SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
MOTAGUAPRESENTATION
THE  ULTIMATE  ESTABLISHMENT  FOR  
NEXT  GENERATION  CYBER  ELITEs.
AUGUST  2015  PROPOSAL
TM
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
2
The  Problem
Security,  Privacy  &  the  Internet  
3
..a  bleak  future?
By  2025,  61%  agree  there  will  be  at  
least  one  attack  causing  widespread  
national  harm    
(2014  US  State  of  Cybercrime  Survey)
Skills  Shortage
Almost  half  of  EU  population  (47%)  not  
properly  digitally  skilled
Vehicles
Industry
Sony,  United,  JP  Morgan,  Target,  
some  but  many  disrupted  by  data  
breaches  in  2014
Fintech
Banking  &  Finance  Ind.  are  prime  
targets  of  cyber  crime
Jeep,  Tesla  Model  S,  remote  
access  control
The  Digital  Economyis  increasingly  under  threat
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
4
New  Tech  LandscapeMassive  disruption  brings  Double-­‐Edged  Threat  and  Opportunity
The  biggest  threat  to  an  
organisation  of  any  size  
is  its  one  key  asset:  
its  people.
MORE  
PEOPLE
Every  time  that  you  open  a  
port  in  something,  you  
create  a  doorway  through  
which  bad  guys  can  walk.  
Bruce  Perrin,  
COO/CIO,  Phenix  Energy  Group
MORE  
THINGS
Attackers  moving  faster,  
defences  are  not.  2014  
saw  all-­‐time  high  of  24  
zero-­‐day  vulnerabilities.    
ISTR20,  Symantec
MORE  ATTACKS
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
5
87%  of  SMEs  have  
had  a  Data  Breach
For  larger  businesses,  
average  cost  is  
£450-­‐850,000
£35-­‐65,000  is  the  
Cost  of  Average  
SME  Cyber/Data  
loss …  at  a  cost  of  £12,000  
(recover  typically  12  hours)  
7  Distributed  
DDoS  Attacks  
daily
2015  Bad  Bot  Landscape  
Report,  IW  Tech  Digest
Bots  Outspace  
Humans,  Become  
More  Mobile  and  
Sophisticated
Risk  of  InactionUK  is  Europe’s  Number  One  Target  for  Cyber  Crime
Source:  http://www.cookeandmason.com/blog/10-­‐facts-­‐about-­‐cyber-­‐
crime-­‐uk-­‐data-­‐loss-­‐risks/  
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
6
The  SolutionA  “Google  Campus”  for  Cyber  Security
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
7
A  multi-­‐platform  business  to  establish  skills,  develop  innovation  and  
serve   as   the   ultimate   red   teaming   destination   for   government,  
industry  and  civilians.      
There   needs   to   be   a  vehicle   to   align   all   the   many   initiatives   set   in  
place  to  drive  skills,  develop  IP,  or  export  UK  companies.  As  of  right  
now,  these  are  missing  momentum…  This  is  the  gap  we  want  to  fill.  
I
What  is  Hacker  House?The  fundamental  pillar  of  a  digitally  connected  society.
We  are  to  hacking  what  Code  Club  is  to  coding;  
just  as  the  National  Curriculum  mandated  coding,  
so  will  the  ethics  of  hacking.”

