SlideShare a Scribd company logo
Sid Yenamandra
CEO & Co-Founder
sid@entreda.com
PREDICTIVE CYBERSECURITY RISK
MITIGATION SOFTWARE FOR
REGULATED ENTERPRISES
Seasoned leadership team
Management Team, Board Members & Investors
Sid Yenamandra
Co-founder and CEO
• Advisor, Memoir Systems (Cisco); VP
Product at Plato Networks
(Netlogic/Broadcom)
• Sr. Director of NSA funded crypto-
acceleration project
• Co-founder of multiple start-up’s
• BS EECS, UC Berkeley
Farshad Ghaffari
Co-founder, Engineering Ops
• Application Engineering, Broadcom
supporting Cisco, Netgear and 2Wire
• Network Stack Development at Sun
Microsystems
• BS EECS, UC Berkeley
Shirish Phatak
Architect
• Co-founder, Talon Storage
• CTO of Wide Area File Services at
Packeteer
Co-founder at Tacit Networks (Packeteer)
• MS IIT, MPhil Rutgers
Jay Sethuram
Chairman, Entreda
• Co-founder Fiberlane, Cerent (Cisco)
• Co-founder, StratumOne (Cisco)
• Founding Director, APIgee
• LP in multiple venture funds
Ajay Goel
Strategy and Business Development
• Managing Director for Symantec
Corporation for India and SAARC countries
• Senior Vice President (Cisco Systems, India
and SAARC)
• Country Director (Sun Microsystems)
Jens Horstmann
Partner Crestlight Ventures
• Inventor of Redbox Technology
• Founder & CEO DVDplay (NCR)
• Advisor to multiple start-up’s
• LP Founder’s Fund
2
Corporate highlights
• Silicon-valley based Start-up
• Cybersecurity risk management software
• 1st market: Financial services (Broker-Dealers)
• VC funded – Crestlight VC & angel investors
• Global Team - 30 Employees, HQ San Mateo CA
• Multiple patents filed, 1 granted to date
• Unify for Financial Services launch - Q4CY14
• Signed-up 10K+ business users over 30 months
• Achieved Operational B/E in Q4, 2016
• Revenue mix - 50%/50% SMB/Enterprise
• 300% Y-o-Y growth for last 2 years
• Listed in FINRA’s compliance vendor directory
Company
Background
Corporate
Milestones
3
Premier customer partnerships in financial services in place
B-D wide mandate to use
our software
2 of 5 largest branch offices use
our software
Shortlisted as a compliance
resource provider
Partnership to offer our
software to 100K+ RIA firms
Partnership to offer our
software to 5K+ RIA firms
Partnership to offer our software
to 80K+ RIA firms
7th
largest US Insurance
Company owns 4 B-Ds
#1
Independent Broker
Dealer in the U.S.
4
Our breakthrough:
Pro-active risk mitigation for users, devices & networks
Today
Manual and Siloed
Automated
Integrated
IT Service Delivery
and Support
IT Governance, Risk
and Compliance
ITSoftwareManagement
User
Authentication
Log
Analysis
VPN
Remote
Desktop
Anti-virus MDM
Patch
Management
Firewall/IDS
Asset
Tracking
Password
Manager
Incident
Reporting
Data-DrivenWorkflow-based
Cyber
Risk
Score:
690
5
Automated cybersecurity policy enforcement
with integrated remediation applications
User installs light-weight
Entreda agent software
on all devices including
mobile devices.
Active
Monitoring Agent
Multi-user
Console
GRC integrated
with IT Software
24x7 Compliance
Reports
Compliance analytics
integrated with applications enables
intuitive and
automated user experience.
Single pane-of-glass
management for cybersecurity
policy enforcement with
real-time analytics.
Easy to understand alerts and
reports inline with
SEC & FINRA regulatory policy
guidelines.
• Behavioral scoring
• Contextual Remediations
• Real-time notifications
Secure Remote
Desktop
User
Management
Auto
VPN
File sharing
Policy Engine
SMRH:434326567.4 -1-
[FORM OF] INFORMATION SECURITY POLICY
[Tip: This Information Security Policy is only a form and must be customized to your business. Please
see the disclaimers below.]
Purpose. The purpose of this Information Security Policy (this “Policy”) is to comply with all applicable
laws and regulations designed to protect the nonpublic personal information (the “Private Information”)
of the customers (the “Customers”) advised by [insert Firm Name] (“Firm”, “we”, “us” or “our”) who
are natural persons, as well as natural persons consisting of our employees and service providers with
whom Firm does business (each, a “Protected Person”). The Information Security Policy is designed to
accomplish the following: (a) to ensure the security and confidentiality of Private Information in a manner
consistent with industry standards and as required by applicable state and federal law; (b) to protect
