SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
30 January 2013
Vladislav Jež
Partner, Credo Ventures
Local to Global:
Cognitive Security Case Study
Esther Dyson
Chair
about us
Reshma Sohoni
Board Member
advisory board
Stuart Chapman
Board Member
€18 million
raised from over 30 high-net-worth
individuals
sold to CISCO Systems sold to Brand Embassy
3 Partners + 2 Associates
office in Prague
Credo Ventures - Credostage 1 Fund - /2011/
Key Factors For Building a Global Leader
University Spin-offs In CEE, Opportunities And Challenges
Observations and
experiments are
performed
Research
University develops
preliminary
commercialization
strategy
Market
assessment
University may
pursue patent
protection
Patenting
University
proactively
approaches
companies,
entrepreneurs, and
investors to bring
the technology to
market
Prospecting
Startup is created
and compensation
to university may
involve fixed fees,
milestone fees,
royalties, equity,
and other forms
The deal
Source: OTC (University of Texas at Austin)
5 Steps of Technology Commercialization
Cognitive Security
a provider of Network Behavior Analysis products and services. It uses advanced
Artificial Intelligence techniques to complement current firewalls and Intrusion
Detection/Prevention security systems and to protect its users against modern
sophisticated network attacks.
Quick pitch:
experts in Network Behavior Analysis
Location:
Prague, Czech Republic
Funding:
EUR 1 million (4/2011)
Exit:
sold to Cisco Systems (2/2013)
COSE Timeline
COMPANY
ESTABLISHED
LICENSE
AGREEMENT
COGNITIVEONE
LAUNCHED
SILICON VALLEY
COGNITIVEONE
2.0
DUE DILIGENCE
START
BUSINESS PLAN
DRAFT
TERM SHEET
SIGNED
VC
INVESTMENT
CISCO OEM
DEAL
VP SALES
HIRED
BULL
DEAL
HEAD OF
SALES HIRED
US NAVY
DEAL
NEW
STRATEGY
BREAK-EVEN
20
EMPLOYESS
TELCO
DEAL
FUNDRAISING
START
TERM SHEET
SIGNED
EQUITY
BUYOUT
EXIT
NEGOTIATIONS
DUE DILIGENCE
START
ACQUIRED
BY CISCO
Investment Case
The business need
- Sales & marketing expansion
- Research & development
- Access to international networks
- Improve corporate governance
Actions to create lasting value
- Active help since the first meeting
- Built a broad and competent
ownership structure
- Strengthening of the sales team
- Active board-level work
- Buyout of a passive angel investor
- Support in exit process
Outcomes
- Built the leading IT security
company
- The company now employs +30
people
- Expansion to global market that
would have taken years organically
- Negotiation with top tier VC
- Sale of Cognitive Security to Cisco
Systems after 20 months from the
investment
- Large return on investment
Key Factors To Invest
People
Prove it
- strong product/market fit
- first revenue
- founders‘ dedication
- angel funding
Problem
Payment
- security as a service (SME)
- $ 2/4/5+ k/year
- enterprise and OEM
- $ 30/100/250+ k/year
Potential
Polymorphic
malware
APT
Zero-day
attacks
2009
Intrusion Detection/Prevention
market segment
2013
$3.5b
$2b
Shareholding Structure Development
40%
60%
Angel investor
Founders
Original, Aug-09
3%
12%
42%
44%
Board members
ESOP
VC investors
Founders
Final, Feb-13
+ earn-out
COSE Team In CISCO
- COSE sales operation taken up by
CISCO
- COSE provided as CISCO technology
- Further integration with other CISCO
security technology
- COSE will be integrated on the cloud
- COSE will support CISCO SIO
COSE Team In CISCO
- International team of 30 young
engineers, developers and scientists
- 5 (+5) Phds in Computer
Sciencs/Artificial Inteligence
- Martin Rehak – Principal Engineer
- Michal Pechoucek – Director of
Enineering
- Based at Charles Square, Prague
Thank You
Vladislav Jež
Partner
Credo Ventures
Křížová 2598/4, Prague 5, 150 00
Czech Republic
http://www.credoventures.com
email: jez@credoventures.com
mob: +420 737 238 278
http://cz.linkedin.com/in/vladojez
@CredoVentures

