SlideShare a Scribd company logo
Cybersecurity,
Software Engineering & Supply Chain
Why customers ask about it even more?
What can you do with it?
UnderDefense
Today’s Discussion
∙ About me and Underdefense
∙ Ransomware and data leakage. Lessons learned
∙ IT outsource in wartime. What we have to expect from RuZZia
∙ New business opportunities. Cybersecurity as a competitive
advantage
∙ Benefits
∙ Summary
∙ Q&A
Your Dream Team
45 000+ systems protected 24x7 IR + Threat Hunting
A Global Incident Response company
serving customers around the world and
leveraging partnership with Nexia
international to deliver IR services
worldwide
Work for global Multinational
Corporations in Gaming, Fintech,
Insurance and Law
Work on behalf of PE firms for their
portfolio businesses, pre and post IPO
Specialize in Cyber resiliency, Cyber
Operations and Cloud
14000 systems
960 systems
33000 systems
Your Dream Team
#1 on Clutch - B2B review platform
https://clutch.co/profile/underdefense#reviews
#1 of 3521 Companies!
Recognitions, Awards & Partnerships
UnderDefense
The question is not IF you are going
to be hacked, but WHEN?
UnderDefense
Key problems
1. Supply Chain attacks are a big deal nowadays
2. Your Clients need to be compliant (SOC2, ISO27001, HIPAA, GDPR…..)
3. Customers of your Clients require proofs for YOUR cybersecurity
maturity
4. You as Suppliers need to be compliant too as you process their data
5. USA and EU enhanced requirements for data security against external
attacks
Your Dream Team
Everyone can be Hacked.
Reaction is
differentiation
Good companies vs Bad companies
UnderDefense
Your Dream Team
TIME & COMMUNICATION =
IMPACT & $$$
People are
greedy....
…Greedy
people pay 2-
3x
YOU what to
customers to
outsource work but
not ready to
outsource
themselves.
Security isn't your core competence. OUTSOURCE IT
UnderDefense
Bigger players understand it
UnderDefense
What to do?
1. Security isn't your core competence. OUTSOURCE IT
2. Порахуйте скільки втратить ваша компанія за 1 день простою в роботі
3. Реалістично оцініть свої ризики
4. Стрестестінг секюріті
UnderDefense
Stress/crush test your Cyber Security
UnderDefense
Letter of attestation
Calculate your risks in $$$
Your Dream Team
To Pay or NOT to Pay?
UnderDefense
After SolarWinds, ISVs must:
Conduct a
Penetration Test
24x7 monitoring Practical
Incident Response
Plan
Social Engineering
Test
Existing successful customers in 24x7 Monitoring & Compliance
ISO27001
GDPR
SOC2 PCI DSS
ш
ш
On your software development
projects data security is vital and
customer needs you to cover that
part
Cooperation models
Your business or your customer
experience cyber attack or data
breach. We help companies
Respond & Recover from Security
Incidents (e.g. SoftServe case)
Data breaches do happen. We are
the first responders. You can
count on our Incident Response
Team to help you and your clients
recover after cyber attacks.
We provide a AppSec expert to
support Your development team
to build product secure by
design.
Easy:
Your customers mention about
security and You refer to
UnderDefense to run a penetration
test or compliance (SOC2,
ISO27001, PCI, HIPAA, GDPR)
Added value: You can recommend
UnderDefense as your
Cybersecurity Partner for an audit
of application developed by your
team
Critical: Complex:
Security as added value:
Your Wins
You get 10% for a referred deal
We work with fixed-price and subscription model
increases trust
to your code and
company through
3rd party
differentiates your
standard development
offering
You deliver software
secure by design
Partner network
UnderDefense
IT outsource in wartime. What we
have to expect from RuZZia
UnderDefense
Cybersecurity as Enabler. New business opportunities
UnderDefense
Summary
● Security isn't your core competence. OUTSOURCE IT
● Stress/crush test your Cyber Security
● Calculate your risks in $$$
The question is not IF you are going to be hacked, but WHEN?
Thank you for your trust
Ukraine
Lviv Heroiv UPA 77 3rd floor, Lviv, 79014
Tel: +38 093 900 30 95
email: help@underdefense.com
USA
New York 375 Park Avenue, Suite 2800, NY
Tel: +1 929 999 5101
email: help@underdefense.com
Call us now at +1 929 999 5101
Contact me: Michael
mh@underdefense.com
Service Value Proposition Pricing range
Penetration Testing
A penetration test, is a simulation of real world cyberattack, performed to discover gapd and
weaknesses and evaluate the security of the system with further improvement recommendations. $ 16 000 - 60 000
Compliance &
Certification
UnderDefense specializes in assessing and diagnosing solutions to improve security and validate
for regulatory compliance (HIPAA, PCI DSS, SOC2, ISO27001) helping you make better decisions,
become more agile and leverage security to sell more.
$ 5 000 - 9 000/
month
Secure Development
process (SDLC)
We believe that Security should not be an afterthought, so we make sure vulnerabilities are found
and fixed prior to application deployment reducing the total cost of software development.
$ 90 000 - 130 000
depends on duration
24x7 Security Monitoring
UnderDefense managed security services (MSS) are delivered by our team of vulnerability and
security researchers, from security operation centers (SOC) to support your organization on-
demand, 24 hours a day, 365 days a year. By combining and correlating log activity, our services
help eliminate blind spots and provide visibility to what really matters.
$ 36 000 - 220 000
per year
Incident Response
We help you respond and recover with advice, guidance and hands-on expertise. Evaluating IT
infrastructure security and identifying vulnerabilities, UnderDefense helps its customers properly
respond to security incidents and build prevention plans in all kinds of situations.
$ 20 000 - 340 000
Service pricing
Agenda:
Can be white-labeled.
Direct sales

