Vol 01 | Issue 03 | 2020
The 10 Most Trusted
Cyber Security Companies to Watch 2020 INFRASTRUCTURE TRANSFORMATION
AI MOVING TO
WARDS
TRANSFORMATION OF INDUSTRIES
INFRASTRUCTURE TRANSFORMATION
AI MOVING TO
WARDS
TRANSFORMATION OF INDUSTRIES
DIGITAL IMMUNITY
Revolutionizing Cyber-Threat Protection for Operational Technology
John P. Murgo Founder, CEO
Editor’s Desk A
friend: Hey! Why are you covering your laptop’s webcam with a tape?
Me: Because I don’t use that. (Sarcastically)
Into the Shady World of Cyber Security!
Friend: Is this a real reason? Or there’s any more reason attached to it? Me: Please, don’t tell me that, you are unaware of hacking of cameras of your smart devices, which can be used as a monitoring system against you! Friend: Wow! Something like the movie Snowden? Me: Yes! But that's the problem, most of the smart device users are becoming un-smart with each passing day. And as usual, my friend got upset and left the conversation unfinished. However, it’s a fact that, shady people around the globe are taking the advantages of our ignorance, and the worst part is, this phenomena is growing with each passing day.
Privacy is a myth!
There might be a hacker, with a high end pc or laptop who can wipe out your bank account from thousands of miles away. Wait! Wait! This is not the worst part, the worst part is, hacking of IoT devices, smartphone, laptop cameras and microphones, which can eventually be used to track you by turning your high-end smart lifestyle device to a spying tool. Already frightened? Don't be! Think, you are going on a date in your beautiful electric autonomous vehicle, which is definitely a head-turner. But, one fine moment you realized, you have lost all the control of your vehicle and the car is being controlled remotely, just like any RC toy. Sounds like a Sci-fi movie! Right? But, it is now possible in real time! And this can become a big threat to the road safety. So, the next question arises, who are behind all these attacks? The answer is, there might be lone wolves, or a group of hackers, or just state sponsored attacks.
As an example, Sony Pictures Entertainment was hacked back in 2014, by a group named Guardian of Peace. Later the hackers stole huge information from Sony and leaked various classified information to the journalists. Then the group demanded to stop the release of a movie named “The Interview”, which shows the assassination of the North Korean supreme leader. However, the movie was released later in selected theaters and online. Since then the US government demands, it has strong evidence that the attack was planned by hackers backed by North Korea. So, now you might think how one can find out that his/her device has been compromised? The sad part is majority of organizations find out a cyber-attack because someone else has notified them about it. Most types of attack are often gets noticed in a jiffy, mostly because they lead to public disclosure, fraud or even resource utilization through DDoS. On the other hand, state sponsored attacks rarely make any noise at first. However, these attacks often cause massive disruption which eventually triggers suspicion or trigger detection. Most of the times, these attacks are being carried out with the intent of espionage and stealing important government data. At the end one can easily say, you can buy a device as much costly as you want, but it still won’t be completely secure and the hackers will eventually find a way to crack open the security systems. So, just be cautious while using any public Wi-Fi, or installing any unknown app in your phone or software in case of your PC. Always try to update your devices with the latest software possible. All these will eventually lower the risk of getting hacked or being watched.
Bhushan Ghate
CONTENTS ARTICLES Editor’s Choice 22 3 Remarkable Innovations in the Field of Printing Business
Industry Trends 38 KeyPOS Trends Reshaping the Retail Sector
COVER STORY
08
DIGITAL IMMUNITY Revolutionizing Cyber-Threat Protection for Operational Technology
BeecherMadden 18 Combining Talent with Excellence
CybeReady 24 Best Autonomous Cybersecurity Training Platform for Enterprises
Cytegic 32 Creating a Benchmark in Cyber Insurance Management
Eclypses Inc. 36 A Next Gen-Cyber Security Company Revolutionizing Digital Data Protection with MicroToken ExchangeÂŽ (MTE)
Leadership Column 16 Is the Single Brand Dead in MPS?
Tech-Know Insights 28 What a tech CEO can teach your business about digital?
Editor-in-Chief Pooja M. Bansal Managing Editor Anish Miller
Executive Editor
Assistant Editors
Kaustav Roy
Jenny Fernandes Rohit Chaturvedi
Visualizer
Art & Design Director
Associate Designer
David King
Amol Kamble
Kushagra Gupta
Co-designer Shweta Ambilwade
Senior Sales Manager
Business Development Manager
Kshitij S
Peter Collins
Marketing Manager
Sales Executives
John Matthew
David, Kevin, Mark, Sagar
Technical Head
Business Development Executives
Jacob Smile
Steve, Joe, Alan, Sanket
Technical Specialist Aditya
Digital Marketing Manager Marry D’Souza
SME-SMO Executive Prashant Chevale
Research Analyst Frank Adams
Database Management Stella Andrew
Circulation Manager Robert Brown
Technology Consultant David Stokes
sales@insightssuccess.com January, 2020
Follow us on :
www.facebook.com/insightssuccess/
www.twitter.com/insightssuccess
We are also available on : Copyright Š 2019 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success.
DIGITAL
IMMUNITY Revolutionizing Cyber-Threat Protection for Operational Technology
Thebased only Bioinformatic endpoint protection that
‘‘
uses the systems’ own DNA to protect runtime memory and prevent cyberattacks and exploits.
