SlideShare a Scribd company logo
30 January 2013
Vladislav Jež
Partner, Credo Ventures
Local to Global:
Cognitive Security Case Study
Esther Dyson
Chair
about us
Reshma Sohoni
Board Member
advisory board
Stuart Chapman
Board Member
€18 million
raised from over 30 high-net-worth
individuals
sold to CISCO Systems sold to Brand Embassy
3 Partners + 2 Associates
office in Prague
Credo Ventures - Credostage 1 Fund - /2011/
Key Factors For Building a Global Leader
University Spin-offs In CEE, Opportunities And Challenges
Observations and
experiments are
performed
Research
University develops
preliminary
commercialization
strategy
Market
assessment
University may
pursue patent
protection
Patenting
University
proactively
approaches
companies,
entrepreneurs, and
investors to bring
the technology to
market
Prospecting
Startup is created
and compensation
to university may
involve fixed fees,
milestone fees,
royalties, equity,
and other forms
The deal
Source: OTC (University of Texas at Austin)
5 Steps of Technology Commercialization
Cognitive Security
a provider of Network Behavior Analysis products and services. It uses advanced
Artificial Intelligence techniques to complement current firewalls and Intrusion
Detection/Prevention security systems and to protect its users against modern
sophisticated network attacks.
Quick pitch:
experts in Network Behavior Analysis
Location:
Prague, Czech Republic
Funding:
EUR 1 million (4/2011)
Exit:
sold to Cisco Systems (2/2013)
COSE Timeline
COMPANY
ESTABLISHED
LICENSE
AGREEMENT
COGNITIVEONE
LAUNCHED
SILICON VALLEY
COGNITIVEONE
2.0
DUE DILIGENCE
START
BUSINESS PLAN
DRAFT
TERM SHEET
SIGNED
VC
INVESTMENT
CISCO OEM
DEAL
VP SALES
HIRED
BULL
DEAL
HEAD OF
SALES HIRED
US NAVY
DEAL
NEW
STRATEGY
BREAK-EVEN
20
EMPLOYESS
TELCO
DEAL
FUNDRAISING
START
TERM SHEET
SIGNED
EQUITY
BUYOUT
EXIT
NEGOTIATIONS
DUE DILIGENCE
START
ACQUIRED
BY CISCO
Investment Case
The business need
- Sales & marketing expansion
- Research & development
- Access to international networks
- Improve corporate governance
Actions to create lasting value
- Active help since the first meeting
- Built a broad and competent
ownership structure
- Strengthening of the sales team
- Active board-level work
- Buyout of a passive angel investor
- Support in exit process
Outcomes
- Built the leading IT security
company
- The company now employs +30
people
- Expansion to global market that
would have taken years organically
- Negotiation with top tier VC
- Sale of Cognitive Security to Cisco
Systems after 20 months from the
investment
- Large return on investment
Key Factors To Invest
People
Prove it
- strong product/market fit
- first revenue
- founders‘ dedication
- angel funding
Problem
Payment
- security as a service (SME)
- $ 2/4/5+ k/year
- enterprise and OEM
- $ 30/100/250+ k/year
Potential
Polymorphic
malware
APT
Zero-day
attacks
2009
Intrusion Detection/Prevention
market segment
2013
$3.5b
$2b
Shareholding Structure Development
40%
60%
Angel investor
Founders
Original, Aug-09
3%
12%
42%
44%
Board members
ESOP
VC investors
Founders
Final, Feb-13
+ earn-out
COSE Team In CISCO
- COSE sales operation taken up by
CISCO
- COSE provided as CISCO technology
- Further integration with other CISCO
security technology
- COSE will be integrated on the cloud
- COSE will support CISCO SIO
COSE Team In CISCO
- International team of 30 young
engineers, developers and scientists
- 5 (+5) Phds in Computer
Sciencs/Artificial Inteligence
- Martin Rehak – Principal Engineer
- Michal Pechoucek – Director of
Enineering
- Based at Charles Square, Prague
Thank You
Vladislav Jež
Partner
Credo Ventures
Křížová 2598/4, Prague 5, 150 00
Czech Republic
http://www.credoventures.com
email: jez@credoventures.com
mob: +420 737 238 278
http://cz.linkedin.com/in/vladojez
@CredoVentures

More Related Content

PDF
Ibm cognitive security_white_paper_04_2016
PPTX
Security in the Cognitive Era: Why it matters more than ever
PDF
Peter Allor - The New Era of Cognitive Security
PPTX
cybersecurity strategy planning in the banking sector
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PPTX
What i learned at issa international summit 2019
PDF
IT Security - Guidelines
PDF
Pivotal Role of HR in Cybersecurity
Ibm cognitive security_white_paper_04_2016
Security in the Cognitive Era: Why it matters more than ever
Peter Allor - The New Era of Cognitive Security
cybersecurity strategy planning in the banking sector
Information Security - Back to Basics - Own Your Vulnerabilities
What i learned at issa international summit 2019
IT Security - Guidelines
Pivotal Role of HR in Cybersecurity

