SlideShare a Scribd company logo
1 of 8
Download to read offline
Sid Yenamandra
CEO & Co-Founder
sid@entreda.com
PREDICTIVE CYBERSECURITY RISK
MITIGATION SOFTWARE FOR
REGULATED ENTERPRISES
Seasoned leadership team
Management Team, Board Members & Investors
Sid Yenamandra
Co-founder and CEO
• Advisor, Memoir Systems (Cisco); VP
Product at Plato Networks
(Netlogic/Broadcom)
• Sr. Director of NSA funded crypto-
acceleration project
• Co-founder of multiple start-up’s
• BS EECS, UC Berkeley
Farshad Ghaffari
Co-founder, Engineering Ops
• Application Engineering, Broadcom
supporting Cisco, Netgear and 2Wire
• Network Stack Development at Sun
Microsystems
• BS EECS, UC Berkeley
Shirish Phatak
Architect
• Co-founder, Talon Storage
• CTO of Wide Area File Services at
Packeteer
Co-founder at Tacit Networks (Packeteer)
• MS IIT, MPhil Rutgers
Jay Sethuram
Chairman, Entreda
• Co-founder Fiberlane, Cerent (Cisco)
• Co-founder, StratumOne (Cisco)
• Founding Director, APIgee
• LP in multiple venture funds
Ajay Goel
Strategy and Business Development
• Managing Director for Symantec
Corporation for India and SAARC countries
• Senior Vice President (Cisco Systems, India
and SAARC)
• Country Director (Sun Microsystems)
Jens Horstmann
Partner Crestlight Ventures
• Inventor of Redbox Technology
• Founder & CEO DVDplay (NCR)
• Advisor to multiple start-up’s
• LP Founder’s Fund
2
Corporate highlights
• Silicon-valley based Start-up
• Cybersecurity risk management software
• 1st market: Financial services (Broker-Dealers)
• VC funded – Crestlight VC & angel investors
• Global Team - 30 Employees, HQ San Mateo CA
• Multiple patents filed, 1 granted to date
• Unify for Financial Services launch - Q4CY14
• Signed-up 10K+ business users over 30 months
• Achieved Operational B/E in Q4, 2016
• Revenue mix - 50%/50% SMB/Enterprise
• 300% Y-o-Y growth for last 2 years
• Listed in FINRA’s compliance vendor directory
Company
Background
Corporate
Milestones
3
Premier customer partnerships in financial services in place
B-D wide mandate to use
our software
2 of 5 largest branch offices use
our software
Shortlisted as a compliance
resource provider
Partnership to offer our
software to 100K+ RIA firms
Partnership to offer our
software to 5K+ RIA firms
Partnership to offer our software
to 80K+ RIA firms
7th
largest US Insurance
Company owns 4 B-Ds
#1
Independent Broker
Dealer in the U.S.
4
Our breakthrough:
Pro-active risk mitigation for users, devices & networks
Today
Manual and Siloed
Automated
Integrated
IT Service Delivery
and Support
IT Governance, Risk
and Compliance
ITSoftwareManagement
User
Authentication
Log
Analysis
VPN
Remote
Desktop
Anti-virus MDM
Patch
Management
Firewall/IDS
Asset
Tracking
Password
Manager
Incident
Reporting
Data-DrivenWorkflow-based
Cyber
Risk
Score:
690
5
Automated cybersecurity policy enforcement
with integrated remediation applications
User installs light-weight
Entreda agent software
on all devices including
mobile devices.
Active
Monitoring Agent
Multi-user
Console
GRC integrated
with IT Software
24x7 Compliance
Reports
Compliance analytics
integrated with applications enables
intuitive and
automated user experience.
Single pane-of-glass
management for cybersecurity
policy enforcement with
real-time analytics.
Easy to understand alerts and
reports inline with
SEC & FINRA regulatory policy
guidelines.
• Behavioral scoring
• Contextual Remediations
• Real-time notifications
Secure Remote
Desktop
User
Management
Auto
VPN
File sharing
Policy Engine
SMRH:434326567.4 -1-
[FORM OF] INFORMATION SECURITY POLICY
[Tip: This Information Security Policy is only a form and must be customized to your business. Please
see the disclaimers below.]
Purpose. The purpose of this Information Security Policy (this “Policy”) is to comply with all applicable
laws and regulations designed to protect the nonpublic personal information (the “Private Information”)
of the customers (the “Customers”) advised by [insert Firm Name] (“Firm”, “we”, “us” or “our”) who
are natural persons, as well as natural persons consisting of our employees and service providers with
whom Firm does business (each, a “Protected Person”). The Information Security Policy is designed to
accomplish the following: (a) to ensure the security and confidentiality of Private Information in a manner
