LSG Introduction
& Overview
1
Tomas G. Ball – Director, Sales
Agenda
• Introductions•Company Introduction•Product Overview•DeceptionGrid•Polarity
•Why LSG?
2
Company Introduction
• Lexington Solutions Group provides US Government and private sector clients with a wide range of national security, strategic communication, and management consulting services.
• We deliver holistic, common sense, cost-effective solutions to help our clients balance competing priorities, answer difficult questions, and manage complex situations.
• LSG is a VA-certified Service-Disabled Veteran Owned Small Business with an exceptionally lean management structure, delivering high value for a very competitive cost.
3
The World Leader in Deception Technology & Advanced Breach Detection
4
1, 2 VMWare Carbon Black 2020 Cybersecurity Outlook Report | 3 CrowdStrike Global Threat Report | 4 CrowdStrike Survey
COMMAND & CONTROL
ATTACKER
QUIET and FAST
Hides behind stealth techniques
Operates at low cost and low risk
> 90% 1
Use defense evasion techniques and software
1 hour 58 minutes 3
Average Time fromInitial Access to Lateral Movement
DEFENDER
COMPLEX and SLOW
Uses expensive tools and complex processes
Requires advanced analytical skills
79%2
Said finding the right talent is very or extremely challenging
162 hours 4
Average time to Detect, Triage and Contain a breach
INITIAL ACCESS
5
Traditional Cybersecurity
TrapX Mission
6
INITIAL ACCESS
Shift the Burden Onto the Attacker
Disrupt the Attack
Waste Their Time | Misinform Them
See Their Techniques | Take Control
TRAPS
INSIGHT FRICTIONSCALE
TrapX Difference
7
INSIGHT FRICTION
LURES
SCALE
DECEIVING
RESPONDING
INSIGHT FRICTION
HONEY POTS
SCALE
LEARNING
RAPID DEPLOYMENT
INTEGRATED SOLTUON
Patent No.: US010275595 (B2)Patent No.: US010372908 (B2)Patent No.: US009516054 (B2)
DeceptionGrid Overview: Analyst Ranking
8
Augmented Reality for Your DesktopAchieve Information Superiority
Augmented Reality for Your DesktopAchieve Information Superiority
The World Leader in Deception Technology & Advanced Breach Detection
PAGE | 11Problem
Data Awareness & Information RecallKnowledge workers miss critical information while they do their work which leads to mistakes in analysis
Human Memory is LimitedEven the best analysts can only keep track of a limited amount of information
“Forward-deployed Sailors and Marines must manually contextualize raw data from multiple unintegrated systems. The DON needs a network capable of delivering actionable information to the point of need.” - Dept Of the Navy Information Superiority Vision
“The current approach is characterized by vertical stovepipes of responsibility which ignore the reality that information and cybersecurity require a horizontal, systems approach across all aspects of the organization’s activities and operations. This horizontal approach is extremely important for without it, the DON cannot achieve cybersecurity.” - Secretary of the Navy Cyber Readiness Review. March 2019
PAGE | 12Solution - The Right Information in the Right Hands, Ready to Decide, Act, and Fight
Annotate or Connect to Data You Want To Remember
Computer Vision
Decision & Action – Information is Combat PowerOverlays annotations and data related to what you are working on across all your tools based on the pixels on your screen
Collective Memory
Awareness of your annotation
Awareness of your co-workers annotations
Awareness of connected data
Discovery & Analysis – Generating Information PowerWarfighters, mission partners, mission assets, contractors, share information about any text on your computer
Delivery & Defense – A Constant State of Information ReadinessAutomatically shared with entire or selectedorganization to enable better and faster decisions
Questions
13