SlideShare a Scribd company logo
1 of 19
ESET is protecting millions of users
in more than 180 countries worldwide
Continual Employee Growth
More Than 900 ESET Employees
HEADQUARTERS
Bratislava, SK
REGIONAL CENTERS AND OFFICES
San Diego (USA)
Buenos Aires (ARG)
Sao Paulo (BRA)
Sydney (AUS)
Jena (GER)
Prague (CZE)
Singapore
MALWARE RESEARCH AND TECHNOLOGY CENTERS
Bratislava (SVK)
Košice (SVK)
San Diego (USA)
Montreal (CAN)
Krakow (POL)
Moscow (RUS)
Buenos Aires (ARG)
Prague (CZE)
Jablonec nad Nisou (CZE)
Singapore
Technology and regional centers
Continual Growth End User Revenue in Million EUR
ESET Is A Major Player
ESET was ranked #5 by IDC
by Worldwide Endpoint Security Revenue for 2011 and 2012
Enjoy Safer
Technology
Vision
We will enable
everyone to enjoy
the full potential
of themselves and
their technology in
a secure digital
world.
Mission
Working with ethical
and passionate people
we are building a safer
technology environment
for everyone to enjoy.
We are doing this
through education and
our commitment to
research and
development.
Values
Courage. We don’t take the easy way.
We constantly push boundaries and
are determined to make a difference.
Integrity. We encourage fairness and
honesty in everything we do.
Reliability. People can count on us.
We work hard to live up to our
promises, and to build trust and
rapport.
Passion. We believe in ourselves and
in what we do. We’re driven to shape
a better future for everyone.
With a passion.
How Malware Detection Works
Signatures
Taking “fingerprints” of known malware.
Reactive approach – one needs to have a sample.
How Malware Detection Works
Heuristics
Analyzing code and behavior using emulation.
Proactive approach – can detect malware not yet written.
History of Anti-virus Business
The 90’s – Era of Viruses
We started playing with heuristics and made this technology usable.
Viruses spread slowly, we published updates on CDs.
History of Anti-virus Business
Early 2000’s – Era of Worms
This is when proactive approach became useful.
We started growing internationally.
The Present of Anti-virus Business
Professional Cybercriminals
Cybercrime economy is bigger than AV economy.
Threats are very advanced and their amount is overwhelming.
Future Trends
Mobile Space
With growing popularity, the mobile devices are going to become
interesting targets for cybercriminals.
Future Trends
Targeted Attacks
Attacks targeted at a single entity are quite difficult to deal with.
Multiple layers of protection and user education are key.
Future Trends
Government Involvement
Cyber attacks are used for political and warfare purposes.
This will make the playground quite messy.
Future Trends
Embedded Devices
Security of many connected devices around us is poor.
Cybercriminals are likely to use them to perform their attacks.
Future Trends
Privacy Concerns
Whatever you do in life these days leaves a footprint.
People should start getting more careful about their privacy.
Future Trends
Social Engineering
Cons have worked for centuries and it’s unlikely to change.
People are vulnerable and technology won’t fix that.
ESET protecting millions in 180+ countries with 900+ employees

More Related Content

What's hot

Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldPro Mrkt
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18Pro Mrkt
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldPro Mrkt
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
Canarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 revCanarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 revColloqueRISQ
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Cyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesCyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesTom Freer
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Inc
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Perforce
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )TechnoHacks_Infosystem
 
cyber security
cyber securitycyber security
cyber securitykm. nahid
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnGareth Niblett
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016Niran Seriki, CCISO, CISM
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7Tripwire
 

What's hot (20)

Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
Canarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 revCanarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 rev
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Cyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesCyber Security Challenges and Strategies
Cyber Security Challenges and Strategies
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
Resume
ResumeResume
Resume
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
cyber security
cyber securitycyber security
cyber security
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Viewers also liked

SAMBA - Elkova Jana - 9.9.2014
SAMBA - Elkova Jana - 9.9.2014SAMBA - Elkova Jana - 9.9.2014
SAMBA - Elkova Jana - 9.9.2014Anton Bittner
 
Zlato investičný pilier 21 storocia
Zlato   investičný pilier 21 storociaZlato   investičný pilier 21 storocia
Zlato investičný pilier 21 storociaAnton Bittner
 
Samba sebo - 10.9.2013
Samba sebo - 10.9.2013Samba sebo - 10.9.2013
Samba sebo - 10.9.2013Anton Bittner
 
SAMBA - Jozef Hajkr - 19.11.2015
SAMBA - Jozef Hajkr - 19.11.2015SAMBA - Jozef Hajkr - 19.11.2015
SAMBA - Jozef Hajkr - 19.11.2015Anton Bittner
 
Samba gonda - 10.9.2013
Samba gonda - 10.9.2013 Samba gonda - 10.9.2013
Samba gonda - 10.9.2013 Anton Bittner
 
5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...
5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...
5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...TimeManagement.sk
 
