SlideShare a Scribd company logo
YOU CAN GET IN BUT NEVER GET REAL DATA OUT
WHAT IF,
YOU WOKE UP
TOMORROW
MORNING
AND
 YOUR ENTIRE FAMILY’S IDENTITY, STOLEN
 YOUR COMPANY HAD A BREACH AND YOUR LIFE’S
WORK, STOLEN
 YOUR UTILITY COMPANY WAS HACKED, NO ELECTRIC,
GAS OR WATER
 MASS TRANSIT STOPPED
 ATM’S STOPPED
 EVEN YOUR CAR’S COMPUTER IS UNDER CONTROL BY A
CYBER CRIMINAL
WHAT CAN WE DO?
OUR TIME HAS COME, PANIC NO MORE
CHIMERA DATA SHIELD IS HERE
WE PROTECT THE “CROWN JEWELS” OF ANY
ENTERPRISE
AND
HERE IS HOW WE DO IT
 Convert “Crown Jewels” Into Machine Code
 Masking and Scrambling Technology
 (Ai) Artificial Intelligence
 Dark Drives
 Create A Mirage Of False Data
 Data Is Locked In A World Of Deception That
Chimera Creates
 We Mask And Lock Website Pathways And
Remote Access Points, Whole Networks
 We Use “Lisp” For Intelligent Intruder Blockage And
Reporting
 Multifaceted Intelligent Masking Language (Mime)
 We Are Always On, Chimera Never Sleeps Nor Can
We Be Deactivated
 We Bypass Remote Hacker Security And Our
Embedded Proprietary Location Virus Will Track
Them Down
 We Are Always Aware Of Who Is On, Where They
Are, And What They Are Doing. We Are Aware Of
Every Block Of Memory Used.
 We Exceed NSA Orange Book 8500.02
Standards When Properly Implemented
 The World’s First Proactive Intelligent And
Aware Protection Solution
 Chimera Holds The Key To What Is Real
And What Is Not
Who Do We Protect ?
All Assets Of Enterprise Large And Small
(All Intellectual Property)
Federal, State And Local Governments
Military
Financial And Banking
Retail
Healthcare
Media
Communications
Infrastructure Of All Kinds
The Team:
Shelly Simon- managing director – life long entrepreneur with over 25 years
experience running his own manufacturing company . Shelly with a $25,000
investment built the company in 5 years to wholesale sales of $20,000,000.
Michael Burke – chief visionary – director and creator of our software,
engineer, patent and copyright holder, winner of several awards Arthur C May,
Princeton and featured in Who's Who.
Manuel Santos – cto – software architect with over 20 years experience and
wrote the original code with Mr. Burke used by Chimera and is a Certified
Microsoft Developer/Trainer.
Nino Caldarola – director – advisor – Nino has over 25 years of mechanical
engineering experience . Nino currently holds his ICE (Inventor 10 Certified
Expert’s) certification and certification in Aircraft Engineering Technology
(Ryerson Polytech, Toronto).
Larry Cherrett, director - in-house legal Officer -technology oriented with legal
and scientific expertise - Corporate lawyer with over 20 years of experience -
Previously employed as a Theoretical Nuclear Physicist for Atomic Energy
Canada - Awarded a Canadian Rhodes scholarship
Competitive Environment:
Last year, the global security technology and services market was worth $67
billion; by 2016 it should be worth $86 billion, conservatively. Cybercrime is a
growth industry. The returns are great and the risks are low. We estimate that
the likely annual cost to the global economy from cybercrime is more than
$400 billion. The global cyber security market is highly competitive and
substantially fragmented. The 20 leading companies in the market are
primarily US based IT and defense companies, with the rise of defense
contractors one of the key recent developments in the market's competitive
landscape.
This gives Chimera Date Shield a leg-up and a huge advantage in today’s
market since there are very few competitors using our methodology and
approach. With that said, top cyber- security companies such as The Boeing
Company, Booz Allen Hamilton Inc, Cisco Systems Inc, Computer Sciences
Corporation, Dell Inc, General Dynamics Corporation, Hewlett Packard
Company, International Business Machines Corporation (IBM) would find a
common interest working with us. Chimera would only compliment their
security platforms by protecting the clients' properties.
In fact anyone of these cyber security giants just mentioned would possibly
acquire Chimera Data Shield.
RSA Conference, the world’s leading information
security conferences and expositions, took place in
May 2015. Conference open with RSA Conference
President and Keynote speaker Amit Yoran:
I quote “We are living in the Dark Ages of
security. We cling to outmoded worldviews
and rely on tools and tactics from the past,
and yet we are surprised to find ourselves
living in an era of chaos and violence. We
must cast off the past and enter an Age of
Enlightenment by pursuing greater visibility
into and understanding of our digital world”.
“Engage people with what they expect. It settles them into
predictable patterns while you wait for the extraordinary
moment-that which they cannot anticipate.” When the
hackers get in, they believe they have won. This is when we
defeat them. The files they steal are useless or directed, their
position is revealed, and we can stall them by providing
seemingly easy access to even richer fictional targets.
With all this said there is only one answer, Our Time Has Come !
CHIMERA DATA SHIELD
Any questions or additional information needed - please contact Shelly Simon @ 617.658.3104 or
561.370.3672 email - ssimon@chimeratashield.com