COVER STORY
John P. Murgo, Founder, CEO
A
team member and wellrespected Biologist and Computer Scientist began to think about the relationship between computer software and biology. He discovered that just like genomics has a unique DNA that identiďŹ es them, so does software. He started to combine the research of Bioinformatics and Computer Science to ďŹ gure out how he could identify the unique DNA of software executing in memory. After 10 years of diligent research and advancements in technology, the concept of mapping the DNA of applications and operating systems software, combined with the technology to use that DNA to protect the integrity of executing code became possible. At that time four years ago, John Murgo took that concept and technology and turned it into a commercially viable company, Digital Immunity. John understood from the beginning that chasing exploits and trying to identify malicious code was a losing battle. There are too many attackers (and nation states), with many creative people and good ideas. The only way to truly protect a system in memory
was to monitor and protect its DNA (how it is supposed to work) at every step of its execution. Digital Immunity, an IQT Portfolio company that is revolutionizing cyberthreat protection, bridges the gap between real-time threat prevention and 24/7, mission critical environments, so security no longer takes a back seat to production. Digital Immunity provides advanced cyberthreat prevention in Operational Technology (OT), as well as controlled, mission critical Informational Technology (IT) environments, with no impact to production or system performance. John is the Founder and CEO of Digital Immunity. He has worked with hypergrowth technology companies for all of his career. From Acronis where he was an executive during its historic rise to become one of the leading recovery solutions on the market, to sitting on the board at a number of OT/IT solution companies, John understands what it takes to motivate and move from idea to market viability in short order. In an interview with Insights Success, he shares his valuable insights on how his company is revolutionizing cyber-threat protection
‘‘
DI is an In-Q-Tel Company, the investment arm for the US Intelligence Community.
Below are the highlights of the interview: Could you throw some light on your mission and vision statement? Our vision is to immunize every computer in the world, providing runtime memory protection from any and all exploits and attacks. Our mission is to stop cyberattacks while shielding good processes from any impact. We serve industrial clients protecting OT and mission-critical endpoints from attack. We mitigate the risk of cyberattack and defer the risk of system patching and upgrade by hardening the operating system and related applications. By mapping the DNA of every application and operating system, we leverage a Bioinformatics and zero-trust approach to protect good processes and stop attacks. Describe your company and its cutting-edge cyber security solutions which address all the needs of your customers. Our technology is built to protect endpoints at the point of attack, in the memory of the system at runtime. We extract the DNA of trusted applications and operating systems. In memory during runtime on the protected endpoint, we continuously verify the integrity of executing code by comparing the trusted DNA against the actual executing code. If any code tries to execute that does not match the known good DNA we reject it and shield the good applications and processes to continue to run uninterrupted. We are the last digital mile of protection against attack.
‘‘
Describe in detail about the work culture and the values that drive your company. The work culture at Digital Immunity is open and inclusive. We are still a relatively small team, so it is easy to ensure everyone understands our vision, mission, goals and strategy. Everyone at Digital Immunity is passionate about what we are bringing to market; we all fully believe this is game-changing technology. We thrive on bringing value to our clients, innovating and collaborating with our clients and partners. How are you contributing in the evolution of the cyber security industry? Our contribution to the industry is to advance the Bioinformatic technique of true protection that doesn't require knowledge of an attack, or attacker. We are evolving end-point protection to be a critical element that is viable in legacy and mission-critical systems where other approaches do not meet the requirements. The zero-trust approach is simply an understanding of what is good and therefore extends, through a deterministic approach, to stop what is bad. Digital Immunity is changing the game, providing an advantage to the defenders and removing any points of attack. What technologies are you leveraging to make your solutions resourceful? We have fully developed all our technology and have 8 patents and more on the way. DI can integrate with and complement the defense-in-depth strategy of our customers. From a
Digital Immunity prevents cyber-attacks from impacting manufacturing uptime, productivity, and revenue.
deployment perspective, DI is flexible, can be deployed on premise or in the cloud, and integrates with existing workflows to be easily maintained by non-cybersecurity professionals. What are your company’s future aspirations? What strategies are you undertaking to achieve those goals? Our aspirations are to have our technology deployed in protection of the OT and mission-critical IT endpoints across industry. We strive to promote the zero-trust model and make our Bioinformatic approach to DNA mapping the de facto standard of endpoint protection. We are partnering with technology companies and service providers to scale faster; a founding member of the ISA Global Cybersecurity Alliance to promote best practices; and an active member of the ICS cybersecurity community. Testimonials A client in the life science industry is implementing Digital Immunity to defer the risk of patching and legacy system upgrades and said “we were looking for something to make
patching irrelevant in OT. I think we found it in Digital Immunity.” Through a deep analysis and assessment of all available technology, Digital Immunity was the only company that can deliver the best protection, securing the OT and mission-critical IT endpoints while shielding the good processes to sustain production without any impact from attempted cyber-attacks. “We’ve just started implementing the solution and it has already done it's job stopping an attack that made it through every other protection we have in place.” “Having a tool that gives me visibility of all IT and OT traffic is the first step so I know what to protect. Coupled with that, Digital Immunity is the most important investment. It is superman armor to those industrial applications that are running on the floor. It is the only technology that I know that truly changes the game of not having to patch on a high basis. We can prioritize production and use maintenance windows to do updates, all while remaining secure with DI Protect.”
STAY PRODUCTIVE, STAY SECURE
Subscribe to Insights Success and get a chance to know core information about businesses, technologies, and world class leaders.
VOL 09 | ISSUE 10 | 2019
The
Successful
Businesswomen to Watch 2019
+
Safeguarding Small Businesses through Comprehensive Risk Management
Vol. 11| Issue. 04 | 2019
20 The
most Successful
Businesswomen TO WATCH
Kim Davis Creating a People-centric Work Culture
KIrSTEN BAY
"Choose Excellent, Choose Insights” Subscribe to Insightssuccess Get Insightssuccess Magazine in print, & digital on www.insightssuccess.com
Global Subscription $250.00
$130.00
$70.00
$25.00
1 Year
6 Months
3 Months
1 Month
(12 Issues)
(06 Issues)
(03 Issues)
(01 Issue)
“Presenting a world class league of leaders”
IS THE
SINGLE BRAND Dead in MPS?
