1. WELCOME TO PCM’s
Alan Lawrence
President – PCMG-G
Public Sector
Bob Bogle
Senior Vice President
Field Sales West
2. INVESTMENTS TO SUPPORT ACCOUNT MANAGER AND CUSTOMERS
CUSTOMER
Face to Face
Phone
Digital
Mobile
ACCOUNT
MANAGER
Business
Development
Managers
Engineers &
Pre-Sales
Support
Professional
Services
Managed Services
Microsoft &
Software
Service Delivery
Advanced & Field
STRATIFORM
(Security & Cloud)
3. MISSION FIRST
• Serving the needs of Public Sector
Customers Worldwide for Nearly 30 Years
• Federal Government (DoD, Civilian,
Advanced Programs)
• State and Local
• Education (K-12 and Higher Ed)
• System Integrators
• Combine Commercial Products from leading
Technology Manufacturers with Certified
Engineer and Integration Service to Tailor
Solutions for Each Customer
• Wide Range of Federal, State and Local, and
Contract Vehicles
• Dedicated, Certified Acquisition and
Program Management Team
4. 2017 marked a major milestone for PCM
We're celebrating 30 years as a trusted IT solutions provider!
We started in garage and now a Global Fortune 1000
IT Solutions and Services Provider
6. MOBILE, CLOUD AND SECURITY
DIGITAL TRANSFORMATION IS NOW AN IMPERATIVE
7. WHO IS PCM?
MOBILE FIRST
We live in a world of mobile technology but it’s not the
technology that’s Mobile it’s the users. We assist customers with
custom solutions in multiple form factors with unique
applications, securely, with a complete managed experience.
CLOUD FIRST
An agnostic cloud approach to understanding a customers unique
business and technical requirements leveraging our assess,
implement, manage and enhance methodology to insure a
seamless journey to the clouds.
SECURITY FIRST
A complete security methodology assessing security requirements,
threat areas, business risk leveraging best of breed security
technologies with the governance and processes to implement a
comprehensive security architecture, identifying controls with the
governance to manage them, and the capacity to remediate
threats as the landscape changes.
A HOLISTIC, COMPREHENSIVE SOLUTION COMPANY
8. MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
Workforce
Anywhere
• Any device – Anywhere
• High, low and no touch
options to transact your
business
• Secure access to data
• Pocket to cloud
enablement
• Fleet and contingent
workforce solutions
Product
Development
• Tailored for customer
experience
• Application accessibility
• Customized solutions
• Custom packaging and
delivery
• Program management
• Data acquisition for
analytics
Support
Everywhere
• Customer experience
driven
• Multi-lingual support
• Global field services
• Warehousing
• Depot options
• Disposal solutions
• Full asset management
9. MOBILE FIRST
FOCUSED ON ALWAYS AVAILABLE ACCESS
All Rights Reserved for Customer Owned Images
10. Don't worry about which Cloud partner provides your business with
the best options. PCM partners with all of todays leading public
cloud providers to design a solution that fits your business best.
We also integrate with your premise private cloud solution.
Transformation
Methodology
Ongoing
Customer
Success
Solution
Focused
PCM Cloud
Strategy
FOUNDATION OF THE
PCM CLOUD STRATEGY
Platform and
Partners
FOCUSED ON HYBRID
Your Cloud
11. The PCM Complete for Cloud program gives every customer
access to the Transformational Services, tools and resources
needed at every step of the solution lifecycle.
Assess
• Envisioning Sessions
• Solution Assessments
• Plan & Roadmap
Implement
• Migration Services
• Deployment Services
• Adoption Services
Enhance
• Cloud Advisors
• Cloud Residents
Ongoing
Customer
Success
Solution
Focused
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Manage
• Straticare Support
• Change Management
• 24/7 Operations
FOUNDATION OF THE
PCM CLOUD STRATEGY
12. FOUNDATION OF THE
PCM CLOUD STRATEGY Ongoing
Customer
Success
Platform and
Partners
PCM Cloud
Strategy
Transformation
Methodology
Solution Alignment
• Collaboration and Productivity – Modern Workplace
• Data Center Transformation, Business Continuity,
Storage, Application Migration- Modern Infrastructure
• Data Visualization, and usage -Modern Data
• Top ERP solutions available as a Service
Solution
Focused
13. Cloud Resident
For customer deploying cloud based solutions –
90 day Architect on-site to assist select clients with
transitioning to the cloud with multiple disciplines.
Cloud Advisor –Regular monthly engagement with client
to help drive business initiatives with cloud technology.
