Dm Corporate Overview
-
Upload
gibreelchamcha -
Category
Documents
-
view
220 -
download
0
description
Transcript of Dm Corporate Overview
-
INTRODUCING THE UAE NATIONAL CYBER SECURITY CHAMPIONJANUARY 2016
-
CONTENTS
1 THE CYBER SECURITY PARADIGM2 DARKMATTER: GUARDED BY GENIUS3 OUR CAPABILITIES4 OUR PEOPLE
-
01THE CYBER SECURITY PARADIGM
-
THE WORLD IS GETTING MORE AND MORE CONNECTED...
Connected devices adoption to explode in the coming years
Technology is becoming cheaper
More people and things are getting connected to the internet every day
Processing power is growing exponentially
Time to reach 50 million users (Years)
>2 Billion smartphones in 2016
Over the last 10 years40x drop in Bandwidth Prices 60% decrease in sensors prices
217 new Internet users every minute
60x decline in cost of processing power
38
13
4
3
1
9 months
-
RESULTING IN EXPONENTIAL GROWTH IN CYBER THREATS
317MILLION
New malware detected in 2014 alone
+500%Increase in mobile malware
over 1 year
295DAY
average time it took to detect the top 5 zero-day
exploits in 2014
348MILLION
identities exposed in 2014 in healthcare, retail,
education &government
-
ATTACKS ARE GETTING INCREASINGLY COMPLEXAND DAMAGING
SOURCE: EY
-
GOVERNMENTS AND ENTERPRISES ARE NOT READY TO HANDLE CYBER THREATS
NEARLY TWO THIRDS OF ORGANISATIONS DO NOT HAVE WELL-DEFINED AND AUTOMATED IDENTITY & ACCESS MANAGEMENT PROGRAMS
37%SAY THAT REALTIME INSIGHT ON CYBER RISK IS NOT AVAILABLE
HIGHLY UNLIKELY THAT THEIR ORGANISATION COULD DETECT A SOPHISTICATED ATTACK
56%OF RESPONDENTS SAYIT IS UNLIKELY OR
42%OF ORGANISATIONSDO NOT HAVE A SECURITY OPERATIONS CENTRE
3545%OF RESPONDENTSRATED THEMSELVES STILL A LOTTO IMPROVE
43%OF ORGANISATIONSTOTAL INFORMATION SECURITY BUDGET WILL STAY THE SAME IN THE COMING12 MONTHS
42%
HIGHLY UNLIKELY
53%OF ORGANISATIONS SAY THATLACK OF SKILLED RESOURCES IS ONE OF THE MAIN OBSTACLES THAT CHALLENGE THEIR INFORMATION SECURITY
SOURCE: EY
-
COST OF CYBER ATTACKS
10
DET
ECTE
DCYB
ERCRIM
E(M
ILLI
ON
S)
2010 2011 2012 2013
SOURCE: VISUAL CAPITALIST 2015 THE CYBER SECURITY BOOM
2009 2014
9.4
3.4
0
In 2014 the cost of cyber attacks for the worlds economies was in excess of $400 billion with over 42 million attacks
50
42.8
40
28.930
24.922.7
20
-
CYBER WARFARE IS A DAILY REALITY
-
THE UAE NEEDS A TRUSTED LOCAL PARTNER WITH GLOBAL EXPERTISE TO PROVIDE THE ENTIRE SPECTRUM OF CYBER SECURITY SOLUTIONS
-
02DARKMATTER:GUARDED BY GENIUS
-
WHO WE ARE
UAEHeadquartered
The worlds elite cyber
security talent
Trusted to protect the
nation
Offering the complete
portfolio of cyber security
solutions
Driving & developing
the next generation
cyber solutions
-
WE HAVE GATHERED THE WORLDS BEST TALENT
Saeed Omar Salem Basweidan Senior Vice President Technology Research
Michael PakSenior Vice PresidentSecure Communications Engineering
Harshul JoshiSenior Vice PresidentCyber Governance, Risk & Compliance
Dr. Robert Statica Senior Vice President Special Projects
Stephen Brennan Senior Vice President Cyber Network Defence
Dr. Najwa AarajVice President Special Projects
Eric EifertSenior Vice President Managed Security Services
Paul LawsonVice President Infrastructure & System Integration
-
TO ADDRESS THE MOST ADVANCED CYBER THREATS
GOVERNANCE, RISK & COMPLIANCE
CYBER NETWORK DEFENCE
MANAGED SECURITY SERVICES
SECURE COMMUNICATIONS
INFRASTRUCTURE & SYSTEM
INTEGRATION
SMART SOLUTIONS
-
DARKMATTER CAN SUPPORT THE UAE IN COMPLEX NATIONAL CYBER INITIATIVES
Government Secure
Communications
Elite Cyber Academy
Superior Cyber SecurityCentre
National Root Certificate
Smart City Cyber Security
National Crypto Suite
-
03OUR CAPABILITIES
-
GOVERNANCE, RISK & COMPLIANCE
-
GOVERNANCE & STANDARDS
As strategic partner to the UAE government and with senior members of our leadership team developing globally recognised national and international standards, DarkMatter is uniquely
positioned to help customers address all aspects of governance, risk and compliance.
