2019 Global Security & Investigations Awards
The Packages
The Editor’s Choice Package: £2,495
• • • • • • •
Main front cover image Main front cover headline Four pages of editorial 2 Crystal trophies 2 Wall plaques 1 Personalised digital logo 1 Bespoke digital certificate Cyber-Attacks: Responding in Crisis
Cyber-Attacks: Responding in Crisis
By Andrew Vermes, Specialist Consultant at Kepner-Tregoe (www.kepner-tregoe.com)
experienced. A clever piece of marketing, since clearly it wasn’t their fault, and they presumably would have been able to claim back any losses from BA. Those businesses that are in a position to make a bold gesture during a crisis will allay a lot of consumer fears. For the technical teams involved, it’s important that business leaders support them to go an extra step or two in investigation: not just the cause of this data loss, but the cause of the cause.
those leaky computer systems to The biggest problem links in scam emails daily and they Encryption software is big busikeep that data on file, or might we with cyber-attacks toallow the use of unknown flash ness today and predicted to grow be safer spending the additional day, is that they come drives. We all live busy lives and to over $12bn by 2022. Some of five seconds to enter the numbers without warning, often that is how the small details this effort has been accelerated by each time we make a transaction? when you least exare ignored or missed. the GDPR regulations: not only do Hackers can only steal what’s pect it and they cause havoc and firms face enormous reputational Transparency and there after all. irretrievable reputational damage Consider this scenario: a user damage, but the EU fines regime protection in their wake. We saw it recently sees the dreaded blue screen. means that the penalties for losing As mentioned, most Another contributing factor is the with Marriott Hotels, an unknown Rather than reporting an incident, data are much bigger, up to €20m large firms dealing with desire of the attacked company to extent of data breach and one he reboots his system and carries or 4% of global turnover (whichmoney already have keep quiet about what happened. where the repercussions may be on. A couple of days later it ever is larger). For Marriott, that monitoring tools in place, In some scenarios it is possible felt for many years to come. Even happens again and again twice fine could amount to as much as but for efficiency, these that data encryption has preventtoday, scammers are making use the following week. Finally, one $900 million, though they may fall tools may not be turned up ed the hackers from making any of personal data that was acquired morning the laptop refuses to outside EU rules. full i.e. if we’re looking at the use of stolen details so you can after a Yahoo! data incident that start up. After MIS have taken it average transaction speed understand the desire to avoid occurred many years ago, where away, they report that they found When a cyber attack happens, and sampling every five minadverse publicity. Having said email details and passwords were 320 instances of malware on the there are a number of common utes, we can easily miss things. that, hiding (even for a short time), lost. The truth is, these kinds of laptop. Were there any signs? A mistakes that business make. As It’s usually quick and simple to is not only unwise, but under EU details are available on criminal degree of IT hypochondria would with other incidents, they may be turn these up to a much higher rules, also illegal. exchanges for cents per ID, and serve many firms well. too quick to jump to a conclusion sampling rate to detect unusual the impact and losses continue i.e. we found the malware, we activity, though there will be some Take control of the scene today. Preparing for the possibility a killed it,in job January done. However, if one establishing Ghost Systems, Inc. wasoforganised 2014, itscrime worldwide headquarters fails to analyse the exact behavIf a cyber attack strikes, when hack is vital and any business cost in slowing systems down and and NOC/SIC in Nevada, USA to support the Financialaddressing Services & Banking; Legal; Healthcare/ iour of the malware and show how the problem, the Large scale cyber-attacks for big with information that interacts with perhaps in getting larger storage that could have caused the specifmost important thing is to pay hotel groups like Marriott can have the outside world via the internet for the data harvested. ic alert that was noticed, one may attention to the precise behaviour the same impact as a burglar is always vulnerable and all large also be overlooking a second or of the system or database at the gaining access to a residents’ businesses have several layers of Every cyber attack is different who reveals the secrets behindthird the firm’s success. software agent that’s hiding moment the breach is noticed. room and because the details security detection and elimination. but the best advice for any major behind thepreventing first obvious attack. The principles are just like a crime can be used for years to come, Founded in 2014, and integrity while a team of highly experienced product or service failure is to be