Mais conteúdo relacionado

Mais procurados

Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Matthew Rosenquist
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Security Transformation
Security TransformationSecurity Transformation
Security TransformationFaisal Yahya
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat ResponseVivek Jindaniya
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseShwetank Jayaswal
 

Mais procurados (20)

Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 

Destaque

Technological Convergence - it-cafe
Technological Convergence - it-cafeTechnological Convergence - it-cafe
Technological Convergence - it-cafeMasoud Zamani
 
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best FriendCognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best FriendSparkCognition
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in SecurityDeveloping Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in Securitychrissanders88
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Gabriel Dusil
 

Destaque (6)

IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Technological Convergence - it-cafe
Technological Convergence - it-cafeTechnological Convergence - it-cafe
Technological Convergence - it-cafe
 
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best FriendCognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
 
report
reportreport
report
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in SecurityDeveloping Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in Security
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
 

Semelhante a Local to Global Cognitive Security Case Study

Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 
Backupeugene.buff
Backupeugene.buffBackupeugene.buff
Backupeugene.buffNASAPMC
 
Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...
Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...
Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...Michael Heiss
 
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De WaeleFintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De WaeleFinTech Belgium
 
Presentation Slides From Vision to Business - David Seoane FundingBox .pdf
Presentation Slides From Vision to Business - David Seoane FundingBox .pdfPresentation Slides From Vision to Business - David Seoane FundingBox .pdf
Presentation Slides From Vision to Business - David Seoane FundingBox .pdfFIWARE
 
Prof.Marik @ Stanford University
Prof.Marik @ Stanford UniversityProf.Marik @ Stanford University
Prof.Marik @ Stanford UniversityVladimir Marik
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
o.vision - NOAH19 London
o.vision - NOAH19 Londono.vision - NOAH19 London
o.vision - NOAH19 LondonNOAH Advisors
 
RUSI presentation OrbisIP
RUSI presentation OrbisIPRUSI presentation OrbisIP
RUSI presentation OrbisIPRob Rowlingson
 
DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130
DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130
DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130FinTech Belgium
 
Knife Capital Exit Conference - May 2014
Knife Capital Exit Conference - May 2014Knife Capital Exit Conference - May 2014
Knife Capital Exit Conference - May 2014Gareth Jane
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016Sarah Bark
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 

Semelhante a Local to Global Cognitive Security Case Study (20)

Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 
Backupeugene.buff
Backupeugene.buffBackupeugene.buff
Backupeugene.buff
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...
Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...
Open Innovation Networks - Crowd Sourcing and Internal Expert Networks at Sie...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De WaeleFintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
Fintech Belgium Summit 2017 - How to fund - B- Hive by Wim De Waele
 
Presentation Slides From Vision to Business - David Seoane FundingBox .pdf
Presentation Slides From Vision to Business - David Seoane FundingBox .pdfPresentation Slides From Vision to Business - David Seoane FundingBox .pdf
Presentation Slides From Vision to Business - David Seoane FundingBox .pdf
 
Prof.Marik @ Stanford University
Prof.Marik @ Stanford UniversityProf.Marik @ Stanford University
Prof.Marik @ Stanford University
 
Aumento ventures
Aumento venturesAumento ventures
Aumento ventures
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
o.vision - NOAH19 London
o.vision - NOAH19 Londono.vision - NOAH19 London
o.vision - NOAH19 London
 
RUSI presentation OrbisIP
RUSI presentation OrbisIPRUSI presentation OrbisIP
RUSI presentation OrbisIP
 
Vt cho re_os_ko
Vt cho re_os_koVt cho re_os_ko
Vt cho re_os_ko
 
DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130
DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130
DFS21_EU Pitch Battle_ Gabriel Levie_Wequity_211130
 
Knife Capital Exit Conference - May 2014
Knife Capital Exit Conference - May 2014Knife Capital Exit Conference - May 2014
Knife Capital Exit Conference - May 2014
 
13028 fn broschuere_engl
13028 fn broschuere_engl13028 fn broschuere_engl
13028 fn broschuere_engl
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 

