SlideShare a Scribd company logo
1 of 24
Safer
Together
The Network Effect of Cyber Security
Actionable Collectiv
e
Threat Intelligenc
e
Discover
Cyber
security
is not a
problem
of means
192G of high
value PI
500K accounts 267M records
5.2M accounts
solarwind
32M accounts
high profile hack
Tens of thousand
mail servers
Client trust (for
an auth system)
Billions… and…
counting
83M accounts
The others
800K records
5700 users
Cyber criminals are teaming…
and we are not!
SRC: CrowdStrike
TWISTED SPIDER Maze QakBot MUMMY SPIDER SPRITE SPIDER Defray777 BazarLoader
Eregor MALLARD SPIDER Emotet LUNAR SPIDER BokBot Anchor
ProLock DoppelDridex TrickBot WIZARD SPIDER Sidoh
DoppelPaymer DOPPEL SPIDER Zloader MagneticScraper
SCULLY SPIDER DanaBot Cutwail v2 CARBON SPIDER Darkside RaaS Conti
SMOKY SPIDER SmokeBot Pushdo NARWHAL SPIDER REvil RaaS PINCHY SPIDER Ryuk
Operates
Distributed
Likely sold
access to
Develops
Affiliate Of
Likely Operates
Previous
collaboration
Amadey Loader
Last 40 years approach to cybersecurity
vs
CrowdSec’s approach…
vs
Here’s the plan…
1> We edit an
open source
software
2> which creates
a network, benefiting
to its users
3> This community
generates a real
time map of rogue
IP address
4>… which we
monetize along
with extra services
A Waze of Cybersecurity
Laurent
Soubrevilla
COO
Coder turned entrepreneur,
loves automation & KPI driven
strategies. 3 times founder,
1 exit, 3 fundraisers.
Accountable for
Delivery
Planning
Execution
CEO
3 times founder, business angel.
4 fundraisers, 3 exits. 22 years in
cyber security. Changed focus
from tech to business 10y ago.
Accountable for
Vision
Means
Business
Thibault
Koechlin
CTO
Former red team pentester. FOSS
advocate, coder & mentor.
Involved in many security projects.
Switched from offensive to
defensive security.
Accountable for
Security
Architecture
Stability
A seasoned triumvirate, on a mission…
Philippe
Humeau
Behavior
(aggressing you)
Syslog, Splunk
journald, Cloudtrails,
SIEM, ELK, Kafka, etc.
ours yours
community
Reputation
(aggressing many)
$_
1 >Acquire 2 >Detect 3>Remedy 4>Share
(This process is fully
The massively
collaborative IPS
CrowdSec already deals with
50+ attacks & unwanted behaviors…
Web Scans Port Scans
21 22 23 25 80
VOIP abuse
Credentials
brute-forcing
XSS, SQLi, & Php-based
armageddons
L7 DDoS
(Applicative)
Ransomware
(lateral move)
Targeted
attacks
Bot scalping,
scraping or
monitoring
Credit card
stuffing
+
and builds a real-
time map of
cybercriminal
IP address pools
Already collecting more signals than anyone before, from 172 countries.
Helping to leverage
our unfair advantage…
… the number!
our network organizes
a shortage, choking
their weakest link.
Cyber criminals need IP
addresses to scale their
OPS & stay anonymous…
A fair model: Software against signals.
Give… and you shall receive.
MIT license.
As free as it can be
Transparent, auditable
and trustable.
Open to contribution
Free, forever.
We monetize access to
CTI for those not sharing
$
OPEN SOURCE (MIT) FREE (to use, copy, modify)
A network effect
in the making…
…but past its cold boot phase
September 2022
112 000
Installations (in 2 years)
7 200 000
Bad IPs identified
16 000 000
Daily reports received
175
Countries
CROWD
SEC
Honeypot (TR100)
Consensus
CROWD
SEC
Whitelist
CROWD
SEC
Predictive Alg
TR
99
TR
99
TR
99
TR
99
TR42 TR7 TR71
Smoke database
There is no smoke without fire
Fire database
The power of 0.3%
350
300
250
200
150
100
50
0
Jan 2 Jan 16 Jan 30 Feb 13 Feb 27 Mar 13
Alerts per week
Blocked by reputation
Blocked by behavior
-92% of the bad traffic aimed at a server,
Is blocked, just based on IP reputation.
7.2 M IP
addresses
22K IP
addresses
SMOKE FIRE
~0.35%
(the 8% remaining are dealt
with by the behavior engine)
Building
a network
of networks
to gain a unique “vertical” vantage point!
Health
care
Retail
Bank
Energy
IT
Media
Housing
Car
CrowdSec
is a 7D CTI
4D CTI
2D CTI
● Which IP
● Seen how many times last hour
● Which behavior
● Geography
● Actionable. We are 99,99%
sure!
● Type of IP (4g, VPN, Tor, etc.)
● Against what type of industry
● Which IP
● Was it aggressive recently
● What vulnerability (CVE)
● Type of IP (4g, VPN, Tor, etc.)
● Which IP
● What (simple) CVE
Network’s
maturity
stages
More signals
(see more threats)
Stronger signals
(distribute more IP, still
with no false positive)
Real time signals
(identifying in seconds
not minutes)
PHASE 1 PHASE 2 PHASE 3
Today
We collect
the strict
minimum Your logs
are never
exported
And keep them for the
least amount of time
We also have
a gorgeous
console
Which offers
CTI
We don’t
compete
We
reinforce
Log Storage
Firewalls EPP/EDR
SIEM
A.I.
SOAR
CTI
LOG
Loved by
professionals
Voted #17 on G2 best 2022
cybersecurity product,
leader in 30+ categories.
(And as Venture Beats highlighted, only 3 out of 50
products are edited by startups. We outranked
Microsoft, GitHub, Symantec, Dynatrace, Tenable, ...)
Technical deck KPI deck Monetization plan Investment plan Team deck Communication & community deck
Safer
together
“An excellent way to really
protect exposed servers”
Willy Tarreau
(Founder - Haproxy)
“CrowdSec takes a novel approach
to programmatically staying ahead
of emerging threats through a novel
application of crowd-sourcing”
Omkhar Arasaratnam
(Engineering Director - Google)
“It’s so good, I thought it already existed.
I’ll be among the 1st customers.”
Yoav Kutner
(Founder - Magento & Oro Inc)
“Crowdsec [is] making the world
safer [...] go grab and install it.”
Flemming Riis
(Director Risk Assessment - GoDaddy)
“Likely the most innovative
security solution”
Michel Moriniaux
(SRE - Microsoft/LinkedIn)
“An excellent approach
to the problem”
Frank Denis
(Security guru, former OVH CISO)
“In an everything-Cyber world, it’s
reassuring to find some genuine
security professionals.”
Nicolas Ruff
(Security Engineer, Google)

