SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Sid Yenamandra
CEO & Co-Founder
sid@entreda.com
PREDICTIVE CYBERSECURITY RISK
MITIGATION SOFTWARE FOR
REGULATED ENTERPRISES
Seasoned leadership team
Management Team, Board Members & Investors
Sid Yenamandra
Co-founder and CEO
• Advisor, Memoir Systems (Cisco); VP
Product at Plato Networks
(Netlogic/Broadcom)
• Sr. Director of NSA funded crypto-
acceleration project
• Co-founder of multiple start-up’s
• BS EECS, UC Berkeley
Farshad Ghaffari
Co-founder, Engineering Ops
• Application Engineering, Broadcom
supporting Cisco, Netgear and 2Wire
• Network Stack Development at Sun
Microsystems
• BS EECS, UC Berkeley
Shirish Phatak
Architect
• Co-founder, Talon Storage
• CTO of Wide Area File Services at
Packeteer
Co-founder at Tacit Networks (Packeteer)
• MS IIT, MPhil Rutgers
Jay Sethuram
Chairman, Entreda
• Co-founder Fiberlane, Cerent (Cisco)
• Co-founder, StratumOne (Cisco)
• Founding Director, APIgee
• LP in multiple venture funds
Ajay Goel
Strategy and Business Development
• Managing Director for Symantec
Corporation for India and SAARC countries
• Senior Vice President (Cisco Systems, India
and SAARC)
• Country Director (Sun Microsystems)
Jens Horstmann
Partner Crestlight Ventures
• Inventor of Redbox Technology
• Founder & CEO DVDplay (NCR)
• Advisor to multiple start-up’s
• LP Founder’s Fund
2
Corporate highlights
• Silicon-valley based Start-up
• Cybersecurity risk management software
• 1st market: Financial services (Broker-Dealers)
• VC funded – Crestlight VC & angel investors
• Global Team - 30 Employees, HQ San Mateo CA
• Multiple patents filed, 1 granted to date
• Unify for Financial Services launch - Q4CY14
• Signed-up 10K+ business users over 30 months
• Achieved Operational B/E in Q4, 2016
• Revenue mix - 50%/50% SMB/Enterprise
• 300% Y-o-Y growth for last 2 years
• Listed in FINRA’s compliance vendor directory
Company
Background
Corporate
Milestones
3
Premier customer partnerships in financial services in place
B-D wide mandate to use
our software
2 of 5 largest branch offices use
our software
Shortlisted as a compliance
resource provider
Partnership to offer our
software to 100K+ RIA firms
Partnership to offer our
software to 5K+ RIA firms
Partnership to offer our software
to 80K+ RIA firms
7th
largest US Insurance
Company owns 4 B-Ds
#1
Independent Broker
Dealer in the U.S.
4
Our breakthrough:
Pro-active risk mitigation for users, devices & networks
Today
Manual and Siloed
Automated
Integrated
IT Service Delivery
and Support
IT Governance, Risk
and Compliance
ITSoftwareManagement
User
Authentication
Log
Analysis
VPN
Remote
Desktop
Anti-virus MDM
Patch
Management
Firewall/IDS
Asset
Tracking
Password
Manager
Incident
Reporting
Data-DrivenWorkflow-based
Cyber
Risk
Score:
690
5
Automated cybersecurity policy enforcement
with integrated remediation applications
User installs light-weight
Entreda agent software
on all devices including
mobile devices.
Active
Monitoring Agent
Multi-user
Console
GRC integrated
with IT Software
24x7 Compliance
Reports
Compliance analytics
integrated with applications enables
intuitive and
automated user experience.
Single pane-of-glass
management for cybersecurity
policy enforcement with
real-time analytics.
Easy to understand alerts and
reports inline with
SEC & FINRA regulatory policy
guidelines.
• Behavioral scoring
• Contextual Remediations
• Real-time notifications
Secure Remote
Desktop
User
Management
Auto
VPN
File sharing
Policy Engine
SMRH:434326567.4 -1-
[FORM OF] INFORMATION SECURITY POLICY
[Tip: This Information Security Policy is only a form and must be customized to your business. Please
see the disclaimers below.]
Purpose. The purpose of this Information Security Policy (this “Policy”) is to comply with all applicable
laws and regulations designed to protect the nonpublic personal information (the “Private Information”)
of the customers (the “Customers”) advised by [insert Firm Name] (“Firm”, “we”, “us” or “our”) who
are natural persons, as well as natural persons consisting of our employees and service providers with
whom Firm does business (each, a “Protected Person”). The Information Security Policy is designed to
accomplish the following: (a) to ensure the security and confidentiality of Private Information in a manner