More Related Content

Similar to Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні (UA)

Hackers Locked
Hackers Locked Hackers Locked
Hackers Locked
Sam S
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
Tony Zirnoon, CISSP
 
Seekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRSeekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IR
Paul Enright
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
patmisasi
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
SlideTeam
 
Information Security
Information SecurityInformation Security
Information Security
Brian Hacker
 

Similar to Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні (UA) (20)

CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
IT SERVICES
IT SERVICESIT SERVICES
IT SERVICES
 
braincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdfbraincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdf
 
braincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdfbraincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdf
 
Hackers Locked
Hackers Locked Hackers Locked
Hackers Locked
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
Solution Spotlight IT Consulting Services
Solution Spotlight  IT Consulting ServicesSolution Spotlight  IT Consulting Services
Solution Spotlight IT Consulting Services
 
"Navigate the MDR Marketplace Like a Pro!"
 "Navigate the MDR Marketplace Like a Pro!" "Navigate the MDR Marketplace Like a Pro!"
"Navigate the MDR Marketplace Like a Pro!"
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Seekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRSeekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IR
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
 
Information Security
Information SecurityInformation Security
Information Security
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 

More from Lviv Startup Club

More from Lviv Startup Club (20)

Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Anatolii Vintsyk: Комунікації в проєкті під час війни (UA)
Anatolii Vintsyk: Комунікації в проєкті під час війни (UA)Anatolii Vintsyk: Комунікації в проєкті під час війни (UA)
Anatolii Vintsyk: Комунікації в проєкті під час війни (UA)
 
Natalia Renska & Roman Astafiev: Нарциси і психопати в організаціях. Як це вп...
Natalia Renska & Roman Astafiev: Нарциси і психопати в організаціях. Як це вп...Natalia Renska & Roman Astafiev: Нарциси і психопати в організаціях. Як це вп...
Natalia Renska & Roman Astafiev: Нарциси і психопати в організаціях. Як це вп...
 
Diana Natkhir: Інструменти Change management для роботи з клієнтами в продукт...
Diana Natkhir: Інструменти Change management для роботи з клієнтами в продукт...Diana Natkhir: Інструменти Change management для роботи з клієнтами в продукт...
Diana Natkhir: Інструменти Change management для роботи з клієнтами в продукт...
 
Khristina Pototska: Steering the Ship: Product Management in Startups vs. Glo...
Khristina Pototska: Steering the Ship: Product Management in Startups vs. Glo...Khristina Pototska: Steering the Ship: Product Management in Startups vs. Glo...
Khristina Pototska: Steering the Ship: Product Management in Startups vs. Glo...
 
Oleksandr Buratynskyi: Як Agile Coach мікроменеджером став 🙃 (UA)
Oleksandr Buratynskyi: Як Agile Coach мікроменеджером став 🙃 (UA)Oleksandr Buratynskyi: Як Agile Coach мікроменеджером став 🙃 (UA)
Oleksandr Buratynskyi: Як Agile Coach мікроменеджером став 🙃 (UA)
 
Igor Protsenko: Difference between outsourcing and product companies for prod...
Igor Protsenko: Difference between outsourcing and product companies for prod...Igor Protsenko: Difference between outsourcing and product companies for prod...
Igor Protsenko: Difference between outsourcing and product companies for prod...
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Valeriy Kozlov: Taming the Startup Chaos: GTD for Founders & Small Teams (UA)
Valeriy Kozlov: Taming the Startup Chaos: GTD for Founders & Small Teams (UA)Valeriy Kozlov: Taming the Startup Chaos: GTD for Founders & Small Teams (UA)
Valeriy Kozlov: Taming the Startup Chaos: GTD for Founders & Small Teams (UA)
 
Anna Kompanets: Проблеми впровадження проєктів, про які б ви ніколи не подума...
Anna Kompanets: Проблеми впровадження проєктів, про які б ви ніколи не подума...Anna Kompanets: Проблеми впровадження проєктів, про які б ви ніколи не подума...
Anna Kompanets: Проблеми впровадження проєктів, про які б ви ніколи не подума...
 