against any anticipated threats or hazards to the security or integrity of the Private Information; and (c) to
protect against unauthorized access to or use of the Private Information that could result in substantial risk
of harm or inconvenience to any Protected Person.
Compliance Officer. ____________________ is our Information Security Policy “Compliance Officer.”
It is [his][her] responsibility to implement, maintain, administer and coordinate the effectiveness of the
Information Security Policy. Any questions or comments regarding this Policy should be directed to the
Compliance Officer. Following the resignation or removal of the current Compliance Officer, the Firm
shall as soon as reasonably practicable appoint another person as the new Compliance Officer. [Tip:
Generally, the Compliance Officer is an employee of the Firm. In certain instances, the Compliance
Officer may be from a third party vendor that provides certain outsourced services to the Firm.]
Risk Assessment. As of the adoption of this Policy, we have identified the following potential risks to the
security, confidentiality and integrity of Private Information that could result in the unauthorized
disclosure, misuse, alteration, or other compromise of such information: [Tip: The Firm should run an
initial risk assessment with Entreda’s assistance at the beginning of the relationship with Entreda to
analyze the risks that the Firm has. The below is a sample set of risks that a Firm may have and may not
represent all the risks of a particular firm.]
• Unauthorized access to documents containing Private Information by our personnel, service
providers, Protected Persons or third parties;
• Inappropriate use or disclosure of Private Information by personnel, service providers, Protected
Persons or third parties who are authorized to have access to Private Information;
• General security risks posed to our information technology system, including the theft of
computers or other equipment permitting access to Private Information, the loss of Private
Information due to electrical outages or other computer system failures, and the introduction of
viruses into our information technology system; and
• The loss of documents containing Private Information through unanticipated physical hazards
such as fire, earthquakes, floods or other natural disasters.
The Compliance Officer shall periodically re-assess the reasonably foreseeable risks to the security,
confidentiality and integrity of Private Information. Such assessment will include analysis of, among
other things, (i) the effectiveness of personnel training and management with regard to the treatment and
handling of Private Information, (ii) the reliability and suitability of our information technology systems
in light of the objectives of this Policy, including network software design, as well as information
processing, storage, transmission and disposal, and (iii) the ability to detect, prevent and respond to
attacks, intrusions or other system failures.
Limiting Private Information. The Firm will generally limit the amount of Private Information collected
to that reasonably necessary to accomplish the legitimate purpose for which it is collected. [Option 1:
Weekly reports Cyber security
Policy
6
Cybersecurity Risk Mitigation with Predictive Analytics
7
Risk Heuristics
3rd Party threat databases, customers
IT Governance, Risk and
Compliance controls
GRC Frameworks – HIPAA, SEC, FINRA
Cybersecurity Applications
SIEM Anti-virus Firewall
Networks
Devices
Users
Enterprise
Device
Data
User
Behavior
Network
Data
Predictive
Scoring
Policy
Engine
Decision
Engine
Pattern
log
Remediation
Services
Alerts and
Notifications
Cybersecurity R
isk Score
690
Our unique and sustainable advantage …
Team expertise
with heterogeneous
platforms and devices
Technology Patents
filed on analytics and service
provisioning framework
Partnerships
with B-D, RIA, MF
and custodial platforms
Cybersecurity Risk Mitigation Software
Data-driven architecture
• Analytics-first approach
• Predictive modeling and ML
Hybrid cloud policy orchestration
• Monitoring, remediation and reporting for cloud
and/or on-premise infrastructure
Built-in remediation apps
• Custom developed thin applications
• Scalability with 3rd Party API integrations
8

