Key Cybersecurity, Inc.
17959 Dumfries Shopping Center Suite B
Dumfries, VA 22026-2490
703.402.2542
Shawn Key
CEO, President skey@keycybersecurity.com
Privileged and Confidential
Most Disruptive Solution – Security Category
Best of Breed – All Security Categories
Inaugural Cohort Member (Graduate)
Cyber Tipline
Provider
™
Provisional Patent No. 61/986,553
Enables agencies and organizations to identify unknown and known file activity typically undetected on the enterprise network and connected devices.
Provides capability to locate desired files algorithmically instead of by keyword, allowing for a paradigm shift in file location independent of file type or language.
“Understanding the file activity on your network is just a few clicks away…”
Undetected child pornography files are being stored on the network.
Privacy Information is being stored in the clear
Corporate reputation is at stake
Embarrassing headlines
Remediation costs
Locate files proactively, reduce liability, handle the issue internally
Identify PI, mitigate concern, ensure compliance with standards/regulations
Intellectual Property is being sent to or accessed by competitors
Corporate espionage
Competitor advantage
Financial loss
Monitor file activity and “bad actors”, locate source of leak, remediate issue
“The Specialized Threat and Protection (STAP) market will reach $1.17 billion in annual revenue by 2017” - IDC
"We are pretty sure we have child pornography on our network but if we find it, we have to do something about it and that becomes onerous and potentially costly."
Sarbanes Oxley Public Law 107-204:
A section of the Sarbanes-Oxley Act that says a person is guilty of a felony, punishable by up to
20 years in prison, if he [sic] “alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States.
”
The American Bar Association Criminal Justice Section
Center for Continuing Legal Education http://www.strozfriedberg.com/files/Publication/2ff70060-e3c5-43f8-bf98-
024a2b4b3509/Presentation/PublicationAttachment/412a1aa4-562b-402d-800d-
0097b96248b6/DigitalContrabandFindingChildPornintheWorkplaceWhiteCollarCrimeProg ram.pdf
“The company must take steps to minimize its own liability risks from an employee’s illegal access to child porn, and those risks can loom large if the illicit images are mishandled.
”
Simply ignoring the problem is not an option, not only from a moral perspective, but also as a legal matter: “doing nothing: could provide a basis for “hostile work environment ” claims or may subject the company to civil suit by “any person aggrieved ” by the possession of the images. Significantly, sticking one’s head in the sand also could expose managers to child porn
“possession” charges or damage the companies reputation if unannounced searches and arrests of employees occur at the workplace.
”
Circulating the child porn images internally or to outside experts to elicit multiple views about how to handle the situation may implicate
“distribution” issues. Relying on inhouse IT staff to investigate the problem also poses potential problems, including the possibility that they might inadvertently taint or destroy evidence, “leak” facts about the internal investigation, or “check out” web sites visited by the offending employee, thereby caching more illegal child porn onto the company network.
”
November 21, 2013
If you've got a big company system, I can almost guarantee that you have child pornography on it…It's there somewhere.’’
Kenneth Citarella, Deputy Chief of Investigations, Westchester
County District Attorney's Office.
“Child pornography is hidden on virtually every large corporate network, according to security experts.
” - Internetnews.com
™
Detection Mode
Find unknown problematic and illicit files
Search Mode
Find all instances of a known file
Forensics Mode
Utilize file reports to augment forensic activities
Automatically Detects/Monitors/Alerts
Compiles Forensic Reports
Customization and “Webcrawling”
Capability
Proprietary “Certainty Hash Value”
Differentiator
Integrated Vision Technology (3Q 2014)
™
CyberMerlin Server
• Server stores file signatures, performs fast matching, provides communications to
CyberMerlin user agents, stores and displays results of scans and much more.
CyberMerlin Web Console
• Provides administrative access to a server, database management, user agent management and much more. Friendly browser user interface powered by
Google Web Toolkit.
CyberMerlin User Agent
• Downloadable agent performs multiple functions – it scans local filesystem and looks for illicit files, In secondary mode, it functions as a crawler to scan/load hashes from the web/cloud. Platform independent and works on Windows, Mac
OSX, Linux and other O/Ss.
Dell Solutions Center (DSC)
Create scalable, cloud based solution which runs ALL major platforms
Dell Appliance Group (NCS)
Create revenue via the distribution of a new capability appliance based solution
Dell Entrepreneur in Residence (EIR)
Applicant for the prestigious Dell Founders Club
Dell OEM Division
Exploring the marketing possibility of CyberMerlin as a desktop OEM solution and/or a network appliance for K-12 organizations (CIPA/FERPA compliance)
DC Innovates
Applicant for DC based grant funding in the Tech Corridor (up to $200k)
th
Shawn R. Key
Founder
15 years of Cybersecurity and
Information Assurance product and services experience
Zal Azmi
Chief Strategy Officer
Former CIO of the FBI
CEO, Nexus Solutions LLC
Dan Woolley
Mach 37 General Partner
Dell, Computer Associates
CEO, Global Integrity
Charles Gold
C. Gold Strategic Marketing
20 years software marketing experience
Skip Lawver
Former Cybercrime SME
Professor Emeritus, Eastern Michigan
University
Informal Advisors
(in contractual discussions)
On behalf of Key Cybersecurity, Inc., we thank you for your time and consideration.
Privileged and Confidential