1 / 16

Key Cybersecurity , Inc. 17959 Dumfries Shopping Center Suite B Dumfries, VA 22026-2490

2Q 2014 Presentation. Key Cybersecurity , Inc. 17959 Dumfries Shopping Center Suite B Dumfries, VA 22026-2490 703.402.2542 Shawn Key CEO, President skey@keycybersecurity.com. Accolades. Most Disruptive Solution – Security Category. Best of Breed – All Security Categories.

ianna
Télécharger la présentation

Key Cybersecurity , Inc. 17959 Dumfries Shopping Center Suite B Dumfries, VA 22026-2490

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 2Q 2014 Presentation Key Cybersecurity, Inc. 17959 Dumfries Shopping Center Suite B Dumfries, VA 22026-2490 703.402.2542 Shawn Key CEO, President skey@keycybersecurity.com

  2. Accolades Most Disruptive Solution – Security Category Best of Breed – All Security Categories Inaugural Cohort Member (Graduate) Cyber Tipline Provider

  3. CyberMerlinProvisional Patent No. 61/986,553 ™ Enables agencies and organizations to identify unknown and known file activity typically undetected on the enterprise network and connected devices. Provides capability to locate desired files algorithmically instead of by keyword, allowing for a paradigm shift in file location independent of file type or language. “Understanding the file activity on your network is just a few clicks away…”

  4. ValueProposition Locate files pro-actively, reduce liability, handle the issue internally Undetected child pornography files are being stored on the network. Corporate reputation is at stake Embarrassing headlines Remediation costs Corporate reputation is at stake Embarrassing headlines Remediation costs Identify PI, mitigate concern, ensure compliance with standards/regulations Compliance violation Fines/Fees ATO revoked Compliance violation Fines/Fees ATO revoked Privacy Information is being stored in the clear Intellectual Property is being sent to or accessed by competitors Monitor file activity and “bad actors”, locate source of leak, remediate issue Corporate espionage Competitor advantage Financial loss “The Specialized Threat and Protection (STAP) market will reach $1.17 billion in annual revenue by 2017” - IDC

  5. Legalities "We are pretty sure we have child pornography on our network but if we find it, we have to do something about it and that becomes onerous and potentially costly." Sarbanes Oxley Public Law 107-204: A section of the Sarbanes-Oxley Act that says a person is guilty of a felony, punishable by up to 20 years in prison, if he [sic] “alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States.”

  6. Ignorance is NOT Bliss The American Bar Association Criminal Justice Section Center for Continuing Legal Education http://www.strozfriedberg.com/files/Publication/2ff70060-e3c5-43f8-bf98-024a2b4b3509/Presentation/PublicationAttachment/412a1aa4-562b-402d-800d-0097b96248b6/DigitalContrabandFindingChildPornintheWorkplaceWhiteCollarCrimeProgram.pdf

  7. ABA/CCLE – Audio track “The company must take steps to minimize its own liability risks from an employee’s illegal access to child porn, and those risks can loom large if the illicit images are mishandled.” Simply ignoring the problem is not an option, not only from a moral perspective, but also as a legal matter: “doing nothing: could provide a basis for “hostile work environment” claims or may subject the company to civil suit by “any person aggrieved” by the possession of the images. Significantly, sticking one’s head in the sand also could expose managers to child porn “possession” charges or damage the companies reputation if unannounced searches and arrests of employees occur at the workplace.” Circulating the child porn images internally or to outside experts to elicit multiple views about how to handle the situation may implicate “distribution” issues. Relying on in-house IT staff to investigate the problem also poses potential problems, including the possibility that they might inadvertently taint or destroy evidence, “leak” facts about the internal investigation, or “check out” web sites visited by the offending employee, thereby caching more illegal child porn onto the company network.”

  8. How Big is the CP Problem? November 21, 2013 • If you've got a big company system, I can almost guarantee that you have child pornography on it…It's there somewhere.’’ • - Kenneth Citarella, Deputy Chief of Investigations, Westchester County District Attorney's Office. “Child pornography is hidden on virtually every large corporate network, according to security experts.” - Internetnews.com

  9. Detection Mode Find unknown problematic and illicit files Search Mode Find all instances of a known file Forensics Mode Utilize file reports to augment forensic activities

  10. Automatically Detects/Monitors/Alerts • Compiles Forensic Reports • Customization and “Webcrawling” Capability • Proprietary “Certainty Hash Value” Differentiator • Integrated Vision Technology (3Q 2014) ™

  11. CyberMerlin Functionality CyberMerlin Server • Server stores file signatures, performs fast matching, provides communications to CyberMerlin user agents, stores and displays results of scans and much more. CyberMerlin Web Console • Provides administrative access to a server, database management, user agent management and much more. Friendly browser user interface powered by Google Web Toolkit. CyberMerlin User Agent • Downloadable agent performs multiple functions – it scans local filesystem and looks for illicit files, In secondary mode, it functions as a crawler to scan/load hashes from the web/cloud. Platform independent and works on Windows, Mac OSX, Linux and other O/Ss.

  12. Current Activities Dell Solutions Center (DSC) Create scalable, cloud based solution which runs ALL major platforms Dell Appliance Group (NCS) Create revenue via the distribution of a new capability appliance based solution Dell Entrepreneur in Residence (EIR) Applicant for the prestigious Dell Founders Club Dell OEM Division Exploring the marketing possibility of CyberMerlin as a desktop OEM solution and/or a network appliance for K-12 organizations (CIPA/FERPA compliance) DC Innovates Applicant for DC based grant funding in the Tech Corridor (up to $200k)

  13. Beta Customer and Strategic Partner Opportunities

  14. CyberMerlin – National ExposureInsert Pending Press Release (June 14th EST)

  15. Executive Management and Advisory Team • Dan Woolley • Mach 37 General Partner • Dell, Computer Associates • CEO, Global Integrity • Shawn R. Key • Founder • 15 years of Cybersecurity and Information Assurance product and services experience • Charles Gold • C. Gold Strategic Marketing • 20 years software marketing experience • Zal Azmi • Chief Strategy Officer • Former CIO of the FBI • CEO, Nexus Solutions LLC • Skip Lawver • Former Cybercrime SME • Professor Emeritus, Eastern Michigan University • Informal Advisors • (in contractual discussions)

  16. Thank You On behalf of Key Cybersecurity, Inc., we thank you for your time and consideration.

More Related