consistent with industry standards and as required by applicable state and federal law; (b) to protect
against any anticipated threats or hazards to the security or integrity of the Private Information; and (c) to
protect against unauthorized access to or use of the Private Information that could result in substantial risk
of harm or inconvenience to any Protected Person.
Compliance Officer. ____________________ is our Information Security Policy “Compliance Officer.”
It is [his][her] responsibility to implement, maintain, administer and coordinate the effectiveness of the
Information Security Policy. Any questions or comments regarding this Policy should be directed to the
Compliance Officer. Following the resignation or removal of the current Compliance Officer, the Firm
shall as soon as reasonably practicable appoint another person as the new Compliance Officer. [Tip:
Generally, the Compliance Officer is an employee of the Firm. In certain instances, the Compliance
Officer may be from a third party vendor that provides certain outsourced services to the Firm.]
Risk Assessment. As of the adoption of this Policy, we have identified the following potential risks to the
security, confidentiality and integrity of Private Information that could result in the unauthorized
disclosure, misuse, alteration, or other compromise of such information: [Tip: The Firm should run an
initial risk assessment with Entreda’s assistance at the beginning of the relationship with Entreda to
analyze the risks that the Firm has. The below is a sample set of risks that a Firm may have and may not
represent all the risks of a particular firm.]
• Unauthorized access to documents containing Private Information by our personnel, service
providers, Protected Persons or third parties;
• Inappropriate use or disclosure of Private Information by personnel, service providers, Protected
Persons or third parties who are authorized to have access to Private Information;
• General security risks posed to our information technology system, including the theft of
computers or other equipment permitting access to Private Information, the loss of Private
Information due to electrical outages or other computer system failures, and the introduction of
viruses into our information technology system; and
• The loss of documents containing Private Information through unanticipated physical hazards
such as fire, earthquakes, floods or other natural disasters.
The Compliance Officer shall periodically re-assess the reasonably foreseeable risks to the security,
confidentiality and integrity of Private Information. Such assessment will include analysis of, among
other things, (i) the effectiveness of personnel training and management with regard to the treatment and
handling of Private Information, (ii) the reliability and suitability of our information technology systems
in light of the objectives of this Policy, including network software design, as well as information
processing, storage, transmission and disposal, and (iii) the ability to detect, prevent and respond to
attacks, intrusions or other system failures.
Limiting Private Information. The Firm will generally limit the amount of Private Information collected
to that reasonably necessary to accomplish the legitimate purpose for which it is collected. [Option 1:
Weekly reports Cyber security
Policy
6
Cybersecurity Risk Mitigation with Predictive Analytics
7
Risk Heuristics
3rd Party threat databases, customers
IT Governance, Risk and
Compliance controls
GRC Frameworks – HIPAA, SEC, FINRA
Cybersecurity Applications
SIEM Anti-virus Firewall
Networks
Devices
Users
Enterprise
Device
Data
User
Behavior
Network
Data
Predictive
Scoring
Policy
Engine
Decision
Engine
Pattern
log
Remediation
Services
Alerts and
Notifications
Cybersecurity R
isk Score
690
Our unique and sustainable advantage …
Team expertise
with heterogeneous
platforms and devices
Technology Patents
filed on analytics and service
provisioning framework
Partnerships
with B-D, RIA, MF
and custodial platforms
Cybersecurity Risk Mitigation Software
Data-driven architecture
• Analytics-first approach
• Predictive modeling and ML
Hybrid cloud policy orchestration
• Monitoring, remediation and reporting for cloud
and/or on-premise infrastructure
Built-in remediation apps
• Custom developed thin applications
• Scalability with 3rd Party API integrations
8

