SlideShare une entreprise Scribd logo
1  sur  8
Protect Yourself from
   Cyber‐Criminality

Presented by Thomas Martinuzzo
Project Leader, Sciences and Engineering
thomas.martinuzzo@univalor.ca
Overview

Licensing Opportunity in Multiple Fields of Use

Technology: 
 • Ready to market 
 • Real‐time Detection of Known Files (10Gbits and more)

Market : $2.1b by 2014 (CAGR: 41.1%, 2008‐2014)

Inventor: Pr. Jean‐Pierre David, École Polytechnique de Montreal

Intellectual Property: US Patent Application + Trade Secret
Case Study


      “…TJX announced the loss of more than 45 
      million credit and debit card numbers that were 
      stolen from its IT systems over an 18‐month 
      period …”

      “…IPLocks, a compliance and database security 
      company, released a report in May 07 estimating 
      that the TJX breach will eventually cost the 
      company $100 per lost record, or a total of $4.5 
      billion”



  Cost = Negative Public Exposure + Brand Name Damage + …   


Source: informationweek.com, 2007
Market
World Data Leakage and Information Loss Prevention
 • $191,9 Millions in 2007
 • $2.1 Billions in 2014

Market Segments
 • Finances and Banking (34%)
 • Healthcare (30%)
 • Manufacturing (14%)
 • Other (Government, Entertainment, Technology) (22%)

Potential Partners:
Needs for Anti‐Data Loss Protection


  Demand for very High Speed Internet



   Comply with Recently Adopted Legislations
 Ex: The SB 1386 law requires anyone doing business in California to
notify anyone whose personal information has been obtained by an
unauthorized party.
Competitive Technologies

Detect Patterns
 • Rebuild the transmitting file
 • Comparison with the data base of protected files


Problem:
  • Do not work at very high speed
Solutions

Pre‐Treatment:
  • Data Base of “Imprints”

We Detect Imprints

Value Proposition: 
 • No need to rebuild the transmitting 
 files
 • Works with all kinds of files
 • Works at 10Gbit/s and more
Real‐Time Detection of Known Files


     Thomas Martinuzzo
thomas.martinuzzo@univalor.ca
        Booth # 402

Contenu connexe

En vedette

Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014LEAD:WNC
 
Three generations of systems and design thinking
Three generations of systems and design thinkingThree generations of systems and design thinking
Three generations of systems and design thinkingAlex Ryan
 
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...Alani Selvey
 
Codigo matlab Secante
Codigo matlab SecanteCodigo matlab Secante
Codigo matlab SecanteTensor
 
Technology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near FutureTechnology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near FutureLarry Smarr
 
Ma vie de courgette
Ma vie de courgetteMa vie de courgette
Ma vie de courgetteFrancisca50
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
 

En vedette (11)

Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014
 
ESTRUCTURA DE UN PROGRAMA
ESTRUCTURA DE UN PROGRAMA ESTRUCTURA DE UN PROGRAMA
ESTRUCTURA DE UN PROGRAMA
 
Three generations of systems and design thinking
Three generations of systems and design thinkingThree generations of systems and design thinking
Three generations of systems and design thinking
 
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
 
Codigo matlab Secante
Codigo matlab SecanteCodigo matlab Secante
Codigo matlab Secante
 
Visninger
VisningerVisninger
Visninger
 
O365 portalen
O365 portalenO365 portalen
O365 portalen
 
Skrive notater
Skrive notaterSkrive notater
Skrive notater
 
Technology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near FutureTechnology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near Future
 
Ma vie de courgette
Ma vie de courgetteMa vie de courgette
Ma vie de courgette
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 

Plus de ThomasUnivalor

Sciences engineering portfolio (2010 08 05)
Sciences  engineering portfolio (2010 08 05)Sciences  engineering portfolio (2010 08 05)
Sciences engineering portfolio (2010 08 05)ThomasUnivalor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorThomasUnivalor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorThomasUnivalor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorThomasUnivalor
 