©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
8
ComprehensiveBuilding  on  best  features  out  there  for  a  one  roof,  aggregated  solution.
Coding  in  
Curriculum  
2014-­‐5
Hak5,  Decoded  
Developed  most  widely  used  
hacking  tools,  training  
programme  for  corporate  
execs
Makerspace(s)  
We  visited  ‘hackspaces’  in  NY,  
Boston,  SF,  Estonia  and  
throughout  the  UK.
Digital  Shadows  
Key  industry  players  
collectively  looking  at  sharing  
info  and  enlisting  ethical  
hacking  support
EU  Initiative(s)  
i.e.  EU  Schoolnet,  Facebook,  
Liberty,  Microsoft  and  SAP  
joined  forces  to  train,  promote  
and  advocate  coding  skills.
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
9
Hack  Lab
Haccelerator
l33t  Red  Team
Talent  
Funnel
8-­‐14yr  olds  
Prevention  Focus
Highly  skilled
National  level  
“Make,  Break,  Do”:3-­‐layer  Innovation  model  that  could  be  for  replicated  &  scaled
Mini  Hack  Space  
After  schools  program,  hack  
retreats  etc
Test  Environment  
Security  cleared  virtual  
environment  for  skills  training.
Media  Campaigns  
Fun  accessible  YouTube  
campaign  on  online  ethics.
Mentorship  
Hacker  in  Residence,  rethinking  
apprenticeships
Innovation  Hub
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
11
Educate  &  Empower  Youth
• Average  cyber  crime  arrest:  16yr  old.  
• Lack  malicious  intent  for  most  part  
• Restorative  Justice  
• Don’t  see  alternative  career  or  skills  development  routes    
• Unclear  where  ethical  boundaries  lie
Strengthen  Cyber  Intelligence  &  Resilience  
• Talent  pool  of  very  high  skilled  workers  
• Plan  to  protect  &  prevent,  not  just  remedy  
• Detect  before  exploits  go  public  
• Mitigation  and  Scale
Mission  is  Two-­‐Fold:Establish  Platform  for  Academia,  Industry  &  Government
LAW  ENFORCEMENT  THAT  SCALES:  Track,  identify,  and  target  vulnerabilities  as  they  happen.
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
12
Ý
START
RESEARCH  
TEST  &  
DEVELOPDESIGN BUILD  &  
REFINE
PROMOTE
LAUNCH
Road  MapCurrently  securing  strategic  partnerships,  funding  &  launching  a  pilot.
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
13
The  Haccelerator
A  Y  Incubator  meets  WeWork  meets  Second  Home  meets  L39.
Innovatiove  and  entrepreneurial    
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
14
Business  ModelStill  a  WIP  
3  diff  customer  segments  
require  diff  marketing  
campaigns  
Hackers  &  IS  Experts  
Government/Industry  
Citizens  (namely  kids)
Target
Lean,  organic  structure  
Equity  TBC  
Investment  interest  from  
Barclays,  Hanson  Asset  
Management,  Invest  
South,  and  more.
Structure
Leveraging  Innotech  &  
Cyler  TLA  platforms  ind  
growth  hacking.  
Hack  Night  meet  ups  
Targeted  SM  campaigns  
Weekly  mailers  
Advertising
Establishing  trust  is  key    
strong  team  ethos  
CFO  
CEO/CTO  
2-­‐3  interns  
Management
Scalable  Hacker  Houses  
in  Manchester  &  
Southampton  
Open  flagship  in  London  
then  expand.
Strategy
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
15
HackerDojo
Now  valued  at  $11  billion,  raised  $367m  in  March
Acquired  by  Pinterest  for  a  valuation  of  $11  billion,  
raised  $367m  in  March  2015.
Unit  8200
Arguably  the  world’s  best  intelligence  unit
Lorem  ipsum  dolor  sit  amet,  consectetur  adipiscing.  
Lorem   ipsum   dolor   sit   amet.   Curabitur   elementum  
posuere   pretium.   Curabitur   elementum   posuere  
pretium.  Quisque  nibh  dolor,  dignissim  ac  dignissim  
ut,  luctus  ac  urna.  Aliquam  aliquet  non  massa  quis.
HackerOne
Ethical  hacking  ‘consultancy’
Should  your  organisation  work  with  hackers?  It  would  
be   insane   not   to.   Helping   companies   connect   and  
enlist  responsible  hackers  for  bounty  hacks.  
Market  ResearchBuilding  on  existing,  successful  case  studies
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
16
HERE  EAST  
London’s  Home  for  Making
In  advanced  discussions  with  Gavin  Poole,  CEO.
Potential  Location
