Upload
cal-net-technology-group
View
130
Download
0
Embed Size (px)
Citation preview
Gavin ZimmerVice President of Sales
Cal Net Technology GroupSouthern California’s Premier IT Service Provider
Cal Net Technology Group (CNTG)
03
WE START WITH OUR MISSION
AND PURPOSE…
MISSIONCal Net Technology Group (CNTG)
03
Our Mission is to Enable IT Solutions in our
clients’ organizations to allow them to focus their business on what they do, and do what they
do more effectively.
PURPOSECal Net Technology Group (CNTG)
03
to be AN Extension of your IT Department
Managed Services
Remote & Onsite
BPO
NOC
Security
Pro Services
Subject Matter Expertise
Virtual CIO & CISO
Advanced Technology Integration
Physical, Virtual &Cloud
Plan
Design
Acquire
Deploy
ORGANIZATIONCal Net Technology Group (CNTG)
Shared Services
Shared Resources
Integrated Processes
Separate P&L
Integrated Into Specialist Sales Motion
Three Autonomous Business Units
03
FLEXIBLE PATHSCNTG’s Differentiated GTM Model
Direct VerticalsBusiness Alignment
Partner Based (Joint)
Infrastructure/ISV
SubcontractingManaged & Pro
Services
Private LabelManaged/Pro Services/BPM
Public Sector to Commercial (Vertical)
Horizontal (Emerging Growth to Reserved Accounts)
Plan, Build & Run Operating Model
Joint Managed and Professional Services Engineers Coordinated
Standardization where possible
Lead Generation could be combined with Sub & Private Label
Transactional to management of outcomes
Leverage 75+ W2 Certified Professional Services Resources
Non-circumvent and non-compete covenants
Custom NOC & SOC Operations Tailored to Protecting Brand
Include Managed Service Offerings, Security Offerings and Professional Services
Non circumvent and non-compete covenants
Certified and Capable: Industry Specific Accreditations
02
MAJOR VENDORS SPECIFIC SOLUTION VENDORS
OFFERINGSCNTG’s Diversified Offerings
03
ACCOMPLISHMENTSCNTG’s Success Stories
04
Industry Awards Manufacturing Finance & Legal
Education& Non Profit Retail Entertainment
Microsoft Partnerof the Year2013-2015
MarvinEngineering
Fishman,Diamond & Block
GoodwillCoffee Bean& Tea Leaf
Director’s Guildof America
LA Business Journal CIO’s IT Service Partner
of the Year
KaiserAluminum
Hotchkis & Wiley LACMA Fox Rental CarWriter’s Guild
of America
MSP Mentor Top 150 Worldwide
Meggitt ACLUSkirball Cultural
CenterTrue Religion
Bunim-Murray Productions
Best Placesto Work
GlenairDignified
Home LoansHarvard-Westlake
Wolfgang Puck Worldwide
NBC Universal
Inc. 5000 Fastest Growing
Companies in North America
KyoceraBerkshire Hathaway
ModernHealth Care
JetEdgeScreen Actors
Guild
Matt LindleyDirector of Security Services
Cal Net Technology GroupSouthern California’s Premier IT Service Provider
CYBERCRIME TRENDS & TARGETS
IT Security Budget & Level of Protection
Val
ue
of
Exp
loit
able
Ass
ets
Enterprise
Small Business
Cybercriminal Sweet SpotMid-size Business
205 days is the average amount of time organizations
had been compromised before they knew it– FireEye/Mandiant - 2015
You are just finding out today that your network was compromised on August 12th 2015
“There are only two types of companies: those that have been hacked and those that will be.”
- 2012 Robert Mueller, Former FBI Director
VICTIM,VULNERABLE OR VAGUE
Don’t Know They’ve Already
Been Hacked
Will Be Hacked
Have Been Hacked
More than 80 percent of U.S. companies have been successfully hacked, according to a Duke University/CFO Magazine Global Business Outlook Survey.
The average cost for detection and escalation only subsequent to a security breach is approximately $417,700*
- Ponemon Institute & IBM 2015 – Cost of Data Breach Report * Cost does not include: Average Total Cost of Data Breach $3.8 Million
Loss of business (Brand)
Remediation and
mitigation costs
Notification
Identity Protection
THE EVOLUTION OF THREATS
“Never before in the history of human kind have people across
the world been subjected to extortion on a massive scale as they are
today”.
-Symantec : The evolution of Ransomware 2015
20051989 2008 2011 2013 2014 2015
RANSOMWARE TODAY
Cisco’s analysis of malware
validated as “known bad”
found that the majority of
that malware—91.3
percent—use the Domain
Name Service in one of
these three ways:
- To gain command and
control
- To exfiltrate data
- To redirect traffic
“99.9%OF THE EXPLOITED
VULNERABILITIES
WERE COMPROMISED
MORE THAN A YEAR
AFTER THE CVE
WAS PUBLISHED.”
“About half of the CVEs
exploited in 2014 went
from publish to pwn in
less than a month.”
VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT
Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known cybersecurity vulnerabilities.
DEFENSE IN DEPTH
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
Perimeter
Network
DEFENSE IN DEPTH
Application
Data
Host
SIEM In Depth
VIIPR
THREAT
RESPONSE
FRAMEWORK
V
I
I
P
R
SECUREMANAGE ENTERPRISE
Security Solutions View Identify Investigate Prioritize Remediate
Managed SIEM Included
Performance, Availability and Change Monitoring Included
Threat Intelligence Center / Threat Feeds Included
Asset Management (CMDB) Included
Single Pane of Glass Portal with Unlimited Users* Included
Customized Dashboards for Security, Performance and Compliance Included
24x7 Event Alerting (Email, Pager/SMS, Dashboard) Included
Internal and External Vulnerability Scanning Included
Vulnerability Remediation Prioritization Included
System Hardening Checks Included
Compliance Alerting, Dashboards and Reporting for PCI, GLBA, FFIEC Included
Threat Monitoring, Analysis and Escalation Included
Expert SOC Analyst Remediation Recommendation Escalation Included
Security Event Remediation (Remote Only) Included
SECUREManage for Enterprise - Compliance
THANKYOU!
CAL NET TECHNOLOGY GROUP