What's hot (20)

PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
2014 the future evolution of cybersecurity
PPTX
Security Transformation
PPTX
Overview of Artificial Intelligence in Cybersecurity
PDF
True Cost of Data Breaches
PPT
Information security.pptx
PPT
Challenges in implementating cyber security
PDF
Cyber Security Strategies and Approaches
PPTX
Your cyber security webinar
PPTX
Threat Modelling And Threat Response
PDF
"Thinking diffrent" about your information security strategy
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
PPTX
IT Security and Risk Mitigation
PPT
Avoiding data breach using security intelligence and big data to stay out of ...
PDF
Cybersecurity solution-guide
PDF
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
PDF
IBM Security Products: Intelligence, Integration, Expertise
PDF
Security Awareness
Securing the Cloud by Matthew Rosenquist 2016
Dealing with Information Security, Risk Management & Cyber Resilience
2014 the future evolution of cybersecurity
Security Transformation
Overview of Artificial Intelligence in Cybersecurity
True Cost of Data Breaches
Information security.pptx
Challenges in implementating cyber security
Cyber Security Strategies and Approaches
Your cyber security webinar
Threat Modelling And Threat Response
"Thinking diffrent" about your information security strategy
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
IT Security and Risk Mitigation
Avoiding data breach using security intelligence and big data to stay out of ...
Cybersecurity solution-guide
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
IBM Security Products: Intelligence, Integration, Expertise
Security Awareness
Ad

Viewers also liked (6)

PPTX
IBM MaaS360 with Watson
PDF
Technological Convergence - it-cafe
PDF
Cognitive Security: How Artificial Intelligence is Your New Best Friend
PDF
PPT
Developing Analytic Technique and Defeating Cognitive Bias in Security
PDF
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
IBM MaaS360 with Watson
Technological Convergence - it-cafe
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Developing Analytic Technique and Defeating Cognitive Bias in Security
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Ad

Similar to Cognitive Security Case Study (14)

PDF
20150409_SM_v3
PPTX
A guide to Sustainable Cyber Security
PPTX
Securing Systems - Still Crazy After All These Years
PPTX
Latest slide intro for TRUSTLESS.AI
PDF
The CyberScope - 2014 Market Review
PPTX
CyberSecurity Portfolio Management
PDF
Andrej Kiska - Credo Ventures - CZ - VC & Startup Ecosystem in Central Europe...
PDF
The CyberScope - Q1 2015 Market Review
PPTX
Co3's Annual Review & Predictions Webinar
PPTX
InfraGard Webinar March 2016 033016 A
PPTX
M&A Presentation Cisco Version FINAL
PPTX
Security Snake Oil Cycle 2019
PDF
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
PDF
CzechInvest - ICT Sector - Matous Kostlivy
20150409_SM_v3
A guide to Sustainable Cyber Security
Securing Systems - Still Crazy After All These Years
Latest slide intro for TRUSTLESS.AI
The CyberScope - 2014 Market Review
CyberSecurity Portfolio Management
Andrej Kiska - Credo Ventures - CZ - VC & Startup Ecosystem in Central Europe...
The CyberScope - Q1 2015 Market Review
Co3's Annual Review & Predictions Webinar
InfraGard Webinar March 2016 033016 A
M&A Presentation Cisco Version FINAL
Security Snake Oil Cycle 2019
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
CzechInvest - ICT Sector - Matous Kostlivy

Recently uploaded (20)

PDF
Blockchain Pesa Research by Samuel Mefane
PPTX
Introduction to Managemeng Chapter 1..pptx
PPTX
Introduction to Essence of Indian traditional knowledge.pptx
PPTX
How best to drive Metrics, Ratios, and Key Performance Indicators
PDF
how_to_earn_50k_monthly_investment_guide.pdf
PDF
Bladex Earnings Call Presentation 2Q2025
PPTX
What is next for the Fractional CFO - August 2025
PDF
Topic Globalisation and Lifelines of National Economy.pdf
PPTX
EABDM Slides for Indifference curve.pptx
PPTX
Who’s winning the race to be the world’s first trillionaire.pptx
PDF
ADVANCE TAX Reduction using traditional insurance
PPTX
kyc aml guideline a detailed pt onthat.pptx
PDF
way to join Real illuminati agent 0782561496,0756664682
PDF
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
PDF
final_dropping_the_baton_-_how_america_is_failing_to_use_russia_sanctions_and...
PPTX
4.5.1 Financial Governance_Appropriation & Finance.pptx
PDF
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
PPTX
fastest_growing_sectors_in_india_2025.pptx
PDF
Understanding University Research Expenditures (1)_compressed.pdf
PDF
Mathematical Economics 23lec03slides.pdf
Blockchain Pesa Research by Samuel Mefane
Introduction to Managemeng Chapter 1..pptx
Introduction to Essence of Indian traditional knowledge.pptx
How best to drive Metrics, Ratios, and Key Performance Indicators
how_to_earn_50k_monthly_investment_guide.pdf
Bladex Earnings Call Presentation 2Q2025
What is next for the Fractional CFO - August 2025
Topic Globalisation and Lifelines of National Economy.pdf
EABDM Slides for Indifference curve.pptx
Who’s winning the race to be the world’s first trillionaire.pptx
ADVANCE TAX Reduction using traditional insurance
kyc aml guideline a detailed pt onthat.pptx
way to join Real illuminati agent 0782561496,0756664682
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
final_dropping_the_baton_-_how_america_is_failing_to_use_russia_sanctions_and...
4.5.1 Financial Governance_Appropriation & Finance.pptx
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
fastest_growing_sectors_in_india_2025.pptx
Understanding University Research Expenditures (1)_compressed.pdf
Mathematical Economics 23lec03slides.pdf

