January Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved Empowering a Fearless Internet

Similar documents
Security-as-a-Service: The Future of Security Management

NERC Staff Organization Chart Budget 2019

IT Consulting and Implementation Services

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

Oregon Fire Service Conference Enterprise Security Office Update. October 26, 2018

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2019

CYBER SOLUTIONS & THREAT INTELLIGENCE

Digital Service Management (DSM)

Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

BHConsulting. Your trusted cybersecurity partner

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Opening Doors to Cyber and Homeland Security Careers

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

NERC Staff Organization Chart

Trustworthy & Innovative Advice Confidis Advisory Services Private Limited. All rights reserved.

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Sage Data Security Services Directory

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

M&A Cyber Security Due Diligence

Pioneering New Frontiers

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Jerry Luftman. Executive Director & Distinguished Professor SIM VP Chapter Relations & Academic Affairs, Emeritus

How to be cyber secure A practical guide for Australia s mid-size business

M2M device connections and revenue: worldwide forecast

LABOR CATEGORIES, EDUCATION AND YEARS OF EXPERIENCE Years No. Labor Categories Education Experience

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Cybersecurity Overview

A Global Look at IT Audit Best Practices

2018 Trends in Hosting & Cloud Managed Services

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

General Dynamics Information Technology, Inc.

itsm003 v.3.0 NISTCSF.COM Role-Based IT & NIST Cybersecurity Curriculum Solutions

Business Case for Training and Certification

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

How Your Organization Can Drive Success in the Age of Digital Disruption

RCISC_11014 Prospect Brochure_V3.indd 1

Turning Strategic Insight Into Business Impact

BHConsulting. Your trusted cybersecurity partner

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Valt.X Next Generation Cyber Security & Crypto Investment

GDPR COMPLIANCE REPORT

Cybersecurity Risk Management Guide for Voluntary Use of the NIST Cybersecurity Framework

Commonwealth Cyber Initiative Blueprint Development

Technology Solutions Group Specialized Real Estate Services

Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions. Cyber Attack: A Global Phenomenon

DATA GOVERNANCE LEADS TO DATA QUALITY

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

The ERA of Enterprise Architecture 2.0

CLOUDERA GOVERNMENT FORUM rd annual. Machine Learning, Artificial Intelligence, and the Future of Big Data Analytics.

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Cyber Resilience. Think18. Felicity March IBM Corporation

The Widening Talent Gap: The greatest security challenge of our time

Cybersecurity. Securely enabling transformation and change

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

CLOUD RISK AND GOVERNANCE Professional services for the enterprise

Run the business. Not the risks.

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT

NERC Staff Organization Chart Budget 2017

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

NDIA: Defense Industrial Base Critical Infrastructure Protection (DIBCIP) Conference San Antonio, Texas April 1 st, 2009

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Thirtieth Annual. Electrical & Computer Engineering Day

locuz.com SOC Services

Moderator: Tino Mantella President, Tier4 Advisors

Address C-level Cybersecurity issues to enable and secure Digital transformation

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

NERC Staff Organization Chart Budget 2017

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

Connected & Smart Home Research Package

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

VALUE OF A CYBERSECURITY SELF-ASSESSMENT

Jason Clark CHIEF SECURITY AND STRATEGY OFFICER, OPTIV. Renee Guttmann CHIEF INFORMATION SECURITY OFFICER, ROYAL CARIBBEAN CRUISE LINES

Accelerate Your Cloud Journey

Cybersecurity Risk Management:

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Cybersecurity and the Board of Directors

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Audit and Compliance Committee - Agenda

Kent Landfield, Director Standards and Technology Policy

The CMA Program: The Essential Credential

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

IFC ENERGY STORAGE MARKET REPORT

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014

Department of Management Services REQUEST FOR INFORMATION

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Global Security Consulting Services, compliancy and risk asessment services

Securing Your Digital Transformation

Transcription:

January 2018 Disrupting the B2B 2018 WHITEHAWK, Inc. All Rights Reserved www.whitehawk.com Cyber Security Market Empowering a Fearless Internet

DISRUPTING THE B2B CYBER SECURITY MARKET Overview Cyber Security Market Challenge WhiteHawk Exchange Offerings Risk Profile Approach Risk Advisory Services CyberPath Solution Engine Insights Analytics Patent Pending Platform Partners The Team 1/22/18 www.whitehawk.com 2

DISRUPTING THE B2B CYBER SECURITY MARKET How Do You Keep Up with Cyber Security Solutions? 1/22/18 www.whitehawk.com 3

One-Stop-Shop for Cyber Security Risk: Profiles, Frameworks, Analytics, and Innovative/Impactful Products/Solutions For companies of all sizes: To understand business sector top risks, gaps, trends - regarding cyber crime & fraud prevention & mitigation To get matched to specific & affordable technology and services that can prevent revenue or reputation loss To keep up with cyber crime & fraud trends impacting their business sector & competitors DISRUPTING THE B2B CYBER SECURITY MARKET 1/22/18 WhiteHawk Proprietary 4

DISRUPTING THE B2B CYBERSECURITY MARKET Solution: The First Online Cyber Security Exchange One-stop-shop for companies to: Understand business cyber security risks Get matched to the specific tools, services and best practices Instantly talk with a Cyber Advisor Keep up with online crime & fraud trends targeting their business sector Get Assessed (Design update coming soon) Get Advised 1/22/18 www.whitehawk.com 5

