SlideShare a Scribd company logo
1 of 8
Protect Yourself from
   Cyber‐Criminality

Presented by Thomas Martinuzzo
Project Leader, Sciences and Engineering
thomas.martinuzzo@univalor.ca
Overview

Licensing Opportunity in Multiple Fields of Use

Technology: 
 • Ready to market 
 • Real‐time Detection of Known Files (10Gbits and more)

Market : $2.1b by 2014 (CAGR: 41.1%, 2008‐2014)

Inventor: Pr. Jean‐Pierre David, École Polytechnique de Montreal

Intellectual Property: US Patent Application + Trade Secret
Case Study


      “…TJX announced the loss of more than 45 
      million credit and debit card numbers that were 
      stolen from its IT systems over an 18‐month 
      period …”

      “…IPLocks, a compliance and database security 
      company, released a report in May 07 estimating 
      that the TJX breach will eventually cost the 
      company $100 per lost record, or a total of $4.5 
      billion”



  Cost = Negative Public Exposure + Brand Name Damage + …   


Source: informationweek.com, 2007
Market
World Data Leakage and Information Loss Prevention
 • $191,9 Millions in 2007
 • $2.1 Billions in 2014

Market Segments
 • Finances and Banking (34%)
 • Healthcare (30%)
 • Manufacturing (14%)
 • Other (Government, Entertainment, Technology) (22%)

Potential Partners:
Needs for Anti‐Data Loss Protection


  Demand for very High Speed Internet



   Comply with Recently Adopted Legislations
 Ex: The SB 1386 law requires anyone doing business in California to
notify anyone whose personal information has been obtained by an
unauthorized party.
Competitive Technologies

Detect Patterns
 • Rebuild the transmitting file
 • Comparison with the data base of protected files


Problem:
  • Do not work at very high speed
Solutions

Pre‐Treatment:
  • Data Base of “Imprints”

We Detect Imprints

Value Proposition: 
 • No need to rebuild the transmitting 
 files
 • Works with all kinds of files
 • Works at 10Gbit/s and more
Real‐Time Detection of Known Files


     Thomas Martinuzzo
thomas.martinuzzo@univalor.ca
        Booth # 402

More Related Content

Viewers also liked

Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014LEAD:WNC
 
Three generations of systems and design thinking
Three generations of systems and design thinkingThree generations of systems and design thinking
Three generations of systems and design thinkingAlex Ryan
 
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...Alani Selvey
 
Codigo matlab Secante
Codigo matlab SecanteCodigo matlab Secante
Codigo matlab SecanteTensor
 
Technology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near FutureTechnology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near FutureLarry Smarr
 
Ma vie de courgette
Ma vie de courgetteMa vie de courgette
Ma vie de courgetteFrancisca50
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
 

Viewers also liked (11)

Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014Education - K 12 STEM Education - LEAD:WNC 2014
Education - K 12 STEM Education - LEAD:WNC 2014
 
ESTRUCTURA DE UN PROGRAMA
ESTRUCTURA DE UN PROGRAMA ESTRUCTURA DE UN PROGRAMA
ESTRUCTURA DE UN PROGRAMA
 
Three generations of systems and design thinking
Three generations of systems and design thinkingThree generations of systems and design thinking
Three generations of systems and design thinking
 
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
Causative Factor(s) of Agglomeration Observed for Lots of Lorcaserin Hydrochl...
 
Codigo matlab Secante
Codigo matlab SecanteCodigo matlab Secante
Codigo matlab Secante
 
Visninger
VisningerVisninger
Visninger
 
O365 portalen
O365 portalenO365 portalen
O365 portalen
 
Skrive notater
Skrive notaterSkrive notater
Skrive notater
 
Technology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near FutureTechnology-Driven Disruptions in the Near Future
Technology-Driven Disruptions in the Near Future
 
Ma vie de courgette
Ma vie de courgetteMa vie de courgette
Ma vie de courgette
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 

More from ThomasUnivalor

Sciences engineering portfolio (2010 08 05)
Sciences  engineering portfolio (2010 08 05)Sciences  engineering portfolio (2010 08 05)
Sciences engineering portfolio (2010 08 05)ThomasUnivalor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorThomasUnivalor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorThomasUnivalor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorThomasUnivalor
 