scene: youthe have to notice which claims from affected consumers Jumping to the wrong concluGhost Systems, unauthorised access or theft of specialists, using best-intransparent, focus first and foreHackers can only take is way thetechnologies body is lying and can continue for a long time and sion Inc. established digital information – whether in- whatclass patented that the most on protecting your customer available angle bullet entered in order potentially run to billions of dollars. Multiple reporting tools will flag up or at-rest. its worldwide flight are robust andthe secure. and be open about that. Any Going off track during a crisis to build the investigation. So the Worst of all the downside risk is any unusual attempts headquarters and to access attempt to control the news leakis cooperation commonplace, sometimes questions are: How exactly was not really calculable and a brand Multiple defence tools Ghost are NOC/SIC data. in Nevada, USA to – in with a “To ensure we succeed in our ing out will go badly. If you’re in the issue companies starts way before the noticed? in this situation can only hope that the also used to Services isolate malwaredozen and bellwether support Financial mission,the thebreach company uses In what way any doubt about the security of a attack, for example GDPR has was the system behaving unusubanks, credit agencies and & theBanking; killLegal; it quickly and those tools are Healthcare/ – developed industry-specific six-sigma processes. Where service, the most obvious course given European firms a jolt and ally at that fit time? general public themselves will do usually Infrastructure kept updated by Pharma; Critical & an army workflows. Each workflow six-sigma doesn’t our business of action is to shut it down to avoid made them think about how much enough to limit the damage.Energy; Mid-Market of expert developers Enterpriseand security is easily added to existing processes, we have companyany more people being affected. personal data they really needdeveloped to Responding quickly while under vendorsofwho are watching what and The Internet Things (IoT) enterprise environments, processes specifically hold. Hotels may way needtoto check pressure can be difficult, but one The largest threat today ismarkets users –the are up to. Likewise, in thehackers most vulnerable providing an economical tailored to our business. passports shared of foreign guests, positive example this year came Many authorities believe that the every bank today, there are many markets for cyber-thefts today. ensure allthe information and do they secure. really need to keep Express, following largest threat to cyber-security is hundreds, probably thousands, stored is but absolutely “Our keyfrom to aAmerican successful those details on file? the BA hack: within a day, the users and their lack of attention of attempts to hack into systems Ghosts’ SafePlace Ecosystem™ There is no other holistic execution is smart, hardhad contacted all of to detail. It seems unbelievable every vast majoritysolution of is designed fromday. the The ground available today that working company people throughout We as consumers continue tothe organisation. their card With usersthese and said they had that so many people still use hack attempts are taken out employs by a upbasic to be resilient and “Secure proprietary technologies the convenience button started monitoring to passwords in many instances. first linetightly of defence and those by Design”. The tothat providereach suchfor a highly people in place,enhanced Ghost functions too oftennetwork allow providers like to an efficient protect them fromand unusual transDespite the numerous warnings it to a second line, will resilient, be integratedmake Ecosystem – secure andand secure machine integrated and secure from the and the security training many of network store our credit card details forsuccessfully the actions and also that they would investigated and the mesh coupledthoroughly with & communications ecosystem executes programs ground up to provide the finest us have today, people still open next “The time. Internet Are we happy to allow cover losses their customers tools updatedflexible accordingly. – Ghost built Jibberish™, a secure, of that meet our any customer’s cyber-security solution available. and user definable interface, Trust™.” requirements. which has been third-party When discussing the industry in approach became more difficult tested/ and is impenetrable – Beginning the interview, Don “As for what differentiates us his region currently, Don provides 28 CORPORATE VISION Issue 1 2019 to manage and significantly less virtually guarantees network starts by explaining the firm’s from our competitors, staff and us with an overview, going into effective at blocking legitimate infrastructure and the information overall mission, the steps Ghost technology are Ghosts two detail about the challenges threats. Existing cyber-security that is transported across it is Systems, Inc. undertake to primary differentiators. Ghost and outside influences that are problems telegraph what’s secure. ensure the clients receive the has a world-class business affecting it. needed for security in the future. best possible