More Related Content

What's hot

Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Venture Capital 101
Venture Capital 101Venture Capital 101
Venture Capital 101Joe Medved
 
How Venture Capitalist (VC) Firms Screen Deals
How Venture Capitalist (VC) Firms Screen DealsHow Venture Capitalist (VC) Firms Screen Deals
How Venture Capitalist (VC) Firms Screen DealsMark J. Feldman
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...MITRE - ATT&CKcon
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSMITRE ATT&CK
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Frode Hommedal
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach AnalysisTal Be'ery
 
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE - ATT&CKcon
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
 
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat MappingHelping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat MappingMITRE - ATT&CKcon
 
Corporate Venture Capital: Asia rising
Corporate Venture Capital: Asia risingCorporate Venture Capital: Asia rising
Corporate Venture Capital: Asia risingKumaraguru Veerasamy
 
ETHICS09 - Case Study - The Cuckoo's Egg
ETHICS09 - Case Study - The Cuckoo's EggETHICS09 - Case Study - The Cuckoo's Egg
ETHICS09 - Case Study - The Cuckoo's EggMichael Heron
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoKatie Nickels
 
Cyber threat intelligence
Cyber threat intelligenceCyber threat intelligence
Cyber threat intelligenceMondher Smii
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Harry McLaren
 

What's hot (20)

Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Venture Capital 101
Venture Capital 101Venture Capital 101
Venture Capital 101
 