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
17
Goals  for  2015/166-­‐month  and  1-­‐year  plan
Maintain   positive   cash   flow   and   break   even   on   Innotech   /   Cyber   TLA  
events
Aggregate   800,000+   viewers   through   Hack   Nights,   content   distribution,  
hackthat.co  by  Jan  2016  -­‐  establish  loyalty  and  consistency
Secure  strategic  partnerships  with  2-­‐3  key  players  in  each  industry  by  Feb  
2016.
Complete  accreditation  courses,  i.e.  CTSE  in  September  2015,  and  further  
technical  skills.
Soft  launch  in  June  2016,  official  launch  by  Sept  2016
18
Marketing  StrategyPreliminary  Branding  
19
Terminology
Hacking  and  negative  connotation.  
But  let’s  ‘own  it’  from  the  get  go,  we  
must  not  dance  around  it.
Strike  the  Right  
balance?
For  government  and  NCA  
involvement,  so  as  not  to  push  
‘real  hackers’  away.
In-­‐House  Security
Protecting  internal  networks  and  
frameworks
Abuse  or  misuse
Need  tight  compliance  &  
accountability  controls  to  ensure  
anything  out  of  HH  is  legitimate  and  
safe
Teachers  &  Parents
Awareness  campaigns,  NCA  comms  
strategy,  Saturday  open  workshops,  
strategic  partnerships
Risk  Management  Strategy
Identifying  &  assessing  potentially  sensitive  areas
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
20
Accreditation
Partnership  with  CREST  
on  vetting  and  clearing  
individuals.
Code  of  Conduct
Define  Honour  Code  to  
be  signed  by  all
Legal  Support
i.e.  Penningtons,  
Cambridge  University
Board  of  Advisors
Members  TBC  
From  academia  and  
cyber  sec.  experts
Systematic
Regular  upkeep  of  
checks  &  balances
Corporate
Enlisting  key  stakeholder  
support  (Barclays,  etc)
Location  
London’s
Mitigating  risksMapping  out  all  assumptions  and  areas  of  risk
21
Why  we’re  perfectly  positioned
Good  strong  relationships  have  been  established  &  are  cultivated;  i.e.  
Innotech’s  Legislating  Lulzsec  boasted  live  streaming  of  800,000  viewers
Unusual  bridge  to  the  hacking  community
ie  Darren  Kitchen  of  Hak5,  founder  of  ‘Pineapple’,  Jamie  Wood  ethical  
hacker  and  founder  of  Patch  Penguin  
Wide  global  network
Access  to  network  and  brand  of  Innotech  Network  &  JA
Credibility  &  weight  within  Tech  Community
Internationally  oriented,  Business,  Law,  Tech  &  Media  backgrounds
Diverse  backgrounds,  highly  committed  team
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
22
Network
Timing
Skilled  Team
Insider  
Knowledge
Our  USP
23
Establishing  Next  Steps
Varying  levels  of  support:
Advisory Endorsement Investment Partnership
Open  to  dialogue  and  discussion  on  how  we  can  work  with  you  in  defining  the  best  way  forward
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
24
Growth
SMEs  suffered  data  breaches  in  2014.
Pillar  of  the  knowledge  economy
60%
Drive  innovation   Cash  injections
Investments,  ie.  £250,000  into    a  
Virtual  Tech  Cluster  by  Lockheed  
Martin
Visibility
2nd  US-­‐UK  Cyber  Sec  Innovation  
Summit  to  showcase  UK  cos
Skills  shortage
Promising  IndustryComplements  and  furthers  work  of  the  NCSP  &  Cyber  Growth  Partnership
No.  of  Cyber  Security  Exports
https://www.gov.uk/government/news/cyber-security-boost-for-uk-firms
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
25
Jennifer  Arcuri
CIO  &  Founder
Luciana  Se
COO  &  Co-­‐Founder
Ghandi  El-­‐Chaama
Creative  Director
Louis  
Marketing  &  Growth
Meet  Our  Great  Team
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
26
Address  
Hacker  House  Ltd  
134  Shoreditch  High  St  
London  
E16JE
Phone  &  Email  
F:  +44  (0)  20  3488  1304  
M:  +44  (0)  7971  277923  
jennifer@myhackerhouse.com  
luciana@myhackerhouse.com  
Social  Media  
Facebook.com/MyHackerHouse  
Twitter.com/HackerHouse  
Youtube.com/HackerHouse
Contact  Us
©  2015  Hacker  House  Ltd.  All  Rights  Reserved.  
27
THANK  YOU
“  
”It  may  sound  crazy  to  try  this.  
But  it  may  also  be  irresponsible  not  to…”  
Bill  Gurley,    
VC  at  Benchmark  Capital,  2015