Viktoriia Honcharova: PMI: нова стратегія розвитку управління проєктами (UA)
Viktoriia Honcharova: PMI: нова стратегія розвитку управління проєктами (UA)Viktoriia Honcharova: PMI: нова стратегія розвитку управління проєктами (UA)
Viktoriia Honcharova: PMI: нова стратегія розвитку управління проєктами (UA)
 
Andrii Mandrika: Як системно допомагати ЗСУ, використовуючи продуктовий підхі...
Andrii Mandrika: Як системно допомагати ЗСУ, використовуючи продуктовий підхі...Andrii Mandrika: Як системно допомагати ЗСУ, використовуючи продуктовий підхі...
Andrii Mandrika: Як системно допомагати ЗСУ, використовуючи продуктовий підхі...
 
Michael Vidyakin: From Vision to Victory: Mastering the Project-Strategy Conn...
Michael Vidyakin: From Vision to Victory: Mastering the Project-Strategy Conn...Michael Vidyakin: From Vision to Victory: Mastering the Project-Strategy Conn...
Michael Vidyakin: From Vision to Victory: Mastering the Project-Strategy Conn...
 
Kateryna Kubasova: Абстрактне Оксфордське лідерство конкретному українському ...
Kateryna Kubasova: Абстрактне Оксфордське лідерство конкретному українському ...Kateryna Kubasova: Абстрактне Оксфордське лідерство конкретному українському ...
Kateryna Kubasova: Абстрактне Оксфордське лідерство конкретному українському ...
 
Andrii Salii: Навіщо публічному сектору NPS: будуємо довіру через відкритість...
Andrii Salii: Навіщо публічному сектору NPS: будуємо довіру через відкритість...Andrii Salii: Навіщо публічному сектору NPS: будуємо довіру через відкритість...
Andrii Salii: Навіщо публічному сектору NPS: будуємо довіру через відкритість...
 
Anton Hlazkov: Впровадження змін – це процес чи проєкт? Чому важливо розуміти...
Anton Hlazkov: Впровадження змін – це процес чи проєкт? Чому важливо розуміти...Anton Hlazkov: Впровадження змін – це процес чи проєкт? Чому важливо розуміти...
Anton Hlazkov: Впровадження змін – це процес чи проєкт? Чому важливо розуміти...
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
Yana Bort: Ритм організації. Чи можливо синхронізувати великий ентерпрайз за ...
Yana Bort: Ритм організації. Чи можливо синхронізувати великий ентерпрайз за ...Yana Bort: Ритм організації. Чи можливо синхронізувати великий ентерпрайз за ...
Yana Bort: Ритм організації. Чи можливо синхронізувати великий ентерпрайз за ...
 
Nikita Artemchuk: Навчання та розвиток продакт менеджера (UA)
Nikita Artemchuk: Навчання та розвиток продакт менеджера (UA)Nikita Artemchuk: Навчання та розвиток продакт менеджера (UA)
Nikita Artemchuk: Навчання та розвиток продакт менеджера (UA)
 

Recently uploaded

20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 

Recently uploaded (20)

Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
 
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alum
 
lecture 02 managerial accounting. chapter 02pptx
lecture 02 managerial accounting. chapter 02pptxlecture 02 managerial accounting. chapter 02pptx
lecture 02 managerial accounting. chapter 02pptx
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Commercial RO Plant Manufacturer In Noida.pdf
Commercial RO Plant Manufacturer In Noida.pdfCommercial RO Plant Manufacturer In Noida.pdf
Commercial RO Plant Manufacturer In Noida.pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo TechnologyLars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 

Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні (UA)