I
f you are an MPS provider, you may have realized the “single brand from a single vendor” solution is falling out of favor with end customers. So, what has changed and is MPS a sustainable offering? As of 2018, we are 20-years into the bell curve for MPS. For many years, prospects were first time buyers who viewed their environments as messy. Printers and copiers were everywhere from different manufacturers and vendors. Control was distributed among departments, Facilities, and IT. Acquisitions methods were just as diverse and included purchases, leases, contracts from local dealers and national supplies resellers. Print was a big mystery to customers. They had no idea how many devices they had, how many pages they were producing or how much they were spending. They needed a clear picture of what they had and potential solutions. Then they struggled with satisfying all stakeholders and gaining consensus on a final solution. Projects were time consuming, political and even risky for the project lead. You played a valuable role as an MPS vendor. In the customer’s eyes, you were the expert who taught them something new and showed them a path forward. You offered expertise and people to find out what they have today and were able to develop a complex solution. The journey took many months from concept to assessment to proposal. You earned the role of trusted advisor so it was only natural that the customer would see a “single brand from a single vendor” as the best available solution. Pricing changed. You wrapped up the solution into bundled pricing that simplified costs for the end customer and
16 | January 2020
enabled you to shield pricing for hardware, maintenance and supplies. After all, there were managed services wrapped around all products so the customer agreed with the bundled pricing format. Bundled pricing enabled you to work with margins behind the curtain. Come decision time, the customer realized that Implementation would affect every user and the potential cost savings put it near the top for cost-savings initiatives. These two factors elevated the project to the most senior management levels for approval and executive sponsorship. The sales cycle got longer but the project became more important to more people. The final result was often a case study of successful transformation from a messy environment to a lean, managed print environment. So, what changed in recent years? The MPS market had certainly matured. Customers had lived through the transformation from unmanaged to managed. With the end of their first MPS contract came a new perspective and different buyer attitude. The customer was no longer sick and in dire need of expertise. Their fleet was no longer messy. Devices had been consolidated and processes streamlined. Customers had clear visibility to what they devices they had, how many pages they produced, and the total cost of ownership. The mystery was solved. Your role changed. In many cases, the customer was more experienced in real-world MPS than your sales team. Sales people struggled to teach customers something new, something of significant potential value. Talk of potential cost savings by switching vendors was no longer compelling – the big savings had already been taken. The MPS story from one vendor sounded the same as the other
www.insightssuccess.com
Leadership Column
vendor – in fact, the story sounded exactly the same as the one told years earlier by their current MPS vendor. Now the end customer was asking about your ability to support their existing fleet, to do repairs and provide consumables. The potential for placing your new hardware was not clear. These new MPS opportunities felt like they belonged more to the vendor service and inside sales teams than to the account sales department. The customer was now clearly in control and driving the sales process. In the past few years, many dealers have exited the MPS market and refocused on their traditional selling motions. They found MPS operations different and costly. Sales reps were harder to train and it took longer to get them hitting quota numbers. So, like a rubber band, dealers re-focused on their core competency. So, what does the future look like for those dealers wishing to stay relevant in the MPS market?
Ben Harris Founder
Harris Technologies
It is time to look inward to tackle five key obstacles to growth and profitability in MPS: • Redefine your value and how you will educate the customer • Define a strategy for pricing and supporting both OEM and compatible supplies • Justify managed services independent of products • Learn how to participate in an open sourcing model • Decide if a fragmented customer environment and sourcing model is good business The days of single brand and single vendor are gone. Sourcing methods have changed dramatically for everything – including print – and the pace of change is accelerating. Vendors must rethink the value provided and how to educate the customer. MPS vendors will still spend months doing assessments and proposals only to be faced with the purchasing process that would unbundle pricing and force transparency to price by product category. The decision then is can you re-invent your practice to enable you to participate in this new arena and win – profitably.
www.insightssuccess.com
ABOUT THE AUTHOR Ben Harris is the Founder of Harris Technologies, Inc. Ben Harris enjoyed a 15 year career in corporate sales, selling and implementing large contracts to Fortune 500 companies around the country. In 2006, he decided to begin a new journey, leaving the big office and tie to start up his own firm. After years of perseverance and dedication, Harris Technologies has become a recognized leader in their space.
January 2020 | 17
Cyber Most
The
Trusted
Security
Companies to Watch 2020
BeecherMadden Combining Talent with Excellence
I
n the field of cybersecurity the demand for skilled employees is incredibly high. There are too many jobs for too few qualified workers and to fill these jobs, businesses are forced to think out of the box and look to professionals who truly understand this market place. To fill this recruitment gap, BeecherMadden is a leading niche recruitment company with the track record of excellence in the recruitment of cybersecurity professionals. BeecherMadden addresses the talent shortage within cybersecurity by helping companies find the right people for them. There is a huge mismatch where people who want to enter the industry don’t know where to start. It is also hard for companies to differentiate themselves as a place to work, when so many companies are hiring. It helps them solve both of those issues with traditional and new recruitment techniques. The company wants to be the number one cybersecurity recruitment company across the US and the UK. According to the company, “We are the authority on cybersecurity recruitment. What that means to us is being the top performing supplier for our clients, to have our candidates refer and recommend us, a market leading net promoter score and a turnover of $50 million. One of our values is People First and having a team of people who love working for us, as well as with us, is key to delivering our vision.” An Influential Mind Karla Reffold founded BeecherMadden in 2010 as she saw a gap in the market for someone to truly specialize in cybersecurity. Recruitment isn’t always done well, and she knew that they could do well by rectifying this. She has guided the company through its growth and through an acquisition, which has enabled faster expansion. The market data that Karla and BeecherMadden produce, helps companies make better hiring decisions. The data focuses on the job market and trends, with a real focus on how companies can improve their diversity. In 2019, the company was named as The Security Recruitment Company of the Year and Karla 18 | January 2020
www.insightssuccess.com
“
BeecherMadden is an award-winning recruitment business, with a track record of excellence in cybersecurity, placing professionals at all levels.
