SlideShare a Scribd company logo
1 of 33
Download to read offline
1
Cybersecurity Solution Provider
European Leader
LEADERSHIP
CEO & Co-Founder
Jean-Nicolas Piotrowski
Former BNP Paribas CISO
ITrust, your cybersecurity expert
10 years experience in cybersecurity
35 collaborators and 30 Data Scientists in labs
More than 200 public and private clients
100% growth/year
VP Business
David Ofer
IT Engineer
PhD in Management, HEC
20 years of experience in High tech
business development
CFO & Co-Founder
Henri Piotrowski
Supaéro Engineer, former AIRBUS-ATR CEO
Paris, Toulouse (headquarters), New York,
Colombus, Shanghai (ongoing)
Value proposal
Covers all cybersecurity activities in all sectors
Leading solutions
International
Cybersecurity as a Service
Shareholders and financial aid
100% French simplified joint-stock company / 483.352 € share capital / 3,3 M€ owner equity
Private and institutional investors (NewAlpha, Nestadio, Crédit Agricole, Caisse d’Epargne)
Supported by the French state:
Financial aid through BPI and the Deposits and Consignments Fund (reimboursable R&D financing)
Financing through the « Investment for the Future » programme
Partners
Prizes & Associates
ITrust, your cybersecurity expert
A company worthy of our attention:
ITrust declares war on hacking
Translation (FR-EN)
of article retrieved from the
<LesEchos.fr> online newspaper &
published by Laurent Marcaillou,
Toulouse, 25.02.2015
“ITrust started its missions in IT security within
Airbus, Toulouse, in 2007. With this expertise, the
young company designed the IKare software, able to
scan an information system in order to detect
potential weaknesses and manage security. Launched
in 2012 , this solution minimizes the duration of an
audit concerning an information system. Its sales
were doubled in 2014 after registering roughly 1,030
new clients.
The enterprise, with only 25 employees, also doubled
its turnover to 1,3 million euro and envisions another
two-fold increase in its turnover for the year 2015.
Among its clients, we will stumble upon giants such
as: Total, Air France, Airbus, Bull [...]”
Articles in press
about ITrust & its solutions
ITrust presents an unequaled
software an European Level
“The Toulouse-based enterprise ITrust, specialized
in IT security, is on the verge of unveiling a new, yet
to be seen cybersecurity software.
ITrust’s CEO, Jean‐Nicolas Piotrowski, was present
at the International Cybercrime Forum to present
this exciting innovation.
Q: Why is your new product considered a
breakthrough among existing IT security solutions?
R: We’ve been working on IT-Tude for 7 years now:
it’s a groundbreaking technology that enables
people to detect weak signals hinting at unknown
viruses, otherwise known as APTs (Advanced
Persistent Threats).”
Translation (FR-EN)
of article retrieved from the
<Tribune> online newspaper and
published by Valentin Dohin,
29.01.2015
Articles in press
about ITrust & its solutions
A French security solution
on a French cloud
“Developed by the Secure Virtual Cloud
(SVC) consortium, this 3-year project
worth 14 mil. Euro is led by the
Toulouse-based start-up ITrust and nine
other partners, of which we will
mention the IT Research Institute of
Toulouse (IRIT), The System Analysis and
Architecture Laboratory (LAAS) and Bull.
Founded in 2007, ITrust distributes
IKare, a vulnerability management
software proposed in cloud mode for
real-time monitoring, or through
licensing bit by bit. Its interest?[...]”
Translation (FR-EN)
of article retrieved from the
<L’Usine Nouvelle> online
newspaper and published by
Ridha Loukll, 20.09.2012
Articles in press
about ITrust & its solutions
Defence & aero
Bank
Health & pharma
Public sector
Insurance & social protection
Transport & logistics
Education Energy &
utilities
Food industry
Client references
More than 100 clients in Europe – 300 000 continuously supervised IPs
15 million stolen credit cards
Target Credit Cards &
Customer Info Hacked (2013)
“US discount retailer Target found 40
million of its customer accounts were
hacked during November 27 and
December 15, 2013.
Across the US, during Black Friday, the
Target stores were targeted and
customer names, credit cards, debit
cards, and CVV values of several
customers were hacked. The retail
major said that other information such
as addresses, PIN, social security
numbers, etc., were not hacked
however. “
Extract from the “Recent Hacking