Cognitive Security Case Study

  • 1. 30 January 2013 Vladislav Jež Partner, Credo Ventures Local to Global: Cognitive Security Case Study
  • 2. Esther Dyson Chair about us Reshma Sohoni Board Member advisory board Stuart Chapman Board Member €18 million raised from over 30 high-net-worth individuals sold to CISCO Systems sold to Brand Embassy 3 Partners + 2 Associates office in Prague Credo Ventures - Credostage 1 Fund - /2011/
  • 3. Key Factors For Building a Global Leader
  • 4. University Spin-offs In CEE, Opportunities And Challenges Observations and experiments are performed Research University develops preliminary commercialization strategy Market assessment University may pursue patent protection Patenting University proactively approaches companies, entrepreneurs, and investors to bring the technology to market Prospecting Startup is created and compensation to university may involve fixed fees, milestone fees, royalties, equity, and other forms The deal Source: OTC (University of Texas at Austin) 5 Steps of Technology Commercialization
  • 5. Cognitive Security a provider of Network Behavior Analysis products and services. It uses advanced Artificial Intelligence techniques to complement current firewalls and Intrusion Detection/Prevention security systems and to protect its users against modern sophisticated network attacks. Quick pitch: experts in Network Behavior Analysis Location: Prague, Czech Republic Funding: EUR 1 million (4/2011) Exit: sold to Cisco Systems (2/2013)
  • 6. COSE Timeline COMPANY ESTABLISHED LICENSE AGREEMENT COGNITIVEONE LAUNCHED SILICON VALLEY COGNITIVEONE 2.0 DUE DILIGENCE START BUSINESS PLAN DRAFT TERM SHEET SIGNED VC INVESTMENT CISCO OEM DEAL VP SALES HIRED BULL DEAL HEAD OF SALES HIRED US NAVY DEAL NEW STRATEGY BREAK-EVEN 20 EMPLOYESS TELCO DEAL FUNDRAISING START TERM SHEET SIGNED EQUITY BUYOUT EXIT NEGOTIATIONS DUE DILIGENCE START ACQUIRED BY CISCO
  • 7. Investment Case The business need - Sales & marketing expansion - Research & development - Access to international networks - Improve corporate governance Actions to create lasting value - Active help since the first meeting - Built a broad and competent ownership structure - Strengthening of the sales team - Active board-level work - Buyout of a passive angel investor - Support in exit process Outcomes - Built the leading IT security company - The company now employs +30 people - Expansion to global market that would have taken years organically - Negotiation with top tier VC - Sale of Cognitive Security to Cisco Systems after 20 months from the investment - Large return on investment
  • 8. Key Factors To Invest People Prove it - strong product/market fit - first revenue - founders‘ dedication - angel funding Problem Payment - security as a service (SME) - $ 2/4/5+ k/year - enterprise and OEM - $ 30/100/250+ k/year Potential Polymorphic malware APT Zero-day attacks 2009 Intrusion Detection/Prevention market segment 2013 $3.5b $2b
  • 9. Shareholding Structure Development 40% 60% Angel investor Founders Original, Aug-09 3% 12% 42% 44% Board members ESOP VC investors Founders Final, Feb-13 + earn-out
  • 10. COSE Team In CISCO - COSE sales operation taken up by CISCO - COSE provided as CISCO technology - Further integration with other CISCO security technology - COSE will be integrated on the cloud - COSE will support CISCO SIO
  • 11. COSE Team In CISCO - International team of 30 young engineers, developers and scientists - 5 (+5) Phds in Computer Sciencs/Artificial Inteligence - Martin Rehak – Principal Engineer - Michal Pechoucek – Director of Enineering - Based at Charles Square, Prague
  • 12. Thank You Vladislav Jež Partner Credo Ventures Křížová 2598/4, Prague 5, 150 00 Czech Republic http://www.credoventures.com email: jez@credoventures.com mob: +420 737 238 278 http://cz.linkedin.com/in/vladojez @CredoVentures