was featured in the SC Media top 50 Women of Influence in Cyber Security. She also writes for Forbes and is a judge for The American Cyber Awards. Different and Constructive People are the biggest risk to cybersecurity today. If teams are not at full capacity, either in number or capability, companies cannot secure all their risks. At BeecherMadden the team believes “people burn out when they are under-resourced and we can’t evolve as an industry if people are not at their best, or decide to leave.” By promoting cybersecurity as a career and helping companies hire the best, the company is helping these teams perform at their best. With a focus on attracting diverse candidates, it is also helping teams make better decisions and perform better in the long term. Further, the company says data is the key thing for it. By using the data it holds on the cybersecurity job market, and translating this into useful insights and suggestions for its clients, they can help them make better hiring decisions. In recruitment, technology helps, but it is the focus on building and maintaining long-standing relationships that sets the company apart from the competition. Moving Ahead Everyday
Karla Reffold Founder BeecherMadden
the whole recruitment process for the clients, saving them time and money whilst also adding extra expertise to their teams. Testimonials “They were transparent in their interactions with me. BeecherMadden also delivered results. I enjoyed my interactions with them” “BeecherMadden were an absolute pleasure to work with. They made it more of an experience rather than just the run of the mill job hunt. When it came to relocation in my situation they were completely understanding of family needs, and negotiated some assistance for us as well. I will be sending any future colleagues searching to BeecherMadden, as well as reaching out to BeecherMadden for any of my own placement needs for our team”
BeecherMadden’s US expansion is the biggest aspiration it has right now. The DC office is growing in Q1 2020 and will continue to grow throughout the year. The enterprise is hiring more people to work for it so it can deliver the best possible results to all of its clients, as well as adding new ones. It is also now able to take over www.insightssuccess.com
January 2020 | 19
3
Innovations
in the Field of
Printing
Business I
n the year 1450, when Blacksmith Johannes Gutenberg ďŹ rst introduced a movable type press in the German city of Mainz, a printing revolution had got erupted. This invention encouraged more people to proliferate and distribute their creative/informative ideas though printed texts. Sooner, plethora of work related to literature, religious scriptures, scientiďŹ c papers, ontological treaties, law texts among other started publishing out in the European region which later got adopted globally at large scale and helped individuals and others to promote/sell their ideas. This printing revolution still considered as one of the most important event in the history of printing and for the humankind as a whole. With the passage of time many other inventions have been taken places that have boosted the printing business at large. Here we have enlisted some of the recent developments that are worth mentioning, and which are also considered as a turning point for the arena of printing business.
22 | January 2020
www.insightssuccess.com
Editor’s Choice Nano Printing: 3D printing has witnessed many remarkable breakthroughs in recent years, Nano printing is one such innovation. Due to this cutting-edge printing technology it is now possible to print and integrate tiny components directly on to the integrated circuits include micro-lenses onto photonic circuits and deformable structures on MEMS actuators.
environment friendly. In this technology, the ink is not made of plastic and other damaging petroleum or fossil fuels; instead ‘water’ here is act as the main solvent and thus makes it an environment friendly printing technology. Moreover, what are making this technology scalable and popular are its other fascinating features famously includes its fine print quality and affordability over the other prevailing printing technologies.
Interestingly, what was a dream some decades ago has become a reality with this technology as it is now possible to print microscopic objects with complex geometry and sizes of nanometres to several millimetres. Such things can be printed on a single printing step and that too on a scale which was not possible before. Such innovative change of on-printing brings new perspectives for developing nano and microscopic 3D component in a hassle free manner.
Its solvents decrease the time and heat necessary to absorb the ink film on fabric and instead of just spreading on the outer layer of the fabric, its ink flow deep into the fabric and create a much better look and ultimately a much better end-user experience. Further, water based inks are thinner and you can actually print with higher precision to give a good texture as compared to thicker inks like plastisol.
Moreover, its application has significance in many vital areas including Artificial Organs, Tissue Engineering, Stem cell-based Regenerative Medicine and Therapy, Fabrication of Nano Scale Devices among other. Customers also reap huge benefit by utilizing this technology as it provides great precision, stability, and support 3D custom design at large scale.
Moreover, the increased softness and flexibility of waterbased prints have the potential to win customers heart every time when they touch a fabric printed using this technology. Many leading organization are considering this technology over plastisol and it is just the matter of time before this technology becomes an industry standard in the printing business.
How this Technology Works? In this printing technology, Nanoscribe’s Photonic Professional GT system uses the technique of two-photon polymerization. In this process a laser gets expose to a photosensitive resin by a high-numerical aperture objective that too in a controlled trajectory following CAD design. The interesting thing here is that the material gets solidified only in the laser focused spot and thus allows printing the exact 3D structure with submicron features. Such advancements have expanded the use of this technique for printing pre-manufactured circuits and opens new ways for executing on-chip printing as well. Nanotechnology for printing – is truly innovative as it alters materials at the atomic and molecular level.
Conductive Ink: Invention of conductive ink is one the greatest milestones in the business of printing and it has the potential to change thefuture of printing business as well.
Water-based Printing: Many printing technologies use inks made from harmful chemical substances which creates negative impact on the printer, wearer and the environment at large. Usage of harsh chemicals and toxic waste also always keep various regulatory agencies on vigil. Therefore, there was a dire need of a technique which can do a fine printing by minimizing the bad effects on environment at large. The birth of water-based printing fulfilled that need.
What’s unique in this technology is its ‘ink’ which contains conductive materials like silver nanoparticles or conductive polymers which gives them the ability to conduct electricity. This conductive (Silver) ink has multiple uses today including printing RFID tags as used in modern transit tickets, they can be used to improvise or repair circuits on printed circuit boards as well. Although, this technology is in early stage and its mainstream adoption may probably takes several years but it is a promising technique which can be effectively used in many different applications including the creation of interactive posters, billboards, and other advertising materials. Interestingly, this technology also holds promise to play sound just by touching a paper or connect you to your phone app just by interacting with a poster on the wall that is linked to the app. Moreover, it has the same capacitive sensing technology that is present in modern day electronic devices like tablets, smartphones among others.
The innovation of water-based printing has started a new era in printing space which is hugely considered as
www.insightssuccess.com
January 2020 | 23
Cyber Most
The
Trusted
Security
Companies to Watch 2020
Best Autonomous Cybersecurity Training Platform for Enterprises
C
yber attacks are on the rise, rapidly growing in number and sophistication year-over-year. Email Security, Firewalls, and other advanced technologies can never guarantee to block 100% of cyber attacks, leaving much of the responsibility to protect the organization for the second line of defense - its employees. But for employees, to become well-trained in detecting and avoiding cyber threats there’s a need for an effective continuous training program. CybeReady offers the only autonomous cybersecurity training platform for enterprises. The CybeReady platform utilizes data science-powered training that implements nextlevel adaptive learning methodology, therefore, boosting change in employee behavior towards cyber attacks. The solution is fully-managed, making CybeReady the security awareness training solution with the lowest total cost of ownership (TCO) available today. In an interview between Insights Success and Shlomi Gian, CEO, Shlomi guarantees to transform security culture through data science and advanced automation. Below are the highlights: What led to the inception of the company? After training cybersecurity teams for over 20 years, CybeReady’s founders, Mike Polatsek and Omer Taran, met at NISA (The National Israeli Security Agency- an NSA equivalent) - where they trained Israel’s critical infrastructure companies. Throughout their journey, the two realized that no human professional can effectively train an entire workforce 365 days a year, which inspired them to start CybeReady and build a scientific training methodology in order to change employee behavior toward cyber attacks. Could you throw some light on your mission and vision statement?
