13
Confidential ©CYBER SECURITY 1 AB October 2019 Company Overview

CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

Confidential

©CYBER SECURITY 1 ABOctober 2019

Company Overview

Page 2: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

1

Athens | Dubai | Dublin | Frankfurt | Istanbul | Johannesburg | Kiev | London | Nairobi | New York | Naples | Rome | Stockholm | Vienna | Zagreb

Product Partners Clients

Trusted Global Service Partner

Page 3: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

2

Key Vendors

Diverse and Profitable Combination of All Business Units

Strong Relationships with Selected and Innovative Partners

Trusted Advisor with Key Private and Public Sector Influencers

Industry Demand for Cyber Security Services

Industry Leading Accreditations

Highly Qualified Team with Significant Cyber Security Background

Key Vendor Partners

Founder Led Management Team 250 plus personnel

Highly accredited and industry leading technical staff

By 2020, all large enterprises will be asked to report to their board of directors on cyber security and

technology risk by at least annual up from 40% today.

Source: Gartner 2019

100%$124 BillionGlobal Spending on Information Security to reach at the end of

2019, a forecasted growth of 8.7%

Source: Gartner 2019 Managed ServicesAdvising & Consulting Products

CYBER1—Company Overview

Page 4: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

3

Rapid Digitalization/ Online Connectivity

• Surge in connected devices globally and increasing further

• Opportunity to secure the connectivity of new endpoints

Cost of Cyber Crime Rising, In Line with Overall Number of Attacks

• Overall spending on cyber security solutions is rising

• Frequency of attacks and average cost of each is increasing

Increase in Compulsory Cyber Security Requirements Implemented

by Regulators• Policy makers creating clear mandates for

enterprises to invest in cyber security provisions

Rise in New and Innovative Technologies

• Demand for services is being amplified as VC firms continue to invest

Significant Shortage of Cyber Security Professionals

• Specialized and accredited personnel required for delivery of cyber security provisions

• Driving overall demand for outsourcing, advisory and managed services

CYBER1 understands market problems and offers solutions to solve customer pain points

Cyber Security Market—Client Challenges

Page 5: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

4

15 18 20 2327

3136

43

51

62

75

2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025

Conn

ecte

d De

vice

s in

Billi

ons

Trend will Continue with Increased Number of Vulnerable Endpoints, Example (IoT)

Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (bn)

157

321446

656

498

662

419 447

614

783 781

1,098

1,579

1,244

19128

36

223

16 23 1792 86

16937

179

447

20052006

20072008

20092010

20112012

20132014

20152016

20172018

Data

Bre

ache

s and

Rec

ords

Exp

osed

in M

illio

ns

Data Breaches Million records exposed

Historical Number of Breaches and Records Exposed

Annual Number of Data Breaches and Exposed Records in the United States from 2005 to 2018 (mm)

Source: Identity Theft Resource Center, Wall Street research

Market problems driving growth in the cyber security industry

Cyber Security Market—Continued Growth

10 14

22

33

2018 2022E

IT Consulting Managed Security Services

10%CAGR

Massive Market Opportunity for Security Experts

Managed Security Services Market TAM ($bn)

Page 6: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

5

SOCs & SIEMs

Secure Operation Centers & Security Information + Event

Management solutions

CLOUD-BASED SECURITY

Evaluating and selecting the best cloud-solutions for your

organization

USER AWARENESS

Training your personnel to be Cyber-savvy and effectively

managing your modern environs

GRC

Building Cyber-solutions for Governance, Risk & Compliance

with regulatory approvals

ADVISING & CONSULTING

Working with your management and senior executive teams to

deliver bespoke Cyber-solutions

BEHAVIORAL ANALYTICS

Understanding behavioral patterns and detecting unfamiliar

traits to prevent threats & attacks

INFORMATION PROTECTION

Assisting you to manage your most valuable assets and protect

provenance and governance

DIGITAL FORENSICS

Delivering unsurpassed forensic analyses for computers, networks

& mobile devices

MALWARE PROTECTION

Determining functionality, purpose, composition and

sources of malicious implants

EARLY DETECTION

And responses to potential threats proving prevention is better than cure every time

FRAUD

Running sophisticated tests and challenges & full audits that assist in protecting data and preventing

fraud

PCI GAP ASSEMENTS

Assessing your degree of compliance to the Payment Card Industry Data Security Standards

(PCI-DSS)

BEST-OF-BREED CYBER SOLUTIONS FROM OVER 100 VENDOR RELATIONSHIPS, PRODUCT AGNOSTIC

Broad yet focused product suite to tackle customer problems

CYBER1 Solutions

Page 7: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

6

The emerging cyber attack landscape requires more sophisticated Firewall and EPP technologies—companies are short

staffed and have budget constraints, thus struggling to respond

The growing adoption of mobility increases the complexity of EPP technologies—

companies require detection and response capabilities 24/7

loT security brings in different security requirements notably in terms of process and operations—companies increasingly

need customized solutions

New European regulation regarding data protection, enforcement to comply

by May 2018—requirements and formal compliance regimes pushing companies

towards external service providers to meet evolving and complex requirements

Timing of Impact

Cloud Development

Cloud development leading to increasing security requirement and infrastructure complexity should create numerous opportunities in IT Security, notably for private and hybrid cloud

Short Term Short Term Medium-Long Term Short Term

Increasing Mobility Development of Internet of Things(loT)

General Data Protection Regulation (GDPR)