Contenu connexe

Tendances

20101116 deckers
20101116 deckers20101116 deckers
20101116 deckersCIONET
 
BlockChain_Brochure
BlockChain_BrochureBlockChain_Brochure
BlockChain_BrochureThi Dang
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystTuan Yang
 
A New Era of Leadership - From Hierarchy to Network
A New Era of Leadership - From Hierarchy to NetworkA New Era of Leadership - From Hierarchy to Network
A New Era of Leadership - From Hierarchy to NetworkTeemu Arina
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
 
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis GuardaDigital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis GuardaDinis Guarda
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Xtandit_Marketing
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Thailand Fintech landscape 2016 special report by techsauce
Thailand Fintech landscape 2016 special report by techsauce Thailand Fintech landscape 2016 special report by techsauce
Thailand Fintech landscape 2016 special report by techsauce Techsauce Media
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALdjnonstp
 
UKTI - 'Global Entrepreneur Programme' Brochure
UKTI - 'Global Entrepreneur Programme' BrochureUKTI - 'Global Entrepreneur Programme' Brochure
UKTI - 'Global Entrepreneur Programme' BrochureMartin Dare-Edwards
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Sparity Inc.
 
The Top 20 Movers & Shakers in UK FinTech
The Top 20 Movers & Shakers in UK FinTechThe Top 20 Movers & Shakers in UK FinTech
The Top 20 Movers & Shakers in UK FinTechThe Pathway Group
 
The Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAli
The Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAliThe Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAli
The Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAliThe Pathway Group
 

Tendances (14)

20101116 deckers
20101116 deckers20101116 deckers
20101116 deckers
 
BlockChain_Brochure
BlockChain_BrochureBlockChain_Brochure
BlockChain_Brochure
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence Analyst
 
A New Era of Leadership - From Hierarchy to Network
A New Era of Leadership - From Hierarchy to NetworkA New Era of Leadership - From Hierarchy to Network
A New Era of Leadership - From Hierarchy to Network
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis GuardaDigital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
Digital Transformation Strategy - 4IR AI Blockchain Fintech by Dinis Guarda
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Thailand Fintech landscape 2016 special report by techsauce
Thailand Fintech landscape 2016 special report by techsauce Thailand Fintech landscape 2016 special report by techsauce
Thailand Fintech landscape 2016 special report by techsauce
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINAL
 
UKTI - 'Global Entrepreneur Programme' Brochure
UKTI - 'Global Entrepreneur Programme' BrochureUKTI - 'Global Entrepreneur Programme' Brochure
UKTI - 'Global Entrepreneur Programme' Brochure
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar
 
The Top 20 Movers & Shakers in UK FinTech
The Top 20 Movers & Shakers in UK FinTechThe Top 20 Movers & Shakers in UK FinTech
The Top 20 Movers & Shakers in UK FinTech
 
The Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAli
The Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAliThe Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAli
The Top 20 Movers & Shakers in UK FinTech compiled by @SafarazAli
 

En vedette

Sidekick School Proposal - Fix My House
Sidekick School Proposal - Fix My HouseSidekick School Proposal - Fix My House
Sidekick School Proposal - Fix My HouseNick Marsh
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
Ericsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of thingsEricsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of thingsEricsson
 
Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016Andrey Apuhtin
 
Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle David Sweigert
 
7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoostChris Out
 
Proposals & Progress Reports
 Proposals & Progress Reports Proposals & Progress Reports
Proposals & Progress ReportsQatar University
 
02 proposal report_preparation_2nd_sem
02 proposal report_preparation_2nd_sem02 proposal report_preparation_2nd_sem
02 proposal report_preparation_2nd_semjenrefamonte
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
The Foundations of Social Media Risk Management
The Foundations of Social Media Risk ManagementThe Foundations of Social Media Risk Management
The Foundations of Social Media Risk Management3Sixty Insights
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Simon Fraser University
 
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemSam Bowne
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
Over-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carOver-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carPratik Desai, PhD
 
Social Media Proposal for Alpha House
Social Media Proposal for Alpha HouseSocial Media Proposal for Alpha House
Social Media Proposal for Alpha HouseAmy Grabowski
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkSam Bowne
 

En vedette (20)

Sidekick School Proposal - Fix My House
Sidekick School Proposal - Fix My HouseSidekick School Proposal - Fix My House
Sidekick School Proposal - Fix My House
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Ericsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of thingsEricsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of things
 
Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016
 
Proposal for Foldable Mobile House
Proposal for Foldable Mobile HouseProposal for Foldable Mobile House
Proposal for Foldable Mobile House
 
Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle
 
7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost
 
Proposals & Progress Reports
 Proposals & Progress Reports Proposals & Progress Reports
Proposals & Progress Reports
 
02 proposal report_preparation_2nd_sem
02 proposal report_preparation_2nd_sem02 proposal report_preparation_2nd_sem
02 proposal report_preparation_2nd_sem
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
The Foundations of Social Media Risk Management
The Foundations of Social Media Risk ManagementThe Foundations of Social Media Risk Management
The Foundations of Social Media Risk Management
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...
 