outcome, and what and technology team including Specifically, enterprises need When installed into an differentiates the company from several of the finest developers “Security architectures largely a comprehensive solution that organisation, the SafePlace competitors. of cyber security technologies grew organically over the past offers scalability, protects against Ecosystem “Ghostifies™” the in the world today. These team ten years, as organisations both known and unknown network and the company that “Here at Ghost Systems, Inc., members include; a co-author of addressed a variety of new threats, automates manual is connected to it, creating a our mission is to authoritatively the Orange Book, a distinguished threats and tactics. This processes, and replaces a SafePlace™ in which to safely develop and maintain a holistic, cryptography and identity expert, resulted in an army of deployed patchwork of ineffective tools communicate with customers, future-proof cyber security and the designer of the first-ever technologies like firewalls, IDS/ with an integrated set of security partners or entire communities infrastructure – the SafePlace distributed OTP. Our technology IPS, network proxies, gateways, services – in short, they need the of common interest. This Ecosystem™. The SafePlace is unmatched in the world sandboxes, endpoint suites, Ghost SafePlace Ecosystem.” dramatically enhances the Ecosystem™ is built to the very today. SafePlace is a holistic, etc. Over time, this patchwork data availability, confidentiality, highest modern standards by cyber-security ecosystem, fully
continues to get worse as they Looking ahead to what the future CORPORATE VISION / Issue 1 2019 gain more knowledge and holds for Ghost Systems, Inc., experience. Don reveals what developments he foresees within the industry, “Ghost continually builds cyberand how the firm will adapt security solutions capable of around these changes. preventing their attacks. We invest heavily in R&D, constantly “Cybersecurity as a whole, is updating cyber-defences ever-changing. Cyber-criminals using modern techniques and continually invest $billions technologies to mitigate cyberdeveloping malware. As a result, attacks. We continually strive they are very successful pulling to change the fundamental off large cyber-thefts costing dynamics of the war between billions of dollars in damage and cyber-criminals and the good personal losses to hundreds guys, making the Internet, private of millions of individuals. This
or public networks safer places
29for people and businesses to
interact, having a positive impact across the World.”
Contact: Don Ritzman 865 Tahoe Blvd, Suite 214; Incline Village, Nevada 89451, USA Primary Phone: 001 831 459 8199 Web Address: www.ghost-systems.com
CORPORATE VISION / Issue 4 2018 49
48 CORPORATE VISION / Issue 4 2018
2019 Global Security & Investigations Awards
Company Name Awards Title
2019 Global Security & Investigations Awards This is to certify that:
Company Name/Logo Have Been Named:
Award Title
CERTIFICATE
The Gold Package: £1,495
• • • • • •
Supporting front cover image Supporting front cover headline Two pages of editorial 1 Crystal trophy 1 Wall plaque 1 Personalised digital logo
Mar19528
Cyber Future Nucleon is a cyber security startup, founded by an experienced team of security professionals. Following their success in CV’s 2019 Corporate Excellence Awards, we profiled Nucleon and caught up with Director of Sales, Roy Heller who provided us with a glimpse into the Founded in 2016 to provide proactive cyber technologies for organizations, Nucleon specializes in collecting and analyzing cyber threats on the internet. In addition to this, the firm also provides organizations/governments with proactive technologies that compliments their existing cyber security tools, enabling them to defend against new and emerging threats. Nucleon’s cyber intelligence framework also fits to SMB, enterprise and MSP/MSSP. Serving to a diverse range of clients from governments to software vendors, Nucleon technology has the capability to cater to all. Going into further detail, Roy begins by informing us of how the firm approaches clients and how they ensure they deliver a service which meets their requirements. “Here at Nucleon, we serve a variety of clients. From governments who want to enhance their cyber security defence abilities are using Nucleon, to software vendors of cyber security tools who are also using Nucleon technologies to improve their products. Among the clients there are also Banks, Telecomm companies and ISPs, to name but a few. “Nucleon also offers Cybercure. ai which provides basic cyber
feeds for free. Cybercure is aimed towards both small and medium business who are looking to implement basic proactive security measures. In addition to this, Cybercure has a bi-weekly podcast that covers cyber news from around the world for non-technical people. Today, less than a year since the launch of Cybercure.ai it has thousands of active users using the service regularly.” Nucleon is based on innovative technology that was developed specially to be used for cyber intelligence gathering and analysis. When discussing the qualities which enables the firm to be the success as we know it today, Roy is keen to highlight the ways in