More Related Content

What's hot

Rampart services corporate ppt
Rampart services corporate pptRampart services corporate ppt
Rampart services corporate ppt
Rampart Services
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
The Economist Media Businesses
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
MIT Startup Exchange
 
La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios
AMETIC
 
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Access Group
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
Andrea Mennillo
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
Indy Dh
 
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
ebuc
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
Bill McCabe
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
DDoS Mitigation
 
A DISA Presentaion
A DISA PresentaionA DISA Presentaion
A DISA Presentaion
Prakash Tripathi
 
How Blockchain Will Transform the IoT
How Blockchain Will Transform the IoTHow Blockchain Will Transform the IoT
How Blockchain Will Transform the IoT
Paris Blockchain Week Summit
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace
Aladdin Dandis
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
Zeshan Sattar
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
Giulio Coraggio
 
How Artificial Intelligence is accelerating adoption of IoT
How Artificial Intelligence is accelerating adoption of IoTHow Artificial Intelligence is accelerating adoption of IoT
How Artificial Intelligence is accelerating adoption of IoT
Francisco Maroto
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
alvin chin
 
Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018
Alex Manders
 
Silicon Valley top 20
Silicon Valley top 20Silicon Valley top 20
Silicon Valley top 20
802 Secure, Inc
 

What's hot (20)

Rampart services corporate ppt
Rampart services corporate pptRampart services corporate ppt
Rampart services corporate ppt
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
 
La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios
 
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
 
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
A DISA Presentaion
A DISA PresentaionA DISA Presentaion
A DISA Presentaion
 
How Blockchain Will Transform the IoT
How Blockchain Will Transform the IoTHow Blockchain Will Transform the IoT
How Blockchain Will Transform the IoT
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
How Artificial Intelligence is accelerating adoption of IoT
How Artificial Intelligence is accelerating adoption of IoTHow Artificial Intelligence is accelerating adoption of IoT
How Artificial Intelligence is accelerating adoption of IoT
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018
 
Silicon Valley top 20
Silicon Valley top 20Silicon Valley top 20
Silicon Valley top 20
 

Viewers also liked

La nube
La nubeLa nube
La nube
JENNYANDJEIMY
 
Modding pc colombia
Modding pc colombiaModding pc colombia
Modding pc colombia
JENNYANDJEIMY
 
Personal Digital Library_PowerPoint Presentation_120213
Personal Digital Library_PowerPoint Presentation_120213Personal Digital Library_PowerPoint Presentation_120213
Personal Digital Library_PowerPoint Presentation_120213
Paul Guay
 
Time Domain response of second order linear circuit
Time Domain response of second order linear circuitTime Domain response of second order linear circuit
Time Domain response of second order linear circuit
Abhishek Choksi
 
Contributor qualities
Contributor qualitiesContributor qualities
Contributor qualities
Abhishek Choksi
 
Poisson’s and Laplace’s Equation
Poisson’s and Laplace’s EquationPoisson’s and Laplace’s Equation
Poisson’s and Laplace’s Equation
Abhishek Choksi
 
Solar Energy presentation
Solar Energy presentationSolar Energy presentation
Solar Energy presentation
Abhishek Choksi
 
Hybrid model for Transistor, small signal Analysis
Hybrid model for Transistor, small signal AnalysisHybrid model for Transistor, small signal Analysis
Hybrid model for Transistor, small signal Analysis
Abhishek Choksi
 
No-load & blocked rotor test, Equivalent circuit, Phasor diagram
No-load & blocked rotor test, Equivalent circuit, Phasor diagramNo-load & blocked rotor test, Equivalent circuit, Phasor diagram
No-load & blocked rotor test, Equivalent circuit, Phasor diagram
Abhishek Choksi
 
Topic: Fourier Series ( Periodic Function to change of interval)
Topic: Fourier Series ( Periodic Function to  change of interval)Topic: Fourier Series ( Periodic Function to  change of interval)
Topic: Fourier Series ( Periodic Function to change of interval)
Abhishek Choksi
 
Orthographic projection
Orthographic projectionOrthographic projection
Orthographic projection
Abhishek Choksi
 