Visual Cortical Implant
Visual Cortical ImplantVisual Cortical Implant
Visual Cortical ImplantThomasUnivalor
 
Position-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base StationPosition-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base StationThomasUnivalor
 
Deep Information and Extraction Tool
Deep Information and Extraction ToolDeep Information and Extraction Tool
Deep Information and Extraction ToolThomasUnivalor
 
Anti Counterfeiting Filters
Anti Counterfeiting FiltersAnti Counterfeiting Filters
Anti Counterfeiting FiltersThomasUnivalor
 

More from ThomasUnivalor (16)

Sciences engineering portfolio (2010 08 05)
Sciences  engineering portfolio (2010 08 05)Sciences  engineering portfolio (2010 08 05)
Sciences engineering portfolio (2010 08 05)
 
Image Interpolation
Image InterpolationImage Interpolation
Image Interpolation
 
Direct Writing
Direct WritingDirect Writing
Direct Writing
 
Color Changing Fibers
Color Changing FibersColor Changing Fibers
Color Changing Fibers
 
The Mr Sub Technology
The Mr Sub TechnologyThe Mr Sub Technology
The Mr Sub Technology
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging Sensor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging Sensor
 
Filterless Corlor Imaging Sensor
Filterless Corlor Imaging SensorFilterless Corlor Imaging Sensor
Filterless Corlor Imaging Sensor
 
Visual Cortical Implant
Visual Cortical ImplantVisual Cortical Implant
Visual Cortical Implant
 
Phantoms
PhantomsPhantoms
Phantoms
 
Sterilization
SterilizationSterilization
Sterilization
 
60 GHz Antenna
60 GHz Antenna60 GHz Antenna
60 GHz Antenna
 
Photonics West 2008
Photonics West 2008Photonics West 2008
Photonics West 2008
 
Position-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base StationPosition-Location in Mobile Networks Using a Single Base Station
Position-Location in Mobile Networks Using a Single Base Station
 
Deep Information and Extraction Tool
Deep Information and Extraction ToolDeep Information and Extraction Tool
Deep Information and Extraction Tool
 
Anti Counterfeiting Filters
Anti Counterfeiting FiltersAnti Counterfeiting Filters
Anti Counterfeiting Filters
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Protect Yourself From Cyber Criminality

  • 1. Protect Yourself from Cyber‐Criminality Presented by Thomas Martinuzzo Project Leader, Sciences and Engineering thomas.martinuzzo@univalor.ca
  • 2. Overview Licensing Opportunity in Multiple Fields of Use Technology:  • Ready to market  • Real‐time Detection of Known Files (10Gbits and more) Market : $2.1b by 2014 (CAGR: 41.1%, 2008‐2014) Inventor: Pr. Jean‐Pierre David, École Polytechnique de Montreal Intellectual Property: US Patent Application + Trade Secret
  • 3. Case Study “…TJX announced the loss of more than 45  million credit and debit card numbers that were  stolen from its IT systems over an 18‐month  period …” “…IPLocks, a compliance and database security  company, released a report in May 07 estimating  that the TJX breach will eventually cost the  company $100 per lost record, or a total of $4.5  billion” Cost = Negative Public Exposure + Brand Name Damage + …    Source: informationweek.com, 2007
  • 4. Market World Data Leakage and Information Loss Prevention • $191,9 Millions in 2007 • $2.1 Billions in 2014 Market Segments • Finances and Banking (34%) • Healthcare (30%) • Manufacturing (14%) • Other (Government, Entertainment, Technology) (22%) Potential Partners:
  • 5. Needs for Anti‐Data Loss Protection Demand for very High Speed Internet Comply with Recently Adopted Legislations Ex: The SB 1386 law requires anyone doing business in California to notify anyone whose personal information has been obtained by an unauthorized party.
  • 6. Competitive Technologies Detect Patterns • Rebuild the transmitting file • Comparison with the data base of protected files Problem: • Do not work at very high speed
  • 7. Solutions Pre‐Treatment: • Data Base of “Imprints” We Detect Imprints Value Proposition:  • No need to rebuild the transmitting  files • Works with all kinds of files • Works at 10Gbit/s and more
  • 8. Real‐Time Detection of Known Files Thomas Martinuzzo thomas.martinuzzo@univalor.ca Booth # 402