURES: WIPRO IDC

More information

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

How icims Supports. Your Readiness for the European Union General Data Protection Regulation How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Cincinnati Bell. Morgan Stanley Technology, Media, and Telecommunications Conference February 28, 2012

Cincinnati Bell. Morgan Stanley Technology, Media, and Telecommunications Conference February 28, 2012 Cincinnati Bell Morgan Stanley Technology, Media, and Telecommunications Conference February 28, 2012 Safe Harbor This presentation and the documents incorporated by reference herein contain forwardlooking

More information

Allot Corporate Presentation

Allot Corporate Presentation Allot Corporate Presentation (NASDAQ, TASE: ALLT) November 2018 Forward Looking Statements This presentation contains forward-looking statements, which express the current beliefs and expectations of Company

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San

More information

Federal Market & Strategy Overview for Investors

Federal Market & Strategy Overview for Investors Federal Market & Strategy Overview for Investors Presented by Venkatapathi Puvvada (PV) Senior Vice President/President, Unisys Federal September 18, 2017 Disclaimer Statements made by Unisys during today

More information

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Cyber Risk and Networked Medical Devices

Cyber Risk and Networked Medical Devices Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with

More information

Reinvention and Transformation in Personal Systems March 22,

Reinvention and Transformation in Personal Systems March 22, Reinvention and Transformation in Personal Systems March 22, 2017 http://www.hp.com/investor/home 1 Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without

More information

CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS

CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS THIRD QUARTER 2017 EARNINGS October 31, 2017 DECEMBER 21, 2017 SAFE HARBOR S A F E H A R B O R This presentation contains forward-looking statements regarding future

More information

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) Adaptive Cybersecurity at the Speed of Your Business Attackers Evolve. Risk is in Constant Fluctuation. Security is a Never-ending Cycle.

More information

Investor Presentation February 2019

Investor Presentation February 2019 Investor Presentation February 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions, acquisition

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

Conference call April 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q1 2018

Conference call April 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q1 2018 Conference call April 26, 2018 15:00 / Helsinki 08:00 / New York 1 Nokia 2016 Q1 2018 Disclaimer It should be noted that Nokia and its business are exposed to various risks and uncertainties, and certain

More information

CYRUSONE / GDS STRATEGIC PARTNERSHIP. October 18, 2017

CYRUSONE / GDS STRATEGIC PARTNERSHIP. October 18, 2017 CYRUSONE / GDS STRATEGIC PARTNERSHIP October 18, 2017 Safe Harbor This presentation contains forward-looking statements regarding future events and our future results that are subject to the "safe harbor"

More information

EB, Elektrobit Corporation Interim Report 2Q CEO Jukka Harju August 8, 2012

EB, Elektrobit Corporation Interim Report 2Q CEO Jukka Harju August 8, 2012 EB, Elektrobit Corporation Interim Report 2Q 2012 CEO Jukka Harju August 8, 2012 Forward-looking Statements Some statements made in this material relating to future circumstances or status, including,

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

NOKIA FINANCIAL RESULTS Q3 / 2012

NOKIA FINANCIAL RESULTS Q3 / 2012 Nokia Internal Use Only NOKIA FINANCIAL RESULTS Q3 / 2012 Conference Call October 18, 2012 15.00 / Helsinki 08.00 / New York Stephen Elop / President & CEO Timo Ihamuotila / CFO Matt Shimao / Head of Investor

More information

Cincinnati Bell 2007 Deutsche Bank Media & Telecom Conference Brian Ross, CFO

Cincinnati Bell 2007 Deutsche Bank Media & Telecom Conference Brian Ross, CFO Cincinnati Bell 2007 Deutsche Bank Media & Telecom Conference Brian Ross, CFO June 4, 2007 1 Safe Harbor Certain of the statements and predictions contained in this presentation constitute forward-looking

More information

Nokia Conference Call 1Q 2012 Financial Results

Nokia Conference Call 1Q 2012 Financial Results Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Windstream acquisition of Broadview Networks Transaction overview April 13, 2017

Windstream acquisition of Broadview Networks Transaction overview April 13, 2017 Windstream acquisition of Broadview Networks Transaction overview April 13, 2017 Safe Harbor Statement Windstream Holdings, Inc. claim the protection of the safe-harbor for forward-looking statements contained

More information

Verizon builds on 2Q momentum with strong 3Q results

Verizon builds on 2Q momentum with strong 3Q results News Release FOR IMMEDIATE RELEASE October 19, 2017 Media contact: Bob Varettoni 908.559.6388 robert.a.varettoni@verizon.com Verizon builds on 2Q momentum with strong 3Q results 3Q 2017 highlights 89 cents

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

INVESTOR RELATIONS 28 January Zayo Reporting Update Call

INVESTOR RELATIONS 28 January Zayo Reporting Update Call INVESTOR RELATIONS 28 January 2016 Zayo Reporting Update Call ZAYO GROUP SAFE HARBOR Information contained in this presentation that is not historical by nature constitutes forward-looking statements which

More information

Conference call July 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q2 2018

Conference call July 26, :00 / Helsinki 08:00 / New York 1 Nokia 2016 Q2 2018 Conference call July 26, 2018 15:00 / Helsinki 08:00 / New York 1 Nokia 2016 Q2 2018 Disclaimer It should be noted that Nokia and its business are exposed to various risks and uncertainties, and certain

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

3Q Investor Presentation

3Q Investor Presentation 3Q 2017 Investor Presentation 1 SAFE HARBOR STATEMENT This presentation contains statements of a forward-looking nature. These statements are made under the safe harbor provisions of the U.S. Private Securities

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

Create a planet run by the sun.

Create a planet run by the sun. Create a planet run by the sun. Sunrun & Comcast Agreement August 24, 2017 Safe Harbor & Forward Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A

More information

Adaptive & Unified Approach to Risk Management and Compliance via CCF

Adaptive & Unified Approach to Risk Management and Compliance via CCF SESSION ID: SOP-W08 Adaptive & Unified Approach to Risk Management and Compliance via CCF Vishal Kalro Manager, Risk Advisory & Assurance Services (RAAS) Adobe @awish11 Disclaimer All the views presented

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

HIPAA Compliance is not a Cybersecurity Strategy

HIPAA Compliance is not a Cybersecurity Strategy HIPAA Compliance is not a Cybersecurity Strategy Presented by: Hector Rodriguez, WW Health CISO, Microsoft Jay Trinckes, Director, Coalfire Speaker Introductions Hector Rodriguez, WW Health CISO, Microsoft

More information

TeraGo Reports 2018 Third Quarter Financial Results

TeraGo Reports 2018 Third Quarter Financial Results TeraGo Reports Third Quarter Financial Results Toronto November 7, TeraGo Inc. ( TeraGo or the Company ) (TSX: TGO, www.terago.ca), today announced financial and operating results for the quarter ended,.

More information

Background FAST FACTS

Background FAST FACTS Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance

More information

ICF Investor Presentation. November 2017

ICF Investor Presentation. November 2017 ICF Investor Presentation November 2017 Cautionary Statement 2 Introducing ICF ICF conquers complexity for its clients across a range of markets Health and Social Programs Energy, Environment and Infrastructure

More information

Third Quarter 2014 Earnings November 5, 2014

Third Quarter 2014 Earnings November 5, 2014 Third Quarter 2014 Earnings November 5, 2014 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes about future expectations, plans and prospects, including concerning

More information