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystem
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
Over-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carOver-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected car
 
Social Media Proposal for Alpha House
Social Media Proposal for Alpha HouseSocial Media Proposal for Alpha House
Social Media Proposal for Alpha House
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
 

Similaire à Hacker House August Proposal

Hack fund pitch deck
Hack fund pitch deckHack fund pitch deck
Hack fund pitch deckRenata George
 
The Incubators of Future
The Incubators of FutureThe Incubators of Future
The Incubators of FutureSilvija Seres
 
InsureNXT-Unicorn session_Final 21 April 2021.pdf
InsureNXT-Unicorn session_Final 21 April 2021.pdfInsureNXT-Unicorn session_Final 21 April 2021.pdf
InsureNXT-Unicorn session_Final 21 April 2021.pdfAlchemy Crew
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
EXXA Wallet Power Point Presentation
EXXA Wallet Power Point Presentation EXXA Wallet Power Point Presentation
EXXA Wallet Power Point Presentation TonyGalinski
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2Elisha Quaye
 
Hilo.io executive summary (two pager)
Hilo.io executive summary (two pager)Hilo.io executive summary (two pager)
Hilo.io executive summary (two pager)roses/foundation
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskDominika Rusek
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-NetherlandsDominika Rusek
 
KSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEWKSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEWCarmarley Dennis
 
FinTech 2015 Edinburgh
FinTech 2015 EdinburghFinTech 2015 Edinburgh
FinTech 2015 EdinburghRay Bugg
 
Mobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psMobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psEd Pimentel
 
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De WaeleFintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De WaeleFinTech Belgium
 
Business and Anarchy Event: Digital Finance Revolution
Business and Anarchy Event: Digital Finance RevolutionBusiness and Anarchy Event: Digital Finance Revolution
Business and Anarchy Event: Digital Finance RevolutionGrow VC Group
 
Anarchy and Business Event: Digital Finance Revolution
Anarchy and Business Event: Digital Finance RevolutionAnarchy and Business Event: Digital Finance Revolution
Anarchy and Business Event: Digital Finance RevolutionJouko Ahvenainen
 
Wharton FinTech - Launching a FinTech Venture
Wharton FinTech - Launching a FinTech VentureWharton FinTech - Launching a FinTech Venture
Wharton FinTech - Launching a FinTech Venturewhartonfintech
 
Hack Fund V - Pitch Deck
Hack Fund V - Pitch DeckHack Fund V - Pitch Deck
Hack Fund V - Pitch DeckHack Fund V
 
DIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index Ventures
DIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index VenturesDIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index Ventures
DIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index VenturesCapgemini
 

Similaire à Hacker House August Proposal (20)

Hack fund pitch deck
Hack fund pitch deckHack fund pitch deck
Hack fund pitch deck
 
The Incubators of Future
The Incubators of FutureThe Incubators of Future
The Incubators of Future
 
InsureNXT-Unicorn session_Final 21 April 2021.pdf
InsureNXT-Unicorn session_Final 21 April 2021.pdfInsureNXT-Unicorn session_Final 21 April 2021.pdf
InsureNXT-Unicorn session_Final 21 April 2021.pdf
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
EXXA Wallet Power Point Presentation
EXXA Wallet Power Point Presentation EXXA Wallet Power Point Presentation
EXXA Wallet Power Point Presentation
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
 
Hilo.io executive summary (two pager)
Hilo.io executive summary (two pager)Hilo.io executive summary (two pager)
Hilo.io executive summary (two pager)
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
 
Extreme Digital Ventures
Extreme Digital VenturesExtreme Digital Ventures
Extreme Digital Ventures
 
KSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEWKSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEW
 
FinTech 2015 Edinburgh
FinTech 2015 EdinburghFinTech 2015 Edinburgh
FinTech 2015 Edinburgh
 
Mobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psMobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_ps
 
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De WaeleFintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
 
Business and Anarchy Event: Digital Finance Revolution
Business and Anarchy Event: Digital Finance RevolutionBusiness and Anarchy Event: Digital Finance Revolution
Business and Anarchy Event: Digital Finance Revolution
 