Incidents Around the World“ article
retrieved from the <MapsOfWorld>
online newspaper , published
01.09.2014
Authorities suspect perpetrator
is based in the United States
“According to the LaTribune.fr, The National
Information System Security Agency (ANSSI)
launched an investigation in order to establish
whether or not Airbus Helicopters fell victim to a
hacking incident that might be linked to an
important call for tenders in Poland. The online
newspaper quotes relevant sources when
indicating that the perpetrator is most likely
based in the United States. The American
companies Sikorsky and Boeing are at the present
moment involved in a full-blown commercial
battle on Polish territory with the European
manufacturer. [...]”
Translation (FR-EN) of article
retrieved from the <L’Usine
Digitale> online newspaper and
published by Julien Bonnet,
13.11.2014
Airbus Helicopters, victim
of a cyber-attack
Biggest heist of the century
hits the banking sector
“A band of Russian, Ukrainian and Chinese
criminals discovered a way to hack into
several banking institutions by infiltrating
their networks. The losses recorded after
the attacks, which were launched in 2013
and continue to this day, amount to a
billion euro.
We are potentially witnessing the biggest
heist of the century. The Russian
Cybersecurity Expert, Kaspersky, released
Monday a report revealing that, since
2013, over a hundred banks had been
hacked by 2.0 thieves.”
Translation (FR-EN)
of article retrieved from the
<FranceSoir.fr> online newspaper
and published 16.02.2015
Banks: more than a billion dollars
stolen by hackers
Sony Pictures Hack:
Co-chairmain Amy Pascal resigns
“Amy Pascal, Co-chairman of Sony Pictures,
finally announced her resignation.
The group was hacked at the end of
November and the attackers leaked some
of Mrs. Pascal’s emails, containing racist
content directed towards President Barack
Obama.
Having tarnished the studio’s reputation,
the scandal quickly reached international
proportions. In other words, the Co-
chairman’s departure was to be expected.”
Translation (FR-EN)
of article retrieved from the
<LePoint> online newspaper and
published 05.02.2015
Hacking & its human consequences
Cybersecurity Solution Provider
Expertise – Products – Security Operations Center
EXPERTISE
Expertise
Consulting
Pentest
Darknet
Training
This is the core business of ITrust.
Our Security Consultants test the
resistance of your architecture, be
it externally or internally, and
accompany you in order to help
you secure your computer network
in the long term.
SOLUTIONS
vulnerability scanner
behavioral analytics
framework & AI
Our engineers are constantly
developing new tools to facilitate
the management, analysis and
understanding of vulnerabilities
and cyber attacks.
SOC as a Service
Managed and/or
SaaS and/or
OEM and/or
On Premise and/or
ITrust manages the entire security
process of companies that wish to
outsource their cybersecurity.
Our Security Operations Center
integrates advanced reporting and is
based on our two leading products.
Vulnerability management
Risk & Report
Vulnerability scanning tool
The implementation of IKare can lead to a 90% reduction of
vulnerabilities on the network it is deployed on. 90% is also
the rate of success of our penetration tests (auditing)
performed at our clients. IKare allows the identification and
correction of their security flaws.
TOP 10 uncovered Covered
security flaws by IKare
“Wordy” systems
Weak passwords
Permissions and access rights
Inter-domain trust
Databases
with default passwords
“Wordy” DNS serves
Sharing confidential files
Poorly configured
protocols
Abandoned development
servers
Non-rectified known vulnerabilities
Vulnerability coverage rate of the
top 10 vulnerability by technology type:
99% of security flaws
could be easily rectified...
…but these issues cannot be addressed by an antivirus & firewalls!
IKare –
Positioning
Automated Vulnerability & Security Audit tool
Values Accessible and intuitive
Simple and modern
Tailored reporting to management
Best practices
The fruit of the cybersecurity experience of our consultants
Why? ALM : Up-to-date systems
IT : Supervision and Dashboard
DG : Risk Assesment - legal
Use Virtual machine or server in your information system
Cloud mode: from ITrust servers
Ready to deploy and operational in a few minutes
Deployement No agents needed for installation
Automated network discovery