consistent with industry standards and as required by applicable state and federal law; (b) to protect
against any anticipated threats or hazards to the security or integrity of the Private Information; and (c) to
protect against unauthorized access to or use of the Private Information that could result in substantial risk
of harm or inconvenience to any Protected Person.
Compliance Officer. ____________________ is our Information Security Policy “Compliance Officer.”
It is [his][her] responsibility to implement, maintain, administer and coordinate the effectiveness of the
Information Security Policy. Any questions or comments regarding this Policy should be directed to the
Compliance Officer. Following the resignation or removal of the current Compliance Officer, the Firm
shall as soon as reasonably practicable appoint another person as the new Compliance Officer. [Tip:
Generally, the Compliance Officer is an employee of the Firm. In certain instances, the Compliance
Officer may be from a third party vendor that provides certain outsourced services to the Firm.]
Risk Assessment. As of the adoption of this Policy, we have identified the following potential risks to the
security, confidentiality and integrity of Private Information that could result in the unauthorized
disclosure, misuse, alteration, or other compromise of such information: [Tip: The Firm should run an
initial risk assessment with Entreda’s assistance at the beginning of the relationship with Entreda to
analyze the risks that the Firm has. The below is a sample set of risks that a Firm may have and may not
represent all the risks of a particular firm.]
• Unauthorized access to documents containing Private Information by our personnel, service
providers, Protected Persons or third parties;
• Inappropriate use or disclosure of Private Information by personnel, service providers, Protected
Persons or third parties who are authorized to have access to Private Information;
• General security risks posed to our information technology system, including the theft of
computers or other equipment permitting access to Private Information, the loss of Private
Information due to electrical outages or other computer system failures, and the introduction of
viruses into our information technology system; and
• The loss of documents containing Private Information through unanticipated physical hazards
such as fire, earthquakes, floods or other natural disasters.
The Compliance Officer shall periodically re-assess the reasonably foreseeable risks to the security,
confidentiality and integrity of Private Information. Such assessment will include analysis of, among
other things, (i) the effectiveness of personnel training and management with regard to the treatment and
handling of Private Information, (ii) the reliability and suitability of our information technology systems
in light of the objectives of this Policy, including network software design, as well as information
processing, storage, transmission and disposal, and (iii) the ability to detect, prevent and respond to
attacks, intrusions or other system failures.
Limiting Private Information. The Firm will generally limit the amount of Private Information collected
to that reasonably necessary to accomplish the legitimate purpose for which it is collected. [Option 1:
Weekly reports Cyber security
Policy
6
Cybersecurity Risk Mitigation with Predictive Analytics
7
Risk Heuristics
3rd Party threat databases, customers
IT Governance, Risk and
Compliance controls
GRC Frameworks – HIPAA, SEC, FINRA
Cybersecurity Applications
SIEM Anti-virus Firewall
Networks
Devices
Users
Enterprise
Device
Data
User
Behavior
Network
Data
Predictive
Scoring
Policy
Engine
Decision
Engine
Pattern
log
Remediation
Services
Alerts and
Notifications
Cybersecurity R
isk Score
690
Our unique and sustainable advantage …
Team expertise
with heterogeneous
platforms and devices
Technology Patents
filed on analytics and service
provisioning framework
Partnerships
with B-D, RIA, MF
and custodial platforms
Cybersecurity Risk Mitigation Software
Data-driven architecture
• Analytics-first approach
• Predictive modeling and ML
Hybrid cloud policy orchestration
• Monitoring, remediation and reporting for cloud
and/or on-premise infrastructure
Built-in remediation apps
• Custom developed thin applications
• Scalability with 3rd Party API integrations
8

