Wednesday, May 6, 2020

My New Cyber Security Companies - 1365 Words

Are you an angel investor in cyber security companies? Are you currently fund raising for your new cyber security company? Do you work in venture capital and invest in cyber? If you ve answered yes to any of these questions then you are are either producing slide decks which are too long or you are spending time looking at slide decks which are too long. Last year, I switched from being a cyber security executive to a venture capitalist focusing on early stage cyber companies. I had always been supportive of the start-up community and had done a bunch of angel investing. In 2016 I started focusing on angel investing full time and in 2017 I launched Gula Tech Adventures which is a fund focused exclusively on cyber security. Over the past†¦show more content†¦Saying that you ve solved cyber security, you increase ROI, .etc isn t enough to get an investor excited these days. Their next question will be how? or so what?. If your What slide helps you differentiate from your competition, this makes it easier for an investor to get excited. Honesty and humility also goes a real long way with investors. Calling out exactly what your advantages are is something a venture capitalist or investor can work with. SLIDE TWO - THE HOW In one slide, describe how you do your what without giving away any proprietary secrets but conveying your ability and comprehension of the problem. Many pitch decks I see completely skip the what slide and start with the how. I see many entrepreneurs dive right into the how as a first introduction to their company. This can be hard for an investor to figure out exactly why you are doing something or why a customer would want to spend money with you on your solution. The how slide should answer many of the basic questions without being evasive. Questions that need to be answered include: Cloud or on-prem. Which components are cloud? Don t say artificial intelligence or machine learning. Instead be specific where you algorithms run on which data and how they manifest in the customer. Agents or no agents? How is it deployed? If you parse logs, which vendors are supported? If you have open source or commercial components, call them out. If it is a cloud solution, doesShow MoreRelatedA Research Project On Cyber Security1230 Words   |  5 Pages Research Proposal Document by Srinivas Vadthya GLS 470 Writing the Research Paper 11/04/2015 Cyber Security Introduction: - for my research project, I would like to explore about the cyber security measures. Cybersecurity covers the fundamental concepts underlying the construction of secure systems from the hardware to the software to the human computer interface, with the use of cryptography to secure interactions. TheseRead MoreTop Three Trends in your profession and associated industry Annotated Bibliography1499 Words   |  6 PagesThe top three trends in the Cyber Security field are salary, career advancement, and the need for predictions of the future in how information is exchanged. Cyber-crimes are becoming more popular and because of the many attacks that are happening much more frequently it has caused for a higher demand in cyber security professionals. Companies spend millions of dollars to correct security breaches within their organization. Back in 2008 the salary range for IT security professionals were in the $80Read MoreWhy I Learned New Techniques1083 Words   |  5 PagesInvestopedia simulation I had always been intimidated by the stock market due to my lack of exposure to it. My limited knowledge of the topic existed through conversations with my dad, who is a financial analyzer. I have always toiled with stock simulations in high school; therefore my intelligence on the subject is modest, but accurate. Furthermore after the simulation, I have learned new techniques to execute in my personal investment portfolio. Due to the little familiarity I have to the stockRead MoreThe Methods Of Social Engineering Attacks745 Words   |  3 PagesPurpose: Th e purpose of this presentation is to inform and educate my audience on the various methods of social engineering attacks because hacking of personal and company accounts and website is in the increase. I want my audience to be able to list and explain three types of social engineering attacks. My central Idea is that social engineering attacks awareness mitigates victimization. Intend Audience: For this presentation, my intended audience consists of people with personal and or job relatedRead MoreStrategic Objectives Of An Cyber Security Branch Is A Large Multi National Corporation That Provides Command, Control,1092 Words   |  5 PagesMissions †¢ Compete Aggressively on New Opportunities †¢ Build Presence in New Growth Markets †¢ Focus on Shareholder Returns (ManTech, 2013) For the purpose of this discussion we will narrow the breadth of ManTech’s numerous ventures within a variety of technology sectors to their recent focus on Cyber Security. According to ManTech’s most recent annual report, the objective of their Cyber Security branch is: â€Å"providing new or improved solutions in cyber security, information assurance, insider threatRead MoreWorld of Network Security Infirmities 1427 Words   |  6 PagesWorld of Network Security Infirmities Network security is a very broad subject for me. I started out in telecommunications field as a Radiomen in United States Navy in 1992. Security was always the main mandate for my job field. I was required to have a security clearance and safeguarding equipment and information for which I had access to. The job area always had all types’ of electronic devices like computers, transmitters, receivers, electronic keying material system (EKMS) equipment, modemsRead MoreInternet Privacy : How Much Privacy Do We Really Have Anymore? Essay1706 Words   |  7 PagesMike Mingone Mrs. Main May 6, 2015 English 15 Essay 5 Internet Privacy How much privacy do we really have anymore? Each and every day new technologies are being born and introduced into our society. A lot of these technologies have something to do with tracking and monitoring the consumer or user of a product or service. I am okay with having my personal information shared with the Internet but only to a point. While Americans claim to care about their privacy, they seem to really care about convenienceRead MoreSecurity Concerns With Having An International Company1114 Words   |  5 Pagesmain security concerns with having an international company. I will be discussing some of those vulnerabilities. So you need to understand that the company culture needs to bridge the gap on these issues so the company can stop these vulnerabilities, so the companies culture needs to direct and guide against these issues. I will use the list from Heimdal Security story â€Å"10 Critical Corporate Cyber Security Risks – A Data Driven List† The first concern is the â€Å"failure to cover cyber security basicsRead MoreCyber Security : The Protection Of Computers1500 Words   |  6 Pagesand practically living our lives online, something needs to keep our precious data safe. Cyber security was the answer to that dilemma, and keeps all of our personal information away from people who have nefarious plans for it. Cyber Security spawned from the technology age. With so many people online and some much data flowing freely, it was only a matter of time before something bad happened. Cyber security is the protection of computers, networks, and pretty much anything that deals with an internetRead MoreThe State Of Cyber Security1389 Words   |  6 PagesThe state of Cyber Security in 2016 is a grim one, every day on the news we hear about another bank or online service getting hacked and consumer information being sold on the darknet, an â€Å"invisible† part of the internet where hackers and criminals sell personal information among other items, or a presidential candidates emails being released. Being a part of the IT community, I am more aware of all these occurrences than the average person who just uses the internet for checking email and seeing

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.