Thévenin’s Theorems
Thévenin’s Theorems Thévenin’s Theorems
Thévenin’s Theorems
Abhishek Choksi
 
K - Map
  K - Map    K - Map
K - Map
Abhishek Choksi
 
While , For , Do-While Loop
While , For , Do-While LoopWhile , For , Do-While Loop
While , For , Do-While Loop
Abhishek Choksi
 
RYAN MINCEY - Resume 2015 military
RYAN MINCEY - Resume 2015 militaryRYAN MINCEY - Resume 2015 military
RYAN MINCEY - Resume 2015 military
Ryan Mincey
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier Transform
Abhishek Choksi
 
Gas turbine cycle (open and closed gas turbine cycle)
Gas turbine cycle (open and closed gas turbine cycle)Gas turbine cycle (open and closed gas turbine cycle)
Gas turbine cycle (open and closed gas turbine cycle)
Abhishek Choksi
 
Difference between micro & Macro Economics
Difference between micro & Macro EconomicsDifference between micro & Macro Economics
Difference between micro & Macro Economics
Abhishek Choksi
 

Viewers also liked (18)

La nube
La nubeLa nube
La nube
 
Modding pc colombia
Modding pc colombiaModding pc colombia
Modding pc colombia
 
Personal Digital Library_PowerPoint Presentation_120213
Personal Digital Library_PowerPoint Presentation_120213Personal Digital Library_PowerPoint Presentation_120213
Personal Digital Library_PowerPoint Presentation_120213
 
Time Domain response of second order linear circuit
Time Domain response of second order linear circuitTime Domain response of second order linear circuit
Time Domain response of second order linear circuit
 
Contributor qualities
Contributor qualitiesContributor qualities
Contributor qualities
 
Poisson’s and Laplace’s Equation
Poisson’s and Laplace’s EquationPoisson’s and Laplace’s Equation
Poisson’s and Laplace’s Equation
 
Solar Energy presentation
Solar Energy presentationSolar Energy presentation
Solar Energy presentation
 
Hybrid model for Transistor, small signal Analysis
Hybrid model for Transistor, small signal AnalysisHybrid model for Transistor, small signal Analysis
Hybrid model for Transistor, small signal Analysis
 
No-load & blocked rotor test, Equivalent circuit, Phasor diagram
No-load & blocked rotor test, Equivalent circuit, Phasor diagramNo-load & blocked rotor test, Equivalent circuit, Phasor diagram
No-load & blocked rotor test, Equivalent circuit, Phasor diagram
 
Topic: Fourier Series ( Periodic Function to change of interval)
Topic: Fourier Series ( Periodic Function to  change of interval)Topic: Fourier Series ( Periodic Function to  change of interval)
Topic: Fourier Series ( Periodic Function to change of interval)
 
Orthographic projection
Orthographic projectionOrthographic projection
Orthographic projection
 
Thévenin’s Theorems
Thévenin’s Theorems Thévenin’s Theorems
Thévenin’s Theorems
 
K - Map
  K - Map    K - Map
K - Map
 
While , For , Do-While Loop
While , For , Do-While LoopWhile , For , Do-While Loop
While , For , Do-While Loop
 
RYAN MINCEY - Resume 2015 military
RYAN MINCEY - Resume 2015 militaryRYAN MINCEY - Resume 2015 military
RYAN MINCEY - Resume 2015 military
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier Transform
 
Gas turbine cycle (open and closed gas turbine cycle)
Gas turbine cycle (open and closed gas turbine cycle)Gas turbine cycle (open and closed gas turbine cycle)
Gas turbine cycle (open and closed gas turbine cycle)
 
Difference between micro & Macro Economics
Difference between micro & Macro EconomicsDifference between micro & Macro Economics
Difference between micro & Macro Economics
 

Similar to Presentation -A

21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
SonaliG6
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
jkl0202
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
ethanBrownusa
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
preetichaubey4
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017
Harbor Research
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
DMIMarketing
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
Ramona Kohrs
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
Vishal Singh
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
Dominic Vogel
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
OCTF Industry Engagement
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Citrin Cooperman
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
OurCrowd
 

Similar to Presentation -A (20)

