160 likes | 299 Views
2Q 2014 Presentation. Key Cybersecurity , Inc. 17959 Dumfries Shopping Center Suite B Dumfries, VA 22026-2490 703.402.2542 Shawn Key CEO, President skey@keycybersecurity.com. Accolades. Most Disruptive Solution – Security Category. Best of Breed – All Security Categories.
E N D
2Q 2014 Presentation Key Cybersecurity, Inc. 17959 Dumfries Shopping Center Suite B Dumfries, VA 22026-2490 703.402.2542 Shawn Key CEO, President skey@keycybersecurity.com
Accolades Most Disruptive Solution – Security Category Best of Breed – All Security Categories Inaugural Cohort Member (Graduate) Cyber Tipline Provider
CyberMerlinProvisional Patent No. 61/986,553 ™ Enables agencies and organizations to identify unknown and known file activity typically undetected on the enterprise network and connected devices. Provides capability to locate desired files algorithmically instead of by keyword, allowing for a paradigm shift in file location independent of file type or language. “Understanding the file activity on your network is just a few clicks away…”
ValueProposition Locate files pro-actively, reduce liability, handle the issue internally Undetected child pornography files are being stored on the network. Corporate reputation is at stake Embarrassing headlines Remediation costs Corporate reputation is at stake Embarrassing headlines Remediation costs Identify PI, mitigate concern, ensure compliance with standards/regulations Compliance violation Fines/Fees ATO revoked Compliance violation Fines/Fees ATO revoked Privacy Information is being stored in the clear Intellectual Property is being sent to or accessed by competitors Monitor file activity and “bad actors”, locate source of leak, remediate issue Corporate espionage Competitor advantage Financial loss “The Specialized Threat and Protection (STAP) market will reach $1.17 billion in annual revenue by 2017” - IDC
Legalities "We are pretty sure we have child pornography on our network but if we find it, we have to do something about it and that becomes onerous and potentially costly." Sarbanes Oxley Public Law 107-204: A section of the Sarbanes-Oxley Act that says a person is guilty of a felony, punishable by up to 20 years in prison, if he [sic] “alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States.”
Ignorance is NOT Bliss The American Bar Association Criminal Justice Section Center for Continuing Legal Education http://www.strozfriedberg.com/files/Publication/2ff70060-e3c5-43f8-bf98-024a2b4b3509/Presentation/PublicationAttachment/412a1aa4-562b-402d-800d-0097b96248b6/DigitalContrabandFindingChildPornintheWorkplaceWhiteCollarCrimeProgram.pdf
ABA/CCLE – Audio track “The company must take steps to minimize its own liability risks from an employee’s illegal access to child porn, and those risks can loom large if the illicit images are mishandled.” Simply ignoring the problem is not an option, not only from a moral perspective, but also as a legal matter: “doing nothing: could provide a basis for “hostile work environment” claims or may subject the company to civil suit by “any person aggrieved” by the possession of the images. Significantly, sticking one’s head in the sand also could expose managers to child porn “possession” charges or damage the companies reputation if unannounced searches and arrests of employees occur at the workplace.” Circulating the child porn images internally or to outside experts to elicit multiple views about how to handle the situation may implicate “distribution” issues. Relying on in-house IT staff to investigate the problem also poses potential problems, including the possibility that they might inadvertently taint or destroy evidence, “leak” facts about the internal investigation, or “check out” web sites visited by the offending employee, thereby caching more illegal child porn onto the company network.”
How Big is the CP Problem? November 21, 2013 • If you've got a big company system, I can almost guarantee that you have child pornography on it…It's there somewhere.’’ • - Kenneth Citarella, Deputy Chief of Investigations, Westchester County District Attorney's Office. “Child pornography is hidden on virtually every large corporate network, according to security experts.” - Internetnews.com
™ Detection Mode Find unknown problematic and illicit files Search Mode Find all instances of a known file Forensics Mode Utilize file reports to augment forensic activities
Automatically Detects/Monitors/Alerts • Compiles Forensic Reports • Customization and “Webcrawling” Capability • Proprietary “Certainty Hash Value” Differentiator • Integrated Vision Technology (3Q 2014) ™
CyberMerlin Functionality CyberMerlin Server • Server stores file signatures, performs fast matching, provides communications to CyberMerlin user agents, stores and displays results of scans and much more. CyberMerlin Web Console • Provides administrative access to a server, database management, user agent management and much more. Friendly browser user interface powered by Google Web Toolkit. CyberMerlin User Agent • Downloadable agent performs multiple functions – it scans local filesystem and looks for illicit files, In secondary mode, it functions as a crawler to scan/load hashes from the web/cloud. Platform independent and works on Windows, Mac OSX, Linux and other O/Ss.
Current Activities Dell Solutions Center (DSC) Create scalable, cloud based solution which runs ALL major platforms Dell Appliance Group (NCS) Create revenue via the distribution of a new capability appliance based solution Dell Entrepreneur in Residence (EIR) Applicant for the prestigious Dell Founders Club Dell OEM Division Exploring the marketing possibility of CyberMerlin as a desktop OEM solution and/or a network appliance for K-12 organizations (CIPA/FERPA compliance) DC Innovates Applicant for DC based grant funding in the Tech Corridor (up to $200k)
CyberMerlin – National ExposureInsert Pending Press Release (June 14th EST)
Executive Management and Advisory Team • Dan Woolley • Mach 37 General Partner • Dell, Computer Associates • CEO, Global Integrity • Shawn R. Key • Founder • 15 years of Cybersecurity and Information Assurance product and services experience • Charles Gold • C. Gold Strategic Marketing • 20 years software marketing experience • Zal Azmi • Chief Strategy Officer • Former CIO of the FBI • CEO, Nexus Solutions LLC • Skip Lawver • Former Cybercrime SME • Professor Emeritus, Eastern Michigan University • Informal Advisors • (in contractual discussions)
Thank You On behalf of Key Cybersecurity, Inc., we thank you for your time and consideration.