Risk AssessmentAudit Readiness Assessments
ComplianceNESA UAE IA controls assessmentsVertical based compliance and risk assessments Oil and Gas Government Finance
Cyber RegulationsSmart City Cyber security regulationsStandards development
GRC Platform implementationImplementation of Industry leading GRC platformBusiness process redesign
-
CYBER NETWORK DEFENCE
-
ADVANCED THREAT DETECTION & REMEDIATION
Our multi disciplinary team provides a suite of security assessments, forensic and incident response services designed to help our clients to understand the threats and vulnerabilities they
face and determine how best to manage them.
Security assessment Technology compliance Vulnerability assessment Penetration testing Application security
Incident responseCyber Incident ReadinessEmergency / Critical ResponseIncident Management Digital Forensics
Active defence & advanced researchSocial Engineering AssessmentMalware and Reverse EngineeringAdvanced Threat Intelligence Limited Stealth Operations Expert Services
Digital investigative servicesDigital / Mobile Forensics E-DiscoveryData Recovery Password Recovery
-
MANAGED SECURITY SOLUTIONS
-
NETWORK MONITORING & INCIDENT RESPONSE
Round the clock, security monitoring, remediation and resolution service providing peace of mind to organisations regarding their operations and networks.
On Premise Security Operations CentreManage On-Premises Security Operations CentresWorld class on-site Intrusion Monitoring, Incident Analysis, Investigation and ResponseContinuous Monitoring as a service
Managed Remote SOCRemote monitoring, remediation and resolutionAdvanced Correlation AnalysisWe work with you to plan and define a scalable cyber security solution
Advisory and Design of SOCConduct gap assessments and provide recommendationsDevelop use cases to determine capabilitiesReview current infrastructure, workflows, SLA/SOPs
-
SECURE COMMUNICATIONS
-
DELIVERING PRIVACY & CONFIDENTIALITY
We provide services and products targeted at protecting the confidentiality and integrity of voice; chat, email and overall data communication over the mobile network and landline.
Secure communication productsHardened Android OS Hardened IP Phone Voice, Chat and email File sharingNews CalendarEmergency alertingNews applicationFile sharing
Advisory & Assessment of ProductsCryptographic algorithmsCryptographic implementationSecure requirements and architectureDesign and implementation reviewsSecurity response
Managed ServiceProducts hosted, managed and secured within our infrastructure.On-premise deployment within the clients infrastructure.
-
INFRASTRUCTURE & SYSTEM INTEGRATION
-
Managing projects from initiation and planning through to execution and completion.Designing the tools, services, software and hardware to deliver bespoke infrastructural and technical
solutions, guaranteed inherent security tailored to every organisations needs.
Technical architectVirtual assessmentIT security assessment Infrastructure assessment Critical facilities assessmentIdentify sophisticated and customised solutions
ImplementationDesktop migrationOffice migrationsWindow servers migration Messaging migration
Project managementEvaluate needsPlanning & execution Project delivery
TRUSTED INFRASTRUCTURE
-
SMART SOLUTIONS
-
INNOVATIVE PHYSICAL SECURITY
Smart Solutions offers a comprehensive security suite of services comprising four elements of protection for both home and buisinessess.