21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 

Presentation -A

  • 1. YOU CAN GET IN BUT NEVER GET REAL DATA OUT
  • 2. WHAT IF, YOU WOKE UP TOMORROW MORNING AND
  • 3.  YOUR ENTIRE FAMILY’S IDENTITY, STOLEN  YOUR COMPANY HAD A BREACH AND YOUR LIFE’S WORK, STOLEN  YOUR UTILITY COMPANY WAS HACKED, NO ELECTRIC, GAS OR WATER  MASS TRANSIT STOPPED  ATM’S STOPPED  EVEN YOUR CAR’S COMPUTER IS UNDER CONTROL BY A CYBER CRIMINAL WHAT CAN WE DO?
  • 4. OUR TIME HAS COME, PANIC NO MORE CHIMERA DATA SHIELD IS HERE WE PROTECT THE “CROWN JEWELS” OF ANY ENTERPRISE AND HERE IS HOW WE DO IT
  • 5.  Convert “Crown Jewels” Into Machine Code  Masking and Scrambling Technology  (Ai) Artificial Intelligence  Dark Drives  Create A Mirage Of False Data  Data Is Locked In A World Of Deception That Chimera Creates  We Mask And Lock Website Pathways And Remote Access Points, Whole Networks
  • 6.  We Use “Lisp” For Intelligent Intruder Blockage And Reporting  Multifaceted Intelligent Masking Language (Mime)  We Are Always On, Chimera Never Sleeps Nor Can We Be Deactivated  We Bypass Remote Hacker Security And Our Embedded Proprietary Location Virus Will Track Them Down  We Are Always Aware Of Who Is On, Where They Are, And What They Are Doing. We Are Aware Of Every Block Of Memory Used.
  • 7.  We Exceed NSA Orange Book 8500.02 Standards When Properly Implemented  The World’s First Proactive Intelligent And Aware Protection Solution  Chimera Holds The Key To What Is Real And What Is Not
  • 8. Who Do We Protect ? All Assets Of Enterprise Large And Small (All Intellectual Property) Federal, State And Local Governments Military Financial And Banking Retail Healthcare Media Communications Infrastructure Of All Kinds
  • 9. The Team: Shelly Simon- managing director – life long entrepreneur with over 25 years experience running his own manufacturing company . Shelly with a $25,000 investment built the company in 5 years to wholesale sales of $20,000,000. Michael Burke – chief visionary – director and creator of our software, engineer, patent and copyright holder, winner of several awards Arthur C May, Princeton and featured in Who's Who. Manuel Santos – cto – software architect with over 20 years experience and wrote the original code with Mr. Burke used by Chimera and is a Certified Microsoft Developer/Trainer. Nino Caldarola – director – advisor – Nino has over 25 years of mechanical engineering experience . Nino currently holds his ICE (Inventor 10 Certified Expert’s) certification and certification in Aircraft Engineering Technology (Ryerson Polytech, Toronto). Larry Cherrett, director - in-house legal Officer -technology oriented with legal and scientific expertise - Corporate lawyer with over 20 years of experience - Previously employed as a Theoretical Nuclear Physicist for Atomic Energy Canada - Awarded a Canadian Rhodes scholarship
  • 10. Competitive Environment: Last year, the global security technology and services market was worth $67 billion; by 2016 it should be worth $86 billion, conservatively. Cybercrime is a growth industry. The returns are great and the risks are low. We estimate that the likely annual cost to the global economy from cybercrime is more than $400 billion. The global cyber security market is highly competitive and substantially fragmented. The 20 leading companies in the market are primarily US based IT and defense companies, with the rise of defense contractors one of the key recent developments in the market's competitive landscape. This gives Chimera Date Shield a leg-up and a huge advantage in today’s market since there are very few competitors using our methodology and approach. With that said, top cyber- security companies such as The Boeing Company, Booz Allen Hamilton Inc, Cisco Systems Inc, Computer Sciences Corporation, Dell Inc, General Dynamics Corporation, Hewlett Packard Company, International Business Machines Corporation (IBM) would find a common interest working with us. Chimera would only compliment their security platforms by protecting the clients' properties. In fact anyone of these cyber security giants just mentioned would possibly acquire Chimera Data Shield.
  • 11. RSA Conference, the world’s leading information security conferences and expositions, took place in May 2015. Conference open with RSA Conference President and Keynote speaker Amit Yoran: I quote “We are living in the Dark Ages of security. We cling to outmoded worldviews and rely on tools and tactics from the past, and yet we are surprised to find ourselves living in an era of chaos and violence. We must cast off the past and enter an Age of Enlightenment by pursuing greater visibility into and understanding of our digital world”.
  • 12. “Engage people with what they expect. It settles them into predictable patterns while you wait for the extraordinary moment-that which they cannot anticipate.” When the hackers get in, they believe they have won. This is when we defeat them. The files they steal are useless or directed, their position is revealed, and we can stall them by providing seemingly easy access to even richer fictional targets. With all this said there is only one answer, Our Time Has Come ! CHIMERA DATA SHIELD Any questions or additional information needed - please contact Shelly Simon @ 617.658.3104 or 561.370.3672 email - ssimon@chimeratashield.com