  • 1. Cybersecurity, Software Engineering & Supply Chain Why customers ask about it even more? What can you do with it?
  • 2. UnderDefense Today’s Discussion ∙ About me and Underdefense ∙ Ransomware and data leakage. Lessons learned ∙ IT outsource in wartime. What we have to expect from RuZZia ∙ New business opportunities. Cybersecurity as a competitive advantage ∙ Benefits ∙ Summary ∙ Q&A
  • 3. Your Dream Team 45 000+ systems protected 24x7 IR + Threat Hunting A Global Incident Response company serving customers around the world and leveraging partnership with Nexia international to deliver IR services worldwide Work for global Multinational Corporations in Gaming, Fintech, Insurance and Law Work on behalf of PE firms for their portfolio businesses, pre and post IPO Specialize in Cyber resiliency, Cyber Operations and Cloud 14000 systems 960 systems 33000 systems
  • 4. Your Dream Team #1 on Clutch - B2B review platform https://clutch.co/profile/underdefense#reviews #1 of 3521 Companies!
  • 5. Recognitions, Awards & Partnerships
  • 6. UnderDefense The question is not IF you are going to be hacked, but WHEN?
  • 7. UnderDefense Key problems 1. Supply Chain attacks are a big deal nowadays 2. Your Clients need to be compliant (SOC2, ISO27001, HIPAA, GDPR…..) 3. Customers of your Clients require proofs for YOUR cybersecurity maturity 4. You as Suppliers need to be compliant too as you process their data 5. USA and EU enhanced requirements for data security against external attacks
  • 8. Your Dream Team Everyone can be Hacked. Reaction is differentiation Good companies vs Bad companies
  • 10. Your Dream Team TIME & COMMUNICATION = IMPACT & $$$
  • 11. People are greedy.... …Greedy people pay 2- 3x YOU what to customers to outsource work but not ready to outsource themselves. Security isn't your core competence. OUTSOURCE IT
  • 13. UnderDefense What to do? 1. Security isn't your core competence. OUTSOURCE IT 2. Порахуйте скільки втратить ваша компанія за 1 день простою в роботі 3. Реалістично оцініть свої ризики 4. Стрестестінг секюріті
  • 16.
  • 18. Your Dream Team To Pay or NOT to Pay?
  • 19. UnderDefense After SolarWinds, ISVs must: Conduct a Penetration Test 24x7 monitoring Practical Incident Response Plan Social Engineering Test
  • 20. Existing successful customers in 24x7 Monitoring & Compliance ISO27001 GDPR SOC2 PCI DSS
  • 21. ш ш On your software development projects data security is vital and customer needs you to cover that part Cooperation models Your business or your customer experience cyber attack or data breach. We help companies Respond & Recover from Security Incidents (e.g. SoftServe case) Data breaches do happen. We are the first responders. You can count on our Incident Response Team to help you and your clients recover after cyber attacks. We provide a AppSec expert to support Your development team to build product secure by design. Easy: Your customers mention about security and You refer to UnderDefense to run a penetration test or compliance (SOC2, ISO27001, PCI, HIPAA, GDPR) Added value: You can recommend UnderDefense as your Cybersecurity Partner for an audit of application developed by your team Critical: Complex:
  • 22. Security as added value: Your Wins You get 10% for a referred deal We work with fixed-price and subscription model increases trust to your code and company through 3rd party differentiates your standard development offering You deliver software secure by design
  • 24. UnderDefense IT outsource in wartime. What we have to expect from RuZZia
  • 25. UnderDefense Cybersecurity as Enabler. New business opportunities
  • 26. UnderDefense Summary ● Security isn't your core competence. OUTSOURCE IT ● Stress/crush test your Cyber Security ● Calculate your risks in $$$ The question is not IF you are going to be hacked, but WHEN?
  • 27. Thank you for your trust Ukraine Lviv Heroiv UPA 77 3rd floor, Lviv, 79014 Tel: +38 093 900 30 95 email: help@underdefense.com USA New York 375 Park Avenue, Suite 2800, NY Tel: +1 929 999 5101 email: help@underdefense.com Call us now at +1 929 999 5101 Contact me: Michael mh@underdefense.com
  • 28. Service Value Proposition Pricing range Penetration Testing A penetration test, is a simulation of real world cyberattack, performed to discover gapd and weaknesses and evaluate the security of the system with further improvement recommendations. $ 16 000 - 60 000 Compliance & Certification UnderDefense specializes in assessing and diagnosing solutions to improve security and validate for regulatory compliance (HIPAA, PCI DSS, SOC2, ISO27001) helping you make better decisions, become more agile and leverage security to sell more. $ 5 000 - 9 000/ month Secure Development process (SDLC) We believe that Security should not be an afterthought, so we make sure vulnerabilities are found and fixed prior to application deployment reducing the total cost of software development. $ 90 000 - 130 000 depends on duration 24x7 Security Monitoring UnderDefense managed security services (MSS) are delivered by our team of vulnerability and security researchers, from security operation centers (SOC) to support your organization on- demand, 24 hours a day, 365 days a year. By combining and correlating log activity, our services help eliminate blind spots and provide visibility to what really matters. $ 36 000 - 220 000 per year Incident Response We help you respond and recover with advice, guidance and hands-on expertise. Evaluating IT infrastructure security and identifying vulnerabilities, UnderDefense helps its customers properly respond to security incidents and build prevention plans in all kinds of situations. $ 20 000 - 340 000 Service pricing Agenda: Can be white-labeled. Direct sales