Secure Home & OfficeAccess Control WifiCCTVParental Monitoring
Technical Surveillance Countermeasures Assessment ProcurementSweeps Monitoring Training
Mobile Peace of Mind Express Mobile Device Repair Mobile Monitoring Services Secure Data Transfer
Trusted Hardware Supply
-
ROOT CERTIFICATION AUTHORITY
-
PROMOTING NATIONAL TRUST
National CA program aims to promote national trust level, achieve full interoperability, and enable the digital economy
National CA Program Strategic Objectives
Establish and operate a national trust anchorIncrease the uptake of digital certificates as enablers of electronic transactions Encourage collaboration of all stakeholders to improve the national CA ecosystem Improve the UAE legal environment to enable the national CA servicesObtain international recognition for the national root CAEstablish a governance model that enables control while promoting innovation
-
04OUR PEOPLE
-
SAEED OMAR SALEM BASWEIDAN
14+ years of leadership / project management experience in telecom, IT and cybersecurity
Education and Certifications Bachelor of Science Degree in Engineering
from Weber State University, USA
Employment History Executive Director of Technology and Applied
Research, National Electronics Security Authority (NESA)
Senior Vice President of Business Development, Mubadala Development Company
CEO, Khazna Data Centre COO, Injazat Data Systems Senior Manager in the Services Division, Al Yah
Satellite Communications Company (Yahsat) International Carrier Relations Manager at
Emirates Integrated Telecom Company (du)
Cyber Security - Related Experience Chairperson of Yahsats R&D Committee,
overseeing strategy and developments in IPTV, VSAT, broadcast, broadband, and civil services
Establishing numerous bilateral agreements with international telecom giants while at du
Senior Vice PresidentTechnology Research
-
HARSHUL JOSHI
20 years+ experience in information and systems security
Education and Certifications MBA, Montclair State University, USA Masters Degree in Information Systems,
Bentley College, USA Bachelors of Science Degree in Chemical
Engineering Global ISO 27007 Editor and part of US
Delegation to ISO SC27 CISSP, CISM, CISA
Employment History Head, Cloud Security, Salesforce, San
Francisco, USA Executive Director, Cyber Security Practice,
PricewaterhouseCoopers, Silicon Valley, USA Managing Director, Cyber Security, CBIZ, USA Head Security Auditor, Sony Corp of America,
USA Chief Security Architect, Verizon (Formerly
GTE Internetworking), USA
Cyber Security - Related Experience Ran Salesforces global Security Governance
program working with Regulators from USA, Germany, France, Hong Kong Australia and other countries
Involved in creation of Connected Cities Vision for Salesforce working with key City Governments
Led PwCs Silicon valley Technology Sector focused Cyber Security Practice
Currently involved in various standards in a leadership capacity
Member of Smart Cities Council
Senior Vice President Cyber Governance, Risk and Compliance
-
STEPHEN BRENNAN
Senior Vice PresidentCyber Network Defence
25+ years of cybersecurity experience to corporations and governments
International Experience Developed, led and delivered Cyber Solutions
in over 160 Countries on 6 continents. Specialising in global solutions for complex
systems in hostile environments. Worked with UN, Interpol, FVEY, NATO,
Mdecins Sans Frontires, UNICEF. Industry specialist across Government,
Aerospace & Defence, Diversified Energy, Financial Services, Healthcare and Life sciences, Oil & Gas, Transport
Educational Experience Master of Information Systems Security
Charles Sturt University A.DIP, Adv Electronics and Industrial Computer
Systems JSST St George TAFE Winner Ingenious Minds Global Award for
CSCs top thinkers
Employment history Global General Manager and Senior Managing
Partner of CSCs Global Cybersecurity Consulting practice
Global Technical Consulting Lead and Managing Parter of CSCs Global Cybersecurity Consulting practice
Global Program Director of CSCs StrikeForce Senior Security Architect of CSCs Global
CyberSecurity Managed Services
Cybersecurity - Related Experience Instrumental in the creation of CSCs elite
StrikeForce, the industrys first commercial ethical hacking and digital forensics group
Senior Contributor to the discovery, research and publishing of the first Human-Morphic threats.
Senior Contributor to CSCs Security Stack and Cloud Security Alliance programs.
Developed Over 30 key cyber solutions and offerings for global markets
Senior contributor to managing threats in emerging technologies and markets
Developed and written first- to third-generation languages on a wide range of platforms.
