The numbers tell the story: 84% of C-suite executives believe they must leverage artificial intelligence (AI) to achieve their growth objectives, yet 76% report they struggle with how to scale. With the stakes higher than ever, what can we learn from companies that are successfully scaling AI, achieving nearly 3X the return on investments and an average 32% premium on key financial valuation metrics?
To answer that question, Accenture conducted a landmark global study involving 1,500 C-suite executives from organizations across 16 industries. The aim: Help companies progress on their AI journey, from one-off AI experimentation to gaining a robust organization-wide capability that acts as a source of competitive agility and growth.
Read the full report:
http://www.accenture.com/AI-Built-to-Scale-Slideshare
Accenture's Technology Vision 2021 details emerging technology trends that will help companies get back on track & build their future post COVID-19. Read more.
Gauging Business Disruption with the Disruptability Index | Accentureaccenture
Accenture research reports business disruption is a growing challenge for all industries. See how your industry could be affected by disruption with Accenture's disruptability index. Read more.
Profit and market value is migrating away from hardware, but few product companies are prepared and executing the required digital transformation. High tech companies need to invest in digital growth strategies, reinvigorate business models and create new revenue streams. Find out how to harness disruption to grow your business.
The numbers tell the story: 84% of C-suite executives believe they must leverage artificial intelligence (AI) to achieve their growth objectives, yet 76% report they struggle with how to scale. With the stakes higher than ever, what can we learn from companies that are successfully scaling AI, achieving nearly 3X the return on investments and an average 32% premium on key financial valuation metrics?
To answer that question, Accenture conducted a landmark global study involving 1,500 C-suite executives from organizations across 16 industries. The aim: Help companies progress on their AI journey, from one-off AI experimentation to gaining a robust organization-wide capability that acts as a source of competitive agility and growth.
Read the full report:
http://www.accenture.com/AI-Built-to-Scale-Slideshare
Accenture's Technology Vision 2021 details emerging technology trends that will help companies get back on track & build their future post COVID-19. Read more.
Gauging Business Disruption with the Disruptability Index | Accentureaccenture
Accenture research reports business disruption is a growing challenge for all industries. See how your industry could be affected by disruption with Accenture's disruptability index. Read more.
Profit and market value is migrating away from hardware, but few product companies are prepared and executing the required digital transformation. High tech companies need to invest in digital growth strategies, reinvigorate business models and create new revenue streams. Find out how to harness disruption to grow your business.
digital transformation for manufacturing
Fourth Industrial Revolution technologies are driving innovation and the benefits of data-driven manufacturing are clear:
Predictive insights ✔
Advanced OEE ✔
Improved quality ✔
Satisfied customers ✔
Embrace your data's potential with Rawcubes' equipped data driven assessment and create an edge!
Accenture makes major investments in IT automation capabilities to advance to more intelligent and touch less IT operations, and business efficiency. Read more.
Solve for X with AI: a VC view of the Machine Learning & AI landscapeEd Fernandez
What you'll get from this deck
1. The M&A race for AI: by the numbers
2. Watch out! hype ahead: definitions & disclaimers
3. Machine Learning drivers: why is Machine Learning a ‘thing’ now (vs before)
4. Venture Capital: forming an industry, the AI/ML landscape
5. The One Hundred (+13) AI startups to watch in the Enterprise
6. The great Enterprise pivot: applying Machine Learning at scale
7. - where to go next -
Online survey of companies → Goal: Understanding the role of
artificial intelligence (AI) and machine learning across countries
and industries
• Evaluation: Which companies are active leaders in adopting or
piloting AI
The Boston Consulting Group, MIT Sloan Management Review, and the United Nations Global Compact joined forces to provide an inside look at how companies are dealing with sustainability issues: http://on.bcg.com/1Ci1R8l.
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
Collaboriamo con gli ingegneri di aziende capital intensive per combinare tecnologie innovative con un approccio pragmatico che aiuti a raggiungere risultati aziendali migliori.
As a society, we're in the age of transformation, yet we're applying old metaphors and running our transformations like software projects. Let's start to consider transformational change as a series of social movements.
digital transformation for manufacturing
Fourth Industrial Revolution technologies are driving innovation and the benefits of data-driven manufacturing are clear:
Predictive insights ✔
Advanced OEE ✔
Improved quality ✔
Satisfied customers ✔
Embrace your data's potential with Rawcubes' equipped data driven assessment and create an edge!
Accenture makes major investments in IT automation capabilities to advance to more intelligent and touch less IT operations, and business efficiency. Read more.