24 | January 2020
CybeReady’s mission is to empower CISOs with an autonomous training program that has proven to show significant results without taxing IT teams. The company has learned from security professionals about their frustrations from spending an increasing amount of time and resources on awareness training efforts with no measurable results. Despite the large investments, most training solutions used today are dated - they rely heavily on long videos and textbooks, and are unable to “move the needle”. CybeReady’s program is fully-managed and guarantees to transform the cybersecurity culture so that CISOs, along with employees, feel empowered by the positive change and the increased organizational resilience they are taking part in building. Describe your company and its cutting-edge cybersecurity solutions that address all the needs of your customers. CybeReady offers an autonomous cybersecurity training platform that guarantees to change employee behavior and enterprise cybersecurity culture. It is a fully-managed service that eliminates all the associated IT overhead. The program provides a complete workforce training on a monthly basis year-round. The methodological data-science driven program is proved to change employee behavior toward phishing attacks. CybeReady also offers the lowest Total Cost of Ownership (TCO) as well as the highest ROI of any solution available today. Give a detailed description of the featured person's influence over the company and the industry. Shlomi Gian has more than 20 years of experience in the technology industry, bringing a unique powerful blend of product and business leadership expertise to CybeReady. As CEO, Shlomi is responsible for ramping up the company’s presence in the U.S and guiding overall growth for CybeReady worldwide. Over the past two decades he has www.insightssuccess.com
“
Cybeready offers the only autonomous cybersecurity training platform for enterprises. It is fully-manages and guarantees to change employee behavior towards cyber attacks without taxing the IT team.
built disruptive technologies, developed high-value strategic partnerships, and lead companies through major acquisitions. Shlomi served at the helm of numerous companies in the U.S and abroad, including Cotendo, Akamai, and PacketZoom - which was acquired by Roblox in 2018. He holds a B.S. degree in Computer Science and an MBA degree from the University of San Francisco. How are you contributing to the evolution of the cybersecurity industry? CybeReady’s platform is a next-generation training solution. It provides an effective and efficient AI-driven training program that eliminated IT overhead while generating powerful results. By implementing CybeReady’s training program, organizations feel less powerless in the face of cyberattacks. Dated, long, and tedious training textbooks and videos are replaced with short and engaging learning content. This new approach builds positive cybersecurity culture and transforms the experience from redundant to effective. What technologies are you leveraging to make your solutions resourceful? At the core of the product, there are three main technologies; (1) Data-driven automation to train 100% of the workforce on an ongoing basis without effort of the IT team, (2) Machine Learning (ML) to match employees with the adequate phishing simulation attack and deliver an adaptive training program, (3) Business Intelligence (BI)based dashboard to allow real-time access to the program results.
Shlomi Gian Chief Executive Officer CybeReady CybeReady aspires to become the industry leader in cybersecurity awareness training and help build stronger enterprise resilience towards cyber-attacks. The company’s strategy is to focus on building a superior end-to-end training platform that addresses the needs of the leading modern enterprises, who are the main target for hackers and are looking for an innovative approach to mitigate that risk. From our experience, there is nothing like a reference customer to generate new business. We are confident in the value and benefits CybeReady provides to its customers, and when leading security professionals share their great results and experiences with other CISOs in their space, others will follow. Testimonial Ilan Abadi, Global CISO at Teva Pharmaceuticals - “We were faced with the challenge of training over 40,000 employees in 65 locations and 30 different languages. CybeReady’s training platform customizes and localizes the content on the fly, and the training continuously adapts to where employees are at in the learning curve, which has proven to generate a significant change in employee behavior towards phishing attacks globally.”
What are your company’s future aspirations? What strategies are you undertaking to achieve those goals?
www.insightssuccess.com
January 2020 | 25
What a tech CEO can teach your business about digital About the Author Pam Bateson is an expert coach and mentor in business, training others to Masters level qualiďŹ cations and supervising coaches. She has worked within the healthcare, retail, hotels, construction, media, agencies, education and public sector. She specialises in Coaching, Mentoring, Employee Engagement, Change Management, Learning and Development and Organisational Design. She has worked with all levels in organisations from graduates to the CEO. She has designed change programmes that connect projects, outcomes, training and coaching. The performance outcomes have been outstanding. She is CEO and Co-founder at Thrive Partners.
28 | January 2020
www.insightssuccess.com
Tech-Know Insights
Pam Bateson CEO & Co-founder
Thrive Partners
P
am Bateson set up Thrive Partners, an on-demand coaching company, three years ago. In this article, she shares her point of view on how important humans are in a more digital world, what she’s learned as a tech CEO, and what this means when you’re looking to use tech in a way that’s both disruptive and works for customers.