which Nucleon is able to tailor its services and solutions to the requests of clients, as well as ensuring that the result is beneficial for all involved. “What enables Nucleon to be a unique entity is the ability of the system to autonomously identify threats on the internet and alert clients, even if those threats are new and never seen before. By using Nucleon technology, any organization can protect its cyber assets similar to how a large government does. “Currently, there are numerous organizations and governments which are using Nucleon to receive constant feeds of cyber
security indicators that can be used to block attacks. As a result of using Nucleon, clients can have a cyber intelligence service without investing a huge budget in setting up its own threat intelligence team.” Looking ahead to what the future holds, Nucleon’s unique technology is changing the cyber security industry by using machine learning and advanced algorithms that can work and calculate data much faster than any human. Bringing the interview to a close, Roy signs off by revealing the exciting plans in store for the team at Nucleon, especially following their recent success where they were recognized in Corporate Vision’s 2019
Corporate Excellence Awards as 2019’s Most Cutting-Edge Cyber Threat Intelligence Company. “During 2019, Nucleon started to supply ‘All In One’ cyber security appliances that enables SMBs to implement threat intelligence and become immediately proactive by simply plugging the device to
the network. To make the offering more compelling, in corporation with European partners, the security appliance is now offered by one of the biggest insurance agencies in Europe, allowing clients to easily and simply gain additional protection to their networks and have it monitored for them 24x7. Additionally, clients
also to get restitution in case cyber security incident is happening.
on handling and stopping threats instead of searching for them.”
“Nucleon is rapidly growing whether it’s to cyber insurance clients or other clients such as governments who are using Nucleon to gather for them intelligence, allowing them to keep their intelligence teams focused
Contact: Ann Su Address: Tampa, 33607, Florida, USA Telephone: 1 813 766 4624 Web Address: www.nucleon.sh
CORPORATE VISION / Issue 4 2019 31
30 CORPORATE VISION / Issue 4 2019
2019 Global Security & Investigations Awards
Company Name Awards Title
2019 Global Security & Investigations Awards This is to certify that:
Company Name/Logo Have Been Named:
Award Title
CERTIFICATE
The Silver Package: £995
• • • • •
Your logo on the Front cover One page of editorial 1 Crystal trophy 1 Personalised digital logo 1 Bespoke digital certificate
Jan19189
MetaCompliance is a global leader in the provision of cyber security and privacy compliance
Established in 2005, MetaCompliance has a state-of-theart product range directly addresses the specific challenges that arise from cyber threats and corporate governance. The firm’s overall mission is to help organisations keep their staff safe online, secure their digital assets and help protect their reputation and brand. In order to achieve this, the team at MetaCompliance have developed a cloud platform that combines key pieces of software functionality. Geraldine begins by informing us of the key the firm specialises in and how their knowledge has proven to be a success within the industry. “Here at MetaCompliance, we provide a one-stop shop for staff awareness and privacy. The platform delivers the highest quality cyber security and compliance e-learning content available on the market. Its ease of use, engaging user experience and regularly updated content ensures staff satisfaction; and enables cyber and compliance professionals to easily track implementation progress and demonstrate ongoing accountability. “We help businesses transform their work culture, because of this we also find it important to cultivate a positive work culture of our own. We are on an exciting
journey of growth, building on our already impressive technology portfolio.” Speaking of the team, MetaCompliance’s passionate team of individuals form the backbone of the successful firm. When discussing the internal culture, Geraldine is keen to highlight the significant role the team play in the successful of the firm. “Ultimately, our employees are at the heart of our business. We believe that our staff should be allowed the opportunity to grow
fast within our organisation, sharing their ideas for the development of the business and how we can provide the best service to our clients.” Looking ahead to what the future holds, Geraldine signs off by revealing the exciting plans which lie in the pipeline for the firm, which include securing new business opportunities across the world. “As a business we are scaling fast, and our cloud-based software is proving extremely popular due its flexibility. Not only
has it enabled us to solidify our position in the UK and Ireland, it has also enabled us to seal new business in other regions across the globe including North America, Latin America, Europe, Asia-Pacific, and the Middle East.”