Evolving Threat of Cyber-Attacks1 2 3 4

Drivers and Trends

Evolving Cyber Security Threat Fueling Growth ofIT Security

Page 8: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

7

• Audit and exception management

• Business continuity

• Compliance and policy management

• Enterprise risk management

• Incident management

• Regulatory change

• Security incident response

• Vendor risk management

• Vulnerability management

• Audio analysis and enhancement

• Data recovery

• Digital forensics

• Mobile forensics

• Duplicators and imagers

• Forensic hardware

• Internet artefacts

• Video analysis and enhancement

• Incident response

• AntiVirus and endpoint security

• Cyber threat intelligence

• Date protection and classification

• Digital resilience and analytics

• Email security and encryption

• Governance, risk and compliance

• Incident response and post breach detection

• Privileged access management

• Security awareness training and orchestration

Cyber security Digital forensics Governance & risk compliance

Key offerings

Value added distribution products

Top vendors

Ability to continuously offer customers a best-of-breed solution for all their cyber security needs, by utilising all vendor relationships

Key components

Services

Page 9: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

8

Consulting & Advisory Services Managed Security Services

Key services

• Penetration Testing • Data Leakage and Loss Prevention

• Urgent Incident and Crisis Management

• Application Security Assessment

• Network Security and Management

• Information Systems andClient Audit

Key USPs

Risk identification and mapping

External intrusion attempt monitoring and prevention

Identify and mitigatesecurity gaps

Systems up to date with latest technology

Ensure no loss of data

Key services

• Security Event Management

• Manages Endpoint Threat Detection and Response

• Managed Threat Intelligence

• Managed Vulnerability Assessment

• Managed Security Controls and web defence

• Managed Remediation Service/forensics Analysis

Key USPs

Real-time protection

Improved Focuson Core Business

Regulatory Compliance

24x7 SecurityEvent Monitoring and Response

PredictableCosts

Best Solution to Skill Shortage

• Ability to offer differentiated services to customers, through its consultants’ breadth of experience, and expertise building customer trust for the long term

• Scalable solutions enabling customers to outsource all their security operations

Differentiated offering with CYBER1's bench of security experts and expertise in the field

Advisory & Managed Security Services

Page 10: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

9

Far-Reaching Vendor Relationships

Global Standards and Accreditations

Diverse Vendor Relationships and Industry leading Accreditations

Page 11: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

10

2015 2016 2017 – 2018

Cyber 1Growing Footprint

Territories Pre-20151

20159

2016 11

2017-2018 20Acquisitions: +5 Acquisitions: +1 Acquisition: +4

2Our Company History and Expanding Footprint

• Cognosec AB formed

• Acquires DRS, ProTec, ARM (Advanced Risk Mitigation and African Risk Mitigation) and DRH

• Acquires Cognosec

• Cognosec AB IPO Nasdaq

• 2017: Acquires A-tek Distribution and Intact Software

• 2018: Cognosec AB rebrands as CYBER1 and acquires Itway and Advantio

Commentary

New Vendors

New York, U.S.

Since 2015, CYBER1 has strategically acquired 11 companies, expanding it’s geographic footprint to 20 countries

Page 12: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

11

ProductAdvisory

Managed Services

Cyber Security

Digital Forensics

Governance Risk& Compliance

• Penetration Testing• Data Leakage & Loss

Prevention• Urgent Incident & Crisis

Management• Network Security &

Management• Information Systems

Audit• Application Security

Assessment• Client Audit

• Managed Web Defence• Security Event Management• Manages Endpoint Threat Detection

& Response• Managed Threat Intelligence

• Managed Vulnerability Assessment• Managed Security Controls• Managed Remediation Service /

forensics Analysis

3Unique Blend of Product, Advisory andManaged Services

Page 13: CYBER1 Presentation Website Octobercyber1.com/.../CYBER1-Presentation-Website-October.pdf · • Video analysis and enhancement • Incident response • AntiVirusand endpoint security

12

6Exceptional Management Team with DeepDomain Expertise

Relevant Experience Other Companies

Kobus PaulsenChairman

• Founded the Group and has served as Chairman of the board since 2015; leads all M&A activity for the group• Previously served as Head of New Media at Mirror Group, as well as Managing Director of Brainware and led a MBO in 1999• Acquired London based Secure Trading and several internet based assets• Founded Acquiring.com, a leading payments group in Europe• Education: BSc in Electrical, Electronics and Communications Engineering, Tshwane University of Technology

Nick VineyChief Executive Officer

• Has served as Chief Executive Officer since 2019• Previously worked at McAfee serving as Regional Vice President (UK, Ireland and South Africa) and EMEA Vice President – Consumer,

Mobile and Small Medium Business• Education: MA, Modern History, MSc, Management Science, Both University of Oxford

Vivian GeversChief Operating Officer

• Has served as Chief Operating Officer since 2019• Previously served as Group Managing Director and Managing Director of our Product Distribution arm Credence Security• Education: BCom in Management, University of South Africa

SamienaHussainGroup Finance Director

• Has been with CYBER1 since 2018• Previously spent 6 years at Secure Trading serving as Group Commercial Financial Controller and Finance Director• Prior to Secure Trading, worked at Hays as a Commercial Financial Analyst at Hays • ACCA: FCCA Qualification• Education: Kingston University, B.A Accounting & Finance (Hons)

Daryn StilwellGeneral Counsel & Board Member

• Co-founder of the CYBER1 Group and has served as Group General Counsel since 2015 and as executive member of the board since 2018• Previously served as Head of Legal and Compliance at the UC Group, and held senior legal counsel positions supporting the technology

divisions of Visa Europe, WorldPay, Accenture and Deutsche Bank• Legal lead on all previous and current M&A transactions for the CYBER1 Group• Dual qualified solicitor: English Law and Laws of South Africa• Education: Bachelor of Commerce (Bcom) and Bachelor of Laws (LLB), Stellenbosch University