Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Confidential
©CYBER SECURITY 1 ABOctober 2019
Company Overview
1
Athens | Dubai | Dublin | Frankfurt | Istanbul | Johannesburg | Kiev | London | Nairobi | New York | Naples | Rome | Stockholm | Vienna | Zagreb
Product Partners Clients
Trusted Global Service Partner
2
Key Vendors
Diverse and Profitable Combination of All Business Units
Strong Relationships with Selected and Innovative Partners
Trusted Advisor with Key Private and Public Sector Influencers
Industry Demand for Cyber Security Services
Industry Leading Accreditations
Highly Qualified Team with Significant Cyber Security Background
Key Vendor Partners
Founder Led Management Team 250 plus personnel
Highly accredited and industry leading technical staff
By 2020, all large enterprises will be asked to report to their board of directors on cyber security and
technology risk by at least annual up from 40% today.
Source: Gartner 2019
100%$124 BillionGlobal Spending on Information Security to reach at the end of
2019, a forecasted growth of 8.7%
Source: Gartner 2019 Managed ServicesAdvising & Consulting Products
CYBER1—Company Overview
3
Rapid Digitalization/ Online Connectivity
• Surge in connected devices globally and increasing further
• Opportunity to secure the connectivity of new endpoints
Cost of Cyber Crime Rising, In Line with Overall Number of Attacks
• Overall spending on cyber security solutions is rising
• Frequency of attacks and average cost of each is increasing
Increase in Compulsory Cyber Security Requirements Implemented
by Regulators• Policy makers creating clear mandates for
enterprises to invest in cyber security provisions
Rise in New and Innovative Technologies
• Demand for services is being amplified as VC firms continue to invest
Significant Shortage of Cyber Security Professionals
• Specialized and accredited personnel required for delivery of cyber security provisions
• Driving overall demand for outsourcing, advisory and managed services
CYBER1 understands market problems and offers solutions to solve customer pain points
Cyber Security Market—Client Challenges
4
15 18 20 2327
3136
43
51
62
75
2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025
Conn
ecte
d De
vice
s in
Billi
ons
Trend will Continue with Increased Number of Vulnerable Endpoints, Example (IoT)
Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (bn)
157
321446
656
498
662
419 447
614
783 781
1,098
1,579
1,244
19128
36
223
16 23 1792 86
16937
179
447
20052006
20072008
20092010
20112012
20132014
20152016
20172018
Data
Bre
ache
s and
Rec
ords
Exp
osed
in M
illio
ns
Data Breaches Million records exposed
Historical Number of Breaches and Records Exposed
Annual Number of Data Breaches and Exposed Records in the United States from 2005 to 2018 (mm)
Source: Identity Theft Resource Center, Wall Street research
Market problems driving growth in the cyber security industry
Cyber Security Market—Continued Growth
10 14
22
33
2018 2022E
IT Consulting Managed Security Services
10%CAGR
Massive Market Opportunity for Security Experts
Managed Security Services Market TAM ($bn)
5
SOCs & SIEMs
Secure Operation Centers & Security Information + Event
Management solutions
CLOUD-BASED SECURITY
Evaluating and selecting the best cloud-solutions for your
organization
USER AWARENESS
Training your personnel to be Cyber-savvy and effectively
managing your modern environs
GRC
Building Cyber-solutions for Governance, Risk & Compliance
with regulatory approvals
ADVISING & CONSULTING
Working with your management and senior executive teams to
deliver bespoke Cyber-solutions
BEHAVIORAL ANALYTICS
Understanding behavioral patterns and detecting unfamiliar
traits to prevent threats & attacks
INFORMATION PROTECTION
Assisting you to manage your most valuable assets and protect
provenance and governance
DIGITAL FORENSICS
Delivering unsurpassed forensic analyses for computers, networks
& mobile devices
MALWARE PROTECTION
Determining functionality, purpose, composition and
sources of malicious implants
EARLY DETECTION
And responses to potential threats proving prevention is better than cure every time
FRAUD
Running sophisticated tests and challenges & full audits that assist in protecting data and preventing
fraud
PCI GAP ASSEMENTS
Assessing your degree of compliance to the Payment Card Industry Data Security Standards
(PCI-DSS)
BEST-OF-BREED CYBER SOLUTIONS FROM OVER 100 VENDOR RELATIONSHIPS, PRODUCT AGNOSTIC
Broad yet focused product suite to tackle customer problems
CYBER1 Solutions
6
The emerging cyber attack landscape requires more sophisticated Firewall and EPP technologies—companies are short
staffed and have budget constraints, thus struggling to respond
The growing adoption of mobility increases the complexity of EPP technologies—
companies require detection and response capabilities 24/7
loT security brings in different security requirements notably in terms of process and operations—companies increasingly
need customized solutions
New European regulation regarding data protection, enforcement to comply
by May 2018—requirements and formal compliance regimes pushing companies
towards external service providers to meet evolving and complex requirements
Timing of Impact
Cloud Development
Cloud development leading to increasing security requirement and infrastructure complexity should create numerous opportunities in IT Security, notably for private and hybrid cloud
Short Term Short Term Medium-Long Term Short Term
Increasing Mobility Development of Internet of Things(loT)
General Data Protection Regulation (GDPR)
Evolving Threat of Cyber-Attacks1 2 3 4
Drivers and Trends
Evolving Cyber Security Threat Fueling Growth ofIT Security
7
• Audit and exception management
• Business continuity