More Related Content

What's hot

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec WaySymantec
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPSymantec
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramLancope, Inc.
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness ProgramPriyanka Aash
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 

What's hot (20)

The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness Program
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 

Similar to Laser App Conference 2017 - Sid Yenamandra, Entreda

MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxTheWalkerGroup1
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowPECB
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 

Similar to Laser App Conference 2017 - Sid Yenamandra, Entreda (20)

CCA study group
CCA study groupCCA study group
CCA study group
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Topic11
Topic11Topic11
Topic11
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 

More from Laser App Software

Laser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, SalesforceLaser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, SalesforceLaser App Software
 
Laser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, AdvicentLaser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, AdvicentLaser App Software
 
Laser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTechLaser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTechLaser App Software
 
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuideProLaser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuideProLaser App Software
 
Laser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, JunxureLaser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, JunxureLaser App Software
 
Laser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, GrendelLaser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, GrendelLaser App Software
 
Laser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet LogixLaser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet LogixLaser App Software
 
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge SolutionsLaser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge SolutionsLaser App Software
 
Laser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, RiskalyzeLaser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, RiskalyzeLaser App Software
 
Laser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptialLaser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptialLaser App Software
 
Laser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, LaserficheLaser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, LaserficheLaser App Software
 
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail TechnologyLaser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail TechnologyLaser App Software
 
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNetLaser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNetLaser App Software
 
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account ManagerLaser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account ManagerLaser App Software
 
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software Laser App Software
 
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on AcceleratorLaser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on AcceleratorLaser App Software
 
Laser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: PropelLaser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: PropelLaser App Software
 
Laser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert PowellLaser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert PowellLaser App Software
 

More from Laser App Software (18)

Laser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, SalesforceLaser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, Salesforce
 
Laser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, AdvicentLaser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, Advicent
 
Laser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTechLaser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTech
 
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuideProLaser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
 
Laser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, JunxureLaser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, Junxure
 
Laser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, GrendelLaser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, Grendel
 
Laser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet LogixLaser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet Logix
 
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge SolutionsLaser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
 
Laser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, RiskalyzeLaser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, Riskalyze
 
Laser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptialLaser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptial
 
Laser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, LaserficheLaser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, Laserfiche
 
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail TechnologyLaser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
 
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNetLaser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
 
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account ManagerLaser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
 
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
 
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on AcceleratorLaser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
 
Laser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: PropelLaser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: Propel
 
Laser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert PowellLaser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert Powell
 

Recently uploaded

Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developersTeri Eyenike
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNtntlai16
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdfNancy Goebel
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXRMegan Campos
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathphntsoaki
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...Kayode Fayemi
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20rejz122017
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESfuthumetsaneliswa
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxthusosetemere
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationFahadFazal7
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 

Recently uploaded (19)

Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentation
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 