www.insightssuccess.com
January 2020 | 29
In October 2015, I gave up a successful career as a management consultant and coach to set up Thrive Partners. Lots of people thought I was crazy. I was approaching 50, with two children still at home. But for the decade running up to that decision, I’d been thinking about a better way to deliver coaching – supported by digital, to share more widely the coaching tools I’d used to help clients for many years. This was the business I set out to build three years ago. Today, we’re working with 25 clients on five continents – delivering our own brand of on-demand coaching, backed with insights for the whole business. The learning curve has been steep – particularly for someone who, by their own confession, didn’t have a lot of experience in learning technology. So here, I wanted to share some of the things we’ve learned – and what it might mean for your business. Dream big I didn’t really set out to build a business that would be considered disruptive, but my background as a lean engineer and coach did mean that we ripped up the rulebook when it came to the coaching industry. We scrapped the idea that you needed to meet face to face, and that sessions had to last an hour, or even two hours. And we made it a lot easier for people to access a coach to answer the questions they had there and then – increasing access so people could chat to an expert within an hour. Working with my co-founder, we then rebuilt the industry by asking the biggest questions we could imaging. What if we could make coaching available to whole organisations? What if we could get listening as valued as speaking? And what if we could help organisations learn as quickly as individuals? I found these questions irresistible: I wanted to do for coaching what Uber had done for getting a taxi, Netflix had done for home entertainment, and Tinder had done for dating. It’s these 30 | January 2020
big dreams that have galvanised our success in the last few years – and which has set us in the right direction for the future. Build for modern users Despite big dreams, we’ve also made our fair share of mistakes! A lot of them mistakes happened when we took our attention away from our end customers. It sounds obvious to see it there on the page. But it can be easy to lose sight of the customers that matter most, especially when, as a tech CEO, sometime we get preoccupied with a shiny piece of new technology. So, what to consider first when it comes to users? The main thing to bear in mind is that they expect experiences that are easy and fast to access – a shift brought about by what we call the ‘Amazon Prime Mindset.’ In this era, clunky user experiences reduce the chances of uptake of services. In short, if your technology can’t match or exceed the quality of digital experience people get in their everyday lives, then you’ll need to go back to the drawing board. Create wins for the many So, if users come first – who else can we harness the power of technology for? Our answer? Everyone else in the system. Early on in the development of our MyThrive platform, we realised that delivering digitally would enable us to do more than just scale and facilitate coaching in global organisations; it would also mean we could spot trends and patterns within communities of users, in organisations or society at large. Just as carefully listening has a powerful and transformative role in one-to-one coaching conversations, carefully listening to and analysing anonymised version of the conversations we host has a powerful and transformative role within whole organisations.
The whole-system insights we produced has helped to make sales processes smoother, improved communications and created more opportunities for people to learn. Keep it human With suicide being the biggest killer of men under 45, loneliness sweeping through developed economies in epidemic proportions and a third of all young people suffering from anxiety, I strongly believe that we have a duty to keep talking to each other as a society. We believe that keeping the art of conversation alive in this digital age is essential; only humans can master creativity, empathy, humour and imagination in a way that’s compelling. Information is everywhere, so we’re using technology differently – to offer real human experiences at scale, at any time of the day, whenever our clients need a conversation, for everything you can’t Google. And what of the future? Curiously, even the structures of artificial intelligence and machine learning look set to mimic human patterns. It’s still early days, but leaders in this space talk of ‘deep learning’ with AI – by layering up different tools that connect in the same way as our brain’s neural networks. And so, the next three years? My recent experiences have led us to ask even bigger questions than we did to begin with – which I suspect will lead to our next irresistible set of adventures! What if we could transform learning management systems into learning ecosystems? What if any community of learners could connect with any community of teachers? And what if a better understanding of outcomes from learning could help both individuals, organisations and society to thrive? I for one believe there are exciting times ahead.
www.insightssuccess.com
Cyber Most
The
Trusted
Security
Companies to Watch 2020
Creating a Benchmark in Cyber Insurance Management
S
ecurity is not just a technological issue, it is a financial issue in current asymmetric world. An attack may cost a fraction of the defenses, so putting your funds and people where it matters is imperative. Working with external vendors and consulting firms to assess cyber risk and security is extremely expensive, long, and probably obsolete the day you received the report. Cytegic’s ACRO enables business executives to make the financial decision between risk reduction by investments in defenses and/or risk hedging with cyber insurance. The company’s patented, scientific approach provides digital-related risk oversight across the organization. An interview conducted between Insights Success, and Elon Kaplan- Chief Executive Officer, allows organizations to automatically collect, process and analyze the widest range of security control data. Below are its highlights: What led to the inception of the company? As we began to witness the move towards quantitative risk analysis to shift the conversation from a purely technical one to that of business risk in traditional enterprise risk management, we knew that we wanted to be part of solving this highly challenging task. Through Cyber Risk Quantification, using hard data, business executives and CISOs to answer their board of directors’ questions about the effectiveness of their cybersecurity program with confidence, make better decisions about budgets & technology investments and assist in meeting regulatory requirements. It’s the pillar of achieving business & ecosystem resilience, and we see ourselves as a critical player in bringing cyber risk quantification to businesses of all sizes in all industries.
32 | January 2020
Could you throw some light on your mission and vision statement? At Cytegic, we believe that companies are constantly measuring the performance of investments in current and proposed business activities. Good managers look at the upside revenue potential as well as known and unknown obstacles they may face. In recent years, cyber financial risks have become significant enough to be factored into overall business strategy. Cytegic strives to become the premier partner in helping organizations solve the highly challenging task of quantifying their cyber risk. Describe your company and its cutting-edge cybersecurity solutions that address all the needs of your customers. Cytegic’s automated technology introduces Rapid Cyber Risk Quantification to the market to solve the complex challenges in obtaining quantified, contextual, and validated data needed to accurately assess & manage cyber risk with ease and visibility. Due to intensive labor and capital resources with scarce technical expertise, most companies often fail to identify all of the possible risk scenarios against each of their organizational assets. As a result, many organizations have a weak grasp of what their cyber risk means to the business and how they can optimize their security budget between risk mitigation vs. risk transfer. Cytegic’s platform immediately provides companies of all sizes with actionable insights into their financial risk exposure, the risk to each organizational asset, and the critical controls the insured can remediate to lower the financial impact of their cyber risk. Further, the biggest challenge for organizations is not technical, it’s organizational. Traditional, siloed and manual assessments in cumbersome Excel documents constrain resources and are not effective for understanding risk across industry standards and regulations. This, unfortunately, www.insightssuccess.com
“
With 4 US Granted Patents, Cytegic's innovative, mature cyber risk platform introduces Rapid Cyber Risk Quantification as industry's first, end-to-end solution automating cyber risk management and quantifying its financial impact across the entire cyber risk value chain.