Más contenido relacionado

La actualidad más candente

Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
Lancope, Inc.
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Innovation Network Technologies: InNet
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
Yasser Mohammed
 

La actualidad más candente (20)

The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness Program
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 

Similar a Laser App Conference 2017 - Sid Yenamandra, Entreda

IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
PECB
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
Kathy_67
 

Similar a Laser App Conference 2017 - Sid Yenamandra, Entreda (20)

CCA study group
CCA study groupCCA study group
CCA study group
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Topic11
Topic11Topic11
Topic11
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 

Más de Laser App Software

Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge SolutionsLaser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Software
 

Más de Laser App Software (18)

Laser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, SalesforceLaser App Conference 2017 - Ilan Davidovici, Salesforce
Laser App Conference 2017 - Ilan Davidovici, Salesforce
 
Laser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, AdvicentLaser App Conference 2017 - Anthony Stich, Advicent
Laser App Conference 2017 - Anthony Stich, Advicent
 
Laser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTechLaser App Conference 2017 - Dean Rager, GenTech
Laser App Conference 2017 - Dean Rager, GenTech
 
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuideProLaser App Conference 2017 - Will Gilfillan, MoneyGuidePro
Laser App Conference 2017 - Will Gilfillan, MoneyGuidePro
 
Laser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, JunxureLaser App Conference 2017 - Kathy Crowley, Junxure
Laser App Conference 2017 - Kathy Crowley, Junxure
 
Laser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, GrendelLaser App Conference 2017 - Aaron Guidotti, Grendel
Laser App Conference 2017 - Aaron Guidotti, Grendel
 
Laser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet LogixLaser App Conference 2017 - Eric Varela, Envestnet Logix
Laser App Conference 2017 - Eric Varela, Envestnet Logix
 
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge SolutionsLaser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
Laser App Conference 2017 - Jennifer Feinerman, Albridge Solutions
 
Laser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, RiskalyzeLaser App Conference 2017 - Matt Morris, Riskalyze
Laser App Conference 2017 - Matt Morris, Riskalyze
 
Laser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptialLaser App Conference 2017 - Ted Denbow, RightCaptial
Laser App Conference 2017 - Ted Denbow, RightCaptial
 
Laser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, LaserficheLaser App Conference 2017 - Tim Welsh, Laserfiche
Laser App Conference 2017 - Tim Welsh, Laserfiche
 
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail TechnologyLaser App Conference 2017 - David Mehlhorn, Redtail Technology
Laser App Conference 2017 - David Mehlhorn, Redtail Technology
 
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNetLaser App Conference 2017 - Paul Feldman, InsuranceNewsNet
Laser App Conference 2017 - Paul Feldman, InsuranceNewsNet
 
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account ManagerLaser App Conference 2017 - Jorge Plascencia Senior Account Manager
Laser App Conference 2017 - Jorge Plascencia Senior Account Manager
 
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
Laser App Conference 2017 - Michael Cymbrowsky, President of Laser App Software
 
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on AcceleratorLaser App Conference 2017 - Tom Cordova-Caddes on Accelerator
Laser App Conference 2017 - Tom Cordova-Caddes on Accelerator
 
Laser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: PropelLaser App Conference 2017 - Chris Maury presents: Propel
Laser App Conference 2017 - Chris Maury presents: Propel
 
Laser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert PowellLaser App Conference 2017 - Robert Powell
Laser App Conference 2017 - Robert Powell
 

Último

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Último (18)