SAMBA - Vizvári Róbert - 12.3.2014
SAMBA - Vizvári Róbert - 12.3.2014SAMBA - Vizvári Róbert - 12.3.2014
SAMBA - Vizvári Róbert - 12.3.2014Anton Bittner
 
SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013
SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013
SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013Anton Bittner
 
SAMBA - Barnas - 9.9.2014
SAMBA - Barnas  - 9.9.2014SAMBA - Barnas  - 9.9.2014
SAMBA - Barnas - 9.9.2014Anton Bittner
 
SAMBA - Sihlovec - 9.12.2014
SAMBA - Sihlovec - 9.12.2014SAMBA - Sihlovec - 9.12.2014
SAMBA - Sihlovec - 9.12.2014Anton Bittner
 
SAMBA - Žiarovský Andrej - 10.6.2014
SAMBA - Žiarovský Andrej - 10.6.2014SAMBA - Žiarovský Andrej - 10.6.2014
SAMBA - Žiarovský Andrej - 10.6.2014Anton Bittner
 
SAMBA - Maj - 14.5.2015
SAMBA - Maj - 14.5.2015SAMBA - Maj - 14.5.2015
SAMBA - Maj - 14.5.2015Anton Bittner
 
SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014
SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014
SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014Anton Bittner
 
SAMBA - Sedlak Marcel - 9.9.2014
SAMBA - Sedlak Marcel - 9.9.2014SAMBA - Sedlak Marcel - 9.9.2014
SAMBA - Sedlak Marcel - 9.9.2014Anton Bittner
 
SAMBA - Peter Varga - 19.11.2015
SAMBA - Peter Varga - 19.11.2015SAMBA - Peter Varga - 19.11.2015
SAMBA - Peter Varga - 19.11.2015Anton Bittner
 
SAMBA story - Spolok absolventov MBA
SAMBA story - Spolok absolventov MBASAMBA story - Spolok absolventov MBA
SAMBA story - Spolok absolventov MBAJiri Slezak
 
SAMBA - SABO - 9.12.2014
SAMBA - SABO - 9.12.2014SAMBA - SABO - 9.12.2014
SAMBA - SABO - 9.12.2014Anton Bittner
 
SAMBA - Hegedus Tomas - 9.9.2014
SAMBA - Hegedus Tomas - 9.9.2014SAMBA - Hegedus Tomas - 9.9.2014
SAMBA - Hegedus Tomas - 9.9.2014Anton Bittner
 
Samba szalay - 10.9.2013
Samba szalay - 10.9.2013Samba szalay - 10.9.2013
Samba szalay - 10.9.2013Anton Bittner
 
SAMBA - Zalesak Peter - 11.12.2013
SAMBA - Zalesak Peter - 11.12.2013SAMBA - Zalesak Peter - 11.12.2013
SAMBA - Zalesak Peter - 11.12.2013Anton Bittner
 

Viewers also liked (20)

SAMBA - Elkova Jana - 9.9.2014
SAMBA - Elkova Jana - 9.9.2014SAMBA - Elkova Jana - 9.9.2014
SAMBA - Elkova Jana - 9.9.2014
 
Zlato investičný pilier 21 storocia
Zlato   investičný pilier 21 storociaZlato   investičný pilier 21 storocia
Zlato investičný pilier 21 storocia
 
Samba sebo - 10.9.2013
Samba sebo - 10.9.2013Samba sebo - 10.9.2013
Samba sebo - 10.9.2013
 
SAMBA - Jozef Hajkr - 19.11.2015
SAMBA - Jozef Hajkr - 19.11.2015SAMBA - Jozef Hajkr - 19.11.2015
SAMBA - Jozef Hajkr - 19.11.2015
 
Samba gonda - 10.9.2013
Samba gonda - 10.9.2013 Samba gonda - 10.9.2013
Samba gonda - 10.9.2013
 
5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...
5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...
5 málo známych spôsobov, ako nechať technológie a ľudí na druhej strane sveta...
 
SAMBA - Vizvári Róbert - 12.3.2014
SAMBA - Vizvári Róbert - 12.3.2014SAMBA - Vizvári Róbert - 12.3.2014
SAMBA - Vizvári Róbert - 12.3.2014
 
SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013
SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013
SAMBA Slovakia v roku 2013 a budúcnosť - 11.12.2013
 
SAMBA - Barnas - 9.9.2014
SAMBA - Barnas  - 9.9.2014SAMBA - Barnas  - 9.9.2014
SAMBA - Barnas - 9.9.2014
 
SAMBA - Sihlovec - 9.12.2014
SAMBA - Sihlovec - 9.12.2014SAMBA - Sihlovec - 9.12.2014
SAMBA - Sihlovec - 9.12.2014
 
SAMBA - Žiarovský Andrej - 10.6.2014
SAMBA - Žiarovský Andrej - 10.6.2014SAMBA - Žiarovský Andrej - 10.6.2014
SAMBA - Žiarovský Andrej - 10.6.2014
 
SAMBA - Maj - 14.5.2015
SAMBA - Maj - 14.5.2015SAMBA - Maj - 14.5.2015
SAMBA - Maj - 14.5.2015
 
SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014
SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014
SAMBA Slovakia - rok 2014 a budúcnosť - 9.12.2014
 
SAMBA - Sedlak Marcel - 9.9.2014
SAMBA - Sedlak Marcel - 9.9.2014SAMBA - Sedlak Marcel - 9.9.2014
SAMBA - Sedlak Marcel - 9.9.2014
 
SAMBA - Peter Varga - 19.11.2015
SAMBA - Peter Varga - 19.11.2015SAMBA - Peter Varga - 19.11.2015
SAMBA - Peter Varga - 19.11.2015
 
SAMBA story - Spolok absolventov MBA
SAMBA story - Spolok absolventov MBASAMBA story - Spolok absolventov MBA
SAMBA story - Spolok absolventov MBA
 
SAMBA - SABO - 9.12.2014
SAMBA - SABO - 9.12.2014SAMBA - SABO - 9.12.2014
SAMBA - SABO - 9.12.2014
 
SAMBA - Hegedus Tomas - 9.9.2014
SAMBA - Hegedus Tomas - 9.9.2014SAMBA - Hegedus Tomas - 9.9.2014
SAMBA - Hegedus Tomas - 9.9.2014
 
Samba szalay - 10.9.2013
Samba szalay - 10.9.2013Samba szalay - 10.9.2013
Samba szalay - 10.9.2013
 
SAMBA - Zalesak Peter - 11.12.2013
SAMBA - Zalesak Peter - 11.12.2013SAMBA - Zalesak Peter - 11.12.2013
SAMBA - Zalesak Peter - 11.12.2013
 

Similar to ESET protecting millions in 180+ countries with 900+ employees

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...Andris Soroka
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldAndris Soroka
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaBravo Tecnologia
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaStefan Streichsbier
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreCyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreClearedJobs.Net
 

Similar to ESET protecting millions in 180+ countries with 900+ employees (20)

Sophos
SophosSophos
Sophos
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação Corporativa
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
braincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdfbraincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdf
 
braincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdfbraincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdf
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreCyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

ESET protecting millions in 180+ countries with 900+ employees

  • 1.
  • 2. ESET is protecting millions of users in more than 180 countries worldwide
  • 3. Continual Employee Growth More Than 900 ESET Employees
  • 4. HEADQUARTERS Bratislava, SK REGIONAL CENTERS AND OFFICES San Diego (USA) Buenos Aires (ARG) Sao Paulo (BRA) Sydney (AUS) Jena (GER) Prague (CZE) Singapore MALWARE RESEARCH AND TECHNOLOGY CENTERS Bratislava (SVK) Košice (SVK) San Diego (USA) Montreal (CAN) Krakow (POL) Moscow (RUS) Buenos Aires (ARG) Prague (CZE) Jablonec nad Nisou (CZE) Singapore Technology and regional centers
  • 5. Continual Growth End User Revenue in Million EUR
  • 6. ESET Is A Major Player ESET was ranked #5 by IDC by Worldwide Endpoint Security Revenue for 2011 and 2012
  • 7. Enjoy Safer Technology Vision We will enable everyone to enjoy the full potential of themselves and their technology in a secure digital world. Mission Working with ethical and passionate people we are building a safer technology environment for everyone to enjoy. We are doing this through education and our commitment to research and development. Values Courage. We don’t take the easy way. We constantly push boundaries and are determined to make a difference. Integrity. We encourage fairness and honesty in everything we do. Reliability. People can count on us. We work hard to live up to our promises, and to build trust and rapport. Passion. We believe in ourselves and in what we do. We’re driven to shape a better future for everyone. With a passion.
  • 8. How Malware Detection Works Signatures Taking “fingerprints” of known malware. Reactive approach – one needs to have a sample.
  • 9. How Malware Detection Works Heuristics Analyzing code and behavior using emulation. Proactive approach – can detect malware not yet written.
  • 10. History of Anti-virus Business The 90’s – Era of Viruses We started playing with heuristics and made this technology usable. Viruses spread slowly, we published updates on CDs.
  • 11. History of Anti-virus Business Early 2000’s – Era of Worms This is when proactive approach became useful. We started growing internationally.
  • 12. The Present of Anti-virus Business Professional Cybercriminals Cybercrime economy is bigger than AV economy. Threats are very advanced and their amount is overwhelming.
  • 13. Future Trends Mobile Space With growing popularity, the mobile devices are going to become interesting targets for cybercriminals.
  • 14. Future Trends Targeted Attacks Attacks targeted at a single entity are quite difficult to deal with. Multiple layers of protection and user education are key.
  • 15. Future Trends Government Involvement Cyber attacks are used for political and warfare purposes. This will make the playground quite messy.
  • 16. Future Trends Embedded Devices Security of many connected devices around us is poor. Cybercriminals are likely to use them to perform their attacks.
  • 17. Future Trends Privacy Concerns Whatever you do in life these days leaves a footprint. People should start getting more careful about their privacy.
  • 18. Future Trends Social Engineering Cons have worked for centuries and it’s unlikely to change. People are vulnerable and technology won’t fix that.