shifts the focus to a more defensive approach in complying with regulations instead of determining actionable insights needed to enhance cyber maturity. Within the same platform and assessment, Cytegic’s Rapid Cyber Risk Quantification enables organizations to dynamically view their risk through the lens of ISO 27001K, NIST CSF, NIST 800-53, HIPAA, GDPR, PCI DSS, NY DFS 500 and more with the immediate reporting capabilities. What technologies are you leveraging to make your solutions resourceful? When evaluating an enterprise to determine cyber financial risk, Acro ingests several internal and external data/intelligence to calculate a specific company’s cyber risk exposure. Primary sources include contextual strategic environmental intelligence (based on its location, sector, and business assets), and the company’s defensive posture by collecting internal control maturity scores (analyzed by the system). The risk methodology leverages known industry good practices such as ISO27005, Intel TARA, FAIR as well as Cytegic’s patented methodology, to derive the specific cyber risk financial impact per business asset then aggregating for total company quantification. About the Leader Elon Kaplan is the Founder and CEO of Cytegic, a cuttingedge cyber-risk quantification solution predicated on the idea that enterprise risk is a combination of four key elements: people, process, technology & the complex, inherent risk that every organization faces with respect to its customer, and supplier ecosystems. This philosophy forms the foundation of ACRO (Automated Cyber Risk Officer), the SaaS-based platform specifically designed to keep up with the rapidly changing digital world & provide executive decision-makers, insurers, and business advisers with a financial representation of cyber risks. Elon brings the combined expertise of a serial entrepreneur and scientist. As www.insightssuccess.com
Elon Kaplan CEO Cytegic a business leader, he excels at building exceptional teams & driving innovative breakthroughs. As an applied behavioral scientist, he is trained in specific modeling and statistical methodologies, specializing in digesting very complex baseline information to predict critical outcomes. How are you contributing to the evolution of the cybersecurity industry? The security industry is currently amidst a shift from cybersecurity to cyber risk management, and more so, towards business and ecosystem resilience – that is, the ability to recover from a bad event. At the core of optimizing cyber risk management and achieving business, resilience is cyber risk quantification. Cyber risk quantification translates this complex risk into a common language understood by both technicians and business executives, sitting at the core of all strategic cyber decisions. Cytegic is advancing this forward by automating the tedious processes often required for a cyber risk quantification exercise and making it scalable and accessible to companies of all sizes, often through the cyber insurance process. As a lot of the work we are doing these days is with global insurance companies leveraging our platform to displace the traditional paper-based applications, offering significant transparency for the insurance community and their insureds. We’re shifting the industry forward as the market has started to harden with more demands from the insured’s regarding their cyber posture. January 2020 | 33
Cyber Most
The
Trusted
Security
Companies to Watch 2020
Eclypses Inc. A Next Gen-Cyber Security Company Revolutionizing Digital Data Protection with MicroToken Exchange® (MTE)
W
ith so many cyber threats, cyber security services are in demand.
The world as a whole needs to understand the gravity of the situation and the challenge, to secure all types of sensitive digital assets. Though, protecting the digital data and sensitive information is the utmost need of every organization yet, very few cyber security services can provide the satisfactory results. Mostly used current methods are simply not good enough. The days of storing data in a vault, building a firewall or two around it, and then utilizing encryption methodology intrusion protection, simply are not stopping bad actors from successfully stealing what’s inside. Meet Eclypses Inc., a cyber security company that offers revolutionary methods for protecting the business digital assets and sensitive information. Steven R. Russo, EVP of the Eclypses, Inc., has achieved many milestones in its pathway in the development of MTE. With long term experience of Eclypses Inventors Tim Reynolds, CTO and David Schoenberger, CIO that both have deep backgrounds in and around payment card security, everyone in the organization has had the confidence to develop the MTE cyber security solution that would not only work but would revolutionize how digital data is protected, both while at rest as well as while in transit. Higher Level of Data Security “If Data Can Be Hacked, Lost, Stolen or Intercepted, Then Stop Using “Real Data” Use MicroTokens Instead,” says Steven. Eclypses provides technology, services, and education to secure sensitive digital information, additionally, mitigating risks, while protecting reputations and assets. Services of Eclypses provide a new, higher level of data security while maintaining flexibility, adaptability, 36 | January 2020
and accessibility through use of its own MicroToken Exchange (MTE) proprietary-patented MicroEncryption® MicroTokenization® solutions. Eclypses takes cyber security to a new level within its PCI DSS certified, as well as HIPAA, Certified, hybrid server system. MTE is also available for remote deployment. Innovative, Disruptive and Patented Technology Eclypses’ industry leading cybersecurity software, MicroToken Exchange, (MTE) help its clients protect their most sensitive and private digital information from cybercriminals and cyber terrorists today. With the next generation of technological advancements, and the advent of quantum computing, there remains a requirement for innovative cyber security assurance measures to protect against and prevent new vulnerabilities. The results of such cyber-attacks can be disabling, catastrophic and financially debilitating in many ways. Eclypses, solved this problem of protecting data with its innovative, disruptive and patented technology, MicroToken Exchange (MTE). Eclypses has invented a new “Quantum Resistant” disruptive framework known as MicroToken Exchange, or MTE, utilizing methods which replace actual data with MicroTokens™, or MicroToken clusters. This occurs throughout the process of storing and or transmitting of sensitive data elements depending upon the application. Passionate and Intelligent Leadership Steven Russo, Executive VP, comprehends the importance of cybersecurity and believes “The best defence, is a good offense”, he emphasized “In the age of technological development, data privacy has become even more prevalent than ever before. Long ago, individuals used fireproof safes, solid steel safe boxes or rented safety deposit boxes at banks to preserve all their critical and confidential information. However, today, everything being digital it’s all about the digital vault.” www.insightssuccess.com
“
Eclypses’ industry leading MicroToken Exchange (MTE) continues to help its clients protect their most sensitive and private information from cybercriminals and cyber terrorists. We don’t make the THINGS you use, we make the THINGS you use more secure™ Hybrid cybersecurity platform of Eclypses, without risking the exploitation of sensitive data, supports and simplifies the capability to analyse, share, and distribute mission critical information seamlessly across multiple platforms. The Eclypses team is very passionate about cybersecurity. Along with Steven they have been available for many Keynote speaking engagements. Additionally, Steven has published a host of security white papers and articles, many of which have been featured by larger, highly respected and read publications. Unique and Elegant Software Eclypses MTE concepts are unlike any other approach in the world today, as MTE makes data exploitation impregnable, systems and connected devices remain unscathed, stable and secure. It is both unique and elegant in its brilliant design and architecture. In most cases, there is no requirement to change or add additional hardware or method of communication. MTE is applicable to Data-AtRest, Data-In-Transit, for the Internet of Things (IoT) and industrial (IIoT) along with commands to connected and or “Intelligent” devices. Eclypses provides a paradigm shift in encryption capabilities for data transmission and storage. Because MTE is “designed to be easily implemented with any existing software requiring low amounts of processing power and memory to work in a resourced constrained environment,” it is a natural solution in most commercialenterprise, government, military and national security applications. Low latency for secure command & control systems is of paramount importance and is strongly desired by key decision makers. Facilitate the Securing of Data Eclypses maintains four proprietary patents currently, with two more pending. Through the deployment of Eclypses MicroToken Exchange, it can facilitate the securing of
www.insightssuccess.com
Steven R. Russo Executive Vice President Eclypses Inc.