Visual Cortical Implant
Visual Cortical ImplantVisual Cortical Implant
Visual Cortical ImplantThomasUnivalor
 
Position-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base StationPosition-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base StationThomasUnivalor
 
Deep Information and Extraction Tool
Deep Information and Extraction ToolDeep Information and Extraction Tool
Deep Information and Extraction ToolThomasUnivalor
 
Anti Counterfeiting Filters
Anti Counterfeiting FiltersAnti Counterfeiting Filters
Anti Counterfeiting FiltersThomasUnivalor
 

Plus de ThomasUnivalor (16)

Sciences engineering portfolio (2010 08 05)
Sciences  engineering portfolio (2010 08 05)Sciences  engineering portfolio (2010 08 05)
Sciences engineering portfolio (2010 08 05)
 
Image Interpolation
Image InterpolationImage Interpolation
Image Interpolation
 
Direct Writing
Direct WritingDirect Writing
Direct Writing
 
Color Changing Fibers
Color Changing FibersColor Changing Fibers
Color Changing Fibers
 
The Mr Sub Technology
The Mr Sub TechnologyThe Mr Sub Technology
The Mr Sub Technology
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging Sensor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging Sensor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging Sensor
 
Visual Cortical Implant
Visual Cortical ImplantVisual Cortical Implant
Visual Cortical Implant
 
Phantoms
PhantomsPhantoms
Phantoms
 
Sterilization
SterilizationSterilization
Sterilization
 
60 GHz Antenna
60 GHz Antenna60 GHz Antenna
60 GHz Antenna
 
Photonics West 2008
Photonics West 2008Photonics West 2008
Photonics West 2008
 
Position-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base StationPosition-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base Station
 
Deep Information and Extraction Tool
Deep Information and Extraction ToolDeep Information and Extraction Tool
Deep Information and Extraction Tool
 
Anti Counterfeiting Filters
Anti Counterfeiting FiltersAnti Counterfeiting Filters
Anti Counterfeiting Filters
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Protect Yourself From Cyber Criminality

  • 1. Protect Yourself from Cyber‐Criminality Presented by Thomas Martinuzzo Project Leader, Sciences and Engineering thomas.martinuzzo@univalor.ca
  • 2. Overview Licensing Opportunity in Multiple Fields of Use Technology:  • Ready to market  • Real‐time Detection of Known Files (10Gbits and more) Market : $2.1b by 2014 (CAGR: 41.1%, 2008‐2014) Inventor: Pr. Jean‐Pierre David, École Polytechnique de Montreal Intellectual Property: US Patent Application + Trade Secret
  • 3. Case Study “…TJX announced the loss of more than 45  million credit and debit card numbers that were  stolen from its IT systems over an 18‐month  period …” “…IPLocks, a compliance and database security  company, released a report in May 07 estimating  that the TJX breach will eventually cost the  company $100 per lost record, or a total of $4.5  billion” Cost = Negative Public Exposure + Brand Name Damage + …    Source: informationweek.com, 2007
  • 4. Market World Data Leakage and Information Loss Prevention • $191,9 Millions in 2007 • $2.1 Billions in 2014 Market Segments • Finances and Banking (34%) • Healthcare (30%) • Manufacturing (14%) • Other (Government, Entertainment, Technology) (22%) Potential Partners:
  • 5. Needs for Anti‐Data Loss Protection Demand for very High Speed Internet Comply with Recently Adopted Legislations Ex: The SB 1386 law requires anyone doing business in California to notify anyone whose personal information has been obtained by an unauthorized party.
  • 6. Competitive Technologies Detect Patterns • Rebuild the transmitting file • Comparison with the data base of protected files Problem: • Do not work at very high speed
  • 7. Solutions Pre‐Treatment: • Data Base of “Imprints” We Detect Imprints Value Proposition:  • No need to rebuild the transmitting  files • Works with all kinds of files • Works at 10Gbit/s and more
  • 8. Real‐Time Detection of Known Files Thomas Martinuzzo thomas.martinuzzo@univalor.ca Booth # 402