-
ERIC EIFERT
20 years+ experience in information and systems security
International Experience USA, Middle East, Europe
Education and Certifications Masters Degree in Information Systems from
Webster University Bachelors of Science Degree in Criminology
from the University of Minnesota Certified Special Agent and Computer Crime
Investigator, United States Air Force Office of Special Investigations
Certified Expert Witness in Computer Forensics, Cyber Crime, and Cyber Investigations
Certified Program Management Professional from the Program Management Institute, PMP 293691#
Certified HIPAA Security Professional
Employment history Senior Vice President, Cyber Security
Solutions, ManTech International Corp, USA and Middle East
Adjunct Graduate Professor, Computer Forensics and Cyber Investigations, George Mason University, VA, USA
Special Agent, Computer Crime Investigator,U.S. Air Force Office of Special Investigations, USA, Middle East, and Europe
Cybersecurity - Related Experience Built, operated, and managed the U.S. DoD
Cyber Security Range and the U.S. Marine Corps Cyber Security Range
Program Manager for the U.S. Department of Homeland Securitys Continuous Diagnostics and Mitigation (CDM) program
Built, operated, and managed over a dozen large Cyber Security Operations Centers
Developed training material for basic, intermediate and advanced cyber training courses
Conducted cyber investigations, computer forensics, cyber threat intelligence, vulnerability assessments and incident response
Senior Vice PresidentManaged Security Services
-
MICHAEL PAK
25+ years of security product and solution engineering experience
International Experience South Korea, United States, Middle East (UAE)
Educational Experience Master of Science Degree in Scientific Computing
and Computational Mathematics from Stanford University
Bachelor of Science Degree in Computer Science and Mathematics - University of San Francisco
Applied Mathematics/Computer Science coursework - Carnegie Mellon University
Employment history Head of Security and Privacy Engineering, Google
Nest Labs, Palo Alto, CA, USA VP of Engineering, Samsung Mobile
Communications, Suwon, South Korea Senior Engineering Manager - Mobile Linux
Development, Wind River/Intel, Hillsboro, OR, USA
Senior Director of Engineering, Head of MobileSecurity engineering and co-founder of McAfeeMobile Security group, McAfee, Beaverton, OR,USA
Software Development Manager, MyCIO.com/ Network Associates/McAfee, Beaverton, OR, USA
Software Development Engineer, Hewlett-Packard, Vancouver, WA, USA
Senior Software Engineer, Anti-virus Emergency Response Team, Network Associates/McAfee, Beaverton, OR, USA
Chief Architect/Director, DS Interactive, Seoul, South Korea
Cybersecurity - Related Experience 18 security patents Founded and managed Samsung Mobile
Communications global security engineering team Engineered worlds first consumer mobile devices
independently validated and approved for classified use by the US Government
Commercialised worlds first hardware-based security platform for mobile apps and services
Directed development of worlds first biometric-based mobile payment system, architected Samsung Pay security
Architected Tizen platforms application security framework
Represented his companies at Open Mobile Alliance, Linux Mobile Foundation (LiMo), Fast Identity Online (FIDO) and Tizen Alliance
Awards Achievement Rewards for CollegeScientists
(ARCS) Scholarship recipient
Senior Vice PresidentSecure Communications Engineering
-
DR. ROBERT STATICA
20 years+ experience in information and systems security
Education and Certifications - Ph.D (ABD) in Homeland Security from Northcentral University
- Ph.D in Computer Science from Warren University
- Master's Degree in Computer Science (cybersecurity specialization) from New Jersey Institute of Technology
- Bachelor of Science Degree in Mechanical Engineering (aeronautics specializtion) from New Jersey Institute of Technology
Employment History - Co-Founder and Chief Technology Officer of Wickr
- President and CEO of United Alert - Founder and Director of the Center for Information Protection (CIP)
- Senior university lecturer at the New Jersey Institute of Technology (NJIT)
- Co-Founder and Chief Technology Officer of Linsafe Inc, a cybersecurity software and consulting company
Cyber Security - Related Experience- CTO and co-founder of Wickr, an encrypted messaging app that exceeds the standards set for HIPAA, FIPS140-2, and NSA Suite B encryption / security for top-secret communication