Data-at-Rest, Data-in-Transit as well as Commands to both Connected and or Intelligent devices. Solving a Long-standing Vulnerability Eclypses’ newest break though is the securing of data in transit for Web based applications/connected devices. It has proudly named the solution WebMTE. WebMTE is the first protection of its kind as it secures transmitted sensitive data elements within a web page both seamlessly and easily, by deployment through a web server browser session. This technology is going to revolutionize sensitive data transmitted by individuals over the internet, using their web browser. WebMTE solves a long-standing vulnerability that has existed for years. Creating a Difference Eclypses is creating a difference with its ability to replace exploitable data with un-exploitable MicroToken Exchange (MTE) software and proven security processes. Individuals and businesses continue to face the daily challenge of securing data & commands to be connected with intelligent devices-systems, known as (IoT) (IIoT). Eclypses provides a simpler, yet, elegantly sophisticated, secure solution, that is rapidly deployable, impregnable and affordable. MTE is the answer everyone in the cyber community has been searching for.
January 2020 | 37
Key POS
Trends
Reshaping
the Retail
I
n recent times, the retail industry hasn’t seen a more exciting invention since the invention of cash register. With new and innovative technologies helping shape both online and offline experiences for consumers, the landscape is continuously changing in a way which was unimaginable even few years back. The best part is that there seems to be no end of the innovation, which only influencing the purchase decision of the consumers. Nowadays the main focus of retailers is to create a safe, engaging, and unique shopping experience for its consumers, it’s very important for the retailers to understand the importance of Big Data and in-store analytics and adapting to the cloud. With the retail industry at the verge of massive transformation, we are listing out few key trends that everyone needs to know to be successful in the ecosystem that is transforming quickly. Multi-system Integration Multi-system integration with various applications gets the utmost priority from top retailers. Most of the retailers list out POS integration with other applications as a key priority alongside the implementation of dynamic marketing content through mobile devices. This is mostly due to the retailer’s interest to store all the customer information and purchase history in a database, which is completely centralized that could be easily integrated with multiple applications. However, in order to do that, a retailer needs to use an ERP database that can handle all these. Speed People always look for quick solutions for everything. A clock starts ticking the moment a customer enters, no matter how good the product is, if the process is slow and the attention to details are missing, then customers will leave 38 | January 2020
Sector
disappointed. As a retailer, one cannot please everyone, but with a modern and efficient POS, the service can be improved. A modern POS simplifies the communication between various departments and can save a lot of time for both the retailer and the customer respectively. Managing Stocks Keeping and managing inventory is a nightmare for most of the retailers, and it’s quite natural. Managing inventory is a never-ending task and takes a lot of effort, time, and manpower. However, it is quite important to manage inventories when it comes to long-time survival. An efficient POS system always makes the process of managing the inventory much easier. The best part of a POS is, one can monitor the status of stocked items, shipped products, and new orders anytime. This is a huge time saver for a cumbersome and a tedious process, and eventually helps retailers to focus on other important aspects of running the business. Customized Experience With POS systems, retailers just need to provide personalization that scoops out every shopper. Every passing year, retailers are adapting to personalized technology solutions that allow an interactive user experience. Thanks to the emergence of all new mobile POS technology, now retailers can offer its customers more choices to accommodate their shopping habits by letting them to complete transactions anywhere in the store. Now with the invention of improved POS marketers and customer service teams can contact the buyer at each point of their purchase decision. With so much data retailers and consumers can have better customer service, quicker payment processes and access to better offers and real-time personalization. www.insightssuccess.com
Industry Trends
Promotions and Marketing at its Best Nowadays with the advent of digital technology, marketing involves maintaining a digital presence as well. A POS can integrate all the advertised offers with transactions, making it easier to keep track of all the campaigns. Additionally, it can integrate with CRM and track customer behavior. When an offer gets popular among the masses, then the retailer will see it in his transaction data. Usage of Big Data analytics In order to compete with e-commerce, retailers are now taking the help of Big-Data and in store analytics just to have a better idea about what’s happening inside the store. Big-Data analytics helps retailers to track how frequently a specific item moves from shelf to shopping cart allows retailers to know the trends that are dominant in the market. Analytics helps the retail industry in a big way to better understand consumer purchase pattern and behaviors. Keeping Track of Employees To run a business smoothly a retailer, need few people. A POS system enables to manage them with great accuracy. With a Point of Sale system in place, employees can sign on or off easily and the system will automatically log their work hours and break hours. Security Above all, a POS system offers great security protections that help keeping customer data safe. Retail stores and businesses are always prime targets for Cyber Criminals, and a data breach is not good for a business. So, by using standard encryption and firewall, businesses can be secured from cyber-attacks and customers can swipe their cards with a peace of mind. So, here we have listed out few of the POS trends that will shape the future of the retail industry. As we look ahead, these trends will be on focus for both retailers and customers. The main advantage of an advanced POS system is greater efficiency and optimization, it links all the departments together which eventually allows to have better control over the inventory, better profitability, and to manage processes in an efficient way.
www.insightssuccess.com
January 2020 | 39