Anarchy and Business Event: Digital Finance Revolution
Anarchy and Business Event: Digital Finance RevolutionAnarchy and Business Event: Digital Finance Revolution
Anarchy and Business Event: Digital Finance Revolution
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
Wharton FinTech - Launching a FinTech Venture
Wharton FinTech - Launching a FinTech VentureWharton FinTech - Launching a FinTech Venture
Wharton FinTech - Launching a FinTech Venture
 
Hack Fund V - Pitch Deck
Hack Fund V - Pitch DeckHack Fund V - Pitch Deck
Hack Fund V - Pitch Deck
 
DIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index Ventures
DIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index VenturesDIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index Ventures
DIGITAL LEADERSHIP: An interview with Saul Klein Partner with Index Ventures
 

Dernier

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 

Dernier (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 

Hacker House August Proposal

  • 1. MOTAGUAPRESENTATION THE  ULTIMATE  ESTABLISHMENT  FOR   NEXT  GENERATION  CYBER  ELITEs. AUGUST  2015  PROPOSAL TM
  • 2. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   2 The  Problem Security,  Privacy  &  the  Internet  
  • 3. 3 ..a  bleak  future? By  2025,  61%  agree  there  will  be  at   least  one  attack  causing  widespread   national  harm     (2014  US  State  of  Cybercrime  Survey) Skills  Shortage Almost  half  of  EU  population  (47%)  not   properly  digitally  skilled Vehicles Industry Sony,  United,  JP  Morgan,  Target,   some  but  many  disrupted  by  data   breaches  in  2014 Fintech Banking  &  Finance  Ind.  are  prime   targets  of  cyber  crime Jeep,  Tesla  Model  S,  remote   access  control The  Digital  Economyis  increasingly  under  threat
  • 4. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   4 New  Tech  LandscapeMassive  disruption  brings  Double-­‐Edged  Threat  and  Opportunity The  biggest  threat  to  an   organisation  of  any  size   is  its  one  key  asset:   its  people. MORE   PEOPLE Every  time  that  you  open  a   port  in  something,  you   create  a  doorway  through   which  bad  guys  can  walk.   Bruce  Perrin,   COO/CIO,  Phenix  Energy  Group MORE   THINGS Attackers  moving  faster,   defences  are  not.  2014   saw  all-­‐time  high  of  24   zero-­‐day  vulnerabilities.     ISTR20,  Symantec MORE  ATTACKS
  • 5. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   5 87%  of  SMEs  have   had  a  Data  Breach For  larger  businesses,   average  cost  is   £450-­‐850,000 £35-­‐65,000  is  the   Cost  of  Average   SME  Cyber/Data   loss …  at  a  cost  of  £12,000   (recover  typically  12  hours)   7  Distributed   DDoS  Attacks   daily 2015  Bad  Bot  Landscape   Report,  IW  Tech  Digest Bots  Outspace   Humans,  Become   More  Mobile  and   Sophisticated Risk  of  InactionUK  is  Europe’s  Number  One  Target  for  Cyber  Crime Source:  http://www.cookeandmason.com/blog/10-­‐facts-­‐about-­‐cyber-­‐ crime-­‐uk-­‐data-­‐loss-­‐risks/  
  • 6. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   6 The  SolutionA  “Google  Campus”  for  Cyber  Security
  • 7. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   7 A  multi-­‐platform  business  to  establish  skills,  develop  innovation  and   serve   as   the   ultimate   red   teaming   destination   for   government,   industry  and  civilians.       There   needs   to   be   a  vehicle   to   align   all   the   many   initiatives   set   in   place  to  drive  skills,  develop  IP,  or  export  UK  companies.  As  of  right   now,  these  are  missing  momentum…  This  is  the  gap  we  want  to  fill.   I What  is  Hacker  House?The  fundamental  pillar  of  a  digitally  connected  society. We  are  to  hacking  what  Code  Club  is  to  coding;   just  as  the  National  Curriculum  mandated  coding,   so  will  the  ethics  of  hacking.”