How Venture Capitalist (VC) Firms Screen Deals
How Venture Capitalist (VC) Firms Screen DealsHow Venture Capitalist (VC) Firms Screen Deals
How Venture Capitalist (VC) Firms Screen Deals
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat MappingHelping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
 
Corporate Venture Capital: Asia rising
Corporate Venture Capital: Asia risingCorporate Venture Capital: Asia rising
Corporate Venture Capital: Asia rising
 
ETHICS09 - Case Study - The Cuckoo's Egg
ETHICS09 - Case Study - The Cuckoo's EggETHICS09 - Case Study - The Cuckoo's Egg
ETHICS09 - Case Study - The Cuckoo's Egg
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
Cyber threat intelligence
Cyber threat intelligenceCyber threat intelligence
Cyber threat intelligence
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
 

Similar to CrowdSec A-Round Fundraising Deck

CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securitySaeidGhasemshirazi
 
Nastiest Malware 2021
Nastiest Malware 2021Nastiest Malware 2021
Nastiest Malware 2021tsevier
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術ハイシンク創研 / Laboratory of Hi-Think Corporation
 
Blockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesBlockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesEric Larcheveque
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)Priyanka Aash
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...NUS-ISS
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Ce hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsCe hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsMehrdad Jingoism
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfinfosec train
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine LearningAvast
 
15 years through Infosec
15 years through Infosec15 years through Infosec
15 years through InfosecSaumil Shah
 
Webinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanWebinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanBlueliv
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 

Similar to CrowdSec A-Round Fundraising Deck (20)

CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deck
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot security
 
Nastiest Malware 2021
Nastiest Malware 2021Nastiest Malware 2021
Nastiest Malware 2021
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
 
Blockchain solutions leading to better security practices
Blockchain solutions leading to better security practicesBlockchain solutions leading to better security practices
Blockchain solutions leading to better security practices
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
MiraiBotnet.pptx
MiraiBotnet.pptxMiraiBotnet.pptx
MiraiBotnet.pptx
 
Ce hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsCe hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypots
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdf
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
 
15 years through Infosec
15 years through Infosec15 years through Infosec
15 years through Infosec
 
Webinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanWebinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking Trojan
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 

Recently uploaded

Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 

Recently uploaded (20)

Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 

CrowdSec A-Round Fundraising Deck

  • 1. Safer Together The Network Effect of Cyber Security Actionable Collectiv e Threat Intelligenc e Discover
  • 2. Cyber security is not a problem of means 192G of high value PI 500K accounts 267M records 5.2M accounts solarwind 32M accounts high profile hack Tens of thousand mail servers Client trust (for an auth system) Billions… and… counting 83M accounts The others 800K records 5700 users
  • 3. Cyber criminals are teaming… and we are not! SRC: CrowdStrike TWISTED SPIDER Maze QakBot MUMMY SPIDER SPRITE SPIDER Defray777 BazarLoader Eregor MALLARD SPIDER Emotet LUNAR SPIDER BokBot Anchor ProLock DoppelDridex TrickBot WIZARD SPIDER Sidoh DoppelPaymer DOPPEL SPIDER Zloader MagneticScraper SCULLY SPIDER DanaBot Cutwail v2 CARBON SPIDER Darkside RaaS Conti SMOKY SPIDER SmokeBot Pushdo NARWHAL SPIDER REvil RaaS PINCHY SPIDER Ryuk Operates Distributed Likely sold access to Develops Affiliate Of Likely Operates Previous collaboration Amadey Loader
  • 4. Last 40 years approach to cybersecurity vs CrowdSec’s approach… vs
  • 5. Here’s the plan… 1> We edit an open source software 2> which creates a network, benefiting to its users 3> This community generates a real time map of rogue IP address 4>… which we monetize along with extra services A Waze of Cybersecurity
  • 6. Laurent Soubrevilla COO Coder turned entrepreneur, loves automation & KPI driven strategies. 3 times founder, 1 exit, 3 fundraisers. Accountable for Delivery Planning Execution CEO 3 times founder, business angel. 4 fundraisers, 3 exits. 22 years in cyber security. Changed focus from tech to business 10y ago. Accountable for Vision Means Business Thibault Koechlin CTO Former red team pentester. FOSS advocate, coder & mentor. Involved in many security projects. Switched from offensive to defensive security. Accountable for Security Architecture Stability A seasoned triumvirate, on a mission… Philippe Humeau
  • 7. Behavior (aggressing you) Syslog, Splunk journald, Cloudtrails, SIEM, ELK, Kafka, etc. ours yours community Reputation (aggressing many) $_ 1 >Acquire 2 >Detect 3>Remedy 4>Share (This process is fully The massively collaborative IPS
  • 8. CrowdSec already deals with 50+ attacks & unwanted behaviors… Web Scans Port Scans 21 22 23 25 80 VOIP abuse Credentials brute-forcing XSS, SQLi, & Php-based armageddons L7 DDoS (Applicative) Ransomware (lateral move) Targeted attacks Bot scalping, scraping or monitoring Credit card stuffing
  • 9. + and builds a real- time map of cybercriminal IP address pools Already collecting more signals than anyone before, from 172 countries.
  • 10. Helping to leverage our unfair advantage… … the number!
  • 11. our network organizes a shortage, choking their weakest link. Cyber criminals need IP addresses to scale their OPS & stay anonymous…
  • 12. A fair model: Software against signals. Give… and you shall receive. MIT license. As free as it can be Transparent, auditable and trustable. Open to contribution Free, forever. We monetize access to CTI for those not sharing $ OPEN SOURCE (MIT) FREE (to use, copy, modify)
  • 13. A network effect in the making… …but past its cold boot phase September 2022 112 000 Installations (in 2 years) 7 200 000 Bad IPs identified 16 000 000 Daily reports received 175 Countries
  • 15. The power of 0.3% 350 300 250 200 150 100 50 0 Jan 2 Jan 16 Jan 30 Feb 13 Feb 27 Mar 13 Alerts per week Blocked by reputation Blocked by behavior -92% of the bad traffic aimed at a server, Is blocked, just based on IP reputation. 7.2 M IP addresses 22K IP addresses SMOKE FIRE ~0.35% (the 8% remaining are dealt with by the behavior engine)
  • 16. Building a network of networks to gain a unique “vertical” vantage point! Health care Retail Bank Energy IT Media Housing Car
  • 17. CrowdSec is a 7D CTI 4D CTI 2D CTI ● Which IP ● Seen how many times last hour ● Which behavior ● Geography ● Actionable. We are 99,99% sure! ● Type of IP (4g, VPN, Tor, etc.) ● Against what type of industry ● Which IP ● Was it aggressive recently ● What vulnerability (CVE) ● Type of IP (4g, VPN, Tor, etc.) ● Which IP ● What (simple) CVE
  • 18. Network’s maturity stages More signals (see more threats) Stronger signals (distribute more IP, still with no false positive) Real time signals (identifying in seconds not minutes) PHASE 1 PHASE 2 PHASE 3 Today
  • 19. We collect the strict minimum Your logs are never exported And keep them for the least amount of time
  • 20. We also have a gorgeous console
  • 23. Loved by professionals Voted #17 on G2 best 2022 cybersecurity product, leader in 30+ categories. (And as Venture Beats highlighted, only 3 out of 50 products are edited by startups. We outranked Microsoft, GitHub, Symantec, Dynatrace, Tenable, ...)
  • 24. Technical deck KPI deck Monetization plan Investment plan Team deck Communication & community deck Safer together “An excellent way to really protect exposed servers” Willy Tarreau (Founder - Haproxy) “CrowdSec takes a novel approach to programmatically staying ahead of emerging threats through a novel application of crowd-sourcing” Omkhar Arasaratnam (Engineering Director - Google) “It’s so good, I thought it already existed. I’ll be among the 1st customers.” Yoav Kutner (Founder - Magento & Oro Inc) “Crowdsec [is] making the world safer [...] go grab and install it.” Flemming Riis (Director Risk Assessment - GoDaddy) “Likely the most innovative security solution” Michel Moriniaux (SRE - Microsoft/LinkedIn) “An excellent approach to the problem” Frank Denis (Security guru, former OVH CISO) “In an everything-Cyber world, it’s reassuring to find some genuine security professionals.” Nicolas Ruff (Security Engineer, Google)