SlideShare a Scribd company logo
1 of 14
Ray Cavanagh Vice President, Sales Anticipate versus React to Security Threats
About CGI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anticipate versus React to  Security Threats ,[object Object],[object Object],[object Object]
Security Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defining the threat ,[object Object],[object Object],[object Object],[object Object]
Introducing CGI-Fusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Increase Security and Lower Operating Costs (Based on DOE directive 470.1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Increase Security and Lower  Operating Costs ,[object Object],[object Object]
What is CGI Fusion? ,[object Object]
Benefits of network video  surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Behavioral Analytics
Off-site Video Monitoring  Command Center  ,[object Object],[object Object],[object Object],[object Object]
Prevention vs. Remediation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CGI Guard Services and Technologies are used by these customers 2,600 times a day

More Related Content

Viewers also liked

вместе в мир музыки викторина
вместе в мир музыки   викторинавместе в мир музыки   викторина
вместе в мир музыки викторинаRazukova
 
Wole lotta rock
Wole lotta rockWole lotta rock
Wole lotta rockchazz_gnr
 
План конкурсной программы
План конкурсной программыПлан конкурсной программы
План конкурсной программыRazukova
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...cgiprotects
 
Perzsa macskák
Perzsa macskákPerzsa macskák
Perzsa macskáktbarbi
 
формирование основ музыкальной культуры
формирование основ музыкальной культурыформирование основ музыкальной культуры
формирование основ музыкальной культурыRazukova
 
вместе в мир музыки викторина1
вместе в мир музыки   викторина1вместе в мир музыки   викторина1
вместе в мир музыки викторина1Razukova
 
вместе в мир музыки викторина
вместе в мир музыки   викторинавместе в мир музыки   викторина
вместе в мир музыки викторинаRazukova
 
Velkommen til thorup klim info
Velkommen til thorup klim infoVelkommen til thorup klim info
Velkommen til thorup klim infoThorupkl
 
An introduction to Agile Monitoring and Control & Agile Metrics
An introduction to Agile Monitoring and Control & Agile MetricsAn introduction to Agile Monitoring and Control & Agile Metrics
An introduction to Agile Monitoring and Control & Agile MetricsMassimus CT
 
Agile Monitoring and Control & Agile Metrics
Agile Monitoring and Control & Agile MetricsAgile Monitoring and Control & Agile Metrics
Agile Monitoring and Control & Agile MetricsMassimus CT
 
в мир музыки
 в мир музыки в мир музыки
в мир музыкиRazukova
 
Media Relations in a Social Media World
Media Relations in a Social Media WorldMedia Relations in a Social Media World
Media Relations in a Social Media Worldeosatlanta
 
Desenvolvimento Ágil de Software
Desenvolvimento Ágil de SoftwareDesenvolvimento Ágil de Software
Desenvolvimento Ágil de SoftwareMassimus CT
 
Modern means of transport
Modern means of transportModern means of transport
Modern means of transportbinayakg
 

Viewers also liked (18)

вместе в мир музыки викторина
вместе в мир музыки   викторинавместе в мир музыки   викторина
вместе в мир музыки викторина
 
Wole lotta rock
Wole lotta rockWole lotta rock
Wole lotta rock
 
План конкурсной программы
План конкурсной программыПлан конкурсной программы
План конкурсной программы
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
 
Perzsa macskák
Perzsa macskákPerzsa macskák
Perzsa macskák
 
Tag training version 1.0
Tag training version 1.0Tag training version 1.0
Tag training version 1.0
 
формирование основ музыкальной культуры
формирование основ музыкальной культурыформирование основ музыкальной культуры
формирование основ музыкальной культуры
 
вместе в мир музыки викторина1
вместе в мир музыки   викторина1вместе в мир музыки   викторина1
вместе в мир музыки викторина1
 
Trello
TrelloTrello
Trello
 
вместе в мир музыки викторина
вместе в мир музыки   викторинавместе в мир музыки   викторина
вместе в мир музыки викторина
 
Velkommen til thorup klim info
Velkommen til thorup klim infoVelkommen til thorup klim info
Velkommen til thorup klim info
 
economy of india
economy of indiaeconomy of india
economy of india
 
An introduction to Agile Monitoring and Control & Agile Metrics
An introduction to Agile Monitoring and Control & Agile MetricsAn introduction to Agile Monitoring and Control & Agile Metrics
An introduction to Agile Monitoring and Control & Agile Metrics
 
Agile Monitoring and Control & Agile Metrics
Agile Monitoring and Control & Agile MetricsAgile Monitoring and Control & Agile Metrics
Agile Monitoring and Control & Agile Metrics
 
в мир музыки
 в мир музыки в мир музыки
в мир музыки
 
Media Relations in a Social Media World
Media Relations in a Social Media WorldMedia Relations in a Social Media World
Media Relations in a Social Media World
 
Desenvolvimento Ágil de Software
Desenvolvimento Ágil de SoftwareDesenvolvimento Ágil de Software
Desenvolvimento Ágil de Software
 
Modern means of transport
Modern means of transportModern means of transport
Modern means of transport
 

Similar to Anticipate Versus React To Security Threats with Security Surveillance

Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...
Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...
Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...Paul Main
 
Security Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comSecurity Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comCGC Solutions & Services
 
Lodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, OlympiaLodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, Olympialodge-service
 
Lodge Service - Counter Terrorism
Lodge Service - Counter TerrorismLodge Service - Counter Terrorism
Lodge Service - Counter Terrorismolivermckeown
 
redwire video verification
redwire video verificationredwire video verification
redwire video verificationnokelley
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business SolutionsAnthony Dials
 
Huwei Cyber Security Presentation
Huwei Cyber Security PresentationHuwei Cyber Security Presentation
Huwei Cyber Security PresentationPeter921148
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency SolutionsAnthony Dials
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityAnthony Dials
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufikRussell Publishing
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor ToolElite ISI
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3Jorge Sebastiao
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Best Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeBest Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeWZWU & Partners
 

Similar to Anticipate Versus React To Security Threats with Security Surveillance (20)

Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...
Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...
Security: Managing Risk, Delivering Value - Seminar 20th April 2016 by ClearV...
 
Trends final
Trends   finalTrends   final
Trends final
 
Security Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comSecurity Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.com
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
Bank security
Bank securityBank security
Bank security
 
Lodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, OlympiaLodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, Olympia
 
Lodge Service - Counter Terrorism
Lodge Service - Counter TerrorismLodge Service - Counter Terrorism
Lodge Service - Counter Terrorism
 
redwire video verification
redwire video verificationredwire video verification
redwire video verification
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Huwei Cyber Security Presentation
Huwei Cyber Security PresentationHuwei Cyber Security Presentation
Huwei Cyber Security Presentation
 
Duncan hine input1_irm_and_outsourcing
Duncan hine input1_irm_and_outsourcingDuncan hine input1_irm_and_outsourcing
Duncan hine input1_irm_and_outsourcing
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent Cybersecurity
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor Tool
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Best Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeBest Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in Singapore
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

Anticipate Versus React To Security Threats with Security Surveillance