  • 8. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   8 ComprehensiveBuilding  on  best  features  out  there  for  a  one  roof,  aggregated  solution. Coding  in   Curriculum   2014-­‐5 Hak5,  Decoded   Developed  most  widely  used   hacking  tools,  training   programme  for  corporate   execs Makerspace(s)   We  visited  ‘hackspaces’  in  NY,   Boston,  SF,  Estonia  and   throughout  the  UK. Digital  Shadows   Key  industry  players   collectively  looking  at  sharing   info  and  enlisting  ethical   hacking  support EU  Initiative(s)   i.e.  EU  Schoolnet,  Facebook,   Liberty,  Microsoft  and  SAP   joined  forces  to  train,  promote   and  advocate  coding  skills.
  • 9. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   9 Hack  Lab Haccelerator l33t  Red  Team Talent   Funnel 8-­‐14yr  olds   Prevention  Focus Highly  skilled National  level   “Make,  Break,  Do”:3-­‐layer  Innovation  model  that  could  be  for  replicated  &  scaled
  • 10. Mini  Hack  Space   After  schools  program,  hack   retreats  etc Test  Environment   Security  cleared  virtual   environment  for  skills  training. Media  Campaigns   Fun  accessible  YouTube   campaign  on  online  ethics. Mentorship   Hacker  in  Residence,  rethinking   apprenticeships Innovation  Hub
  • 11. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   11 Educate  &  Empower  Youth • Average  cyber  crime  arrest:  16yr  old.   • Lack  malicious  intent  for  most  part   • Restorative  Justice   • Don’t  see  alternative  career  or  skills  development  routes     • Unclear  where  ethical  boundaries  lie Strengthen  Cyber  Intelligence  &  Resilience   • Talent  pool  of  very  high  skilled  workers   • Plan  to  protect  &  prevent,  not  just  remedy   • Detect  before  exploits  go  public   • Mitigation  and  Scale Mission  is  Two-­‐Fold:Establish  Platform  for  Academia,  Industry  &  Government LAW  ENFORCEMENT  THAT  SCALES:  Track,  identify,  and  target  vulnerabilities  as  they  happen.
  • 12. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   12 Ý START RESEARCH   TEST  &   DEVELOPDESIGN BUILD  &   REFINE PROMOTE LAUNCH Road  MapCurrently  securing  strategic  partnerships,  funding  &  launching  a  pilot.
  • 13. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   13 The  Haccelerator A  Y  Incubator  meets  WeWork  meets  Second  Home  meets  L39. Innovatiove  and  entrepreneurial    
  • 14. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   14 Business  ModelStill  a  WIP   3  diff  customer  segments   require  diff  marketing   campaigns   Hackers  &  IS  Experts   Government/Industry   Citizens  (namely  kids) Target Lean,  organic  structure   Equity  TBC   Investment  interest  from   Barclays,  Hanson  Asset   Management,  Invest   South,  and  more. Structure Leveraging  Innotech  &   Cyler  TLA  platforms  ind   growth  hacking.   Hack  Night  meet  ups   Targeted  SM  campaigns   Weekly  mailers   Advertising Establishing  trust  is  key     strong  team  ethos   CFO   CEO/CTO   2-­‐3  interns   Management Scalable  Hacker  Houses   in  Manchester  &   Southampton   Open  flagship  in  London   then  expand. Strategy
  • 15. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   15 HackerDojo Now  valued  at  $11  billion,  raised  $367m  in  March Acquired  by  Pinterest  for  a  valuation  of  $11  billion,   raised  $367m  in  March  2015. Unit  8200 Arguably  the  world’s  best  intelligence  unit Lorem  ipsum  dolor  sit  amet,  consectetur  adipiscing.   Lorem   ipsum   dolor   sit   amet.   Curabitur   elementum   posuere   pretium.   Curabitur   elementum   posuere   pretium.  Quisque  nibh  dolor,  dignissim  ac  dignissim   ut,  luctus  ac  urna.  Aliquam  aliquet  non  massa  quis. HackerOne Ethical  hacking  ‘consultancy’ Should  your  organisation  work  with  hackers?  It  would   be   insane   not   to.   Helping   companies   connect   and   enlist  responsible  hackers  for  bounty  hacks.   Market  ResearchBuilding  on  existing,  successful  case  studies
  • 16. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   16 HERE  EAST   London’s  Home  for  Making In  advanced  discussions  with  Gavin  Poole,  CEO. Potential  Location