Ready to integrate in the information system
Assets French Cloud (not restricted by the Patriot Act)
Service and proximity
R&D with LaaS, IRIT and TSoE
IKare Vulnerability Management
Product positioning
• Vulnerability audit in real-time
• Proactive security issues identification
• Infrastructure and applications automated discovery
• Correlation and supervision
Vulnerability detection becomes more reliable. These engines limit the number of false positives and allow
the detection of abnormal behaviors.
• Responsibility area determination
• Security alerts
• Virtual groups ensuring decision-making concerning security
• Trending, security evolution in time
• Business unit management
IKare functions
IKare: simple & intuitive interface
A major breakthrough
“BEHAVIORAL ANALYSIS IS THE MOST PLAUSIBLE SOLUTION FOR UNKNOWN VIRUS”
NSA VICE CHAIRMAN 2012
“The next Pearl Harbor we might be
confronted with could very well be a
cyber attack”
– Leon Panetta, US Secretary of Defense
& former CIA Director (August 2011
Senate Hearing)
Behavioral analysis
can boost cybersecurity
“Behavioral analysis is the most
plausible solution for unknown viruses”
– NSA Director , 2012
21
A groundbreaking technology
• Protects your infrastructures against APTs, viruses & unknown attacks
• Detects malicious behaviors within your information system
• Identifies weak signals in order to anticipate performance problems,
but is also capable of identifying stealth attacks
• Avoids data extraction
• Avoids resource depletion within your information system
Reveelium
Anomaly Detection Platform
Reveelium is a complete anomaly detection and prevention platform:
 It relies on your existing infrastructures (« Plug and play »);
 Automatically detects, analyses and prioritizes anomalies, grading them according to their
potential risk;
Predicts performance or security issues with the use of machine
learning technologies.
Reveelium
Product principle
1. A weak signal analysis
built on our research and partnerships with mathematical laboratories.
2. A logical correlator
built on the experience of our engineers and security consultants.
3. A shared knowledge base
Reveelium is a unique combination of 3 scanning engines:
An innovating 3D-technology
• What is an anomaly?
– Weird condition/nonsensical sample/deviation from the norm
– Data inconsistency not matching with any normal behavior
(either observed or learned)
• How do we detect it?
– By using Machine Learning technologies
– By building profiles of normal behaviors
– By identifying deviations from the norm
Anomaly detection
Machine learning
Huge data volumes learning
Normal behaviors learning with a minimum of human interaction
& Statistical and preventive analysis
Validating learning
Identifying nonsensical / missing samples
Identifying seasonalities
Identifying abnormal behaviors
Reveelium engines
is not a new concept, but Reveelium repurposes it in the
scope of automatic learning applied to supervised systems.
Learning VS correlation…
… why not use both,
for better qualified results:
• Eliminating false positives
• Correlating external data sources
in order to fine-tune the decision-making process
• System expert
Post-treatment results
Anomaly detection engines
Reveelium: APT Threat Module
Use case demonstration
Reveelium: APT Threat Module
Use case demonstration
Plugin SIEM or through application
VM Standalone
External VM SaaS or on the premises
Covers the entire supervision platform: logging, log correlation, alert correlation
POC Model
Similar to a plugin for enterprise applications, journals, XML
data, meant to search for professional anomalies and all
abnormal behaviors alike (AS, IAM, Messaging…)
Plug and play on a supervision platform
No need to be a security consultant or Data Scientist!
can be delivered through
private or public cloud by
Saas or OnPremise
Delivery models
• Risk management policies
• Justifying the existence of a cyber attack
• Ability to assess proof for a filed complaint
• Security level history up until the moment of the attack
• Legal investigation – forensic computing
• Cyber-insurance
• Limited criminal risk
• Pro-active defense process
Legal outlook
Thank you
Contact
ITrust Headquarters
55 Avenue l’Occitane, BP 67303
31673 Labege Cedex
Telephone: +33 (0)5 67 34 67 80
Email: sales@itrust.fr
International Office:
24 rue Firmin Gillot
75015 Paris
www.itrust.fr/en
www.ikare-monitoring.com
www.reveelium.com/en