Laser App Conference 2017 - Sid Yenamandra, Entreda

  • 1. Sid Yenamandra CEO & Co-Founder sid@entreda.com PREDICTIVE CYBERSECURITY RISK MITIGATION SOFTWARE FOR REGULATED ENTERPRISES
  • 2. Seasoned leadership team Management Team, Board Members & Investors Sid Yenamandra Co-founder and CEO • Advisor, Memoir Systems (Cisco); VP Product at Plato Networks (Netlogic/Broadcom) • Sr. Director of NSA funded crypto- acceleration project • Co-founder of multiple start-up’s • BS EECS, UC Berkeley Farshad Ghaffari Co-founder, Engineering Ops • Application Engineering, Broadcom supporting Cisco, Netgear and 2Wire • Network Stack Development at Sun Microsystems • BS EECS, UC Berkeley Shirish Phatak Architect • Co-founder, Talon Storage • CTO of Wide Area File Services at Packeteer Co-founder at Tacit Networks (Packeteer) • MS IIT, MPhil Rutgers Jay Sethuram Chairman, Entreda • Co-founder Fiberlane, Cerent (Cisco) • Co-founder, StratumOne (Cisco) • Founding Director, APIgee • LP in multiple venture funds Ajay Goel Strategy and Business Development • Managing Director for Symantec Corporation for India and SAARC countries • Senior Vice President (Cisco Systems, India and SAARC) • Country Director (Sun Microsystems) Jens Horstmann Partner Crestlight Ventures • Inventor of Redbox Technology • Founder & CEO DVDplay (NCR) • Advisor to multiple start-up’s • LP Founder’s Fund 2
  • 3. Corporate highlights • Silicon-valley based Start-up • Cybersecurity risk management software • 1st market: Financial services (Broker-Dealers) • VC funded – Crestlight VC & angel investors • Global Team - 30 Employees, HQ San Mateo CA • Multiple patents filed, 1 granted to date • Unify for Financial Services launch - Q4CY14 • Signed-up 10K+ business users over 30 months • Achieved Operational B/E in Q4, 2016 • Revenue mix - 50%/50% SMB/Enterprise • 300% Y-o-Y growth for last 2 years • Listed in FINRA’s compliance vendor directory Company Background Corporate Milestones 3
  • 4. Premier customer partnerships in financial services in place B-D wide mandate to use our software 2 of 5 largest branch offices use our software Shortlisted as a compliance resource provider Partnership to offer our software to 100K+ RIA firms Partnership to offer our software to 5K+ RIA firms Partnership to offer our software to 80K+ RIA firms 7th largest US Insurance Company owns 4 B-Ds #1 Independent Broker Dealer in the U.S. 4
  • 5. Our breakthrough: Pro-active risk mitigation for users, devices & networks Today Manual and Siloed Automated Integrated IT Service Delivery and Support IT Governance, Risk and Compliance ITSoftwareManagement User Authentication Log Analysis VPN Remote Desktop Anti-virus MDM Patch Management Firewall/IDS Asset Tracking Password Manager Incident Reporting Data-DrivenWorkflow-based Cyber Risk Score: 690 5
  • 6. Automated cybersecurity policy enforcement with integrated remediation applications User installs light-weight Entreda agent software on all devices including mobile devices. Active Monitoring Agent Multi-user Console GRC integrated with IT Software 24x7 Compliance Reports Compliance analytics integrated with applications enables intuitive and automated user experience. Single pane-of-glass management for cybersecurity policy enforcement with real-time analytics. Easy to understand alerts and reports inline with SEC & FINRA regulatory policy guidelines. • Behavioral scoring • Contextual Remediations • Real-time notifications Secure Remote Desktop User Management Auto VPN File sharing Policy Engine SMRH:434326567.4 -1- [FORM OF] INFORMATION SECURITY POLICY [Tip: This Information Security Policy is only a form and must be customized to your business. Please see the disclaimers below.] Purpose. The purpose of this Information Security Policy (this “Policy”) is to comply with all applicable laws and regulations designed to protect the nonpublic personal information (the “Private Information”) of the customers (the “Customers”) advised by [insert Firm Name] (“Firm”, “we”, “us” or “our”) who are natural persons, as well as natural persons consisting of our employees and service providers with whom Firm does business (each, a “Protected Person”). The Information Security Policy is designed to accomplish the following: (a) to ensure the security and confidentiality of Private Information in a manner consistent with industry standards and as required by applicable state and federal law; (b) to protect against any anticipated threats or hazards to the security or integrity of the Private Information; and (c) to protect against unauthorized access to or use of the Private Information that could result in substantial risk of harm or inconvenience to any Protected Person. Compliance Officer. ____________________ is our Information Security Policy “Compliance Officer.” It is [his][her] responsibility to implement, maintain, administer and coordinate the effectiveness of the Information Security Policy. Any questions or comments regarding this Policy should be directed to the Compliance Officer. Following the resignation or removal of the current Compliance Officer, the Firm shall as soon as reasonably practicable appoint another person as the new Compliance Officer. [Tip: Generally, the Compliance Officer is an employee of the Firm. In certain instances, the Compliance Officer may be from a third party vendor that provides certain outsourced services to the Firm.] Risk Assessment. As of the adoption of this Policy, we have identified the following potential risks to the security, confidentiality and integrity of Private Information that could result in the unauthorized disclosure, misuse, alteration, or other compromise of such information: [Tip: The Firm should run an initial risk assessment with Entreda’s assistance at the beginning of the relationship with Entreda to analyze the risks that the Firm has. The below is a sample set of risks that a Firm may have and may not represent all the risks of a particular firm.] • Unauthorized access to documents containing Private Information by our personnel, service providers, Protected Persons or third parties; • Inappropriate use or disclosure of Private Information by personnel, service providers, Protected Persons or third parties who are authorized to have access to Private Information; • General security risks posed to our information technology system, including the theft of computers or other equipment permitting access to Private Information, the loss of Private Information due to electrical outages or other computer system failures, and the introduction of viruses into our information technology system; and • The loss of documents containing Private Information through unanticipated physical hazards such as fire, earthquakes, floods or other natural disasters. The Compliance Officer shall periodically re-assess the reasonably foreseeable risks to the security, confidentiality and integrity of Private Information. Such assessment will include analysis of, among other things, (i) the effectiveness of personnel training and management with regard to the treatment and handling of Private Information, (ii) the reliability and suitability of our information technology systems in light of the objectives of this Policy, including network software design, as well as information processing, storage, transmission and disposal, and (iii) the ability to detect, prevent and respond to attacks, intrusions or other system failures. Limiting Private Information. The Firm will generally limit the amount of Private Information collected to that reasonably necessary to accomplish the legitimate purpose for which it is collected. [Option 1: Weekly reports Cyber security Policy 6
  • 7. Cybersecurity Risk Mitigation with Predictive Analytics 7 Risk Heuristics 3rd Party threat databases, customers IT Governance, Risk and Compliance controls GRC Frameworks – HIPAA, SEC, FINRA Cybersecurity Applications SIEM Anti-virus Firewall Networks Devices Users Enterprise Device Data User Behavior Network Data Predictive Scoring Policy Engine Decision Engine Pattern log Remediation Services Alerts and Notifications Cybersecurity R isk Score 690
  • 8. Our unique and sustainable advantage … Team expertise with heterogeneous platforms and devices Technology Patents filed on analytics and service provisioning framework Partnerships with B-D, RIA, MF and custodial platforms Cybersecurity Risk Mitigation Software Data-driven architecture • Analytics-first approach • Predictive modeling and ML Hybrid cloud policy orchestration • Monitoring, remediation and reporting for cloud and/or on-premise infrastructure Built-in remediation apps • Custom developed thin applications • Scalability with 3rd Party API integrations 8