DISRUPTING THE B2B CYBERSECURITY MARKET Cyber Risk Advisory Services Established Cyber Risk Baselines and Pragmatic Living Frameworks Conducting Cyber Risk Profiles and Proof of Concept Scorecards across all business sectors Deliverables being designed, tested, and augmented for automation Automating NIST assessment and content generation to populate deliverables Conducting Federal and Industrial Base Self Assessment Certifications Sharing toolset questionnaire to determine product interoperability 1/22/18 www.whitehawk.com 6

DISRUPTING THE B2B CYBERSECURITY MARKET Online Open Exchange Design Update coming soon Vendor Exchange Open Direct Search Pricing & Purchase for 500+ products & solutions Direct Online Buy or with Cyber Analyst 1/22/18 www.whitehawk.com 7

DISRUPTING THE B2B CYBERSECURITY MARKET WhiteHawk Insights Customer Pain Points Highlighting Online Crime and Fraud Trends, Best Practices, and Innovative Solutions Top Partner Content and Guest Articles Roberts Reports Targeting Each Business Sector 1/22/18 www.whitehawk.com 8

DISRUPTING THE B2B CYBER SECURITY MARKET WhiteHawk Analytics Approach Automated online process to collect and compare large numbers of security reviews from across the WWW. These reviews cover a global array of products and services, and are normalized against a large set of security features. This provides the ability to: 1) Determine which products have the best reputations according to contrasting metrics. 2) Down select products which are optimal for a customer s individual needs, while discarding products that are only good at things the customer does not need. CYBERPATH AI SOLUTION ENGINE ANALYTICS SERVICES & SUBSCRIPTIONS WHITEHAWK VENDOR EXCHANGE 1/22/18 www.whitehawk.com 9

DISRUPTING THE B2B CYBER SECURITY MARKET CyberPath: Solution Engine is Patent Protected US Provisional Patent #62456338 Decision support system based on adaptive reasoning The system and methods employ a dynamic rules-based analysis engine that has a plurality of rules for categorizing, selecting, scoring, and ranking - matching accuracy for a multitude of sub-choices by segregating data services into uncovering four components used for decision support: cues, goals, key performance indicators, and optimal match functions. 1/22/18 www.whitehawk.com 10

DISRUPTING THE B2B CYBER SECURITY MARKET We Built Our Online Platform With: MINDSTAR SECURITY & PROFILING 1/22/18 www.whitehawk.com 11

The Team DISRUPTING THE B2B CYBER SECURITY MARKET Terry Roberts CEO, President & Founder Previously Deputy Director of US Naval Intelligence, TASC VP for Intelligence & Cyber, Executive Director of Carnegie Mellon Software Engineering Institute. Currently US National Security Cyber Thought Leader, Board Member & Chair Emeritus, Intelligence & National Security Alliance Cyber Council US Fed Top 50 Women & MSSI in Strategic & Artificial Intelligence. https://www.linkedin.com/in/terry-roberts-193493143/ Luis Cruz-Rivera CTO & Co-Founder Former VP of Government and Industry at Resilient Corp. Technical Director & Solution Architect, TASC and ManTech. Creative, Proven & Technically Deep Engineer, Entrepreneur, & Innovator, with over 16 successful years in IT and Cyber Security Industry. Stanford MS Computer Engineer & Georgia Tech PHD studies. http://www.linkedin.com/in/ljcruzrrivera Kevin Goodale CFO CFO at Impressions Marketing Group Inc. from 2005 2016. Career Commercial Financial & Contracting Manager with over 20 years at the CFO level, using degrees in accounting & management information science to reduce risk & increase profits. https://www.linkedin.com/in/kevin-goodale-6ba4383b/ 1/22/18 WhiteHawk Proprietary 12

DISRUPTING THE B2B CYBER SECURITY MARKET The Team Antonio Crespo CIO Former Cyber Security Consultant at Security Risk Advisors. Extensive Cyber Security knowledge in Engineering and Assessments for Global Fortune 500 Enterprises. https://www.linkedin.com/in/tcresponj/ Sarah Messer Chief Data Scientist Previously a senior data scientist at Raytheon and Foreground Security and with a decade as an experimental physicist in automation operations and data collection. Bachelor s Degrees in Computer Science, Mathematics, and Physics from American University and a Master s Degree and Ph.D. in Physics from the University of Maryland, College Park. 1/22/18 WhiteHawk Proprietary 13

DISRUPTING THE B2B CYBER SECURITY MARKET The Board Terry Roberts Executive Chair Louise McElvogue Non-Executive Director Currently company director and advisor with strategy, commercial, and digital expertise in North America, Europe, and Asia Pacific. Global Experience of media, digital transformation, and start-ups. Governance and strategic experience. Expert in media, journalism, and marketing. Tiffany O. Jones Non-Executive Director Currently CEO Of Distill Networks Previously VP of Global Strategic Partnerships and Alliance Operations at FireEye. & SVP of Client Solutions & Chief Revenue Officer for isight and Mandiant. Former Deputy Chief of Staff at the White House Office of Cyber Security and Critical Infrastructure Protection. Decorated US Coast Guard Officer. Phil George Non Executive Director Specialist in Information Security & Risk Management Currently operates Nurv Cloud, a cloud telecom company, specializing in high quality, secure voice solutions. Launched Uber Perth in Australia in 2014 as Operations Manager Non-Executive Director of Department 13 International Limited (ASX:D13) 1/22/18 www.whitehawk.com 14