Solve for X with AI: a VC view of the Machine Learning & AI landscapeEd Fernandez
What you'll get from this deck
1. The M&A race for AI: by the numbers
2. Watch out! hype ahead: definitions & disclaimers
3. Machine Learning drivers: why is Machine Learning a ‘thing’ now (vs before)
4. Venture Capital: forming an industry, the AI/ML landscape
5. The One Hundred (+13) AI startups to watch in the Enterprise
6. The great Enterprise pivot: applying Machine Learning at scale
7. - where to go next -
Online survey of companies → Goal: Understanding the role of
artificial intelligence (AI) and machine learning across countries
and industries
• Evaluation: Which companies are active leaders in adopting or
piloting AI
The Boston Consulting Group, MIT Sloan Management Review, and the United Nations Global Compact joined forces to provide an inside look at how companies are dealing with sustainability issues: http://on.bcg.com/1Ci1R8l.
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
Collaboriamo con gli ingegneri di aziende capital intensive per combinare tecnologie innovative con un approccio pragmatico che aiuti a raggiungere risultati aziendali migliori.
As a society, we're in the age of transformation, yet we're applying old metaphors and running our transformations like software projects. Let's start to consider transformational change as a series of social movements.
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...AdNerds
A lot of industries have changed drastically since the arrival of the internet. Think of the music business. The Internet comes with threats and great opportunities, if you set the proper objectives and strategy.
In this presentation, we present insights in how sales managers and new bizz people can use tools like Facebook and LinkedIN to their benefit. Especially LinkedIN requires a completely different approach, since authority is only gained by participating fully. And having your sales manager be very active on a platform like LinkedIN makes them easier to find for your competitors. But not having them participate, is a threat as well...
At AdNerds - part of Proximity BBDO - we give advice on how to behave, how to set the proper objectives and how to define your strategy.
Business optimization | building your first million is easySurjeet Singh
Making your first million is easier with the help of these a few steps. you'll find that making millions in a few short years is not that much difficult as you think before.
Innovation Enablers: Culture, Community & Code Angel Diaz
IBM Cloud Innovation Forum - CA
Innovation Enablers: Culture, Community & Code
How to infuse a culture of innovation to advance digital transformation
In this session, Angel Diaz, VP Cloud Architecture and Technology, will share how enterprise clients are successfully instilling a culture of innovation in support of their organization's digital disruption goals. The session will include examples on how today's business leaders are cultivating workplace environments that drive continuous improvements, innovative thinking and reward employee-driven initiatives. How to instill and support a start-up culture within the Enterprise and why developer ecosystems are typically at the heart of digital disruption will be reviewed. Central to establishing a culture of innovation is a focus on the right code and right community. Specially, Angel will explain how an "open cloud architecture" has become the technology behind today's business imperatives and the foundation for tomorrow's competitive advantage. Angel Diaz will present a roadmap to innovations being delivered by IBM and open communities such as OpenStack, Cloud Foundry, Node and Docker. Angel will be joined by Stephanie Trunzo, PointSource, Chief Operations Officer, to share how top-performing organizations are applying these innovative practices in order to advance mobile application development, infrastructure and management practices within their organizations.
The latest study from the ADP Research Institute® presents key considerations for leaders to keep pace with the rapidly changing needs of a global workforce.
La présente étude a pour vocation de proposer un regard quantitatif sur les rapports de force entre candidats et partis sur Facebook dans le cadre de la campagne présidentielle française.
Pour élaborer cette analyse, Publicis consultants Net Intelligenz s’est associé à Pikko Software pour mettre en oeuvre une méthodologie propriétaire basée sur la collecte, l’analyse et la cartographie de dizaines de milliers d’interactions sur les pages Facebook officielles des candidats et partis représentés dans la campagne. En résulte une mise en lumière de la dynamique «sociale» des différents bords politiques.
You don’t need to be born with super-human strength or have mutant abilities. IBM Cloud Security Enforcer can give you the powers you need to be a Cloud Security Superhero.
Understanding strategy in innovation and technology oriented businessDurgarao Gundu
It is study of 3M strategy analysis. Its mission, vision, values, swot analysis, Porter’s Five forces Model, Core-Competency, Value chain analysis, Business level strategies.
Knowledge Management: Putting Information to Good UseSlideShop.com
Organizations and companies can significantly benefit from their people using, sharing and updating information. Here's a presentation about knowledge management and its life cycle.
More presentations: https://slideshop.com/Themed-Slides/
A quick presentation share that makes the argument that the future of education is increasingly digital, but the aims and foundational core of education remains the same.
Presentacion realizada en Argentina y Paraguay Durante Marzo 2014.