• Compliance and policy management
• Enterprise risk management
• Incident management
• Regulatory change
• Security incident response
• Vendor risk management
• Vulnerability management
• Audio analysis and enhancement
• Data recovery
• Digital forensics
• Mobile forensics
• Duplicators and imagers
• Forensic hardware
• Internet artefacts
• Video analysis and enhancement
• Incident response
• AntiVirus and endpoint security
• Cyber threat intelligence
• Date protection and classification
• Digital resilience and analytics
• Email security and encryption
• Governance, risk and compliance
• Incident response and post breach detection
• Privileged access management
• Security awareness training and orchestration
Cyber security Digital forensics Governance & risk compliance
Key offerings
Value added distribution products
Top vendors
Ability to continuously offer customers a best-of-breed solution for all their cyber security needs, by utilising all vendor relationships
Key components
Services
8
Consulting & Advisory Services Managed Security Services
Key services
• Penetration Testing • Data Leakage and Loss Prevention
• Urgent Incident and Crisis Management
• Application Security Assessment
• Network Security and Management
• Information Systems andClient Audit
Key USPs
Risk identification and mapping
External intrusion attempt monitoring and prevention
Identify and mitigatesecurity gaps
Systems up to date with latest technology
Ensure no loss of data
✓
Key services
• Security Event Management
• Manages Endpoint Threat Detection and Response
• Managed Threat Intelligence
• Managed Vulnerability Assessment
• Managed Security Controls and web defence
• Managed Remediation Service/forensics Analysis
Key USPs
Real-time protection
Improved Focuson Core Business
Regulatory Compliance
24x7 SecurityEvent Monitoring and Response
PredictableCosts
Best Solution to Skill Shortage
• Ability to offer differentiated services to customers, through its consultants’ breadth of experience, and expertise building customer trust for the long term
• Scalable solutions enabling customers to outsource all their security operations
Differentiated offering with CYBER1's bench of security experts and expertise in the field
Advisory & Managed Security Services
9
Far-Reaching Vendor Relationships
Global Standards and Accreditations
Diverse Vendor Relationships and Industry leading Accreditations
10
2015 2016 2017 – 2018
Cyber 1Growing Footprint
Territories Pre-20151
20159
2016 11
2017-2018 20Acquisitions: +5 Acquisitions: +1 Acquisition: +4
2Our Company History and Expanding Footprint
• Cognosec AB formed
• Acquires DRS, ProTec, ARM (Advanced Risk Mitigation and African Risk Mitigation) and DRH
• Acquires Cognosec
• Cognosec AB IPO Nasdaq
• 2017: Acquires A-tek Distribution and Intact Software
• 2018: Cognosec AB rebrands as CYBER1 and acquires Itway and Advantio
Commentary
New Vendors
New York, U.S.
Since 2015, CYBER1 has strategically acquired 11 companies, expanding it’s geographic footprint to 20 countries
11
ProductAdvisory
Managed Services
Cyber Security
Digital Forensics
Governance Risk& Compliance
• Penetration Testing• Data Leakage & Loss
Prevention• Urgent Incident & Crisis
Management• Network Security &
Management• Information Systems
Audit• Application Security
Assessment• Client Audit
• Managed Web Defence• Security Event Management• Manages Endpoint Threat Detection
& Response• Managed Threat Intelligence
• Managed Vulnerability Assessment• Managed Security Controls• Managed Remediation Service /
forensics Analysis
3Unique Blend of Product, Advisory andManaged Services
12
6Exceptional Management Team with DeepDomain Expertise
Relevant Experience Other Companies
Kobus PaulsenChairman
• Founded the Group and has served as Chairman of the board since 2015; leads all M&A activity for the group• Previously served as Head of New Media at Mirror Group, as well as Managing Director of Brainware and led a MBO in 1999• Acquired London based Secure Trading and several internet based assets• Founded Acquiring.com, a leading payments group in Europe• Education: BSc in Electrical, Electronics and Communications Engineering, Tshwane University of Technology
Nick VineyChief Executive Officer
• Has served as Chief Executive Officer since 2019• Previously worked at McAfee serving as Regional Vice President (UK, Ireland and South Africa) and EMEA Vice President – Consumer,
Mobile and Small Medium Business• Education: MA, Modern History, MSc, Management Science, Both University of Oxford
Vivian GeversChief Operating Officer
• Has served as Chief Operating Officer since 2019• Previously served as Group Managing Director and Managing Director of our Product Distribution arm Credence Security• Education: BCom in Management, University of South Africa
SamienaHussainGroup Finance Director
• Has been with CYBER1 since 2018• Previously spent 6 years at Secure Trading serving as Group Commercial Financial Controller and Finance Director• Prior to Secure Trading, worked at Hays as a Commercial Financial Analyst at Hays • ACCA: FCCA Qualification• Education: Kingston University, B.A Accounting & Finance (Hons)
Daryn StilwellGeneral Counsel & Board Member
• Co-founder of the CYBER1 Group and has served as Group General Counsel since 2015 and as executive member of the board since 2018• Previously served as Head of Legal and Compliance at the UC Group, and held senior legal counsel positions supporting the technology
divisions of Visa Europe, WorldPay, Accenture and Deutsche Bank• Legal lead on all previous and current M&A transactions for the CYBER1 Group• Dual qualified solicitor: English Law and Laws of South Africa• Education: Bachelor of Commerce (Bcom) and Bachelor of Laws (LLB), Stellenbosch University