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 

Laser App Conference 2017 - Sid Yenamandra, Entreda

  • 1. Sid Yenamandra CEO & Co-Founder sid@entreda.com PREDICTIVE CYBERSECURITY RISK MITIGATION SOFTWARE FOR REGULATED ENTERPRISES
  • 2. Seasoned leadership team Management Team, Board Members & Investors Sid Yenamandra Co-founder and CEO • Advisor, Memoir Systems (Cisco); VP Product at Plato Networks (Netlogic/Broadcom) • Sr. Director of NSA funded crypto- acceleration project • Co-founder of multiple start-up’s • BS EECS, UC Berkeley Farshad Ghaffari Co-founder, Engineering Ops • Application Engineering, Broadcom supporting Cisco, Netgear and 2Wire • Network Stack Development at Sun Microsystems • BS EECS, UC Berkeley Shirish Phatak Architect • Co-founder, Talon Storage • CTO of Wide Area File Services at Packeteer Co-founder at Tacit Networks (Packeteer) • MS IIT, MPhil Rutgers Jay Sethuram Chairman, Entreda • Co-founder Fiberlane, Cerent (Cisco) • Co-founder, StratumOne (Cisco) • Founding Director, APIgee • LP in multiple venture funds Ajay Goel Strategy and Business Development • Managing Director for Symantec Corporation for India and SAARC countries • Senior Vice President (Cisco Systems, India and SAARC) • Country Director (Sun Microsystems) Jens Horstmann Partner Crestlight Ventures • Inventor of Redbox Technology • Founder & CEO DVDplay (NCR) • Advisor to multiple start-up’s • LP Founder’s Fund 2
  • 3. Corporate highlights • Silicon-valley based Start-up • Cybersecurity risk management software • 1st market: Financial services (Broker-Dealers) • VC funded – Crestlight VC & angel investors • Global Team - 30 Employees, HQ San Mateo CA • Multiple patents filed, 1 granted to date • Unify for Financial Services launch - Q4CY14 • Signed-up 10K+ business users over 30 months • Achieved Operational B/E in Q4, 2016 • Revenue mix - 50%/50% SMB/Enterprise • 300% Y-o-Y growth for last 2 years • Listed in FINRA’s compliance vendor directory Company Background Corporate Milestones 3
  • 4. Premier customer partnerships in financial services in place B-D wide mandate to use our software 2 of 5 largest branch offices use our software Shortlisted as a compliance resource provider Partnership to offer our software to 100K+ RIA firms Partnership to offer our software to 5K+ RIA firms Partnership to offer our software to 80K+ RIA firms 7th largest US Insurance Company owns 4 B-Ds #1 Independent Broker Dealer in the U.S. 4
  • 5. Our breakthrough: Pro-active risk mitigation for users, devices & networks Today Manual and Siloed Automated Integrated IT Service Delivery and Support IT Governance, Risk and Compliance ITSoftwareManagement User Authentication Log Analysis VPN Remote Desktop Anti-virus MDM Patch Management Firewall/IDS Asset Tracking Password Manager Incident Reporting Data-DrivenWorkflow-based Cyber Risk Score: 690 5
  • 6. Automated cybersecurity policy enforcement with integrated remediation applications User installs light-weight Entreda agent software on all devices including mobile devices. Active Monitoring Agent Multi-user Console GRC integrated with IT Software 24x7 Compliance Reports Compliance analytics integrated with applications enables intuitive and automated user experience. Single pane-of-glass management for cybersecurity policy enforcement with real-time analytics. Easy to understand alerts and reports inline with SEC & FINRA regulatory policy guidelines. • Behavioral scoring • Contextual Remediations • Real-time notifications Secure Remote Desktop User Management Auto VPN File sharing Policy Engine SMRH:434326567.4 -1- [FORM OF] INFORMATION SECURITY POLICY [Tip: This Information Security Policy is only a form and must be customized to your business. Please see the disclaimers below.] Purpose. The purpose of this Information Security Policy (this “Policy”) is to comply with all applicable laws and regulations designed to protect the nonpublic personal information (the “Private Information”) of the customers (the “Customers”) advised by [insert Firm Name] (“Firm”, “we”, “us” or “our”) who are natural persons, as well as natural persons consisting of our employees and service providers with whom Firm does business (each, a “Protected Person”). The Information Security Policy is designed to accomplish the following: (a) to ensure the security and confidentiality of Private Information in a manner