En Argentina por Faustino Sanchez. En Paraguay por Santiago Cavanna.
Trata sobre el problema de la presencia de vulnerabilidades en aplicaciones, el impacto que tiene en las organizaciones y la forma que se encuentra disponible para descubrirlas en forma temprana y facilitar su remediacion
Links disponibles en
http://www.santiagocavanna.com/segurinfo-2014-el-costo-oculto-de-las-aplicaciones-vulnerables/
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
View on-demand presentation: http://securityintelligence.com/events/ibm-2015-cyber-security-intelligence-index/
The cyber threat landscape is increasing in complexity and frequency. Organizations that have historically not been the target of cyber attacks now make headline news with large data losses and compromised transactions. Organizations need a clear point of view on how to respond to these threats, and one that incorporates not only the relevant technology but also the organizational changes needed.
Nick Bradley, Practice Leader of the IBM Threat Research Group and the X-Force Threat Analysis Team, and Nick Coleman, Global Head Cyber Security Intelligence Services outline what organizations need to do now and in the future to stay ahead of the growing cyber security threat.
Symantec's Internet Security Threat Report for the Government SectorSymantec
Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight Threat Management System, Symantec Managed Security Services, Norton consumer products, and other third-party data sources.
In addition, Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 60,000 recorded vulnerabilities (spanning more than two decades) from over 19,000 vendors representing over 54,000 products.
Spam, phishing, and malware data is captured through a variety of sources including the Symantec Probe Network, a system of more than 5 million decoy accounts, Symantec.cloud, and a number of other Symantec security technologies. Skeptic, the Symantec.cloud proprietary heuristic technology, is able to detect new and sophisticated targeted threats before they reach customers’ networks. Over 8.4 billion email messages are processed each month and more than 1.7 billion web requests filtered each day across 14 data centers. Symantec also gathers phishing information through an extensive anti-fraud community of enterprises, security vendors, and more than 50 million consumers.
Symantec Trust Services provides 100 percent availability and processes over 6 billion Online Certificate Status Protocol (OCSP) look-ups per day, which are used for obtaining the revocation status of X.509 digital certificates around the world. These resources give Symantec analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report, which gives enterprises, small businesses, and consumers essential information to secure their system effectively now and into the future.
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
A Time of Great Risk: The Time Between Compromise and Mitigation
In most organizations today, threat detection is based on various security sensors that attempt to look for anomalous behavior or for known signatures of malicious activity. These sensors include firewalls, intrusion detection/prevention systems (IDS/IPS), application gateways, anti- virus/anti-malware, endpoint protection, and more. They operate at and provide visibility into all layers of the IT stack.
90% of data that exist today was created in the past 2 years. This massive amount of data allows organizations to take a
more qualitative approach to business and customer
service, but also makes them vulnerable to a continually
increasing number of threats.
Palestra do evento "Cybersecurity: a nova era em resposta a incidentes e auditoria de dados"
Sam Maccherola - VP and General Manager Public Sector Guidance Software Inc.
Brasília, 04 de agosto de 2010
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
Cyber Security in business is all about protecting the data, not just the online data but also the offline data, from theft and any sort of damage. It includes the security of personal data, intellectual property data, protected information, sensitive data, government data as well as the data of various industries. It is a shield that helps in safeguarding the entire data of a business. Running a business is not everyone’s cup of tea and what makes it further difficult is the absence of cyber security. Let’s learn what impact this service has on the running of a successful business.
The frequency and impact of cyber attacks have escalated cybersecurity to the top of Board agendas. Institutions are no longer asking if they are vulnerable to cyber attacks. Instead, the focus has shifted to how the attack might be executed, risks and impact. Most importantly, their organisational readiness and resilience to such threats.
Think differently about security. Perimeter defenses are failing to protect customers. Hackers are getting smarter, more persistent and better organized. So must you.
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
El panorama de amenazas en evolución basado en nuestro ISTR (Reporte de Anual de Amenazas en Internet Vol. 24) recientemente publicado, refleja las últimas tendencias y cómo se aplican a Colombia y América Latina. Las principales tendencias de transformación digital, como la nube y la movilidad, junto con los nuevos desafíos de seguridad han cambiado el panorama de ciberseguridad por lo que la estrategia debe enfocarse en términos de riesgos clave, regulaciones y hallazgos sobre la madurez de la seguridad. Recomendaciones para enfocar y mejorar las posturas de ciberseguridad para abordar estas tendencias, incluidos los marcos clave, las tecnologías, los procesos y los cambios culturales son parte integral de los pasos a seguir.
