key cybersecurity , inc. 17959 dumfries shopping center suite b dumfries, va 22026-2490
DESCRIPTION
2Q 2014 Presentation. Key Cybersecurity , Inc. 17959 Dumfries Shopping Center Suite B Dumfries, VA 22026-2490 703.402.2542 Shawn Key CEO, President [email protected]. Accolades. Most Disruptive Solution – Security Category. Best of Breed – All Security Categories. - PowerPoint PPT PresentationTRANSCRIPT
Privileged and ConfidentialPrivileged and Confidential
Key Cybersecurity, Inc.17959 Dumfries Shopping Center Suite B
Dumfries, VA 22026-2490703.402.2542
Shawn KeyCEO, President
2Q 2014 Presentation2Q 2014 Presentation
AccoladesAccolades
Best of Breed – All Security Best of Breed – All Security
CategoriesCategories
Inaugural Cohort Member Inaugural Cohort Member
(Graduate)(Graduate)
Most Disruptive Solution – Security Most Disruptive Solution – Security
CategoryCategory
Cyber Tipline Provider
Enables agencies and organizations to identify unknown and known file activity typically undetected on the enterprise network and connected devices.
Provides capability to locate desired files algorithmically instead of by keyword, allowing for a paradigm shift in file location independent of file type or language.
™
“Understanding the file activity on your network is just a few clicks away…”
CyberMerlinCyberMerlinProvisional Patent No. 61/986,553Provisional Patent No. 61/986,553
ValueValue PropositionPropositionUndetected child pornography files are being stored on the network.
Compliance violationFines/FeesATO revoked
Corporate reputation is at stakeEmbarrassing headlinesRemediation costs
Privacy Information is being stored in the clear
Intellectual Property is being sent to or accessed by competitors
Corporate espionageCompetitor advantageFinancial loss
Locate files pro-actively, reduce liability, handle the issue internally
Identify PI, mitigate concern, ensure compliance with standards/regulations
Monitor file activity and “bad actors”, locate source of leak, remediate issue
Compliance violationFines/FeesATO revoked
Corporate reputation is at stakeEmbarrassing headlinesRemediation costs
“The Specialized Threat and Protection (STAP) market will reach $1.17 billion in annual revenue by 2017” - IDC
Legalities Legalities
"We are pretty sure we have child pornography on our network but if we find it, we have to do something about it and that becomes onerous and potentially costly."
Sarbanes Oxley Public Law 107-204: A section of the Sarbanes-Oxley Act that says a person is guilty of a felony, punishable by up to 20 years in prison, if he [sic] “alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States.”
Ignorance is NOT Ignorance is NOT BlissBliss
The American Bar Association Criminal Justice Section
Center for Continuing Legal Education
http://www.strozfriedberg.com/files/Publication/2ff70060-e3c5-43f8-bf98-024a2b4b3509/Presentation/PublicationAttachment/412a1aa4-562b-402d-800d-0097b96248b6/DigitalContrabandFindingChildPornintheWorkplaceWhiteCollarCrimeProgram.pdf
ABA/CCLE – Audio ABA/CCLE – Audio tracktrack
“The company must take steps to minimize its own liability risks from an employee’s illegal access to child porn, and those risks can loom large if the illicit images are mishandled.”
Simply ignoring the problem is not an option, not only from a moral perspective, but also as a legal matter: “doing nothing: could provide a basis for “hostile work environment” claims or may subject the company to civil suit by “any person aggrieved” by the possession of the images. Significantly, sticking one’s head in the sand also could expose managers to child porn “possession” charges or damage the companies reputation if unannounced searches and arrests of employees occur at the workplace.”
Circulating the child porn images internally or to outside experts to elicit multiple views about how to handle the situation may implicate “distribution” issues. Relying on in-house IT staff to investigate the problem also poses potential problems, including the possibility that they might inadvertently taint or destroy evidence, “leak” facts about the internal investigation, or “check out” web sites visited by the offending employee, thereby caching more illegal child porn onto the company network.”
If you've got a big company system, I can almost guarantee that you have child pornography on it…It's there somewhere.’’
- Kenneth Citarella, Deputy Chief of Investigations, Westchester County District Attorney's Office.
How Big is the CP Problem?How Big is the CP Problem?
November 21, 2013
“Child pornography is hidden on virtually every large corporate network, according to security experts.” - Internetnews.com
™
Detection Mode
Find unknown problematic and illicit files
Search Mode
Find all instances of a known file
Forensics Mode
Utilize file reports to augment forensic activities
Automatically Detects/Monitors/Alerts Compiles Forensic Reports Customization and “Webcrawling”
Capability Proprietary “Certainty Hash Value”
Differentiator Integrated Vision Technology (3Q 2014)
™
CyberMerlin FunctionalityCyberMerlin Functionality
CyberMerlin Server•Server stores file signatures, performs fast matching, provides communications to CyberMerlin user agents, stores and displays results of scans and much more.
CyberMerlin Web Console•Provides administrative access to a server, database management, user agent management and much more. Friendly browser user interface powered by Google Web Toolkit.
CyberMerlin User Agent•Downloadable agent performs multiple functions – it scans local filesystem and looks for illicit files, In secondary mode, it functions as a crawler to scan/load hashes from the web/cloud. Platform independent and works on Windows, Mac OSX, Linux and other O/Ss.
Current ActivitiesCurrent Activities
Dell Solutions Center (DSC)Create scalable, cloud based solution which runs ALL major platforms
Dell Appliance Group (NCS)Create revenue via the distribution of a new capability appliance based solution
Dell Entrepreneur in Residence (EIR) Applicant for the prestigious Dell Founders Club
Dell OEM Division Exploring the marketing possibility of CyberMerlin as a desktop OEM solution and/or a network appliance for K-12 organizations (CIPA/FERPA compliance)
DC InnovatesApplicant for DC based grant funding in the Tech Corridor (up to $200k)
Beta Customer and Strategic Partner Opportunities
CyberMerlin – National Exposure
Insert Pending Press Release (June 14th EST)
Executive Management and Advisory TeamExecutive Management and Advisory Team
Shawn R. KeyFounder15 years of Cybersecurity and Information Assurance product and services experience
Skip LawverFormer Cybercrime SMEProfessor Emeritus, Eastern Michigan University
Charles GoldC. Gold Strategic Marketing20 years software marketing experienceZal Azmi
Chief Strategy OfficerFormer CIO of the FBICEO, Nexus Solutions LLC
Dan WoolleyMach 37 General PartnerDell, Computer AssociatesCEO, Global Integrity
Informal Advisors (in contractual discussions)
Privileged and ConfidentialPrivileged and Confidential
On behalf of Key Cybersecurity, Inc., we thank you for your time and consideration.