More Related Content

What's hot

The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
Netpluz Asia Pte Ltd
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
Brian Honan
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
Stanton Viaduc
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
Symantec
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
NetWatcher
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Shawn Tuma
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
Shawn Tuma
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
FireEye, Inc.
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
Symantec
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramLancope, Inc.
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
Doug Copley
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Shawn Tuma
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Innovation Network Technologies: InNet
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness Program
Priyanka Aash
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye, Inc.
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 

What's hot (20)

The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness Program
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 

Similar to Laser App Conference 2017 - Sid Yenamandra, Entreda

CCA study group
CCA study groupCCA study group
CCA study group
IIBA UK Chapter
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
AT-NET Services, Inc. - Charleston Division
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
MITSDEDistance
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
TheWalkerGroup1
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
Shawn Tuma
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
PECB
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
TikdiPatel
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
Cloudera, Inc.
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Topic11
Topic11Topic11
Topic11
Anne Starr
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 

Similar to Laser App Conference 2017 - Sid Yenamandra, Entreda (20)

CCA study group
CCA study groupCCA study group
CCA study group
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Topic11
Topic11Topic11
Topic11
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 

More from Laser App Software

Laser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, SalesforceLaser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Software
 
Laser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, AdvicentLaser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, Advicent
Laser App Software
 
Laser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTechLaser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTech
Laser App Software
 
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuideProLaser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Software
 
Laser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, JunxureLaser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, Junxure
Laser App Software
 
Laser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, GrendelLaser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Software
 
Laser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet LogixLaser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Software
 
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge SolutionsLaser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Software
 
Laser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, RiskalyzeLaser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, Riskalyze
Laser App Software
 
Laser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptialLaser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Software
 
Laser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, LaserficheLaser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Software
 
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail TechnologyLaser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Software
 
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNetLaser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Software
 
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account ManagerLaser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Software
 
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Software
 
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on AcceleratorLaser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Software
 
Laser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: PropelLaser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: Propel
Laser App Software
 
Laser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert PowellLaser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert Powell
Laser App Software
 

More from Laser App Software (18)

Laser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, SalesforceLaser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, Salesforce
 
Laser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, AdvicentLaser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, Advicent
 
Laser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTechLaser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTech
 
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuideProLaser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
 
Laser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, JunxureLaser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, Junxure
 
Laser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, GrendelLaser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, Grendel
 
Laser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet LogixLaser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet Logix
 
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge SolutionsLaser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
 
Laser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, RiskalyzeLaser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, Riskalyze
 
Laser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptialLaser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptial
 
Laser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, LaserficheLaser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, Laserfiche
 
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail TechnologyLaser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
 
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNetLaser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
 
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account ManagerLaser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
 
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
 
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on AcceleratorLaser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
 
Laser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: PropelLaser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: Propel
 
Laser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert PowellLaser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert Powell
 

Recently uploaded

International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 

Recently uploaded (13)