Último

NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...Amil Baba Dawood bangali
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxuzma244191
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...Amil baba
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTharshitverma1762
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 

Último (20)

NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptx
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 

Local to Global Cognitive Security Case Study

  • 1. 30 January 2013 Vladislav Jež Partner, Credo Ventures Local to Global: Cognitive Security Case Study
  • 2. Esther Dyson Chair about us Reshma Sohoni Board Member advisory board Stuart Chapman Board Member €18 million raised from over 30 high-net-worth individuals sold to CISCO Systems sold to Brand Embassy 3 Partners + 2 Associates office in Prague Credo Ventures - Credostage 1 Fund - /2011/
  • 3. Key Factors For Building a Global Leader
  • 4. University Spin-offs In CEE, Opportunities And Challenges Observations and experiments are performed Research University develops preliminary commercialization strategy Market assessment University may pursue patent protection Patenting University proactively approaches companies, entrepreneurs, and investors to bring the technology to market Prospecting Startup is created and compensation to university may involve fixed fees, milestone fees, royalties, equity, and other forms The deal Source: OTC (University of Texas at Austin) 5 Steps of Technology Commercialization
  • 5. Cognitive Security a provider of Network Behavior Analysis products and services. It uses advanced Artificial Intelligence techniques to complement current firewalls and Intrusion Detection/Prevention security systems and to protect its users against modern sophisticated network attacks. Quick pitch: experts in Network Behavior Analysis Location: Prague, Czech Republic Funding: EUR 1 million (4/2011) Exit: sold to Cisco Systems (2/2013)
  • 6. COSE Timeline COMPANY ESTABLISHED LICENSE AGREEMENT COGNITIVEONE LAUNCHED SILICON VALLEY COGNITIVEONE 2.0 DUE DILIGENCE START BUSINESS PLAN DRAFT TERM SHEET SIGNED VC INVESTMENT CISCO OEM DEAL VP SALES HIRED BULL DEAL HEAD OF SALES HIRED US NAVY DEAL NEW STRATEGY BREAK-EVEN 20 EMPLOYESS TELCO DEAL FUNDRAISING START TERM SHEET SIGNED EQUITY BUYOUT EXIT NEGOTIATIONS DUE DILIGENCE START ACQUIRED BY CISCO
  • 7. Investment Case The business need - Sales & marketing expansion - Research & development - Access to international networks - Improve corporate governance Actions to create lasting value - Active help since the first meeting - Built a broad and competent ownership structure - Strengthening of the sales team - Active board-level work - Buyout of a passive angel investor - Support in exit process Outcomes - Built the leading IT security company - The company now employs +30 people - Expansion to global market that would have taken years organically - Negotiation with top tier VC - Sale of Cognitive Security to Cisco Systems after 20 months from the investment - Large return on investment
  • 8. Key Factors To Invest People Prove it - strong product/market fit - first revenue - founders‘ dedication - angel funding Problem Payment - security as a service (SME) - $ 2/4/5+ k/year - enterprise and OEM - $ 30/100/250+ k/year Potential Polymorphic malware APT Zero-day attacks 2009 Intrusion Detection/Prevention market segment 2013 $3.5b $2b
  • 9. Shareholding Structure Development 40% 60% Angel investor Founders Original, Aug-09 3% 12% 42% 44% Board members ESOP VC investors Founders Final, Feb-13 + earn-out
  • 10. COSE Team In CISCO - COSE sales operation taken up by CISCO - COSE provided as CISCO technology - Further integration with other CISCO security technology - COSE will be integrated on the cloud - COSE will support CISCO SIO
  • 11. COSE Team In CISCO - International team of 30 young engineers, developers and scientists - 5 (+5) Phds in Computer Sciencs/Artificial Inteligence - Martin Rehak – Principal Engineer - Michal Pechoucek – Director of Enineering - Based at Charles Square, Prague
  • 12. Thank You Vladislav Jež Partner Credo Ventures Křížová 2598/4, Prague 5, 150 00 Czech Republic http://www.credoventures.com email: jez@credoventures.com mob: +420 737 238 278 http://cz.linkedin.com/in/vladojez @CredoVentures