Date: June 25, 2015
Opportunities in Cybersecurity
Join us June 25th at Wetherby Asset Management to discuss entrepreneurial and job opportunities in cybersecurity. We have a packed evening with two technical presentations and a sponsor presentation and the chance to network over food and wine. Come and help kick off year three of the Chapter!
Presentation #1: Opportunities in Forming a Cybersecurity Startup
Is your startup waiting to be born? This presentation will be multi-part with first a discussion by Mahendra Ramsinghani about (a) How to assess market opportunity, (b) identify if you have the ability to risk it, and (c) tactics to raise capital. Following this will be Matthew Tamayo-Rios presenting the Kryptnostic startup story with a detailed technical overview of homomorphic encryption and encrypted search. Finally a ‘fireside chat / Q&A” will be moderated by Mahendra.
Mahendra Ramsinghani Matthew Tamayo-Rios
Mahendra Ramsinghani brings his two decades of business expertise to foster innovation with infosec / cybersecurity startups. He works with founders to develop their value proposition, engage with CISOs of Fortune 500 companies and attract capital from the best-in-class security investors.
As Managing Director of First Step Fund, he has led investments in over fifty startups. Mahendra is the author of two leading books on venture capital and startups – “The Business of Venture Capital” (Wiley Finance, 2014) and “Startup Boards” (Wiley, 2014) co-authored with noted VC Brad Feld. His articles have been published in Forbes, MIT Technology Review and Huffington Post.
As a frequent speaker on Venture Capital & Technology, Mahendra has presented at IBF Venture Conference (San Francisco), Swissnex – Future of Cyber security (San Francisco), Traction (Vancouver, BC), Thompson Reuters VCJ Alpha Conference (Boston & San Francisco) and National Public Radio 91.7 UOFM.
His educational background includes a B. Engg. (Electronics) and MBA (Finance & Marketing) from University of Pune, India.
Matthew Tamayo-Rios is Founder and CEO of Kryptnostic. Kryptnostic has solved the challenge of search inside encrypted objects. Its team of determined optimists has formerly worked at Palantir, Microsoft and is firmly united by the belief that enterprises can safely leverage their data in the cloud. Leading investors such as Index Ventures, Felicis Ventures, Harrison Metal and RRE Ventures back the company.
Previously, Matthew has worked at Microsoft on the OS Security team and at Palantir, Raytheon and AOL. He got started in computer security at the early age of nine, hacking his mother’s point of sale retail system to adjust the ice cream inventory. Matthew earned his BS in Math, Computer Science at RPI and MS at University of Washington.
Sponsor Presentation: Humming Heads’ API-Whitelist Solution
We are welcoming our Chapter’s platinum sponsor Humming Heads to provide background on adopting an API-Whitelist solution, and to introduce and demo the application of this solution in their technology. Representatives from the Humming Heads’ Tokyo team will be flying in to participate led by Kato Mikiya (President Humming Heads USA).
SHINOBI Defense Platform marks an abrupt departure from the standard PC security model. Instead of a black list identifying prohibited software, viruses, malware and similar threats — also known as a signature file, SHINOBI employs its patented API monitoring technology to provide the only effective whitelisting cyber defense system available. Humming Heads is authorized by ISO/IEC 15408 LEVEL-EAL3 for its basic technology, and SHINOBI is in the process of receiving the same authorization. SHINOBI monitors all API activity and will only allow programs whose APIs it has identified as safe to access a computer or system.
Additional information is available at:
Presentation #2: Opportunities in Securing Mobile Applications
Mobile apps are changing business models and will decide the success of your products. It is proven that most commercial (CRM, Accounting software, etc) and personal (Home Theater, TV) products with mobile capabilities do better long term in the market than their competitors with traditional web interfaces. Yet most IOS and android apps are impacted by medium to severe security vulnerabilities that put application data, as well as data stored on the device, at risk.
This interactive presentation will discuss common mobile application security vulnerabilities and remediation strategies that entrepreneurs and organizations should adopt to develop and put out secure mobile apps. We will play around with real mobile apps from Apple and Google Play stores, use open source tools to identify security vulnerabilities, and discuss countermeasures that will protect critical data and application functionality
- Technical expertise with business acumen
- Security risk assessments, penetration testing, Web/Mobile/Cloud platforms, secure software development, threat modeling, code reviews
- PCI, HIPAA, ISO and other security standards and compliance
- Security training for developers – Online and Instructor led
- Published author & regular speaker at OWASP, RSA, ISACA, and other conferences