International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 

Laser App Conference 2017 - Sid Yenamandra, Entreda

  • 1. Sid Yenamandra CEO & Co-Founder sid@entreda.com PREDICTIVE CYBERSECURITY RISK MITIGATION SOFTWARE FOR REGULATED ENTERPRISES
  • 2. Seasoned leadership team Management Team, Board Members & Investors Sid Yenamandra Co-founder and CEO • Advisor, Memoir Systems (Cisco); VP Product at Plato Networks (Netlogic/Broadcom) • Sr. Director of NSA funded crypto- acceleration project • Co-founder of multiple start-up’s • BS EECS, UC Berkeley Farshad Ghaffari Co-founder, Engineering Ops • Application Engineering, Broadcom supporting Cisco, Netgear and 2Wire • Network Stack Development at Sun Microsystems • BS EECS, UC Berkeley Shirish Phatak Architect • Co-founder, Talon Storage • CTO of Wide Area File Services at Packeteer Co-founder at Tacit Networks (Packeteer) • MS IIT, MPhil Rutgers Jay Sethuram Chairman, Entreda • Co-founder Fiberlane, Cerent (Cisco) • Co-founder, StratumOne (Cisco) • Founding Director, APIgee • LP in multiple venture funds Ajay Goel Strategy and Business Development • Managing Director for Symantec Corporation for India and SAARC countries • Senior Vice President (Cisco Systems, India and SAARC) • Country Director (Sun Microsystems) Jens Horstmann Partner Crestlight Ventures • Inventor of Redbox Technology • Founder & CEO DVDplay (NCR) • Advisor to multiple start-up’s • LP Founder’s Fund 2
  • 3. Corporate highlights • Silicon-valley based Start-up • Cybersecurity risk management software • 1st market: Financial services (Broker-Dealers) • VC funded – Crestlight VC & angel investors • Global Team - 30 Employees, HQ San Mateo CA • Multiple patents filed, 1 granted to date • Unify for Financial Services launch - Q4CY14 • Signed-up 10K+ business users over 30 months • Achieved Operational B/E in Q4, 2016 • Revenue mix - 50%/50% SMB/Enterprise • 300% Y-o-Y growth for last 2 years • Listed in FINRA’s compliance vendor directory Company Background Corporate Milestones 3
  • 4. Premier customer partnerships in financial services in place B-D wide mandate to use our software 2 of 5 largest branch offices use our software Shortlisted as a compliance resource provider Partnership to offer our software to 100K+ RIA firms Partnership to offer our software to 5K+ RIA firms Partnership to offer our software to 80K+ RIA firms 7th largest US Insurance Company owns 4 B-Ds #1 Independent Broker Dealer in the U.S. 4
  • 5. Our breakthrough: Pro-active risk mitigation for users, devices & networks Today Manual and Siloed Automated Integrated IT Service Delivery and Support IT Governance, Risk and Compliance ITSoftwareManagement User Authentication Log Analysis VPN Remote Desktop Anti-virus MDM Patch Management Firewall/IDS Asset Tracking Password Manager Incident Reporting Data-DrivenWorkflow-based Cyber Risk Score: 690 5
  • 6. Automated cybersecurity policy enforcement with integrated remediation applications User installs light-weight Entreda agent software on all devices including mobile devices. Active Monitoring Agent Multi-user Console GRC integrated with IT Software 24x7 Compliance Reports Compliance analytics integrated with applications enables intuitive and automated user experience. Single pane-of-glass management for cybersecurity policy enforcement with real-time analytics. Easy to understand alerts and reports inline with SEC & FINRA regulatory policy guidelines. • Behavioral scoring • Contextual Remediations • Real-time notifications Secure Remote Desktop User Management Auto VPN File sharing Policy Engine SMRH:434326567.4 -1- [FORM OF] INFORMATION SECURITY POLICY [Tip: This Information Security Policy is only a form and must be customized to your business. Please see the disclaimers below.] Purpose. The purpose of this Information Security Policy (this “Policy”) is to comply with all applicable laws and regulations designed to protect the nonpublic personal information (the “Private Information”) of the customers (the “Customers”) advised by [insert Firm Name] (“Firm”, “we”, “us” or “our”) who are natural persons, as well as natural persons consisting of our employees and service providers with whom Firm does business (each, a “Protected Person”). The Information Security Policy is designed to accomplish the following: (a) to ensure the security and confidentiality of Private Information in a manner consistent with industry standards and as required by applicable state and federal law; (b) to protect against any anticipated threats or hazards to the security or integrity of the Private Information; and (c) to protect against unauthorized access to or use of the Private Information that could result in substantial risk of harm or inconvenience to any Protected Person. Compliance Officer. ____________________ is our Information Security Policy “Compliance Officer.” It is [his][her] responsibility to implement, maintain, administer and coordinate the effectiveness of the Information Security Policy. Any questions or comments regarding this Policy should be directed to the Compliance Officer. Following the resignation or removal of the current Compliance Officer, the Firm shall as soon as reasonably practicable appoint another person as the new Compliance Officer. [Tip: Generally, the Compliance Officer is an employee of the Firm. In certain instances, the Compliance Officer may be from a third party vendor that provides certain outsourced services to the Firm.] Risk Assessment. As of the adoption of this Policy, we have identified the following potential risks to the security, confidentiality and integrity of Private Information that could result in the unauthorized disclosure, misuse, alteration, or other compromise of such information: [Tip: The Firm should run an initial risk assessment with Entreda’s assistance at the beginning of the relationship with Entreda to analyze the risks that the Firm has. The below is a sample set of risks that a Firm may have and may not represent all the risks of a particular firm.] • Unauthorized access to documents containing Private Information by our personnel, service providers, Protected Persons or third parties; • Inappropriate use or disclosure of Private Information by personnel, service providers, Protected Persons or third parties who are authorized to have access to Private Information; • General security risks posed to our information technology system, including the theft of computers or other equipment permitting access to Private Information, the loss of Private Information due to electrical outages or other computer system failures, and the introduction of viruses into our information technology system; and • The loss of documents containing Private Information through unanticipated physical hazards such as fire, earthquakes, floods or other natural disasters. The Compliance Officer shall periodically re-assess the reasonably foreseeable risks to the security, confidentiality and integrity of Private Information. Such assessment will include analysis of, among other things, (i) the effectiveness of personnel training and management with regard to the treatment and handling of Private Information, (ii) the reliability and suitability of our information technology systems in light of the objectives of this Policy, including network software design, as well as information processing, storage, transmission and disposal, and (iii) the ability to detect, prevent and respond to attacks, intrusions or other system failures. Limiting Private Information. The Firm will generally limit the amount of Private Information collected to that reasonably necessary to accomplish the legitimate purpose for which it is collected. [Option 1: Weekly reports Cyber security Policy 6
  • 7. Cybersecurity Risk Mitigation with Predictive Analytics 7 Risk Heuristics 3rd Party threat databases, customers IT Governance, Risk and Compliance controls GRC Frameworks – HIPAA, SEC, FINRA Cybersecurity Applications SIEM Anti-virus Firewall Networks Devices Users Enterprise Device Data User Behavior Network Data Predictive Scoring Policy Engine Decision Engine Pattern log Remediation Services Alerts and Notifications Cybersecurity R isk Score 690
  • 8. Our unique and sustainable advantage … Team expertise with heterogeneous platforms and devices Technology Patents filed on analytics and service provisioning framework Partnerships with B-D, RIA, MF and custodial platforms Cybersecurity Risk Mitigation Software Data-driven architecture • Analytics-first approach • Predictive modeling and ML Hybrid cloud policy orchestration • Monitoring, remediation and reporting for cloud and/or on-premise infrastructure Built-in remediation apps • Custom developed thin applications • Scalability with 3rd Party API integrations 8