More Related Content

What's hot

Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealthInvest
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Presentazione Security Challenga 12/9/16 Bologna
Presentazione Security Challenga 12/9/16 BolognaPresentazione Security Challenga 12/9/16 Bologna
Presentazione Security Challenga 12/9/16 BolognaLuca Moroni ✔✔
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloNorth Texas Chapter of the ISSA
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
 
Cyber security money men
Cyber security money menCyber security money men
Cyber security money mengiorgiogarrido6
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 

What's hot (19)

Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Presentazione Security Challenga 12/9/16 Bologna
Presentazione Security Challenga 12/9/16 BolognaPresentazione Security Challenga 12/9/16 Bologna
Presentazione Security Challenga 12/9/16 Bologna
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
Stu r35 b
Stu r35 bStu r35 b
Stu r35 b
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Cyber security money men
Cyber security money menCyber security money men
Cyber security money men
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 

Viewers also liked

Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 

Viewers also liked (6)

Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 

Similar to ITrust Company Overview EN

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
TRUSTLESS.AI and Trustless Computing Consortium
TRUSTLESS.AI and Trustless Computing ConsortiumTRUSTLESS.AI and Trustless Computing Consortium
TRUSTLESS.AI and Trustless Computing ConsortiumTRUSTLESS.AI
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Leonardo
 
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPJoseph Lopez, M.ISM
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...Andris Soroka
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 

Similar to ITrust Company Overview EN (20)

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
TRUSTLESS.AI and Trustless Computing Consortium
TRUSTLESS.AI and Trustless Computing ConsortiumTRUSTLESS.AI and Trustless Computing Consortium
TRUSTLESS.AI and Trustless Computing Consortium
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
 
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 

More from ITrust - Cybersecurity as a Service

L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 

More from ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 
Reveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FRReveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FR
 

Recently uploaded

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburgmasabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationShrmpro
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durbanmasabamasaba
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 

Recently uploaded (20)