Contact: Geraldine Strawbridge Address: 89 Worship Street, London, EC2A 2BF, United Kingdom Telephone: 02871359777 Website: www.metacompliance.com
22 CORPORATE VISION / Issue 2 2019
2019 Global Security & Investigations Awards This is to certify that:
Company Name/Logo Have Been Named:
Award Title
CERTIFICATE
2019 Global Security & Investigations Awards
Company Name Awards Title
The Bronze Package: £625
• • • •
One page of editorial 1 Crystal trophy 1 Personalised digital logo 1 Bespoke digital certificate
2019 Global Security & Investigations Awards
Company Name Awards Title
Dec18137
Delivering Results services the team provides. Having started as a tech start up, Digiryte assembled a dream team of highly skilled and experienced innovation consultants, growth hackers, designers, developers and data scientists capable of building innovative cloud-based solutions using the latest in technology. This high calibre team is the USP of Digiryte and the secret behind it has had success so far. At Digiryte, the team specialises in four key areas: •
Digital Transformations – Which is helping organisations to automate processes and effectively implement technology to improve efficiency and productivity. Ability to provide a complete service from initial analysis to consultation, development and deployment.
•
Web and Mobile Application Development – From simple websites to complex cloud-based systems and bespoke mobile applications, the firm’s team’s expertise range over a broad spectrum and include technologies like Artificial Intelligence, Machine Learning, Blockchain and IoT.
•
Data Science – Identifying the right metrics to ensure they lead to sound data driven decisions, and help organisations drive growth based on solid facts rather than assumptions.
•
Staff Augmentation - Digiryte can offer access to its highly sought after pool of resources at very affordable rates for both short and long term projects, allowing organisations to build specialist teams quickly and scale them as needed without long term commitments.
Helping the firm to deliver excellence within these four core areas, is the dedicated team who not only form that backbone of Digiryte, but who are also are a key factor into the firm’s overall remarkable success. Over time, the firm’s culture, positive environment, high autonomy and focus on innovation has attracted
individuals from the likes of McKinsey and Co., Accenture, Cognizant, IBM, Amazon, PayPal, Caterpillar, Zoho, Unilever and more. At Digiryte, the firm are very particular in the people that they take on board, and at the moment are hiring 1 in over 100 interviews that they are doing. Looking ahead to what the future holds, the team at Digiryte will continue to deliver their exceptional services to their clients, especially following their recent success in Corporate Vision’s Corporate Excellence Awards 2019 where they were righteously awarded the accolade Leading Specialists in Web and Mobile
Application Development 2019 – UK. Moving forward, the team at Digiryte aim to be one of the most trusted and future focused Technology Consulting firm in the arena, with a clear goal to bring positive change in the industry through a client centric service and innovative solutions.
Address: Peter House, Oxford Street, Manchester, M1 5AN, United Kingdom Telephone: +44 161 706 7983 Website: www.digiryte.com
12 CORPORATE VISION / Issue 1 2019
Complimentary Package: (Free of Charge)
2019 Global Security & Investigations Awards This is to certify that:
Company Name/Logo
•
As online listing in our A-Z Directory on the Global Security and Investigations Awards Page.
•
Access to the official Global Security and
Have Been Named:
Award Title
CERTIFICATE
Investigations Awards Press release