What makes the next-generation firewall better than the traditional firewalls in protecting your data from hackers? Know more information from Netmagic!
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
View ondemand webinar: https://securityintelligence.com/events/qradar-investment-2016/
Helping you stay ahead of cybercriminals means our work at IBM Security is never done. With data coming from every direction to collect, you need real time and historical analytics to discover anomalistic conditions that often provide the early warning signs of an attacker’s presence. Join us to hear about new features in IBM Security QRadar that can provide you with better visibility into what’s happening on your network and new integrations that will help you multiply your investment and help speed your remediation efforts.
As cyber attacks and network hacks become increasingly sophisticated, not only do you have to set up security infrastructure complete with firewalls, anti-virus software, malware scanners and intrusion prevention, but you have to maintain all this stuff daily. It’s a moving target and you don’t have the time to do it full time! Enter managed security, also known as cloud-based or hosted security. See this slideshow snapshot of the presentation.
The GGV Capital Digital Economy Index looks at the IRR of publicly-traded ecommerce companies that are shaping economic performance in consumer industries ranging from ecommerce, fintech, education technology, food technology, wellness and health tech, and more.
The GGV Capital Digital Economy Index looks at the IRR of publicly-traded ecommerce companies that are shaping economic performance in consumer industries ranging from ecommerce, fintech, education technology, food technology, wellness and health tech, and more.
Lessons from US & China for Global EntrepreneursGGV Capital
Hans Tung, managing partner of GGV Capital who has been investing in startups across US and China for almost 20 years, shares his observations on tech in the US and China, and how entrepreneurs can learn from the world’s two most vibrant startup ecosystems.
Hans Y Combinator Presentation on Lessons from China for Global EntrepreneursGGV Capital
GGV Capital Managing Partner Hans Tung talks about lessons learned from China that can benefit global entrepreneurs. Initially presented at Y Combinator in October 2017
GGV Capital and Max Ventures co-hosted its second annual Evolving E NYC Summit in the heart of midtown Manhattan. More than 300 founders, executives, and investors of top consumer companies gathered to share ideas and insights on growth, culture and product. While the private event was off-the-record, we wanted to capture some key takeaways from the evening’s speakers to share.
On Thursday, March 9th, we hosted Evolving Enterprise, an afternoon event with top founders and leaders in SaaS. Here are some of the more memorable quotes from our speakers.
2016 was a standout year for entrepreneurs in the GGV Capital ecosystem. Our portfolio companies collectively completed more than $26 billion of M&A and IPO activity, raised more than $10 billion to fuel global expansion, and completed one new IPO (BC Pharma in China).
The year also marked expansion on a number of fronts for our firm. We announced the launch of GGV Capital Fund VI and our Discovery Fund with more than $1.2 billion in commitments. A big thank you to our Limited Partners for their continued support. Second, we added 16 new members to the GGV Capital team across the U.S. and China.
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016GGV Capital
Jenny Lee, Managing Partner, GGV Capital shared her insights on next generation wearables, transportation and robotics at the WSJ Converge conference in Hong Kong. Here’s the presentation.
Monetization in the US and China: Where to InvestGGV Capital
In this presentation, GGV Capital Managing Partner Hany Nada analyzes the differences in the US and China advertising markets, areas of opportunity and other methods of monetization.
In this deck we look at key industries being disrupted by mobile, including transportation and travel, online and offline commerce, and hardware and IoT.
A look at the shifts in focus in Silicon Valley as mobile has taken technology to a global scale. This presentation looks at the impact of mobile and emerging markets on how people consume and the disruption coming to traditional industries, such as food, CPG, and spirits.
Sales and Marketing 3.0: The High Velocity ModelGGV Capital
This deck looks at the evolution of the next model in enterprise sales and marketing: the high velocity organization. See how high velocity teams use technology, data and automation to align sales and marketing and drive faster leads and conversions.