Cloud Advisor
New Roles | New Focus
Managed Hybrid Cloud Support
FOUNDATION OF THE
PCM CLOUD STRATEGY
Transformational
Methodology
Platforms and
Partners
Solution
Focused
PCM Cloud
Strategy
FOCUSED ON CUSTOMER SUCCESS &
AN ENHANCED EXPERIENCE
Ongoing
Customer
Success
14. SECURITY FIRST
FOCUSED ON HELPING COMPANIES AT EVERY STAGE
Manage Security
Environment
Determine Current &
Target Scale
Assessment Security
Requirements
Communicate & Execute
your Roadmap
Develop Improvement
Plans
15. RIGHT NOW
For more information please contact your Account Representative or
Stephen.Moss@pcm.com Herb.Hogue@pcm.com Robert.Hall@pcm.com
today for Your Right Now solution.
Mobile
CloudSecure
43. RIGHT NOW
SVP of Security Practice
Tuesday, November 6, 2017
Gary Miglicco
44.
45. WRAP UP
SVP/GM of Inside Sales
Monday, November 6, 2017
Keith Joseph
46. Platinum & Gold Partner
Breakout sessions
Tech Expo 2:00-5:30
Cocktail Reception &
Attendee Gift Distribution
UP NEXT
Notas do Editor
VIDEO NEXT SLIDE
Describe how your childhood influenced you and set you out on this journey
Often alone due to parents being busy
Obsession with puzzles, games and video games that were challenged.
At the end of the day, you just like solving problems and creating solutions to challenges
Anecdote about his father giving him his first computer
Go into detail about
How many hours you spent on the computer
Talk about your fathers office and entertaining yourself with the computer
What it felt like
Why you liked it so much
What were the first things you did on the computer
Describe your first time on the internet
Who introduced you, where you were, why you went on there in the first place
Your initial thoughts
And how your activities on the internet evolved
Describe your humble beginnings,
Your first exploits, the inspiration the results
Your evolution in skill and the escalation of the severity of the hacking
I was recruited my Russia’s top hacking group… a world reowned group called TNT
Described how you were recruited
What those first conversations were like
Was there an initiation process, what was it?
what happened next
I was recruited my Russia’s top hacking group… a world renound group called TNT
Described how you were recruited
What those first conversations were like
Was there an initiation process, what was it?
what happened next
Here’s the actual code that MafiaBoy used in his attack. Can we put this on an old school computer with some like weird ass coder looking font/treatment?
Tools Used:
Trinoo
IMP.C
TF2k
Stacheldraht
Describe what people are looking at and then in great detail explain the attack
The idea/inspiration
How you picked the targets
How you did it
Who the targets were (name 4-5)
Did anyone in your personal life know you were going to do it
Where you were
How it felt
You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered.
Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety.
People began to sell and my targets scrambled to regain credibility but it was too late.
It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected.
CLICK
You have to understand that this was in the heat of the ecommerce boom and when you start to see websites like eBay, Amazon, UPS and CNN unexpectedly go down – any confidence the public had in this new platform was shattered.
Project Rivolta shocked the market, frightened consumers and disrupted the public perception of online safety.
People began to sell and my targets scrambled to regain credibility but it was too late.
It’s projected that the end result was 1.7 billion dollars in economic damage across the 16 companies that were affected.
CLICK
Things to touch on:
Family/friend reaction
Juvenile detention
Being released from Juvenile detention at reintegrating into society
Reference the trailer – As I mentioned in the video a hacker’s arsenal is much more sophisticated today and so are their motivations.
The first is the institutionalization of hacking.
When I was hacking, it was about Exploration, pushing the status quo circumventing preset parameters – those motivations are still there but there is a completely different set of threats impacting organizations like yours.
Today, it’s about Financial Gain, Ideology, Politics and Entertainment and these groups are much different from ones like I was a part of like TNT
Today, they are often state sponsored, numbered businesses, organizations whose reputation is build on their ability to get results.
These grandiose motivations, highly evolved collectives of talent hackers, you gets grandiose and complex attacks.
Although everyone in this room is very cognizant of the threats that exist online – that every email, every link, every attachment is a potential threat – the truth of the matter is, we are the minority.
Everyone organization that is represented in this room is made up almost entirely of employees who don’t think in terms of risk, who don’t see themselves as the target and act first and think later.
65% of all breaches happen from internal – people can’t resist.
I know for a fact that this is what keeps you up at night.