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 

ITrust Company Overview EN

  • 2. LEADERSHIP CEO & Co-Founder Jean-Nicolas Piotrowski Former BNP Paribas CISO ITrust, your cybersecurity expert 10 years experience in cybersecurity 35 collaborators and 30 Data Scientists in labs More than 200 public and private clients 100% growth/year VP Business David Ofer IT Engineer PhD in Management, HEC 20 years of experience in High tech business development CFO & Co-Founder Henri Piotrowski Supaéro Engineer, former AIRBUS-ATR CEO Paris, Toulouse (headquarters), New York, Colombus, Shanghai (ongoing) Value proposal Covers all cybersecurity activities in all sectors Leading solutions International Cybersecurity as a Service
  • 3. Shareholders and financial aid 100% French simplified joint-stock company / 483.352 € share capital / 3,3 M€ owner equity Private and institutional investors (NewAlpha, Nestadio, Crédit Agricole, Caisse d’Epargne) Supported by the French state: Financial aid through BPI and the Deposits and Consignments Fund (reimboursable R&D financing) Financing through the « Investment for the Future » programme Partners Prizes & Associates ITrust, your cybersecurity expert
  • 4. A company worthy of our attention: ITrust declares war on hacking Translation (FR-EN) of article retrieved from the <LesEchos.fr> online newspaper & published by Laurent Marcaillou, Toulouse, 25.02.2015 “ITrust started its missions in IT security within Airbus, Toulouse, in 2007. With this expertise, the young company designed the IKare software, able to scan an information system in order to detect potential weaknesses and manage security. Launched in 2012 , this solution minimizes the duration of an audit concerning an information system. Its sales were doubled in 2014 after registering roughly 1,030 new clients. The enterprise, with only 25 employees, also doubled its turnover to 1,3 million euro and envisions another two-fold increase in its turnover for the year 2015. Among its clients, we will stumble upon giants such as: Total, Air France, Airbus, Bull [...]” Articles in press about ITrust & its solutions
  • 5. ITrust presents an unequaled software an European Level “The Toulouse-based enterprise ITrust, specialized in IT security, is on the verge of unveiling a new, yet to be seen cybersecurity software. ITrust’s CEO, Jean‐Nicolas Piotrowski, was present at the International Cybercrime Forum to present this exciting innovation. Q: Why is your new product considered a breakthrough among existing IT security solutions? R: We’ve been working on IT-Tude for 7 years now: it’s a groundbreaking technology that enables people to detect weak signals hinting at unknown viruses, otherwise known as APTs (Advanced Persistent Threats).” Translation (FR-EN) of article retrieved from the <Tribune> online newspaper and published by Valentin Dohin, 29.01.2015 Articles in press about ITrust & its solutions
  • 6. A French security solution on a French cloud “Developed by the Secure Virtual Cloud (SVC) consortium, this 3-year project worth 14 mil. Euro is led by the Toulouse-based start-up ITrust and nine other partners, of which we will mention the IT Research Institute of Toulouse (IRIT), The System Analysis and Architecture Laboratory (LAAS) and Bull. Founded in 2007, ITrust distributes IKare, a vulnerability management software proposed in cloud mode for real-time monitoring, or through licensing bit by bit. Its interest?[...]” Translation (FR-EN) of article retrieved from the <L’Usine Nouvelle> online newspaper and published by Ridha Loukll, 20.09.2012 Articles in press about ITrust & its solutions
  • 7. Defence & aero Bank Health & pharma Public sector Insurance & social protection Transport & logistics Education Energy & utilities Food industry Client references More than 100 clients in Europe – 300 000 continuously supervised IPs
  • 8. 15 million stolen credit cards Target Credit Cards & Customer Info Hacked (2013) “US discount retailer Target found 40 million of its customer accounts were hacked during November 27 and December 15, 2013. Across the US, during Black Friday, the Target stores were targeted and customer names, credit cards, debit cards, and CVV values of several customers were hacked. The retail major said that other information such as addresses, PIN, social security numbers, etc., were not hacked however. “ Extract from the “Recent Hacking Incidents Around the World“ article retrieved from the <MapsOfWorld> online newspaper , published 01.09.2014
  • 9. Authorities suspect perpetrator is based in the United States “According to the LaTribune.fr, The National Information System Security Agency (ANSSI) launched an investigation in order to establish whether or not Airbus Helicopters fell victim to a hacking incident that might be linked to an important call for tenders in Poland. The online newspaper quotes relevant sources when indicating that the perpetrator is most likely based in the United States. The American companies Sikorsky and Boeing are at the present moment involved in a full-blown commercial battle on Polish territory with the European manufacturer. [...]” Translation (FR-EN) of article retrieved from the <L’Usine Digitale> online newspaper and published by Julien Bonnet, 13.11.2014 Airbus Helicopters, victim of a cyber-attack
  • 10. Biggest heist of the century hits the banking sector “A band of Russian, Ukrainian and Chinese criminals discovered a way to hack into several banking institutions by infiltrating their networks. The losses recorded after the attacks, which were launched in 2013 and continue to this day, amount to a billion euro. We are potentially witnessing the biggest heist of the century. The Russian Cybersecurity Expert, Kaspersky, released Monday a report revealing that, since 2013, over a hundred banks had been hacked by 2.0 thieves.” Translation (FR-EN) of article retrieved from the <FranceSoir.fr> online newspaper and published 16.02.2015 Banks: more than a billion dollars stolen by hackers
  • 11. Sony Pictures Hack: Co-chairmain Amy Pascal resigns “Amy Pascal, Co-chairman of Sony Pictures, finally announced her resignation. The group was hacked at the end of November and the attackers leaked some of Mrs. Pascal’s emails, containing racist content directed towards President Barack Obama. Having tarnished the studio’s reputation, the scandal quickly reached international proportions. In other words, the Co- chairman’s departure was to be expected.” Translation (FR-EN) of article retrieved from the <LePoint> online newspaper and published 05.02.2015 Hacking & its human consequences