- Co-founded, architected, designed and created the first unified Emergency Alert and Secure Group Communication Service, United Alert
- Founding faculty member of the NJIT Information Technology Program and the College of Computing Sciences
- Developed and taught more than 20 courses in areas such as digital crime, computer
forensics, cryptography and cybersecurity at NJIT
- Created concentrations and co-developed the Master in Information Technology Administration and Security program at NJIT
- Led the design and development of the first intelligent Intrusion Prevention System (iIPS) capable of mitigating threats based on correlating, learning, and adapting to threat behavior for U.S. Army while at Linsafe
- Architected, designed, built and proposed a secure communication network for future U.S. Army combat systems, while at Linsafe
- Registered more than 25 patents
Senior Vice PresidentSpecial Projects
-
DR. NAJWA AARAJ
12 years+ experience in information & systems security
International experience USA, Middle East, Australia, Africa, Asia
Education Ph.D. with Highest Honors in Computer
Engineering from Princeton University Masters Degree in Computer Engineering from
Princeton University B.Eng. in Computer and Communication
Engineering from American University of Beirut
Employment History Lead Senior Associate, Booz & Company,
USA and Middle East Research Staff Member, NEC Labs-Princeton
University, NJ, USA Research Staff Member, IBM T. J. Watson,
NY, USA Research Staff Member, Intel Corporation,
Oregon, USA
Cyber Security - Related Experience Patents: Optimizing performance of integrity
monitoring; Patent number: 8949797 Analysis and design of a hardware/software
trusted platform module (TPM) for embedded systems
Energy and execution time analysis of a software-based trusted platform module (TPM)
INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment
A framework for defending embedded systems against software attacks
Dynamic Binary Instrumentation-Based Framework for Malware Defense
Hybrid Arch. for Efficient and Secure Face Authentication in Embedded Systems
Architectures for efficient face authentication in embedded systems
Neighbor stranger discrimination: a new defense mechanism against DDOS attacks
Awards Recipient of Wu Prize for Research Excellence,
Princeton University Princeton Commendation List for Outstanding
Teaching Recipient of Princeton University Fellowship Recipient of National Mathematics
Mathematics Baccalaureate
Vice PresidentSpecial Projects
-
PAUL LAWSON
27+ years of IT and project management experience
International experienceUAE, UK
CertificationsPrince 2 ITILiSeries MQSeries Unix WinTel Tivoli
Employment History Head of Technical Architecture,
Implementation Engineering and Project Management with Injazat Data Systems, UAE
Head of the Data Center, Service Transformation and Solution Design teams for Getronics UK
Cyber Security-related Experience Assembled and empowered a team of domain
experts from around the world to deliver projects for Injazat client
Head of The Data Center, the UAEs only TierIV facility, and responsible for a team of over50 technicians and engineers
At Getronics, he led major programs and projects, consultancy, design, build and implementation, and solutions architecture across a range of industries and clients
Vice PresidentInfrastructure & System Integration
-
THANK YOU
INTRODUCING THE UAE NATIONAL CYBER SECURITY CHAMPIONJANUARY 2016CONTENTSSlide Number 3THE WORLD IS GETTING MORE AND MORE CONNECTED...Slide Number 5ATTACKS ARE GETTING INCREASINGLY COMPLEX AND DAMAGINGGOVERNMENTS AND ENTERPRISES ARE NOT READY TO HANDLE CYBER THREATSCOST OF CYBER ATTACKSCYBER WARFARE IS A DAILY REALITYTHE UAE NEEDS A TRUSTED LOCAL PARTNER WITH GLOBAL EXPERTISE TO PROVIDE THE ENTIRE SPECTRUM OF CYBER SECURITY SOLUTIONSSlide Number 11WHO WE AREWE HAVE GATHERED THE WORLDS BEST TALENTTO ADDRESS THE MOST ADVANCED CYBER THREATSDARKMATTER CAN SUPPORT THE UAE IN COMPLEX NATIONAL CYBER INITIATIVESSlide Number 16Slide Number 17GOVERNANCE & STANDARDSSlide Number 19ADVANCED THREAT DETECTION & REMEDIATIONSlide Number 21NETWORK MONITORING & INCIDENT RESPONSESlide Number 23DELIVERING PRIVACY & CONFIDENTIALITYSlide Number 25TRUSTED INFRASTRUCTURESlide Number 27INNOVATIVE PHYSICAL SECURITYSlide Number 29PROMOTING NATIONAL TRUSTSlide Number 31SAEED OMAR SALEM BASWEIDANHARSHUL JOSHISTEPHEN BRENNANERIC EIFERTMICHAEL PAKDR. ROBERT STATICADR. NAJWA AARAJPAUL LAWSONTHANK YOU