  • 17. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   17 Goals  for  2015/166-­‐month  and  1-­‐year  plan Maintain   positive   cash   flow   and   break   even   on   Innotech   /   Cyber   TLA   events Aggregate   800,000+   viewers   through   Hack   Nights,   content   distribution,   hackthat.co  by  Jan  2016  -­‐  establish  loyalty  and  consistency Secure  strategic  partnerships  with  2-­‐3  key  players  in  each  industry  by  Feb   2016. Complete  accreditation  courses,  i.e.  CTSE  in  September  2015,  and  further   technical  skills. Soft  launch  in  June  2016,  official  launch  by  Sept  2016
  • 19. 19 Terminology Hacking  and  negative  connotation.   But  let’s  ‘own  it’  from  the  get  go,  we   must  not  dance  around  it. Strike  the  Right   balance? For  government  and  NCA   involvement,  so  as  not  to  push   ‘real  hackers’  away. In-­‐House  Security Protecting  internal  networks  and   frameworks Abuse  or  misuse Need  tight  compliance  &   accountability  controls  to  ensure   anything  out  of  HH  is  legitimate  and   safe Teachers  &  Parents Awareness  campaigns,  NCA  comms   strategy,  Saturday  open  workshops,   strategic  partnerships Risk  Management  Strategy Identifying  &  assessing  potentially  sensitive  areas
  • 20. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   20 Accreditation Partnership  with  CREST   on  vetting  and  clearing   individuals. Code  of  Conduct Define  Honour  Code  to   be  signed  by  all Legal  Support i.e.  Penningtons,   Cambridge  University Board  of  Advisors Members  TBC   From  academia  and   cyber  sec.  experts Systematic Regular  upkeep  of   checks  &  balances Corporate Enlisting  key  stakeholder   support  (Barclays,  etc) Location   London’s Mitigating  risksMapping  out  all  assumptions  and  areas  of  risk
  • 21. 21 Why  we’re  perfectly  positioned Good  strong  relationships  have  been  established  &  are  cultivated;  i.e.   Innotech’s  Legislating  Lulzsec  boasted  live  streaming  of  800,000  viewers Unusual  bridge  to  the  hacking  community ie  Darren  Kitchen  of  Hak5,  founder  of  ‘Pineapple’,  Jamie  Wood  ethical   hacker  and  founder  of  Patch  Penguin   Wide  global  network Access  to  network  and  brand  of  Innotech  Network  &  JA Credibility  &  weight  within  Tech  Community Internationally  oriented,  Business,  Law,  Tech  &  Media  backgrounds Diverse  backgrounds,  highly  committed  team
  • 22. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   22 Network Timing Skilled  Team Insider   Knowledge Our  USP
  • 23. 23 Establishing  Next  Steps Varying  levels  of  support: Advisory Endorsement Investment Partnership Open  to  dialogue  and  discussion  on  how  we  can  work  with  you  in  defining  the  best  way  forward
  • 24. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   24 Growth SMEs  suffered  data  breaches  in  2014. Pillar  of  the  knowledge  economy 60% Drive  innovation   Cash  injections Investments,  ie.  £250,000  into    a   Virtual  Tech  Cluster  by  Lockheed   Martin Visibility 2nd  US-­‐UK  Cyber  Sec  Innovation   Summit  to  showcase  UK  cos Skills  shortage Promising  IndustryComplements  and  furthers  work  of  the  NCSP  &  Cyber  Growth  Partnership No.  of  Cyber  Security  Exports https://www.gov.uk/government/news/cyber-security-boost-for-uk-firms
  • 25. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   25 Jennifer  Arcuri CIO  &  Founder Luciana  Se COO  &  Co-­‐Founder Ghandi  El-­‐Chaama Creative  Director Louis   Marketing  &  Growth Meet  Our  Great  Team
  • 26. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   26 Address   Hacker  House  Ltd   134  Shoreditch  High  St   London   E16JE Phone  &  Email   F:  +44  (0)  20  3488  1304   M:  +44  (0)  7971  277923   jennifer@myhackerhouse.com   luciana@myhackerhouse.com   Social  Media   Facebook.com/MyHackerHouse   Twitter.com/HackerHouse   Youtube.com/HackerHouse Contact  Us
  • 27. ©  2015  Hacker  House  Ltd.  All  Rights  Reserved.   27 THANK  YOU “   ”It  may  sound  crazy  to  try  this.   But  it  may  also  be  irresponsible  not  to…”   Bill  Gurley,     VC  at  Benchmark  Capital,  2015