2014 was all about...people. The world-class entrepreneurs who feed off the energy of the companies they are building and the industries they are changing.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. • 1 team in the US and China
• $2.6 billion under management
• 6 funds | 150+ investments
• 15 years | 27 IPOs
GLEN N SOLOMON
• Managing Partner
• 10 years at GGV Capital
• Enterprise, SaaS, Cloud, Security, Mobile
• goinglongblog.com | @glennsolomon
3. Cybercrime is a Growth Industry
Source: 2015 Verizon DBIR Report; ITRC ; HP 2015 Cost of Cyber Crime Study; The Global State of Information Security Survey 2015; McAfee Net Losses –
Estimating the Cost of Cybercrime
42.8M
Security
Incidents
5,810
Confirmed
Data Breaches
61
Countries
$445B
Annual Cost
to the Global
Economy
4. Data Breaches by the Numbers
Data Records Lost or Stolen in 2014
2,803,306 records lost or stolen every day
116,793 records every hour
1,947 records every minute
32 records every second
Source: SafeNet – The Art of Data Protection, Feb 2015
Only 4% of breaches were “Secure
Breaches” where encryption was used
and the stolen data was rendered
useless
6. Hackers & Their Weapons
Participants
Hackers
Hacktivists
Criminal Organizations
Commercial Vendors
State Sponsored Terror Groups
Available to Purchase
Hacking Tools
Zero-day Exploits
Credit Card Data
eCommerce/Social-
Media Credentials
Key Participants
Eastern Europe
Russia
China
US
Latin America
Source: RAND National Security Research Division
8. Common Threats & Victims
Identity Theft Phishing Social Engineering Cyber AttackCyber Extortion
When you protect your company, you need to focus on all possible weaknesses.
Hackers only need to find one way in…
9. The Corporate Challenge
Source: 2015 Verizon DBIR Report; BTIG Security Report – Attack of the Clones
Cloud-based
Applications
Social
Networking
Virtualization BYOD
83 million software
applications today;
141 million by 2017
Stolen or weak
credentials involved in
76% of cyber attacks
14% of attacks or
exploits are on cloud
services, applications,
or storage systems
Mobile security
breaches have
affected 65% of global
organizations in
the last 12 months
10. The Next Generation of Cyber Security
Source: BTIG Security Report – Attack of the Clones
Legacy Security Companies Next Generation Equivalent
Firewall/Intrusion Prevention System Next Generation Network Security
Antivirus Next Generation Endpoint/Malicious Detection
Web Gateway/URL Filtering Cloud Security & Data Protection
Authentication, Authorization &
Accounting
Identity & Access Management – The New Perimeter
Secure Event Management Security Intelligence & Analytics
Data Security Data Security, Discovery, Clarification, Control & Intel
Data Loss Prevention Inside Threat Protection
Governance, Risk Management &
Compliance
Compliance Automation and Data Governance
11. New Threat Vectors
Source: Immuniweb, Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
Social Media Protection
While email remains a
significant attack vector, 70% of
social media scams were
manually shared.
Advanced Persistent Threats
Zero-day exploits are almost impossible
to detect and will work 9 out of 10
cases because they have legal, financial
and banking industry experts,
psychologists, and even ex-law
enforcement officers behind them.
Insider Threats
Privileged users, such as managers with
access to sensitive information, pose the
biggest insider threat to organizations.
This is followed by contractors,
consultants, and regular employees.
Compromised account credentials, or
when someone’s account is hijacked, are
also a big part of this risk.
12. New Threat Vectors
Internet of Things
These hubs, switches, and
router are increasingly used to
target the network. They have
processing, storage, and
internet connectivity.
Mobile Security &
Protection
As more users rely on their
mobile devices, more spam,
scams, and threats are tailored
to these devices. Mobile
malware such as bootkits will
become harder to remove.
Critical Infrastructure
The most significant trend is the
use of malware to compromise
supervisory control and data
acquisition (SCADA) systems,
including Homeless
Management Information
System (HMIS), historians, and
other connected devices.
Source: Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
13. Approaches Over Time
1987-2009 2009-2014 2014 onward 2015 onward
Signatures Sandboxes Anomaly Detection Zero-Trust
APT
Attack Sophistication Level
Hammertoss, Black Energy, etc
Endpoint
Content
Network
Source: Based on Agari presentation material
14. Modern Security Challenges in the Cloud
Challenge: Corporate services are migrating to the cloud
Secure Application Access
Privileged Access
Management
Multi-Factor
Authentication
FirewallsNetwork Access Control SSO
Challenge: Dynamic workloads due to multi-tiered apps & virtualization, containers, micro-services, etc.
Protect Server to Server Interactions
Cloud Workload ManagementMachine Firewalls
15. Modern Security Challenges in the Cloud (cont)
Challenge: Employees on websites via HTTP and mail –some malicious
Securing Employee to Internet
Cloud Policy ManagementCloud Access Security Brokers SaaS Data Encryption
Challenge: Rapid development cycles leave little room for security checks
Web App Security
RASPsWAFs CDNs
16. Emerging Protection for Emerging Threats
Insider Threat Detection
Machine Learning to Spot Attacks
Industrial & Connected Device Security
17. Security Startups Raised $10.9B across 1074 Deals since 2010
Source: Momentum Partners, CB Insights