consistent with industry standards and as required by applicable state and federal law; (b) to protect against any anticipated threats or hazards to the security or integrity of the Private Information; and (c) to protect against unauthorized access to or use of the Private Information that could result in substantial risk of harm or inconvenience to any Protected Person. Compliance Officer. ____________________ is our Information Security Policy “Compliance Officer.” It is [his][her] responsibility to implement, maintain, administer and coordinate the effectiveness of the Information Security Policy. Any questions or comments regarding this Policy should be directed to the Compliance Officer. Following the resignation or removal of the current Compliance Officer, the Firm shall as soon as reasonably practicable appoint another person as the new Compliance Officer. [Tip: Generally, the Compliance Officer is an employee of the Firm. In certain instances, the Compliance Officer may be from a third party vendor that provides certain outsourced services to the Firm.] Risk Assessment. As of the adoption of this Policy, we have identified the following potential risks to the security, confidentiality and integrity of Private Information that could result in the unauthorized disclosure, misuse, alteration, or other compromise of such information: [Tip: The Firm should run an initial risk assessment with Entreda’s assistance at the beginning of the relationship with Entreda to analyze the risks that the Firm has. The below is a sample set of risks that a Firm may have and may not represent all the risks of a particular firm.] • Unauthorized access to documents containing Private Information by our personnel, service providers, Protected Persons or third parties; • Inappropriate use or disclosure of Private Information by personnel, service providers, Protected Persons or third parties who are authorized to have access to Private Information; • General security risks posed to our information technology system, including the theft of computers or other equipment permitting access to Private Information, the loss of Private Information due to electrical outages or other computer system failures, and the introduction of viruses into our information technology system; and • The loss of documents containing Private Information through unanticipated physical hazards such as fire, earthquakes, floods or other natural disasters. The Compliance Officer shall periodically re-assess the reasonably foreseeable risks to the security, confidentiality and integrity of Private Information. Such assessment will include analysis of, among other things, (i) the effectiveness of personnel training and management with regard to the treatment and handling of Private Information, (ii) the reliability and suitability of our information technology systems in light of the objectives of this Policy, including network software design, as well as information processing, storage, transmission and disposal, and (iii) the ability to detect, prevent and respond to attacks, intrusions or other system failures. Limiting Private Information. The Firm will generally limit the amount of Private Information collected to that reasonably necessary to accomplish the legitimate purpose for which it is collected. [Option 1: Weekly reports Cyber security Policy 6
  • 7. Cybersecurity Risk Mitigation with Predictive Analytics 7 Risk Heuristics 3rd Party threat databases, customers IT Governance, Risk and Compliance controls GRC Frameworks – HIPAA, SEC, FINRA Cybersecurity Applications SIEM Anti-virus Firewall Networks Devices Users Enterprise Device Data User Behavior Network Data Predictive Scoring Policy Engine Decision Engine Pattern log Remediation Services Alerts and Notifications Cybersecurity R isk Score 690
  • 8. Our unique and sustainable advantage … Team expertise with heterogeneous platforms and devices Technology Patents filed on analytics and service provisioning framework Partnerships with B-D, RIA, MF and custodial platforms Cybersecurity Risk Mitigation Software Data-driven architecture • Analytics-first approach • Predictive modeling and ML Hybrid cloud policy orchestration • Monitoring, remediation and reporting for cloud and/or on-premise infrastructure Built-in remediation apps • Custom developed thin applications • Scalability with 3rd Party API integrations 8