  • 12. Cybersecurity Solution Provider Expertise – Products – Security Operations Center EXPERTISE Expertise Consulting Pentest Darknet Training This is the core business of ITrust. Our Security Consultants test the resistance of your architecture, be it externally or internally, and accompany you in order to help you secure your computer network in the long term. SOLUTIONS vulnerability scanner behavioral analytics framework & AI Our engineers are constantly developing new tools to facilitate the management, analysis and understanding of vulnerabilities and cyber attacks. SOC as a Service Managed and/or SaaS and/or OEM and/or On Premise and/or ITrust manages the entire security process of companies that wish to outsource their cybersecurity. Our Security Operations Center integrates advanced reporting and is based on our two leading products.
  • 13. Vulnerability management Risk & Report Vulnerability scanning tool
  • 14. The implementation of IKare can lead to a 90% reduction of vulnerabilities on the network it is deployed on. 90% is also the rate of success of our penetration tests (auditing) performed at our clients. IKare allows the identification and correction of their security flaws. TOP 10 uncovered Covered security flaws by IKare “Wordy” systems Weak passwords Permissions and access rights Inter-domain trust Databases with default passwords “Wordy” DNS serves Sharing confidential files Poorly configured protocols Abandoned development servers Non-rectified known vulnerabilities Vulnerability coverage rate of the top 10 vulnerability by technology type: 99% of security flaws could be easily rectified... …but these issues cannot be addressed by an antivirus & firewalls!
  • 15. IKare – Positioning Automated Vulnerability & Security Audit tool Values Accessible and intuitive Simple and modern Tailored reporting to management Best practices The fruit of the cybersecurity experience of our consultants Why? ALM : Up-to-date systems IT : Supervision and Dashboard DG : Risk Assesment - legal Use Virtual machine or server in your information system Cloud mode: from ITrust servers Ready to deploy and operational in a few minutes Deployement No agents needed for installation Automated network discovery Ready to integrate in the information system Assets French Cloud (not restricted by the Patriot Act) Service and proximity R&D with LaaS, IRIT and TSoE IKare Vulnerability Management Product positioning
  • 16. • Vulnerability audit in real-time • Proactive security issues identification • Infrastructure and applications automated discovery • Correlation and supervision Vulnerability detection becomes more reliable. These engines limit the number of false positives and allow the detection of abnormal behaviors. • Responsibility area determination • Security alerts • Virtual groups ensuring decision-making concerning security • Trending, security evolution in time • Business unit management IKare functions
  • 17. IKare: simple & intuitive interface
  • 18. A major breakthrough “BEHAVIORAL ANALYSIS IS THE MOST PLAUSIBLE SOLUTION FOR UNKNOWN VIRUS” NSA VICE CHAIRMAN 2012
  • 19. “The next Pearl Harbor we might be confronted with could very well be a cyber attack” – Leon Panetta, US Secretary of Defense & former CIA Director (August 2011 Senate Hearing) Behavioral analysis can boost cybersecurity “Behavioral analysis is the most plausible solution for unknown viruses” – NSA Director , 2012
  • 20.
  • 22. • Protects your infrastructures against APTs, viruses & unknown attacks • Detects malicious behaviors within your information system • Identifies weak signals in order to anticipate performance problems, but is also capable of identifying stealth attacks • Avoids data extraction • Avoids resource depletion within your information system Reveelium Anomaly Detection Platform
  • 23. Reveelium is a complete anomaly detection and prevention platform:  It relies on your existing infrastructures (« Plug and play »);  Automatically detects, analyses and prioritizes anomalies, grading them according to their potential risk; Predicts performance or security issues with the use of machine learning technologies. Reveelium Product principle
  • 24. 1. A weak signal analysis built on our research and partnerships with mathematical laboratories. 2. A logical correlator built on the experience of our engineers and security consultants. 3. A shared knowledge base Reveelium is a unique combination of 3 scanning engines: An innovating 3D-technology
  • 25. • What is an anomaly? – Weird condition/nonsensical sample/deviation from the norm – Data inconsistency not matching with any normal behavior (either observed or learned) • How do we detect it? – By using Machine Learning technologies – By building profiles of normal behaviors – By identifying deviations from the norm Anomaly detection
  • 26. Machine learning Huge data volumes learning Normal behaviors learning with a minimum of human interaction & Statistical and preventive analysis Validating learning Identifying nonsensical / missing samples Identifying seasonalities Identifying abnormal behaviors Reveelium engines is not a new concept, but Reveelium repurposes it in the scope of automatic learning applied to supervised systems.
  • 27. Learning VS correlation… … why not use both, for better qualified results: • Eliminating false positives • Correlating external data sources in order to fine-tune the decision-making process • System expert Post-treatment results
  • 29. Reveelium: APT Threat Module Use case demonstration
  • 30. Reveelium: APT Threat Module Use case demonstration
  • 31. Plugin SIEM or through application VM Standalone External VM SaaS or on the premises Covers the entire supervision platform: logging, log correlation, alert correlation POC Model Similar to a plugin for enterprise applications, journals, XML data, meant to search for professional anomalies and all abnormal behaviors alike (AS, IAM, Messaging…) Plug and play on a supervision platform No need to be a security consultant or Data Scientist! can be delivered through private or public cloud by Saas or OnPremise Delivery models
  • 32. • Risk management policies • Justifying the existence of a cyber attack • Ability to assess proof for a filed complaint • Security level history up until the moment of the attack • Legal investigation – forensic computing • Cyber-insurance • Limited criminal risk • Pro-active defense process Legal outlook
  • 33. Thank you Contact ITrust Headquarters 55 Avenue l’Occitane, BP 67303 31673 Labege Cedex Telephone: +33 (0)5 67 34 67 80 Email: sales@itrust.fr International Office: 24 rue Firmin Gillot 75015 Paris www.itrust.fr/en www.ikare-monitoring.com www.reveelium.com/en