Those are the obvious examples but let me tell you about one of the more sophisticated social engineering tactics I’ve employed as a pen tester:
Tell Car/Train story
Thankfully for that client, this was only a test. But let me tell you about one of the most devastating attacks that came as the result of a simple phishing scam that shook the foundation of a multi-billion dollar company
The internet of things revolution has made devices smarter, it’s made our lives easier but it’s also made us more susceptible than ever before to cyber attacks.
And as more and more devices are added to our networks the time, energy and resources you’re able to dedicate to securing them is drawn thinner and thinner.
For the last several years, we’ve been focused on securing the truly mobile devices that scale across our organizations: smart phones, tablets and laptops.
I like to think of the analogy of focusing 90% of your efforts on those devices is like locking the front and back doors.
The problem for organizations though is….
CLICK
Hackers come through the pipes.
While we’re talking about end points within this context, let’s dissect one in particular that is often overlooked but a huge red herring for many organizations.
CLICK
A few questions for the room: how many printers does your organization have in your fleet?
If you asked any of the employees in your organization – do you think they would have a sense of what kind of information flows through your company printer every day? I am willing to bet, because I’ve had these conversations – the general perception is that printers are purely an output device, and aside from rare chance of paper being stolen from the tray – they aren’t a risk.
We all know that if that printer is connected to the company network, that’s not true.
CLICK
What security protocols are currently managing your printer fleet? If you don’t know the answer or if the answer isn’t a robust list. Let me ask you:
if you suffered a breach through one of your printers.. would you know it happened and how long would it take you to find the breach?
CLICK
So we know hackers are looking for entry points to your organization that function more like pipes than front and back doors.
And you have a fleet of printers that may not be overly secure.
Ask yourself, can your organization stand to have a blind spot that large?
I can tell you as someone who has been on both sides of this battleground between IT and cyber criminals that you cannot.
CLICK
Today, I work as a security consultant and penetration tester and as a result, I’ve heard the security spiel from every major technology company.
And, I’ve also seen how exposed many of those companies are leaving their customers.
We all see daily news headlines about data breaches and hacking, so of course technology companies will tout security as a product feature, but are they really bringing it to the core of their offering and bringing it across devices? In my experience, many are not.
As more and more connected PCs, Printers and other devices flood our networks and more and more data goes in transit, IT departments are scrambling to keep up – and the truth us, they can’t do it by themselves – they need help.
And that’s really what inspired me to begin working with HP.
They aren’t just talking the talk, they’re walking the walk. I’ve had the opportunity to work with the HP labs team, and peak underneath the hood and can tell you that whether it’s PC or Print – HP is delivering best in class security solutions, at the device level – the sort of security based-automation and protection that today’s businesses need to ensure they’re protected, at all times.
But what do I mean about building in security technology at the device level?
CLICK
Security at the Firewall level, isn’t enough – because of extremely sophisticated attacks that are now happening below the firmware.
On the PC side of things, let’s look at HPSureStart for example which protects against those attacks below firmware, at the BIOS level. SureStart protects against the attacks targeting the millions of lines of code before your operating system boots up and the firewall has an opportunity to engage and protect you. SureStart ensures that you’re protected from the moment you hit that power button. I can’t tell you how many end-users are being saved on a daily basis by features like this – amazing stuff.
CLICK
In terms of Print, let’s examine just one example of the tremendous enhancements in print security technology HP has championed.
HP Runtime Intrusion Detection which constantly analyzes for malware attacks and any other inconsistencies. Sounds standard right?
Well, what truly sets Runtime Intrusion Detection apart is its ability to identify, delete, self-heal and then reboot, automatically without the need for a service call.
What IT department that you know of wouldn’t benefit from this self-detection and healing technology, it’s precisely to kind of safety nets today’s employees need to ensure they aren’t making mistakes online that could cost a business millions, without even knowing it.
CLICK
Today, we’ve discussed my story, and how much hacking has changed. The motivation, the techniques, the perpetrators and even the targeted devices.
We talked about how IT departments are often being tasked to do more with less – a difficult mandate when you consider the huge proliferation of sophisticated devices that are joining company networks everyday.
And finally, we discussed what HP is doing to help the IT department shore up the defense against cyber-attacks at the device level, to create the layers of security required to protect your devices and provide the modern IT department with the necessary safety nets and detection protocol to act with quickness and efficiency when attacks do happen.
I urge all of you to re-assess what is being done at the organizational, individual employee and device level to protect yourselves, before it’s too late.
Thank you.